MikroTik CCR 1009/1016/1036 officially discontinued

Categories
MikroTik RouterOSv7

MikroTik CCR 1009/1016/1036 officially discontinued

We knew it was coming when MikroTik announced the end of production for Tilera chips back in the fall of 2022, but recently (looks like it was last week), MikroTik moved almost all of the CCR1K series (CCR1009, CCR1016, CCR1036) to discontinued officially on the website.

The only CCR1K series that are still listed for sale are:

CCR1009-7G-1C-1S+
CCR1016-12S-1S+
CCR1072-1G-8S+

This likely indicates low or no stock to replenish distributors for the discontinued models, so the CCR1K market is going to get even tighter. Expect the three models still listed to go discontinued in the next 60 to 90 days if not sooner.

It’s a bit of a double-edged sword as operators that haven’t made the jump to ROSv7 will quickly get forced into CCR2K models that only support ROSv7 and while MikroTik has done an awesome job of closing the gap, there is still some work to achieve feature parity with ROSv6.

That said, the upside is that the massive rush to CCR2K that has been happening will help to refine ROSv7 with more bug fixes and improved stability due to the larger user base running it and reporting bugs.

CCR2K series

A worthy line of successors

Luckily we’ve seen rapid development on ROSv7 and the CCR2k line which is arm64 based with several models offering L3 hardware offload using Marvell Prestera chips. 

arm64

MikroTik has introduced several arm64 chips with the introduction of the CCR2k line. most notably, chips from annapurna labs which is owned by Amazon. 

The CCR2116/CCR2216 models are outfitted with a 16 core Annapurna CPU that can move up to 200 Gbps of traffic.

Marvell Prestera

The Marvell series of ASICs has been incredibly successful for MikroTik and other vendors at providing a rich feature set for L2/L3 while maintaining a relatively low price point. 

ROSv7 

ROSv7 has been on fire this year (in a good way) as far as development is concerned and releases are coming in a timely manner with significant work put into each one fixing bugs. By the end of the year we’ll likely see a long-term release and ROSv6 start to wane in popularity.

New hardware 

Tilera created some issues in what MikroTik was able to accomplish because it never became more than a niche CPU architecture. So form factors were limited to what Tilera was able to handle. 

Now that arm64 & marvell form the base of CPU/ASIC architecture for MikroTik, the possibilities are broader and there are more hardware platforms on the way. 

https://iparchitechs.com/ecosystem/mikrotik-network-consulting/
Categories
MikroTik RouterOSv7

MikroTik RouterOS v7.11 stable released


2023 has been a big year for MikroTik RouterOS v7 development. The OS has matured quite a bit and the number of operators that are using ROSv7 in prod has gone up significantly.

Most of the work this year has been centered around feature parity with ROSv6 and performance improvements.

Although there have been a few new additions like the Back to Home VPN (Which is now scheduled to release with 7.12) and IS-IS (Also slated for 7.12).

This is important because most of the development time by MikroTik has been consumed by stabilization, feature parity and perf improvements. However, as that gap closes, we should see long awaited features like SR-MPLS and EVPN make it into ROS v7 faster as development time frees up.

7.11 contains a long list of fixes and improvements and will likely be adopted quickly by the MikroTik community.

MikroTik Routers and Wireless – Software

Noteworthy additions

bfd stability

*) bfd – fixed “actual-tx-interval” value and added “remote-min-tx” (CLI only);
*) bfd – improved system stability;

Bi-directional forwarding detection or BFD has been a feature gap in ROSv7 for a long time and was a showstopper for some ASNs that wanted to use the new CCR2K hardware as peering/border routers. Now that BFD has been implemented for BGP and OSPF with some stabilization fixes, it’s much easier to deploy a CCR2116 or CCR2216 in that role.

IPv6 support for containers

*) container – added IPv6 support for VETH interface;

Being able to use IPv6 for containers is a great addition given the rapid pace of IPv6 adoption in 2023. It also makes it easier to expose containers directly to the Internet without NAT if desired.

Continued improvement of l3hw offload

*) l3hw – changed minimal supported values for “neigh-discovery-interval” and “neigh-keepalive-interval” properties;
*) l3hw – fixed /32 and /128 route offloading after nexthop change;
*) l3hw – fixed incorrect source MAC usage for offloaded bonding interface;
*) l3hw – improved system responsiveness during partial offloading;
*) l3hw – improved system stability during IPv6 route offloading;
*) l3hw – improved system stability;

There were a number of l3hw fixes in 7.11 which allows the platforms with Marvell Prestera chips to be put into more roles for L3 switching and lower the cost of wirespeed performance for network operators.

Wifiwave2 development continues

*) wifiwave2 – added “steering” parameters and menu to set up and monitor AP neighbor groups (CLI only);
*) wifiwave2 – added more information on roaming candidates to BSS transition management requests (802.11v) and neighbor report responses (802.11k);
*) wifiwave2 – added option to filter frames captured by the sniffer command (CLI only);
*) wifiwave2 – automatically add wifi interfaces to appropriate bridge VLAN when wireless clients with new VLAN IDs connect;
*) wifiwave2 – changed default behavior for handling duplicate client MAC addresses, added settings for changing it (CLI only);
*) wifiwave2 – enabled PMK caching with EAP authentication types;
*) wifiwave2 – fixed “reg-info” information for several countries;
*) wifiwave2 – fixed “security.sae-max-failure” rate not limiting authentications correctly in some cases;
*) wifiwave2 – fixed clearing CAPsMAN Common Name when disabling “lock-to-caps-man”;
*) wifiwave2 – fixed interface hangs on IPQ6010-based boards (introduced in v7.9);
*) wifiwave2 – improved stability when changing interface settings;
*) wifiwave2 – improved stability when receiving malformed WPA3-PSK authentication frames;
*) wifiwave2 – make info log less verbose during client roaming (some info moved to wireless,debug log);
*) wifiwave2 – rename “reg-info” country argument from “Macedonia” to “North Macedonia”;
*) wifiwave2 – use correct status code when rejecting WPA3-PSK re-association;

The Wifiwave2 package has gotten a lot of love from the developers since the release of AX hardware and has stabilized quite a bit. The new wireless chips + active development might put MikroTik back in contention for wireless against WISP and WiFi vendors after a long period of limited innovation prior to the 2020s.




Categories
MikroTik RouterOSv7

MikroTik introduces Back to Home (bth) VPN in ROS 7.11 beta/rc

Back To Home – RouterOS – MikroTik Documentation

MikroTik already has a wealth of VPN options and is introducing another with the Back to Home or BTH VPN service. The framework underneath is based on wireguard which MikroTik began supporting in the early 7.x series of RouterOS.

What makes this notable is the addition of relay servers that MikroTik hosts to facilitate ease of VPN access when behind NAT.

This VPN service appears to be targeted at home users, gamers and others that need a “push button” VPN solution without complex routing or advanced configuration options.

It’s also important to point out that the solution is dual stacked and uses IPv4 and IPv6 by default so it will scale well globally.

BTH tab under the cloud menu


App based remote connectivity.

MikroTik is developing Android & Apple apps to use as clients of the BTH VPN service. While not released yet, there are preview screen shots in the online docs.

Manual Configuration

MikroTik also allows manual configuration of a remote endpoint using either ROS config for wireguard to be pasted in or via a QR code.


Categories
MikroTik RouterOSv7

MikroTik RouterOS v7.5 stable released

The pace of development for MikroTik RouterOS version 7 has definitely sped up in 2022 and we are seeing the results in improved stability and features added.

As of August 31st, 2022, MikroTik moved ROS v7.5rc2 into v7.5 stable

MikroTik Routers and Wireless – Software

Noteworthy additions

dhcpv6-relay – not being able to relay a PD request from a delegating router for IPv6 has been a limitation of MikroTik routers for a while so getting this fixed has a big impact on scaling MikroTik IPv6 deployments

RTSP helper – The addition of a Real Time Streaming Protocol helper is a great addition to ROSv7 to make NAT traversal for realtime applications (IPTV, SIP and IP cameras) easier.

A good overview of the discussion leading up to the addition of RTSP is here: RTSP Helper – MikroTik

l3hw – fixed hw offloaded NAT – This feature still has some issues as IP ArchiTechs recently filed a bug (SUP-91389) where src-nat traffic that carries an H flag in the connection table will die after 1 hour with a 10G load on the router. Once this feature receives further bug fixes and testing, it’s going to be very useful for high capacity but low cost NAT44 gateways.

lte – this category got a significant amount of development work as there are numerous fixes with many relating to the Chateau devices.

wifiwave2 – There was also a significant amount of development in wifi wave 2 which included notable additions like 802.11k for roaming.

 vrrp – added “sync-connection-tracking” compatibility with preemption-mode – this is a long awaited feature that showed up early in ROSv7 but did not have pre-emption mode capabilities. The addition of connection synching between routers positions MikroTik routers much closer to traditional enterprise firewall vendors so that failover between devices can include connections.



Categories
network operating systems

Networking CLI Rosetta Stone

Changing between network operating systems is one of the most challenging things for new engineers. Most people learned cisco cli due to their extensive training system or got on the job training for whatever their company runs.

We are hoping to make moving back and forth between network operating systems a little easier with some useful show and operational commands for Mikrotik, Juniper, Cisco, and IP Infusion. There are in detail usages of these commands on stubarea51.net.

OSPF Commands

MikroTikJuniperCiscoIP Infusion
routing ospf neighbor printshow ospf neighborshow ip ospf neighborshow ip ospf neighbor
routing ospf interface printshow ospf interfaceshow ip ospf interfaceshow ip ospf interface
routing ospf instance print detailshow ospf overview briefshow ip ospf 1show ip ospf 1
routing ospf lsa printshow ospf databaseshow ip ospf databaseshow ip ospf database
ip route print where ospf=yesshow route protocol ospfshow ip route ospfshow ip route ospf

routing ospf area-border-router print
show ospf route abrshow ip ospf border-routersshow ip ospf border-routers

routing ospf as-border-router print
show ospf route asbrshow ip ospf border-routersshow ip ospf border-routers

MPLS – LDP Commands

MikrotikJuniperCiscoIP Infusion
mpls ldp neighbor printshow ldp neighborshow mpls ldp neighborshow mpls ldp neighbor
mpls ldp interface printshow ldp interfaceshow mpls interfacesshow ldp interface
mpls forwarding-table printshow route forwarding-table family mplsshow mpls forwarding-tableshow mpls forwarding-table
mpls remote-bindings printshow ldp databaseshow mpls bindingshow mpls ilm-table
mpls local-bindings printshow ldp databasesh mpls ip binding localshow mpls ilm-table
mpls printshow mpls label usagesh mpls ldp parametersshow mpls label-space 0

BGP Commands

MikroTikJuniperCiscoIP Infusion
routing bgp peer print briefshow bgp summaryshow ip bgp summaryshow ip bgp summary
routing bgp peer print statusshow bgp neighborshow ip bgp neighborshow ip bgp neighbors
routing bgp advertisements print peer=peer_nameshow route advertising-protocol bgp 172.31.254.2show ip bgp neighbor 172.31.254.2 advertised-routesshow ip bgp neighbors 172.31.254.2 advertised-routes
ip route print where received-from=peer_nameshow route receive-protocol bgp 172.31.254.2show ip bgp neighbor 172.31.254.2 received-routesshow ip bgp neighbors 172.31.254.2 received-routes
ip route print where bgp=yesshow route protocol bgpshow ip route bgpshow ip route bgp
routing bgp peer refresh peer1clear bgp neighbor 172.31.254.2 soft-inboundclear ip bgp 172.31.254.2 soft inclear ip bgp 172.31.254.2 soft in
routing bgp peer resend peer1clear bgp neighbor 172.31.254.2 softclear ip bgp 172.31.254.2 soft outclear ip bgp 172.31.254.2 soft out

Let us know what other commands you would like to see in our rosetta stone to make switching network operating systems a breeze.