Leaderboard
Popular Content
Showing content with the highest reputation since 12/14/24 in all areas
-
now just says 'offline'.. update that column with "offline/n[datetime]" to see when last-seen... also req#2, Add to devicelist to show recent unregistered clients now offline too -- so over past 24h or past half-dozen over past week... that is just a separate REQ... It surprises me, someone can go onto a Keenetic system a few minutes ago then go offline and be invisible in the UI. I actually prefer a DHCP page where I can see what was recently assigned and so who it was assigned to, but that isn't even fullproof if they go static.5 points
-
So the real feature request sounds as "don't lease the IP address to the host with the installed local-administrated bit in address". Sounds interesting, will reconsider this.3 points
-
Release 4.3 Alpha 12: IPoE: reworked code for configuring Wired connections concerning IPTV, VoIP and VLANs on Ethernet ports [NDM-3586] IPv6: fixed the cause of nginx error “bind() to [fd05:...] failed (Address not available)” [NDM-3525]3 points
-
The main idea is to add the ability to reject connections based on MAC address patterns (masks) in cases where white/blacklists are not flexible enough for configuration.2 points
-
Hello, I set up a second connection which is Cloudflare Warp and I want to route some traffic to that connection. I am playing with this tool since 2 days and what is difficult to me can be improved. 1-There should be bulk modification for routes. I have imported batch file of Twitter which has maybe 50 IP. I want to add "Twitter" label to each record. I can not do it. (Or is it possible to add this via batch file, not sure). 2-We should be able to do this with URL like we do it in modern firewalls (Fortigate for example) instead of IP. Because it is impossible for me to find all IPs address of Twitter, Discord, telegram etc.. and they can change/update their IP also. 3-It would be great if we have enable-disable slide button for each routing rule. so that we dont have to delete that routing if we dont want to use it temporarily. Thanks.2 points
-
I confirm, the function of grouping and subsequent batch editing/enabling-disabling/deleting routes is very necessary2 points
-
Could you please tell us what features of the fourth version do you need? We don't upgrade because transmission 4.0 uses C++ inplace of C, and consumes significantly more CPU, RAM and flash storage.2 points
-
2 points
-
You can put it of the USB flash drive, and then issue in the commandline > copy USBDRIVE:/image.bin ndm:firmware2 points
-
Is the connection via a cable? If so, make sure the Guest LAN is also shared on that port.1 point
-
Feature Request: Support for MAC Address Filtering by Masks and Ranges Introduction Currently, my routers allow me to control wireless network access using allowlists (“White List”) and blocklists (“Black List”) based on device MAC addresses. While this works for basic cases, it becomes inconvenient in larger networks or when frequent adjustments to access settings are required. Proposed Feature I propose adding the ability to filter MAC addresses using masks and/or ranges. This would allow managing access not on a per-device basis but for entire groups of devices with similar MAC addresses. Why This Matters Ease of Management If the network contains many devices from the same manufacturer (with identical MAC address prefixes), a single rule could replace dozens of individual entries. Scalability For large or dynamic networks, this tool would simplify the management process, as working with ranges or masks is far easier than maintaining a long list of addresses. Improved Security The ability to define precise filters for groups of devices helps ensure better control over who can connect to the network. Suitable for IoT and Office Networks Devices from the same manufacturer often have similar MAC address patterns. Filtering by masks and/or ranges would make managing such devices more efficient. Management of Randomized MAC Addresses This feature would make it possible to allow or block all devices with randomized MAC addresses, or permit connections only for devices using static ones. Currently, this is nearly impossible to achieve without relying on external services. However, implementing this directly in the routers seems feasible and would not require significant technical or human resources. How It Could Work MAC Address Masks: An entry like 00:1A:2B:XX:XX:XX would cover all devices within the specified range. MAC Address Ranges: Users could specify a start and end MAC address, such as 00:1A:2B:00:00:00 – 00:1A:2B:FF:FF:FF. Interface: Add fields in the access control settings for inputting masks and/or ranges, ensuring the feature remains intuitive. Conclusion Supporting masks and/or ranges for MAC address filtering would make network management more convenient, flexible, and secure. This is especially important for modern networks where the number of connected devices continues to grow.1 point
-
Release 4.3 Alpha 13: AFP: enabled Time Machine attribute for all shares by default [NDM-3510]: afp share {label} {mount} [timemachine] [{description}] IPoE: fixed "voip" role assignment (reported by @Leshiyart) [NDM-3643] IPv6: fixed 6in4 tunneling when static MTU is set [NDM-3644] Web: fixed display of connection name in the “Signal Levels” pop-up (reported by @dimon27254) [NWI-3978] Web: fixed errors in log when adding a DNS server (reported by @dimon27254) [NWI-3991] Web: fixed traffic monitor card on the dashboard (reported by @spatiumstas) [NWI-3921]1 point
-
I've got the point, thanks. Implementing some sort of a garbage collection would be nice.1 point
-
Release 4.3 Alpha 11: DynDNS: increased HTTP version to 1.1 in all requests (reported by @Olegas) [NDM-3628] HTTP: fixed "there are errors in config" endless loop when OpenConnect server is active (reported by @Namenloss) [NDM-3627] NTP: implemented server suspension before the time is synchronized (reported by @feoser) [NDM-3620] SSTP: implemented automatic configuration of OSC following SSL certificate [NDM-3622] TSMB: fixed compatibility with iOS 18 [NDM-3626] USB: implemented FM350 modem configuration without power-cycle (reported by @toxa_e1) [NDM-3615] Web: fixed 2FA input on the NextDNS login pop-up (reported by @ava-by) [NWI-3925] Web: fixed an error when creating an EoIP tunnel (reported by @xan) [NWI-3964] Web: fixed connection priority setting on mobile screens (reported by @spatiumstas) [NWI-3990] Web: fixed display of scanning status for DLNA media server (reported by @project_fcc) [NWI-3844] Web: fixed display of unsupported OPKG settings for non-USB devices (reported by @SerjPav) [NWI-3994] Web: fixed issues with scrollbars (reported by @dimon27254) [NWI-3962] Web: fixed removal of the Wi-Fi client connection from the Home segment when changing SSID on Extender [NWI-3983] Web: fixed spacing between tiles on the dashboard (reported by @dimon27254) [NWI-3920] Web: fixed the display of the page with legal documents (reported by @dimon27254) [NWI-3995]1 point
-
Thank you for the report, will be fixed in the next 4.3 release.1 point
-
Release 4.2.4 (preview → stable): DNS: fixed waiting for a response from the upstream server polled last [SYS-1245] MWS: fixed activation of 5 GHz access point on Extenders [NDM-3565] SFP: added quirks for GPON modules on KN-1012 [SYS-1248] ODI DFP-34X-2I3 ODI DFP-34X-2IY3 SSTP: fixed server compliance with the policy bound to the interface [NDM-3563] Web: fixed "Applications not installed" status on the dashboard (reported by @dimon27254) [NWI-3798] Web: fixed autocompletion in the command line interface (reported by @dimon27254) [NWI-3791] Web: fixed display of long strings in search results (reported by @dimon27254) [NWI-3866] Web: fixed display of special usernames (reported by @MaXaoH) [NWI-3898] Web: fixed flickering when loading the Home segment page (reported by @spatiumstas) [NWI-3820] Web: fixed menu section headings (reported by @spatiumstas) [NWI-3824] Web: fixed sorting of the Mesh Wi-Fi System list by "Uptime" (reported by @Эльдар) [NWI-3815] Web: fixed tooltip display on the traffic monitor graph (reported by @FLK) [NWI-3894] Web: fixed tooltips on the Traffic Monitor page (reported by @T@rkus) [NWI-3825] Web: fixed WPA3 network selection for WISP [NWI-3937] Wi-Fi: fixed preserving the radio turned off by button after system restart [SYS-1239] Wireguard: fixed connection uptime (reported by @spatiumstas) [NDM-3567] Wireguard: fixed reconnection after disabling the local interface [NDM-3560]1 point
-
Hello, I need auto wake on lan client with specific date and time also one time or every day, every week, every month, every year like windows task scheduler. Can you add this next future uptade KeeneticOS 4.3 ? There are many Keenetic devices and PCs in our network. This feature is very necessary for our it department. Thanks, Kind regards.1 point
-
1 point
-
I have 3 providers, priority 1-2-3, the electricity turns off, the Keenetic switches to provider 3, then the electricity turns on, the Keenetic switches to 1, but the forwarding ports remain open on provider 3, and are not accessible from the internet on provider 1, although the internet at the same time goes through provider 1, and if I ping provider 1 from the internet, the Keenetic responds from provider 3. In my case helps to turn provider 3 off and on, then the ports become available on provider 1.1 point
This leaderboard is set to Moscow/GMT+03:00