Fortunately I had migrated from IP accounting to netflow some time ago. I do not need an expensive netflow analyzer package, I just want to keep
some logs, but I wanted to include port numbers. So I wrote a simple netflow receiver in perl using the Net::Flow package from CPAN, that just receives
the netflow stream and writes it into a tab-separated file similar to IP accounting. The deamon starts writing a new file (with date in the filename)
every day and the previous ones are compressed and kept for some limited time. Normally they are never read, they are just kept in case some
abuse report arrives.
I expect this to work in v7 (not tested yet).
Enabling L3 offloading on my CRS309 completely ignores switch ACL rules then all traffics are permitted, even those only for L2 switching.
Disable L3 offloading and reboot makes ACL rules working again.
Are ACL rules broken with L3 offloading enabled in v7.1beta6?
ACL rules should work with L3 HW offloading with exception of Fasttrack offloading. Offloaded Fasttrack connections have higher priority and bypass ACL rules. Other than that, hardware routing should obey ACL rules. Can you post your interface config please, so we try reproducing your issue on our side?
In my following config, I added the 3rd switch rule to completely disable the sfpplus1 port. However, it has no effects when l3 offloading is on. If I turn off l3 offloading, that port will be completely blocked and cannot send out any packets, but if turn l3 offloading on again, the port is working again.
I don’t have any stateful firewall configuration in /ip/firewall.
We reproduced the issue and confirm that, unfortunately, ACL rules do not work with L3 HW in v7.1beta6. The bug report has been submitted to the developers. Hopefully, it will get resolved in the next beta.
Just rolled back from beta6 due to my crs328-24p-4s+rm becoming unresponsive after a couple of days after boot. It continues to pass packets, but no response to its internal IP.
Unfortunately, I didn’t get a chance to grab logs or delve deeper, but rolling back has fixed it.
There’s nothing funky in the config except a couple of 802.3ad bonds.
Is there any known issue with Traffic Flow in beta6? It looks like I can’t get any netflow info into logstash (and I have checked everything in terms of config, FW, etc.)
If no one has an idea, I will open a support case to check if it really is an issue in MT or not.
Hopefully Cake will be stable. Currently using it (on RB750gr3) and random reboot twice so far. First one was nearly a day after setting up and the second just about 1 hour after.
Upgraded from v6-longterm to v7.1beta6, on an older RB953 with two LTE modems (Sierra MC7354, Telit LE960), to check it out. The modem both seem to working fine (once reconfig’d for MBIM & a seemingly a few reboots initially to get the ports/fw/carrier aligned, certainly needs the init delay.
BUT my issue is actually I can’t figure out how to do ECMP with the two LTE modems. I can’t seem to add multiple interface (or IP-based) “gateway”, in main or a specific table, using an interface nor another connected gateway IP. CLI or Winbox, all seem not want to take multiple gateways.
Basically is ECMP suppose to work? Maybe there some syntax for the /ip/route/add gateway=… butI tried a bunch of possible things for the two interface: “lte1,lte2” and “1.2.3.4,1.5.4.3”, “lte1 lte2”, etc., etc.
Normally it the LTE chips sometimes fight…but that seems much improved! But now I’d like to use both of them in LTE mode I can’t figure out ECMP in v7.1beta6 however.
What happens if you add them one at a time? i.e. Your command line but with gateway=lte1
Then, same command with gateway=lte2. Do you get two entries? The conversion of “lte1, lte2”
to 0.0.0.0 seems odd. I’d try it here but I downgraded my test router back to v6, swapped it into
production, then forgot to remove the SATA drive that had the licensed v7 on it.
In my case the MBIM stuff just worked in v7beta6 -VERY COOL - why there is even a “lte1” and “lte2” interfaces to even be used by ECMP. The rest of the post is just documenting what I did in case it helps someone else.
I created a new VLAN/route table to test those in my lightly modified from quickset defaults RB953, using PBR for simplicity:
# vlan for ECMP route
/interface/vlan/add name=vlan-ecmp2 vlan-id=2 interface=bridge comment=ecmp2
/ip/address/add interface=vlan-ecmp2 address=203.0.113.1/24 comment=ecmp2
# dchp-server on ECMP route
/ip/dhcp-server/network/add address=203.0.113.0/24 gateway=203.0.113.1 comment=ecmp2
/ip/pool/add name=ecmp2 ranges=203.0.113.101-203.0.113.199 comment=ecmp2
/ip/dhcp-server/add address-pool=ecmp2 name=ecmp2 interface=vlan-ecmp2 disabled=no
# with default firewall, adding to LAN interface list will do NAT
/interface/list/member/add interface=vlan-ecmp2 list=LAN
# many ways to do this part, a policy rule seemed simple to show this working (NOTE: v6 had this under "/ip route rule")
/routing/rule/add src-address=203.0.113.0/24 table=ecmp2 comment=ecmp2
Skipping un-tagging the new VLAN 2 since that more config dependant… But using an access port from VLAN 2 above, a quick test using BitTorrent to download Ubuntu ISO goes out both MBIM-based LTE connections:
It was actually doing higher speeds, but just captured one. Anyway v7 seems to have come a long way, considering we have to use PPP with Sierra modems in production today.
How does that actually work? I presume you rely on the ECMP only for the first packet of each connection to be routed to a random external connection, and then the connection tracking (NAT table) will force all the other traffic out of the chosen interface?
Otherwise it would only be useful for UDP traffic where a single UDP exchange constitutes the entire connection (DNS, NTP etc).
I would consider ECMP mostly to balance traffic over two links (e.g. VPN tunnels) where both ends are under my control and no NAT is involved.
Is there any advantage of using ECMP in your scenario, vs the “standard” solution of setting up route marking via some form of per-connection classification (based on IP+port or N’th matchers)?
Like others, the Let’s Encrypt worked (with port 80/firewall changes) - been waiting for that almost as long as MBIM: don’t like the self-signed certs but too lazy to deal with a cert hierachy.
But did run into some oddities in v7beta6 so far (hardware is RB953 in this case)…
winbox/webfig static route issues
Tried a few v7 beta now, so kinda know to use the CLI for now. But I tried in the ECMP/PBR stuff in both winbox and webfig, seem like there were still issues, noticed at least the following:
In winbox, using “@” in the “Gateway” field in a listed IP>Routes crashes winbox
Similarly, using IP>Route>Rule in winbox causes random crashes and displays different things from CLI sometimes.
In webfig, the IP>Route display either shows empty or one route. Selecting the same item from webfig menu on left, then showed entire list.
Now that we have MBIM… some suggestions/issues
LTE interface only shows “rssi” several TelIt and Sierra modems in MBIM mode - think I’ve seen it show in other beta, but RSSI is helpful be good to know rest of stats.
Using ECM mode with TelIt LC960 in this v7.1beta6 shows the RSRQ etc (Sierra can’t do ECM, so only RSSI for those RN)
While “at-chat” works - which is great - it strips “newlines” from some output… in particular ones that show CQI etc. See below. While remove newlines/“trimming” the AT output make sense most times, for the “big” AT commands with formated output, not as useful
Sierra’s output from these commands has columns with newlines so you can tell which numbers go to what: