Why not? It's not a really complex problem. But it's MikroTik choice anyways — to remove it, or not.it will be cleaned up in a future release, but maybe not in 6.30.x .
Maybe they would fix it, but not in 6.30.x because it might imply an architectural change.Why not? It's not a really complex problem. But it's MikroTik choice anyways — to remove it, or not.it will be cleaned up in a future release, but maybe not in 6.30.x .
I'd like to support you and vote against the dummy rules, which are undoubtedly just a mess. I would have vote for option #1, but your wording is quite misleading. Your "Each rule should count its own counters correctly" implies the rule's packet/byte counters are incorrect, but in fact they aren't! What real rule counters show you is perfectly correct. You just need to understand what they show exactly. And Mikrotik needs to document that stuff in a clear way.Why the fasttracking rules do not count their hits but count something different? Make them count correctly and you do not need any dummy rules!
There will be no difference in counters for other rules - as soon as you enable fasttrack, fasttracked traffic will skip firewall - will not be counted in any rules, will be invisible in firewall and queues, that is how fasttrack works, so with and without fasttrack dummy rule other rules will count exatly the same amount of traffic.I want no dummy rules. Each rule should count its own counters correctly.
Same as before..., only small fraction of traffic will go through firewall with fasttrack, and dummy rules have no effect of "nonsense further"I want non-removable one dummy rule for all fasttracking rules to display summary values and real rules can show nonsenses further.
Fasttrack-connection works with connections, similar to connection-mark, you don't know how many rules are marking your traffic with the same mark, it is impossible.I want one dummy rule for each fasttracking rule to display values individually (as many dummy rules as many real fasttracking rules).
I can agree to this option, but be ready that there will be someone that will report that traffic is missing in firewall and queues as soon as you disable it.I want to have general option to enable or disable this dummy rule.
Already stated before - it is impossible as fasttrack is binary flag in connection tracking you can't say what rule added the flag.I want to have an individual option in each fasttracking rule to invoke corresponding dummy rule for counting values.
It is a workaround, you can't get those counters any other way manually, you need to go to /ip settings to see themBut: If there is possibility to count the values and display them in dummy rule, the values could be displayed on real rules instead on the dummy ones.
Dummy rules showcumulativefasttrack counters (i.e. grand total bytes/packet fasttracked). You may have more then 1 fasttrack rule in your configuration, and showing the same number of packets/bytes on all your real fasttrack rules will be even more misleading then it is now with the fake (dummy) rules. Making fasttrack update per-rule counters is not an option, I think, as that should be quite expensive, while fasttrack is all about performance.But: If there is possibility to count the values and display them in dummy rule, the values could be displayed on real rules instead on the dummy ones.
[admin@INCOMPLETE_CONFIGURATION] > :foreach item in=[ /ip firewall filter find ] do { /ip firewall filter remove $item } failure: cannot remove builtin [admin@INCOMPLETE_CONFIGURATION] > :foreach item in=[ /ip firewall mangle find ] do { /ip firewall mangle remove $item } failure: cannot remove builtin
Rules show up as soon as you have at least one fasttrack connection in connection tracking tableEdit 1: These rules are not there when I do a /system reset-configuration no-defaults=yes . So I do not understand why they are separatly handled as "built-ins"
Actually we want MT developers to explain us in DETAIL of how fasttrack works with several examples and clear description.
There are no normal answers there. 3 or 4 of them are basically implying the same thing.Ok,
a week has passed. Now the result look quite clear.
People here want to be able to switch the dynamic rules off and want each rule to show its values correctly instead those dummy rules.
Normis, what is your answer to this?
In reality (if you print in console) there are no action at all. I think accept is default value in winbox. and that is only thing that need to be changed.Does justrenamingthat dummyacceptrule toaccountrule solve the problem?
Marting I had the same issue I finally got fixed. I am not sure if you or others finding this post still need a solution, but the below lines are direct replacements for your lines that fail. The following has been tested on 6.32.3 with the following hardware: RB951Ui-2HnD, RB751U 2HnD, and RB751G-2HnDCode:Select all[admin@INCOMPLETE_CONFIGURATION] > :foreach item in=[ /ip firewall filter find ] do { /ip firewall filter remove $item } failure: cannot remove builtin [admin@INCOMPLETE_CONFIGURATION] > :foreach item in=[ /ip firewall mangle find ] do { /ip firewall mangle remove $item } failure: cannot remove builtin
:foreach item in=[/ip firewall filter find] do={:if ($item != "*8") do={/ip firewall filter remove $item;}} :foreach item in=[/ip firewall mangle find] do={:if ($item != "*3") do={:if ($item != "*2") do={:if ($item != "*1") do={/ip firewall mangle remove $item;}}}}