Oh is the eap-identity/remote cap info for cli only? That would make more sense why I can’t see it in winbox.Any plans to add “eap-identity” to Winbox as well? :)
Check this viewtopic.php?t=213245What are the MT product that support e-Sim? or this is just preparation for the future release?
Where do I see these values?*) ip-service - show all TCP/UDP connections on the system (additional fixes);
*) ip-service - show all TCP/UDP ports on system, including ports in containers (additional fixes);
In IP/Services.Where do I see these values?*) ip-service - show all TCP/UDP connections on the system (additional fixes);
*) ip-service - show all TCP/UDP ports on system, including ports in containers (additional fixes);
Is there something special on enterprise devices? My `/ip/service` shows RouterOS's access services (winbox, www, api, etc). I struggle to connect what "all TCP/UDP connections on the system" and "all TCP/UDP ports on system, including ports in containers" have to do with that.In IP/Services.
The issue is RN says "connections", not "listeners"... There is a difference.In IP/Services.
why not be accurate and fix the RN?You can choose to understand what they meant to say or you can choose to get lost in translation.
Send us supout rif file and details on the issue.e50ug can't accessed after upgrade from 7.19beta8
What are the MT product that support e-Sim? or this is just preparation for the future release?
A piece of cardboard with QR code on it i guess:)What's a physical eSIM?
Not exactly: https://esim.me/A piece of cardboard with QR code on it i guess:)What's a physical eSIM?
For the ones still wondering:*) ip-service - show all TCP/UDP connections on the system (additional fixes);
*) ip-service - show all TCP/UDP ports on system, including ports in containers (additional fixes);
Please re-read changelog - one entry is about "connections" and one about "ports" or, as you prefer - "listeners".
Maybe give https://sysmocom.de/products/sim/sysmoc ... index.html a try as well ;)This is actually pretty nice. Did not know physical eSIM is a thing!
Just reporting. That issue has been present in RouterOS on CCR2116 since at least 7.12.1 along with few others (like for example ipsec crashing after opening installed-sa tab in winbox).Looks like you pushed a release candidate (beta) to production. Probably not the smartest move.
Yeah the tunnelling aspects Wireguard/IPSec/OpenVPN in RouterOS need some serious attention. While they work (generally to some degree), they have all had bugs, performance regressions and other issues since early 7.x series and continue to this day. If your doing anything other than slight connectivity through those tunnels to your router its a pain in the ass. It's forced me to stop terminating things on the router and instead use a dedicated x86 host to terminate tunnels on and then route the traffic via the firewall so I still have granular control.Just reporting. That issue has been present in RouterOS on CCR2116 since at least 7.12.1 along with few others (like for example ipsec crashing after opening installed-sa tab in winbox).Looks like you pushed a release candidate (beta) to production. Probably not the smartest move.
Please contact us and send your supout rif file after the issue. Does the same happens if you monitor installed sa using cli ?Just reporting. That issue has been present in RouterOS on CCR2116 since at least 7.12.1 along with few others (like for example ipsec crashing after opening installed-sa tab in winbox).Looks like you pushed a release candidate (beta) to production. Probably not the smartest move.
Thank you :).*) ipsec - fixed system failure on MMIPS devices when using IPsec services;
Larsa, dont they teach that at IT school. Use the latest beta firmware for production!Looks like you pushed a release candidate (beta) to production. Probably not the smartest move.
On an AP running nothing but wireless, dhcp keeps popping up as a dynamic port (server), what's the reason there if it's not configured?*) ip-service - show all TCP/UDP connections on the system (additional fixes);
*) ip-service - show all TCP/UDP ports on system, including ports in containers (additional fixes);
Please re-read changelog - one entry is about "connections" and one about "ports" or, as you prefer - "listeners".
It's part of "all" in RN sentence, and it's a "connection", not dynamic port (server)/"listener" in this scheme. ;)On an AP running nothing but wireless, dhcp keeps popping up as a dynamic port (server), what's the reason there if it's not configured?*) ip-service - show all TCP/UDP connections on the system (additional fixes);
*) ip-service - show all TCP/UDP ports on system, including ports in containers (additional fixes);
Please re-read changelog - one entry is about "connections" and one about "ports" or, as you prefer - "listeners".
My point was it's not clear and there is more subtlety here... Might be the DHCP client polling? Now whether that's a connection in this terminology, IDK.No smartypants, connections have the connection flag, this one doesn't.
I thought I was the only one noticing a performance drop in WireguardWe’ve had no stability issues whatsoever with either WireGuard or IPsec for a long time now. IPsec parallel throughput with hardware offload on the high-end models is really solid, with no noticeable drop in performance as long as you stay within the recommended connection limits. The only limitation is the lack of VTI support, though that’s mostly a matter of configuration.
I thought I was the only one noticing a performance drop in Wireguard
I don't agree with this. If you want to say, "vpn concentrators where high throughput and scalability are required, ipsec with offload is the only practical solution on RouterOS" maybe that is true. But if we are talking hardware/software solutions outside of what Mikrotik provides etc, then this certainly isn't the case. Additionally, I believe @federalbr is indicating there IS a performance drop similar to what I have tested and shown in my post above whereas you were saying that you have not seen any Wireguard performance regressions.I thought I was the only one noticing a performance drop in Wireguard
Since WireGuard relies entirely on software-based encryption (ChaCha20), speed is limited by the endpoint with the weakest CPU. It’s good for home setups and out-of-band management for a single connection, but for VPN concentrators where high throughput and scalability are required, IPsec with hardware offload is still the only practical option.
WireGuard Performance Tuning
Since WireGuard relies entirely on software-based encryption (ChaCha20), speed is limited by the endpoint with the weakest CPU. It’s good for home setups and out-of-band management for a single connection, but for VPN concentrators where high throughput and scalability are required, IPsec with hardware offload is still the only practical option.
So… a programable SIM card?Not exactly: https://esim.me/
I don't agree with this. If you want to say, "vpn concentrators where high throughput and scalability are required, ipsec with offload is the only practical solution on RouterOS" maybe that is true. But if we are talking hardware/software solutions outside of what Mikrotik provides etc, then this certainly isn't the case. Additionally, I believe @federalbr is indicating there IS a performance drop similar to what I have tested and shown in my post above whereas you were saying that you have not seen any Wireguard performance regressions.
I agree that with Mikrotik's current offerings w.r.t Wireguard are not the best choice if your looking for high throughout and massive scalability. In regards to the performance regression, I did multiple tests and submitted a ticket already.I don't agree with this. If you want to say, "vpn concentrators where high throughput and scalability are required, ipsec with offload is the only practical solution on RouterOS" maybe that is true. But if we are talking hardware/software solutions outside of what Mikrotik provides etc, then this certainly isn't the case. Additionally, I believe @federalbr is indicating there IS a performance drop similar to what I have tested and shown in my post above whereas you were saying that you have not seen any Wireguard performance regressions.
My comment was specifically in the context of Mikrotik ROS, where IPsec provides hardware offload. WireGuard with multiple connections on the same platform is very limited since it's CPU-bound, and that applies also to all platforms and architectures on the market.
To make WireGuard perform well with multiple connections, you need massive CPU power (just look at the VPN providers). So yeah, performance will obviously vary depending on hardware, software and traffic patterns.
Bottom line: WireGuard is perfect for the advanced home user and OOB management, but not really an option when it comes to scalability. Anyone suggesting otherwise hasn’t run it in production or high-demand environments. But that’s another discussion.
As for @federalbr’s point, I'm not denying that performance issues actually can occur, just noting that in our use cases we haven’t observed any regressions at all, and we have plenty of OOB connections that are monitored 24/7.
So if you’re sure about the performance regressions, gather some facts and open a ticket with support. Just saying it feels slow isn’t going to cut it.
I really disagree with this one (within an RoS context). Let me explain:Since WireGuard relies entirely on software-based encryption (ChaCha20), speed is limited by the endpoint with the weakest CPU. It’s good for home setups and out-of-band management for a single connection, but for VPN concentrators where high throughput and scalability are required, IPsec with hardware offload is still the only practical option.
You can't complain about OT when I'm answering YOUR post!Again, OT! Please start a separate thread and I’ll respond there, alright?
Anyway, just to spice up the debate before the new thread: 256 full-speed IPsec tunnels with almost no CPU impact equal, at most, 5–10 full-speed WireGuard tunnels with 100% CPU consumption on a CCR2216. And that’s a fact!
It is located in a remote place and I can’t access it now, sorry.Send us supout rif file and details on the issue.e50ug can't accessed after upgrade from 7.19beta8
This is a silly comment. It's not like they only have five guys that work on all of RouterOS.As per normis they are working hard on ROSE features/stability on 7.19 and 7.20 so I guess no progress on routing,switching and hwoffload features I hope I'm mistaken
Well, I hope that second "some" is more than zero. But it does not really look like it.This is a silly comment. It's not like they only have five guys that work on all of RouterOS.
Some developers work on ROSE and containers. Some work on BGP, OSPF, ISIS, MPLS, etc.
any specific devices, or just all of them?Not sure if anybody else is seeing this behaviour, but since updating to this release from 7.18.2 my devices that as a rule connect to 5g on the same SSID are now only connecting to 2.4g across the same SSID. After downgrading and reloading the previous saved config, all is well again. stuff is prefering the faster 5g again.
yes using FT and steering
Interesting, I saw a major improvement in 7.18.x. I have an m2 ssd in a case attached over usb.I upgraded my RDS2216 to 7.19rc1 for some disk testing. Built-in SMB is still bad for some reason. It works fine on 7.17, but throughput on 7.18-7.19 are horrifically slow.
RouterOS is becoming more and more like Windows...on 7.19rc1 something called 'fileman' is reading everything on the disk for some reason
One of my test routes is RB1100AHx4, and since 7.18beta2, SMB connections from macOS will cause a hard crash of RB1100.Built-in SMB is still bad for some reason. It works fine on 7.17, but throughput on 7.18-7.19 are horrifically slow.
All of the devices that used to connect to 5g now seem to prefer 2.4g for some strange reason.any specific devices, or just all of them?Not sure if anybody else is seeing this behaviour, but since updating to this release from 7.18.2 my devices that as a rule connect to 5g on the same SSID are now only connecting to 2.4g across the same SSID. After downgrading and reloading the previous saved config, all is well again. stuff is prefering the faster 5g again.
yes using FT and steering
The only 2 devices i ever had issues with (with Multiple Vendors Wi-Fi) was my Xiaomi 12 Pro and Samsung Galaxy S8+
The last one in the list is an iPhone, pretty stubborn to sit on the 5GHz band considering the signal I'd say.For the record we are talking about iphones and google pixel.
SUP-181069 opened with this question from 03/2025.Some more questions:
Should or could i use both an access list entry and multi-password-group for the same client?
And when yes, in wich order is this processed?
And wich comment it used or could you combine the comments in the registration list?
regards
it seems that iot-related-features and "adlists" is more important than bgp which is fundamentally broken in 7.x and we keep waiting like ...let's dont say like what.I am sure many of us are anxious to hear if the BGP changes made in 7.19 put this release as a candidate for folks still holding at 7.15.3. I know pe1chl has mentioned the various BGP problems within 7.16 and forward ROS versions. He has been patiently encouraging developers to address them. I continue to wait on the sidelines. BGP stability is crucial to our network and many others, I suspect.
I agree with you that I don't like at all the NAS in Mikrotik, but I read a lot of BGP, but in my network with BGP I don't see any problems, help to identify those problems that cause so much noiseit seems that iot-related-features and "adlists" is more important than bgp which is fundamentally broken in 7.x and we keep waiting like ...let's dont say like what.I am sure many of us are anxious to hear if the BGP changes made in 7.19 put this release as a candidate for folks still holding at 7.15.3. I know pe1chl has mentioned the various BGP problems within 7.16 and forward ROS versions. He has been patiently encouraging developers to address them. I continue to wait on the sidelines. BGP stability is crucial to our network and many others, I suspect.
we consider switching to a VM with bird of opnsense and frr package for our AS, since we can't keep up with 7.x anymore.
It's a pity when mikrotik announces rose and enterprise hardware and giving more attention to silly features and not in features related to the hardware they are producing.
no meaning anymore on to this.
I can't understand your priorities but I am disappointed by far with your feature schedule.
me too, both on E5UG and hAP-AX3Another issue on 7.19rc1, device mode does not work properly. You can't update the mode as the command is broken. Device-mode print only works if you CTRL-C after running the command.
See SUP-159987, for example. And also the several times I have brought BGP up in release topics after 7.16.xWhat is completely broken in BGP?
Have u fix bgp-path-len mrz?That does not qualify as "completely broken".
Well, for us it is!That does not qualify as "completely broken".
If "enterprise storage" development will be as opaque with "known issues" and bug handling as everything else is, then it would be hard to imagine how this would get any traction on the market. Network problems can be worked around, storage data loss due to bugs on "enterprise storage" can not.@mrz most of the people here buy high-end devices from you guys from switch to router and we expect that it will work properly if there was a bug we expect that each bug was fairly treated even though it was hard to fix don't assume always that it was a config issue or user error, we notice that your developer want to fix those area that only interest them, we buy RouterOS to forward or switch packet not as a Storage device, with this direction you are forcing us out and let us dry but our hands our tied because we can't simply throw investment we have in the device and people that's my sour graping at least on my end
I already said this here many times don't take this as negative instead use this as an opportunity to fix or enhance your product try to address the issue of your customers instead of evading them. By not addressing this or continue to deny the existence of the bug it would be a deterrent on MikroTik good name
Semantics.That does not qualify as "completely broken".
Its stability.What is completely broken in BGP?
Have you seen that problem where in the session the number of prefixes remains at 0 even though the number of received messages increases as normal?
It was mentioned several times, there is an issue that winbox may not refresh tables. Hit F5 or use CLI for monitoring.When the content of the route table is incorrect (in winbox), I have found that it is sometimes fixed when winbox is closed and re-opened. That also helps when garbage is displayed in the "Immediate Gateway" column.
Have you seen that problem where in the session the number of prefixes remains at 0 even though the number of received messages increases as normal?
Here that only happens after some uptime (and restart of a session), not immediately after boot.
Hit F5 does not fix this. Or, sometimes it causes crash of winbox.It was mentioned several times, there is an issue that winbox may not refresh tables. Hit F5 or use CLI for monitoring.
Yes, that is what I mean.I had not noticed that before, but I pulled up one of my borders and found this interesting. For all of my peers with redundant connections, the secondary router (that has most recently reconnected) shows a dissimilar number of prefixes received, despite being configured identically.
What do you mean with "stability issues"? Is that the bugs I am describing above in this topic, or in SUP-159987?Stability issues should be already solved in v7.19rc,
Yes, that is what I mean.I had not noticed that before, but I pulled up one of my borders and found this interesting. For all of my peers with redundant connections, the secondary router (that has most recently reconnected) shows a dissimilar number of prefixes received, despite being configured identically.
And it is not cosmetic. When the other connection fails, you are without failover routes and need to close/re-open the second session to get them back (which when the other side is MikroTik takes 1 minute due to another bug).
Well, my experience with v6 was very good, and I still have it running on a lot of routers in the hobby network.The CCR is already in its 2nd generation. Even in the 1st generation, I was running my business with some issues, and now in the 2nd generation with v7, the situation isn't exactly better.
I believe Normis was the first to use "completely broken"; I do not think it was by a forum user specific to BGP in this thread. A more accurate phrase would be "completely unusable". BGP is a function that should either work perfectly or be fixed as it has ramifications for not just a router, but an entire commercially offered network affecting thousands of clients.That does not qualify as "completely broken".
+1..CUT..
I salute pe1chl for his persistence and continued posts on this forum related to these BGP problems.
+10000000+1..CUT..
I salute pe1chl for his persistence and continued posts on this forum related to these BGP problems.
Have you seen that problem where in the session the number of prefixes remains at 0 even though the number of received messages increases as normal?
Here that only happens after some uptime (and restart of a session), not immediately after boot.
I had not noticed that before, but I pulled up one of my borders and found this interesting. For all of my peers with redundant connections, the secondary router (that has most recently reconnected) shows a dissimilar number of prefixes received, despite being configured identically.
It was the post by chrismfz where he said "fundamentally broken". But normis the first to say "completely broken" in his question. But this seems to be a language misunderstanding. There is a huge difference between "fundamentally" and "completely". Completely means "100%/fully/totally" broken. Fundamentally on the other side means here like "important parts / essential parts / core parts". And I follow the discussion and the reports by pe1chl and I have to agree: their BGP issues are fundamental. But not "completely broken".I believe Normis was the first to use "completely broken"; I do not think it was by a forum user specific to BGP in this thread. A more accurate phrase would be "completely unusable".That does not qualify as "completely broken".
Yes, that certainly seems part of the issue. We run our network with different AS on each router (eBGP) and when there is a mesh of tunnels between the routers, at some point routes are not being accepted.It appears that if the router is already receiving routes from another router in the same AS, that it won't even count and list any of those same routes as received from a second router in that source AS (hence the "0" or "1"). The second router is most definitely advertising them.
Sure, devices used in productive environments should be absolutely reliable.... we can't provide a public administration or government with equipment that doesn't work.
+++Well, my experience with v6 was very good, and I still have it running on a lot of routers in the hobby network.The CCR is already in its 2nd generation. Even in the 1st generation, I was running my business with some issues, and now in the 2nd generation with v7, the situation isn't exactly better.
I never would have switched the company network to v7 when the currently used hardware (CCR2004 and RB5009) would not require it...
I would be very happy when there was an optional package to have the original v6 auto-routing in v7.
For my use-cases (not full table internet routing but routing in a smaller network with 20 (work) to 1000 (hobby) routes on a partial mesh network) the old routing was fine and at least it was fully stable without those 'That does not qualify as "completely broken"' bugs... and there was no performance problem. The "new routing engine" has brought us nothing useful, and the configuration is "more complicated" as well (no problem for the company network but not so good for the hobby network).
I doubt that's an accurate assessment of Mikrotik's state of affairs--to be fair, one can walk and chew gum at the same time. And given how bare-bones the capabilities of ROSE are vs. what's available out there, I seriously doubt they have devoted that many resources to it. Let's face it, the RDS2216 feels more like a "let's test the waters and see how the market reacts" effort more than anything else. It's essentially a CCR2216 with a less capable switch chip and less ports to lower costs, with md and smbd running in the background to do some basic storage stuff.Instead of focusing on core routing functionality, we get ROSE...
And no, just because other developers may be working on ROSE does not mean that it doesn't affect routing. It does. Resources (human and money) are being spent on frivolous stuff instead of networking.
Even if a single developer was allocated to implementing the storage features on ROS, is still a single developer less allocated to networking.I doubt that's an accurate assessment of Mikrotik's state of affairs--to be fair, one can walk and chew gum at the same time. And given how bare-bones the capabilities of ROSE are vs. what's available out there, I seriously doubt they have devoted that many resources to it. Let's face it, the RDS2216 feels more like a "let's test the waters and see how the market reacts" effort more than anything else. It's essentially a CCR2216 with a less capable switch chip and less ports to lower costs, with md and smbd running in the background to do some basic storage stuff.Instead of focusing on core routing functionality, we get ROSE...
And no, just because other developers may be working on ROSE does not mean that it doesn't affect routing. It does. Resources (human and money) are being spent on frivolous stuff instead of networking.
And at the risk of rubbing you the wrong way even further, for many of us, 7.x has proven to be vastly superior to 6.x in many ways. YMMV I guess.
Using WInBox4, the DHCP client "check-gateway" option is a static control, but should be drop-down.*) dhcpv4/v6-client - added check-gateway parameter;
Well now at least we had both normis and mrz commenting on the topic "problems with BGP", we can hope that they had a chat at the coffee machine and walked by the routing guy to ask what he is working on and if he has an idea what happened in the 7.16 release...Indeed, discussed often. But IMHO these release topics are some variant of /dev/null. You can write until this topic gets locked for discussion. What a waste of words.
Never said it was vastly superior, no need to get personal here. But since you're asking, for instance, 7.x took the CCR2004 from an unstable/unfinished piece of crap impossible to deploy and maintain in the field due to its lack of reliability, to a pretty damn good router, from both cost and performance perspectives. The 6.x kernel just never played well with the Annapurna-based line. And yes, wireguard is a big plus. Like I said, ymmv.
You probably do very basic stuff in v7 if you think that's vastly superior to v6.
The only actual feature worth using v7 for, is Wireguard.
UI and routing is like oil and water, they just don’t mix. UDM/Unifi is painful and catered to “prosumers” who also think skibidi ohio rizz sigma are the coolest things to say, and UISP, while initially promising, quickly proved to be crippled/DoA. The Edge line was great at the time, but it’s old and feature-poor now, and UI quietly let it die anyway, one of their biggest mistakes if you ask me (I guess they had no desire to maintain their own branch of vyatta after brocade bought it).
If MikroTIk opened up real support, or paid support like other vendors -- this can help. Ubiqu*F* is now offering paid support..... also their release of v9 is very nice and forward progress. This all might be a precursor to them leaving the consumer market and focusing on pro/enterprise.
Yes, it would really help to have RouterOS v7 use more recent wireguard sources - it would improve performance considerably.@MikroTik could you somehow update the wireguard sources? based on your GPL handed out ̶f̶o̶r̶ ̶7̶.̶1̶9̶r̶c̶ you're using code untouched from 5 years ago. more exactly it's stuck at this point: https://github.com/WireGuard/wireguard- ... 49e940b479
A fast look over the changes in those years I've found this: https://github.com/WireGuard/wireguard- ... c6214ccf7a
Among other changes it had in FIVE YEARS.
Shame.
That is, if you actually provided the recent sources, and not some old archive that you just hand out on request. That would be another can of worms.
FWIW, these are not in the docs yet (or at least I cannot find them):*) route - added options to set dynamic-in and connected-in chains in /routing/settings;
/routing/settings/set <tab>
connected-in-chain dynamic-in-chain single-process
I think MikroTik had it pretty well sorted in v6. Routing was a breeze to configure via the UI.UI and routing is like oil and water, they just don’t mix.
RouterOS is stuck at Linux Kernel 5.6.3 as far as I know which was the first release to have wireguard and wireguard is a part of the kernel source tree ever since so porting it back to 5.6.3 which isn't supported from 2020 may not be as easy task...Yes, it would really help to have RouterOS v7 use more recent wireguard sources - it would improve performance considerably.@MikroTik could you somehow update the wireguard sources?
Yes, it would really help to have RouterOS v7 use more recent wireguard sources - it would improve performance considerably.
| Date | Kernel | Summary +------------+--------+------------------------------------------------------------ | 2021-02-14 | 5.11 | Lock-free p/p single-list queues with ~90% lower memory p/p, | | | reduced CPU contention, latency and improved p/p scaling | 2021-02-14 | 5.11 | Improved crypto support for ARM with/without NEON/SIMD and | | | for x86 SSE2/SSSE3/AVX | 2021-06-27 | 5.13 | Switched compiler flags from -O3 to -O2 for improved stability | 2023-08-27 | 6.5 | CPU affinity fix for encryption threads. Faster round-robin | | | across cores with better latency and load balance | 2025-01-21 | 6.13 | Adding Big TCP (GSO) with ~15% throughput boost on TCP streams | 2025 WIP | 6.15 | GRO-based NIC offload similar to IPsec ESP hardware offload (beta)
Weirdly enough I do not seem to have this issue. I have an RB4011 with an LHG60 and NB19 link to the same tower, each with their own BGP session (but same local/remote ASN) and prefix counts are identical for both sessions.To address this further:
It appears that if the router is already receiving routes from another router in the same AS, that it won't even count and list any of those same routes as received from a second router in that source AS (hence the "0" or "1"). The second router is most definitely advertising them. This isn't an iBGP issue as you can see that one of the peers with two routers is an eBGP peer.
I would think the receiving router should list all of them, even if it adds an "Fb" for filtered or just "b" for BGP.
We have a central router and 3 branch routers. Each branch router has two tunnels to the central router (one over GRE and one over L2TP/IPsec), and the branch routers have tunnels to eachother over GRE6.Both BGP sessions terminate on the same local and remote router though, maybe it's only triggered when it receives routes from a different router with the same ASN? Or only after one of the links flap? I had an issue recently on v7.14.3 where after a link flapped about 20% of the routes were missing in the routing table even though they were being advertised by the peer.
Have You tested without the filters? May help to narrow down WHERE the problem is.The routes over L2TP/IPsec are set to local-pref 90 using filters.
Usually after boot the pref 90 routes appear in the table, all prefix counts are the same on the 4 tunnels at each branch, but after a route flap they often do not come back.
But unfortunately when the main internet connection that transports the GRE and GRE6 tunnel goes down, the backup is via L2TP and its routes are not installed in the table.
Yes, Mikrotik released a Chateau LTE12 (2025). https://mikrotik.com/product/chateau_lte12_2025Have they not released the Chateau LTE12 (2025) with 32MB ?
That isn't possible. The filters are required to force the routing over the fiber/vdsl connection instead of over 4G with limited bundle.Have You tested without the filters? May help to narrow down WHERE the problem is.
/routing filter rule
add chain=pref-90 comment="low pref for backup paths" disabled=no rule="set bgp-local-pref 90;"
add chain=pref-90 disabled=no rule="jump input;"
I use this exactly thing on my DN42 filters. Never noticed a problem, but then again it's a very particular one - and getting different number of routes from different peers is the expected behavior there.That isn't possible. The filters are required to force the routing over the fiber/vdsl connection instead of over 4G with limited bundle.
When that disturbs the BGP functioning there is a bug.
Weirdly enough I do not seem to have this issue. I have an RB4011 with an LHG60 and NB19 link to the same tower, each with their own BGP session (but same local/remote ASN) and prefix counts are identical for both sessions.
Both BGP sessions terminate on the same local and remote router though, maybe it's only triggered when it receives routes from a different router with the same ASN? Or only after one of the links flap? I had an issue recently on v7.14.3 where after a link flapped about 20% of the routes were missing in the routing table even though they were being advertised by the peer.
This would be ideal.I use this exactly thing on my DN42 filters. Never noticed a problem, but then again it's a very particular one - and getting different number of routes from different peers is the expected behavior there.That isn't possible. The filters are required to force the routing over the fiber/vdsl connection instead of over 4G with limited bundle.
When that disturbs the BGP functioning there is a bug.
I'll take a look here, with my setup. Maybe I'm affected and never noticed? Maybe I'm not affected, and we can run a differential to narrow it down?
EDIT: Although I don't use two connections from the same router... may be a factor too.
Sometimes I think that it just won't store more than a certain number of routes to each destination, but I cannot find a consistent number for that. Sometimes it accepts 2, sometimes 3, but I need at least 4 but preferably 5.I use this exactly thing on my DN42 filters. Never noticed a problem, but then again it's a very particular one - and getting different number of routes from different peers is the expected behavior there.That isn't possible. The filters are required to force the routing over the fiber/vdsl connection instead of over 4G with limited bundle.
When that disturbs the BGP functioning there is a bug.
I think your flogging a dead horse is what I'm trying to say.Yes, Mikrotik released a Chateau LTE12 (2025). https://mikrotik.com/product/chateau_lte12_2025Have they not released the Chateau LTE12 (2025) with 32MB ?
What do you want to tell me? I should replace my existing Chateau with the "2025 refresh"? This can only be a cost factor - but why should anyone buy Chateau LTE12 (2025) with legacy wireless (instead of Chateau LTE18 AX)? Or does this ship with wifi-qcom-ac already? But even then: it is 2025. Nobody should buy new devices with 802.11ac only. At least in Western Europe.
But the flash issue applies to my cap ac as well. There is no "cap ac (2025)" with 32MB flash right now. But my cap ac still has some "room" as it is acting as a dumb CAP.
I have, usually, 6 or 7 possibilities for a given destination.
Sometimes I think that it just won't store more than a certain number of routes to each destination, but I cannot find a consistent number for that. Sometimes it accepts 2, sometimes 3, but I need at least 4 but preferably 5.
> /ipv6/route/print where dst-address=fd42:d42:d42:53::/64
Flags: D - DYNAMIC; A - ACTIVE; b - BGP
Columns: DST-ADDRESS, GATEWAY, DISTANCE
DST-ADDRESS GATEWAY DISTANCE
DAb fd42:d42:d42:53::/64 fd86:bad:11b7:23::1 20
D b fd42:d42:d42:53::/64 fd22:ad17:8e8d:10::111 20
D b fd42:d42:d42:53::/64 fd22:ad17:8e8d:10::105 20
D b fd42:d42:d42:53::/64 fdb1:e72a:343d::9 20
D b fd42:d42:d42:53::/64 fd22:ad17:8e8d:10::11d 20
> /ipv6/route/print where dst-address=fd42:d42:d42:54::/64
Flags: D - DYNAMIC; A - ACTIVE; b - BGP
Columns: DST-ADDRESS, GATEWAY, DISTANCE
DST-ADDRESS GATEWAY DISTANCE
D b fd42:d42:d42:54::/64 fd86:bad:11b7:23::1 20
D b fd42:d42:d42:54::/64 fd22:ad17:8e8d:10::111 20
D b fd42:d42:d42:54::/64 fd22:ad17:8e8d:10::117 20
D b fd42:d42:d42:54::/64 fd22:ad17:8e8d:10::105 20
DAb fd42:d42:d42:54::/64 fdb1:e72a:343d::9 20
D b fd42:d42:d42:54::/64 fd22:ad17:8e8d:10::11d 20
local-pref, no. I use bgp-local-pref only.Do you have a different local-pref on some of the routes?
And I am trying to say: why replace my "dead horse" with more or less the same 2025 horse edition? I am not ready to give up my horse.I think your flogging a dead horse is what I'm trying to say.
Yes, Mikrotik released a Chateau LTE12 (2025). https://mikrotik.com/product/chateau_lte12_2025
What do you want to tell me? I should replace my existing Chateau with the "2025 refresh"? This can only be a cost factor - but why should anyone buy Chateau LTE12 (2025) with legacy wireless (instead of Chateau LTE18 AX)? Or does this ship with wifi-qcom-ac already? But even then: it is 2025. Nobody should buy new devices with 802.11ac only. At least in Western Europe.
But the flash issue applies to my cap ac as well. There is no "cap ac (2025)" with 32MB flash right now. But my cap ac still has some "room" as it is acting as a dumb CAP.
In other news, my WiFi problem with RC1 appears to be fixed in RC2.
bgp-local-pref is used in bgp filters to apply it to a route received via BGP, but once it ends up in the routing table it is called local-pref.local-pref, no. I use bgp-local-pref only.Do you have a different local-pref on some of the routes?
In that case, lots of them. I use it to choose the BGP peer based on the region of the internal host I will connect to.bgp-local-pref is used in bgp filters to apply it to a route received via BGP, but once it ends up in the routing table it is called local-pref.
add chain=DN42PeerAmericaDoNorteLeste comment="Pega-tudo dos sem-regiao (14)" disabled=no rule="if (not bgp-communities any-list RegiaoOrigem) {set bgp-local-pref 500; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Pacifico (13)" disabled=no rule="if (bgp-communities any 64511:53) {set bgp-local-pref 5838; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Asia Sudeste (11)" disabled=no rule="if (bgp-communities any 64511:51) {set bgp-local-pref 6238; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Asia Leste (12)" disabled=no rule="if (bgp-communities any 64511:52) {set bgp-local-pref 6238; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Asia Sul (10)" disabled=no rule="if (bgp-communities any 64511:50) {set bgp-local-pref 6738; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Africa do Sul (09)" disabled=no rule="if (bgp-communities any 64511:49) {set bgp-local-pref 6863; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Africa do Norte (08)" disabled=no rule="if (bgp-communities any 64511:48) {set bgp-local-pref 7913; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Am\E9rica do Sul Oeste (07)" disabled=no rule="if (bgp-communities any 64511:47) {set bgp-local-pref 8288; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Europa (01)" disabled=no rule="if (bgp-communities any 64511:41) {set bgp-local-pref 8438; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Am\E9rica do Sul Leste (06)" disabled=no rule="if (bgp-communities any 64511:46) {set bgp-local-pref 8513; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Am\E9rica do Norte Oeste (05)" disabled=no rule="if (bgp-communities any 64511:44) {set bgp-local-pref 8988; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Am\E9rica Central" disabled=no rule="if (bgp-communities any 64511:45) {set bgp-local-pref 9263; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Am\E9rica do Norte Centro (04)" disabled=no rule="if (bgp-communities any 64511:43) {set bgp-local-pref 9488; jump DN42EntradaSanidade}"
add chain=DN42PeerAmericaDoNorteLeste comment="Am\E9rica do Norte Leste -> Am\E9rica do Norte Leste (02)" disabled=no rule="if (bgp-communities any 64511:42) {set bgp-local-pref 9988; jump DN42EntradaSanidade}"
Adlist from file or from URL is loaded after each startup.Question about DNS Adlist.
I use a file for blocking addresses, that is created by a script. The script downloads data from several sources and removes repeated addresses. This file is then uploaded to the router and added to the blocking list.
Screenshot_Adlist.png or Screenshot_Adlist_noSSL.png
There are two problems with this:
1. after the router is rebooted, this file of data for blocking is not automatically read. you must manually perform an action to upload from the file.
2. an error line appears periodically. even though I don't have any line with http data download.
Screenshot_Error.png
7.x has proven to be vastly superior to 6.x in many ways.
🤦♂️Never said it was vastly superior
Due to hardware limitations, RB5009 series, hAP ax3 and Chateau ax series devices cannot display whether link partner advertises 2.5G-baseT.@MT
Minor issue (RB5009UPr+S+):
/interface/ethernet> monitor ether1 once
name: ether1
status: link-ok
auto-negotiation: done
rate: 2.5Gbps
full-duplex: yes
tx-flow-control: no
rx-flow-control: no
supported: 10M-baseT-half
10M-baseT-full
100M-baseT-half
100M-baseT-full
1G-baseT-half
1G-baseT-full
2.5G-baseT
advertising: 10M-baseT-half
10M-baseT-full
100M-baseT-half
100M-baseT-full
1G-baseT-half
1G-baseT-full
2.5G-baseT
link-partner-advertising: 10M-baseT-half
10M-baseT-full
100M-baseT-half
100M-baseT-full
1G-baseT-full
this line doesn't appear "2.5G-baseT"
with this connection 2.5Gbps
Canvas seems to just miss most of the basic function of the phpBB compare to Prosilver. Canvas is so bad, that I can not use the forum with it.I dont know why the "Canvas" forum theme does not show the quote-author. The polsilver theme does it correctly. I always found this so confusing not knowing who is quoted actually. Can Mikrotik forum admins fix this?
2025-05-09_10-12.png
2025-05-09_10-13.png
I said it was vastly superior *for many of us*, *in many ways* and I made it clear *ymmv*, multiple times. You shortened my quote, italicized vastly, and purposely took my words out of context to make it sound I was making a generic/universal statement, which was not the intent. I even provided examples as to why it was better from my standpoint.7.x has proven to be vastly superior to 6.x in many ways.🤦♂️Never said it was vastly superior
Tomayto tomahto.I said it was vastly superior *for many of us*, *in many ways* and I made it clear *ymmv*, multiple times. You shortened my quote, italicized vastly, and purposely took my words out of context to make it sound I was making a generic/universal statement, which was not the intent. I even provided examples as to why it was better from my standpoint.
But hey, I’ll restate what I wrote to keep all the closeted keyboard warriors on this forum happy => 7.x may not be for everyone, but it proved to be vastly superior for many of us. Again, ymmv. And if you don’t like it, 6.49 is still kicking and alive, and on LTS.
What has Ros7 ever done for us?And no, you cannot use v6. I guess you haven't bought a MikroTik product since the first CCR2004, for which you could apparently accept a downgrade in functionality (ie v7) for it to just work without crashing every two minutes. In that sense if you squint your eyes enough, v7 maybe superior to some hurt wallets, yes.
Plenty of v6-based gear out there up for grabs, esp. if you know a reseller that still carries older stock, or if you're willing to use second hand gear. We have dozens of 2004s in the field that will be happy to go all the way back to 6.46.4 via a simple netinstall (note that based on other comments, the 2004 appears to be stable with the later revisions of 6.49, though we have absolutely no reason to try).And no, you cannot use v6. I guess you haven't bought a MikroTik product since the first CCR2004
This one cuts deep (not). Several r3 2004s, but they won't let you go back to 6.x, obviously. Quite a few 2116's and 2216's out there, and even a rose flavor in the lab--the one you seem to despise so much. For the latter, I'll reiterate my initial comment, if you really think Mikrotik spent oodles of time on the rose package, then you just haven't played with it--it's absolutely barebone at the moment.I guess you haven't bought a MikroTik product since the first CCR2004
Using CAPsMAN?hAP ax2 and ax3 - everything seems fine (wifi).
My RB4011 and 3x wAP AX managed by CAPsMAN is working flawless with V7.19RC2.Using CAPsMAN?
My AX also works fine, one thing I did notice have you checked the channel it was broadcasting on when the 5ghz dropped? I’ve noticed sometimes it’ll choose something in the UNII-4 range (channel 5885) which 99% of devices don’t see and it will appear that 5g isn’t there until you restart your WiFi and it chooses a new channel. (You can manually pick a new channel but that’s why restarting the AP appears to fix the problem)Wireless seems to be broken is this version, CAP ax and WAP ax with RB5009 running CAPsMAN.
Some devices refuse to connect at all, some connect for 30 mins then disconnect and refuse to connect again. 5Ghz seems to stop for no reason and reboot AP's fix issues for a short period.
Intel(R) Wi-Fi 6 AX201 160MHz really struggle
Anyone else having issues with this version and wireless, no noticeable issue with 7.16.2
This page need username and password to see.take a look here: https://help.mikrotik.com/docs/spaces/R ... 83568/EVPN
You're right, it was accessible last night.This page need username and password to see.
I got the Info that there will be an rc3I'm eagerly awaiting a stable release.
Wayback machine managed to grab itThis page need username and password to see.take a look here: https://help.mikrotik.com/docs/spaces/R ... 83568/EVPN
You can use a tunnel for example ipip over ipsec and than assign that ipip interface to another vrf...I need to set ipsec to work with another vrf different from main. How can I do that?