MikroTik RouterOS ARM Firmware 7.10 Beta 5

Manufacturer:

Description

DOWNLOAD NOW

What's new in 7.10beta5:

- bridge - fixed HW offloaded STP state on port disable;
- bridge - fixed HW offloading for vlan-filtered bridge on devices with multiple switches (introduced in v7.8);
- certificate - fixed displaying of certificate serial number;
- certificate - improved error reporting for Let's Encrypt certificate;
- certificate - restore available "key-usage" property options;
- console - added timeout error for configuration export;
- console - changed time format according to ISO standard;
- console - disable output when using "as-value" parameter;
- console - fixed ":terminal inkey" input when resizing terminal;
- console - hide past commands with sensitive arguments;
- container - fixed "container pull" to support OCI manifest format;
- container - fixed crash due to missing system directories;
- container - improved default internal environment values;
- defconf - fixed default configuration for RBSXTLTE3-7;
- dhcp-server - fixed accounting on RADIUS interim update;
- firewall - added "endpoint-independent-nat" support;
- firewall - added "nth" option for IPv6 firewall;
- gps - expose GPS port for Quectel RM520N-GL;
- ike2 - improved child SA delete request processing;
- iot - added option to send Modbus function code commands directly from RouterOS (CLI only);
- ipsec - added hardware acceleration support for IPQ-5010 (hAP ax lite);
- ipsec - refactor public key authentication;
- ipv6 - fixed IPv6 address removal;
- l3hw - added advanced configuration options for fine-tuning the L3HW offload (l3hw-settings are cleared after upgrade or downgrade) (CLI only);
- l3hw - added monitoring options for L3HW utilization (CLI only);
- l3hw - fixed /32 route deletion;
- l3hw - improved system stability for partial routing table offload;
- lte - added serving cell query for MBIM modems with necessary MBIM extension;
- lte - disable DHCP request filtering (UDP port 67) for Chateau 5G;
- lte - fixed Google Pixel 7 tethering support;
- lte - improved stability for Chateau 5G LTE modem firmware upgrade;
- lte - stop "cell-monitor" on LTE interface configuration change for MBIM modems;
- mpls - added FastPath support;
- ovpn - added initial support for V2 data transfer protocol;
- ovpn - improved system stability;
- pppoe - fixed PPPoE client scan when server is sending PADO messages without Service-Name tag;
- qos-hw - added QoS marking support for 98DXxxxx switches (CLI only);
- route - improved system stability when removing multicast forwarding entries;
- routerboard - fixed memory test on CCR2116-12G-4S+ ("/system routerboard upgrade" required);
- routerboard - improved RouterBOOT stability for Alpine CPUs ("/system routerboard upgrade" required);
- sfp - fixed combo-ether link monitor for CRS328-4C-20S-4S+ switch;
- sfp - improved Q/SFP interface stability for 98DX8208, 98DX8212, 98DX8332, 98DX3257, 98DX4310, 98DX8525, 98DX3255, 98PX1012 switches;
- sfp - improved SFP interface handling for RB4011, RB5009, CCR2xxx and CRS518 devices;
- sfp - improved system stability with certain SFP modules for CCR2216 and CRS518 devices;
- sfp - report EEPROM data even if "auto-init-failed" has occurred;
- smb - improved SMB v1 operation;
- snmp - added "engine-id-suffix" setting and display actual "engine-id" as read-only property;
- snmp - added new "mtxrInterfaceStatsTxRx1024ToMax" OID to MIKROTIK-MIB;
- ssh - added inline key "passphrase" property;
- switch - added more precise "storm-rate" configuration options for 98DXxxxx switches (CLI only);
- switch - fixed storm rate on 10G links for 98DX8208, 98DX8216, 98DX8212, 98DX8332, 98DX3257, 98DX4310, 98DX8525, 98DX3255 switches;
- system - improved watchdog reporting in log after reboots for several ARM and ARM64 devices;
- tile - fixed support for microSD card;
- upgrade - do not run manual upgrade if some packages are missing;
- ups - fixed updating of "battery-voltage" property;
- w60g - improved interface stability for PTMP setups;
- webfig - added high-resolution favicon;
- webfig - allow limitless upper bounds for number range;
- webfig - allow to set "0" second time for fields with default values;
- webfig - changed time format according to ISO standard;
- webfig - display date and time in local time zone;
- webfig - fixed missing "WifiWave2" menu;
- webfig - fixed missing property names in "WifiWave2" menu;
- webfig - redesigned item configuration display;
- webfig - redesigned top menu bar;
- webfig - removed "Tools/Telnet" menu;
- webfig - removed auto-login with default credentials (admin without a password);
- wifiwave2 - avoid transmitting extra bytes at the end of the packet after stripping a VLAN tag;
- wifiwave2 - do not show placeholder transmit power values on interface startup;
- wifiwave2 - fixed CAP connection when provisioning "manager=capsman";
- wifiwave2 - fixed DFS channel availability warning (introduced in v7.9);
- wifiwave2 - fixed dynamic interface adding to bridge on CAP device;
- wifiwave2 - fixed inability to disable CAPsMAN when there are RADIUS-authenticated clients connected;
- wifiwave2 - fixed incorrect limits on number of interfaces in station mode;
- wifiwave2 - fixed interface name change when restoring backup;
- wifiwave2 - fixed key handshake timeout with re-associating clients;
- wifiwave2 - fixed OWE authentication compatibility with 802.11ax client devices;
- wifiwave2 - fixed OWE authentication compatibility with third-party client devices (introduced in v7.8);
- wifiwave2 - improved logging when an interface is unable to assign a VLAN tag to client;
- wifiwave2 - improved system stability when trying to exceed virtual AP limit;
- wifiwave2 - improved system stability;
- wifiwave2 - restore interface running state when connection to CAPsMAN is lost;
- winbox - added "Queues" configuration tab when creating new entries under "IPv6/DHCP-Server" menu;
- winbox - rename "URL" property to "Action data" under "IP/Web-Proxy/Access" menu;
- wireguard - fixed IPv6 traffic processing with multiple peers;
- x86 - ice driver update to v1.11.14;
- zerotier - make "identity" setting sensitive;

About Router Firmware:

Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn't either newer or matching this release.

Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.

In theory, these steps shouldn't be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don't always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.

If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.

If you're looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don't power off the router or use its buttons during the installation, if you wish avoid any malfunctions.

If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don't miss the update that will improve your device.

MikroTik RouterOS Firmware MikroTik ARM Architecture Firmware MikroTik Router Firmware Router RouterOS Firmware MikroTik