MikroTik RouterOS SMIPS Firmware 6.38.1

Manufacturer:

Description

DOWNLOAD NOW

Changes:

- bridge - disallow manual removal of dynamic bridge ports;
- bridge - fixed MAC address learning from switch master-port;
- bridge - fixed access loss to device through bridge if master port had a loop (introduced in v6.38);
- certificate - added year cap (invalid-after date will not exceed year 2039);
- certificate - fixed fail on import from CAPs when both key and name already exist;
- dhcpv6-client - fixed DHCPv6 rebind on startup;
- dhcpv6-server - fixed server removal crash if static binding was present;
- dns - fixed typo in regexp error message;
- fan - improved RPM monitor on CCR1009;
- firewall - nat action "netmap" now requires to-addresses to be specified;
- health - report fan speed for RB800 and RB1100 when 3-pin fan is being used;
- ike1 - fixed ph1 rekey in setups with mode-cfg;
- ike2 - allow empty selectors to reach policy handler;
- ike2 - auto-negotiate split nets;
- ike2 - default to tunnel mode in setups without policy;
- ike2 - fixed error packet from initiator on responder reply;
- ike2 - fixed initiator TS updating;
- ike2 - fixed ph1 initial-contact rare desync;
- ike2 - fixed policy setting for /0 selector with different address families;
- ike2 - fixed split policy active flag;
- ike2 - fixed traffic selector prefix calculation;
- ike2 - fixed xauth add check;
- ike2 - include identity in peer address info;
- ike2 - log empty TS payload;
- ike2 - minor logging update;
- ike2 - show peer identity of connected peers;
- ike2 - traffic selector improvements;
- ike2 - update also local port when peer changes port;
- ike2 - use first split net for empty TS;
- ike2 - use standard retransmission timers for DPD;
- ike2 - xauth like auth method with user support;
- ipsec - added ability to kill particular remote-peer;
- ipsec - fixed flush speed and SAs on startup;
- ipsec - fixed peer port export;
- ipsec - port is used only for initiators;
- ipv6 - added warning about having interface MTU less than minimal IPv6 packet fragment (1280);
- license - fixed demo license expiration after installation on x86;
- log - improved firewall log messages when NAT has changed only connection ports;
- logs - work on false CPU/RAM overclocked alarms;
- mpls - fixed crash on active tunnel loss in MPLS TE setups;
- ovpn - fixed address acquisition when ovpn-in interface becomes slave;
- proxy - fixed "max-cache-object-size" export;
- proxy - speed-up almost empty disk cache clean-up;
- quickset - various small changes;
- rb751u - fixed ethernet LEDs (broken since 6.38rc16);
- ssh - fixed high memory consumption when transferring file over ssh tunnel;
- webfig - show properly large BGP AS numbers;
- winbox - added "make-static" to IPv6 DHCP server bindings;
- winbox - added "prefix-pool" to DHCPv6 server binding;
- winbox - added IPsec to radius services;
- winbox - added upstream flag to IGMP proxy interfaces;
- winbox - allow to specify "connection-bytes" & "connection-rate" for any protocol in “/ip firewall” rules;
- winbox - allow to specify "sip-timeout" under ip firewall service-ports;
- winbox - do not create empty rates.vht-basic/supported-mcs if not specified in CAPsMAN;
- winbox - hide "nat-traversal" setting in IPsec peer if IKEv2 is selected;
- winbox - show dynamic IPv6 pools properly;
- winbox - show errors on IPv6 addresses;
- winbox - specify metric for “/ip dns cache-used” setting;
- wireless - show comment on "security-profile" if it is set;
 

About Router Firmware:

Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn’t either newer or matching this release.

Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.

In theory, these steps shouldn’t be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don’t always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.

If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.

If you’re looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don’t power off the router or use its buttons during the installation, if you wish avoid any malfunctions.

If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don’t miss the update that will improve your device.

MikroTik RouterOS Firmware MikroTik SMIPS Architecture Firmware MikroTik Router Firmware Router RouterOS Firmware MikroTik