Community discussions

MikroTik App
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Mon Jul 24, 2017 6:33 am

APIs are good but tbh SNMP is far easier to work with in NMS tools. I've found a handful of OIDs I'd really like to see supported. Particularly IPv6 traffic tracking and connection counts. Saying it's solved with scripting to custom OIDs is a total hack over supporting standardized mibs.
Yes, and adding the "Radio Name" field is something that should, IMO, be relatively easy for them to do.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10240
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Mon Jul 24, 2017 11:59 am

that should, IMO, be relatively easy for them to do.
There is probably a list of things that are relatively easy to do that is so long that it requires considerable effort to sort it all out...
 
upower3
Member
Member
Posts: 425
Joined: Thu May 07, 2015 11:46 am

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Mon Jul 24, 2017 12:46 pm

By the way, I now can see two block diagrams for routers, one for non-switched config and other is for switched. So as 6.41 is out both still be there but "switched" become "attached to the same bridge", right?

Also, on this diagram:

Image

am I right to say that if I set 2-4 ports to be switched, and port 1 as non-switched, then port 1 will be 1 Gbps, and four remaining will share another 1 Gpbs in routing scenario?
 
idlemind
Forum Guru
Forum Guru
Posts: 1146
Joined: Fri Mar 24, 2017 11:15 pm
Location: USA

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Mon Jul 24, 2017 5:31 pm

By the way, I now can see two block diagrams for routers, one for non-switched config and other is for switched. So as 6.41 is out both still be there but "switched" become "attached to the same bridge", right?

Also, on this diagram:

Image

am I right to say that if I set 2-4 ports to be switched, and port 1 as non-switched, then port 1 will be 1 Gbps, and four remaining will share another 1 Gpbs in routing scenario?
Running 6.40rc38 (won't be upgrading until 6.41rc is released) I don't get hardware offload on any ports. That's ok for me because I have the hex doing intervlan routing which is done in CPU anyways per MikroTik support. I have a separate layer 2 switch that is capable of faster speeds between the hex and my various devices for intravlan traffic.
 
HeadCraft
just joined
Posts: 16
Joined: Tue Mar 05, 2013 11:11 am

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Tue Jul 25, 2017 11:39 am

As in v6.39.2 still not changing dynamic ipsec src. address in policies and peers, when setting it in ipip tunnel interface in local address setting. And if I delete dynamic entries in ipsec policies or peers, the will not appear anymore until reboot, or set another dst address.
 
User avatar
mrz
MikroTik Support
MikroTik Support
Posts: 7056
Joined: Wed Feb 07, 2007 12:45 pm
Location: Latvia
Contact:

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Tue Jul 25, 2017 11:47 am

@HeadCraft be more specific, what you described works:
[admin@rack1_b3] /interface ipip> /ip ipsec policy print 
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes priority=0x10000 

 1  D  ;;; ipip-tunnel4
       src-address=1.1.1.1/32 src-port=any dst-address=1.1.1.2/32 dst-port=any protocol=ipencap action=encrypt 
       level=require ipsec-protocols=esp tunnel=no proposal=default priority=0x20000 ph2-count=0 
[admin@rack1_b3] /interface ipip> print 
Flags: X - disabled, R - running, D - dynamic 
 #     NAME         MTU ACTUAL-MTU LOCAL-ADDRESS   REMOTE-ADDRESS       KEEPALIVE                               DSCP
 0     ipip-tu...  auto       1480 1.1.1.1         1.1.1.2              10s,10                               inherit
 
 [admin@rack1_b3] /interface ipip> set 0 local-address=2.2.2.2 
[admin@rack1_b3] /interface ipip> /ip ipsec policy print 
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes priority=0x10000 

 1  D  ;;; ipip-tunnel4
       src-address=2.2.2.2/32 src-port=any dst-address=1.1.1.2/32 dst-port=any protocol=ipencap action=encrypt 
       level=require ipsec-protocols=esp tunnel=no proposal=default priority=0x20000 ph2-count=0 

 
 
HeadCraft
just joined
Posts: 16
Joined: Tue Mar 05, 2013 11:11 am

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Tue Jul 25, 2017 3:02 pm

@HeadCraft be more specific, what you described works:
[admin@rack1_b3] /interface ipip> /ip ipsec policy print 
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes priority=0x10000 

 1  D  ;;; ipip-tunnel4
       src-address=1.1.1.1/32 src-port=any dst-address=1.1.1.2/32 dst-port=any protocol=ipencap action=encrypt 
       level=require ipsec-protocols=esp tunnel=no proposal=default priority=0x20000 ph2-count=0 
[admin@rack1_b3] /interface ipip> print 
Flags: X - disabled, R - running, D - dynamic 
 #     NAME         MTU ACTUAL-MTU LOCAL-ADDRESS   REMOTE-ADDRESS       KEEPALIVE                               DSCP
 0     ipip-tu...  auto       1480 1.1.1.1         1.1.1.2              10s,10                               inherit
 
 [admin@rack1_b3] /interface ipip> set 0 local-address=2.2.2.2 
[admin@rack1_b3] /interface ipip> /ip ipsec policy print 
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes priority=0x10000 

 1  D  ;;; ipip-tunnel4
       src-address=2.2.2.2/32 src-port=any dst-address=1.1.1.2/32 dst-port=any protocol=ipencap action=encrypt 
       level=require ipsec-protocols=esp tunnel=no proposal=default priority=0x20000 ph2-count=0 

 
Sorry, I just found why it is not working correct (may be I doing it incorrect). The reason is that I use mikrotik DDNS as destination address in tunnel. So situation is:
[admin@MikroTik] > /interface ipip
add allow-fast-path=no ipsec-secret=123 !keepalive local-address=1.1.1.1 name=\
    ipip-tunnel1 remote-address=google-public-dns-a.google.com
After creating interface with dns there is no ipsec policies at all.
[admin@MikroTik] > ip ipsec policy print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default 
       template=yes
Lets reboot the router, and we see the policy:
[admin@MikroTik] > ip ipsec policy print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default 
       template=yes 

 1  D  ;;; ipip-tunnel1
       src-address=1.1.1.1/32 src-port=any dst-address=8.8.8.8/32 dst-port=any 
       protocol=ipencap action=encrypt level=require ipsec-protocols=esp tunnel=no 
       proposal=default priority=0 ph2-count=0

Now we will change settings in tunnel interface:
[admin@MikroTik] > /interface ipip set [find name=ipip-tunnel1] local-address=3.3.3.3
But we still see old ip in policies
[admin@MikroTik] > ip ipsec policy print                                             
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default 
       template=yes 

 1  D  ;;; ipip-tunnel1
       src-address=1.1.1.1/32 src-port=any dst-address=8.8.8.8/32 dst-port=any 
       protocol=ipencap action=encrypt level=require ipsec-protocols=esp tunnel=no 
       proposal=default priority=0 ph2-count=0
And in peers
[admin@MikroTik] > ip ipsec peer print  
Flags: X - disabled, D - dynamic, R - responder 
 0  D  ;;; ipip-tunnel1
       address=8.8.8.8/32 local-address=1.1.1.1 auth-method=pre-shared-key secret="123" 
       generate-policy=no policy-template-group=default exchange-mode=main 
       send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1 
       enc-algorithm=aes-128,3des dh-group=modp1024 lifetime=1d dpd-interval=2m 
       dpd-maximum-failures=5
After rebooting the router we will see new ip.
 
User avatar
strods
MikroTik Support
MikroTik Support
Topic Author
Posts: 1628
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v6.40rc [release candidate] is released! (New bridge implementation delayed till 6.41rc)

Wed Jul 26, 2017 2:37 pm

Version 6.41rc has been released:
viewtopic.php?f=21&t=123936

Who is online

Users browsing this forum: elbob2002, sirbryan and 62 guests