PCI-DB.com
  1. Driver
  2. Router Switch Access Point
  3. MikroTik RouterOS MIPS-LE Firmware 6.33 RC 22

MikroTik RouterOS MIPS-LE Firmware 6.33 RC 22 Download

Posted at March 28, 2024 by PCI-DB Team

Install Driver Automatically
Device NameMikroTik RouterOS MIPS-LE Firmware 6.33 RC 22
CategoryRouter Switch Access Point
ManufacturerMikroTik
File Size12.2 MB
Supported OSOS Independent

MikroTik RouterOS MIPS-LE Firmware 6.33 RC 22 Description

What's new in 6.33rc22 (2015-Oct-09 10:01):

- certificate - fix scep server certificate-reply degenerate PKCS#7 signed-data content;
- certificate - also accept downloaded CRLs in PEM format;
- userman - added 'history clear' to allow flushing undo history, which may take up significant amount of memory for huge databases with hundreds of users;
- userman - refresh active user/session view when opened;
- health - fix voltage for CRS109, CRS112 and CRS210 if powered from external adapter
- userman - added phone number support to signup form;
- ip pool6 - try to acquire the same prefix if info matches recently freed;
- ipsec - fix transport mode ph2 ID ports when policy selects specific ip protocol on initiator;
- ipsec - use local-address for phase 1 matching and initiation;
- pptp, l2tp, sstp, pppoe clients - fixed problem where they failed to connect at startup and only reboot helped;
- route - fixed crash on removing route that was aggregated;
- ipsec - fix replay window, was accidently disabled since version 6.30;
- ssh - allow host key import/export;
- ssh - use 2048bit RSA host key when strong-crypto enabled;
- ssh - support RSA keys for user authentication;
- wireless - improved WMM-PowerSave support in wireless-cm2 package;
- pptp & l2tp - fixed problem where android client could not connect if both dns names were not provided (was broken since v6.30);
- auto upgrade - added ability to select which versions to select when upgrading;
- quickset - fixed HomeAP mode;
- lte - improved modem identification to better support multiple identical modems;
- snmp - fix system scripts table;
- tunnels - eoip,eoipv6,gre,gre6,ipip,ipipv6,6to4 tunnels now support dns name as remote address;
- fastpath - active macwinbox or mactelnet session no longer suspends fastpath;
- fastpath - added per interface fastpath counters;
- fastpath - added trafflow support in basic ipv4 and fasttrack ipv4 fastpaths;
- quickset - create proper firewall rules when PPPoE is used for address acquisition;
- ppp - added on-up & on-down scripts to ppp profile
- sstp - fixed kernel crash when other party started to fragment ppp packets in the middle;
- ippool6 - optimize same prefix acquisition;
- winbox - Shift+Ins & Shift+Del did not work in multi entry fields;
- winbox - allow to specify ipv6 address in traffic flow target;
- winbox - allow to specify eap-radius-accounting in CAPsMAN;
- winbox - allow to specify dns name in all the tunnels;
- winbox - allow to enter dns name in email server;
- pppoe - added support for MTU > 1492 on PPPoE;
- email - allow server to be specified as fqdn which is resolved on each send;
- cerm - fix scep server certificate-reply degenerate PKCS#7 signed-data content;
- ups - fix console oid print;
- ppp-client - added default channels for Alcatel OneTouch L100V;
- tunnel - fix loopback keepalives on gre and ipip;
- pptp,l2tp,sstp,pppoe: fixed bug #7586: do not send data packets before we have negotiated connection with other side (happens on dial-on-demand interfaces), this brakes when connecting to other party servers;
- email - allow server to be specified as fqdn which is resolved on each send;
- defconf - fix for boards that had bridge with only wlan ports;
- pptp,l2tp,sstp - make it work when add-default-route & dial-on-demand both are enabled;
- nv2 - fixed kernel failure with frame size accounting;
- ovpn: support OpenWRT ovpn clients (or any other with enable-small option enabled);
- cerm - use certificate file name for imported cert name;
- ovpn client - fixed crash when ovpn didn't receive it's ip address;
- lcd - fix slideshow for CCR1072, and possible sign issues for temperatures;
- winbox - make console notice correct screen size;
- fetch - fixed error message when error code 200 was received;
- winbox - fixed context menu actions to apply to all selected items;
- ssh - allow to specify pass as argument for private key import
- winbox - refetch hotspot walled garden hit counter;
- winbox - added client-connections & server-connections to web proxy status;
- cerm - rebuild crl for local ca if crl file does not exist;
- winbox - make directed broadcasts work for neighbor discovery;
- upnp: automatically adjust mappings to new external ip change;;
- bgp - specific BGP networks were changed to different ones;
- cerm - allow export for all types except templates;
- wlan - update brazil-anatel country;
- ppp - added ppp interface to upnp internals/externals if requested
- ppp - when adding ipv6 default route use user provided distance;
- userman - allow to correctly enable CoA on router;
- cerm - also accept downloaded CRLs in PEM format;
- cerm - show crl nextupdate time;
- ppp - added CoA support to PPPoE, PPTP & L2TP (Mikrotik-Recv-Limit, Mikrotik-Xmit-Limit, Mikrotik-Rate-Limit, Ascend-Data-Rate, Ascend-XMit-Rate, Session-Timeout);
- ppp - added new option under "ppp aaa" - "use-circuit-id-in-nas-port-id";
- userman - refresh active sessions/users view dynamically;
- package - added version tag and show everywhere alongside of version number;
- wlan - improved 802.11 protocol single connection TCP performance for ac chipset with cm2 package
- fastpath - eoip,gre,ipip tunnels support fastpath (new per tunnel setting - allow-fast-path - ~no~ for existing tunnels, ~yes~ for new ones). Encapsulated tunnel packets will bypass firewall, connection tracking, simple queues, queue tree with parent=global, ip accounting, ipsec, hotspot universal client, vrf assignment. Note that allowing fast path for tunnel does not guarantee that all packets will go fastpath, so for slowpath packets regular processing happens as before;

About Router Firmware:

Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn’t either newer or matching this release.

Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.

In theory, these steps shouldn’t be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don’t always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.

If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.

If you’re looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don’t power off the router or use its buttons during the installation, if you wish avoid any malfunctions.

If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don’t miss the update that will improve your device. 

  It is highly recommended to always use the most recent driver version available.

Try to set a system restore point before installing a device driver. This will help if you installed an incorrect or mismatched driver. Problems can arise when your hardware device is too old or not supported any longer.

Related MikroTik Drivers

Find Missing Drivers

© 2024 PCI-DB.com - PCI Database Replacement. All rights reserved.