If you are restoring a config,.....that's your problem. Reset and manually configure. No importing configs.Bad experience with this 384.10. Nothing worked, reflashed from start, don' t like it.
Super slow DL speeds wired.
Will flash back to 384.9 Keep your config file....
It looks normal only if nothing connected, the extra field appears only if something connects.The RT-AC87U has a different architecture, most likely the new field added for other models isn't properly hidden on that model.
I'm restoring 384.9 configuration with 384.9 firmware, sorry for being unclear.If you are restoring a config,.....that's your problem. Reset and manually configure. No importing configs.
Bad experience with this 384.10. Nothing worked
Try the two Alpha builds in https://asuswrt.lostrealm.ca/test-builds/ as well as the 384.10 betas posted on Sourceforge to see if the issue started with a specific release.
In AX88U Movistar triple VLAN profile works correctly...
Same issue here... and same solution (back to 384.9_0)
I dirty flashed first alpha (build alpha2-g8bdff96906) and IPTV didnt work
8bdff96906 Merge branch 'master' into mainline
e5ecf7d04c openssl11: Enable OpenSSL 1.1.x on all models
8ac309d1e5 Merge branch 'master' into mainline
c61f03731a Bumped revision to 384.10 alpha 2
953fdb28f8 Updated documentation
f7e8aece92 tor: Update to 0.3.5.8; enable OpenSSL 1.1.x support
d414591de4 strongswan: remove version 5.2.1 from the tree
758b811b8d strongswan: switch to 5.7.2; enable OpenSSL 1.1.x support
51966ea1ff rc: strongswan: Re-enable modp1024 DH, as the built-in Android client doesn't support newer dhgroups with ikev1
8df9f4014e rc: strongswan: Update strongswan.conf content for 5.7.2
fbd510087a strongswan: kernel-netlink: Fix compilation on old kernels (< 2.6.39) (backport from upstream)
f6895a2f9a strongswan: port threading fixes for HND from Asus's 5.2.1
523777ec1a strongswan: fix 32-bit building on 64-bit HND kernel; switch strongswan to 32-bit build, with shared openssl linking
2a2ec0e577 strongswan: Add 5.7.2 to the tree (required for OpenSSL 1.1.x)
45104dbebc openssl11: email: Enable OpenSSL 1.1.x support
8c0ad421ce openssl11: acme-client: Enable OpenSSL 1.1.x support
dcfd174e87 openssl11: net-snmp: Enable OpenSSL 1.1.x support
f0f9f5d985 openssl11: vsftpd: Enable OpenSSL 1.1.x support
47b0262d42 openssl11: Enable OpenSSL 1.1.1 for httpd, mssl, libvpn, wget, inadyn
e67db647fd httpd: Fix OpenSSL 1.1.x support
2fcbe91ecd inadyn: Fix compilation without deprecated OpenSSL 1.1 APIs
0b49f44251 openssl: openssl11: Performance optimizations
8fed354c55 openssl11: priorize CHACHA over GCM for models with no AES acceleration
c00cbfe5d5 openssl11: Add OPENSSL_PREFER_CHACHA_OVER_GCM option
7d3e9174fc openssl11: Add build recipes
944bc2e3ff openssl11: add OpenSSL 1.1.1a to the tree
3fd2098b6c webui: fixed IPSEC log display, which was all shown on one single line
e255fdbba6 Updated documentation
1c4ae65240 openvpn: update to 2.4.7
67346424ae quagga: size it down and fix path
a2255cb4b1 httpd: properly use an "_" if MU-MIMO is not present on a Guest client
804e77ca22 usb-modeswitch: remove unused 1.2.3 version from the tree
30e9599651 curl: updated to 7.64.0
98b3c6630f openvpn: drop CFB ciphers from client as they are never really used
57708c7fe8 Merge branch 'master' of github.com:RMerl/asuswrt-merlin.ng
6beef0d060 openvpn: remove OFB ciphers from client, not supported by current OpenSSL build anyway
48947ded3c use sizeof in fgets to reduce risk of buffer over runs
17b451c130 Don't risk over running the buffer
46e7847441 Don't compare the pointer, compare the value
3141317540 btconfig: removed component that's not used by any of the AM supported models
19c271ed5c Make array argv the right size
af3452a561 Merge pull request #268 from dp111/patch-8
cf9c38653f Merge pull request #267 from dp111/patch-7
59b8571234 Check -C parameters correctly
a7d3a96204 Check port range correctly
24be8ee85c correct size of structure
ab0e53fb28 Correct memset parameter order
0c1e93f868 Correct order of memset parameters
ed3c77883d build: fix/optimize HND_ROUTER checks in inadyn. ncurses and ipset_arm recipes
40c24630c4 openvpn: cleanup build recipe
4d0f428c14 webui: display number of tracked connections on Classification table
7bafe66260 webui: disable automatic refresh of Classification page if more than 300 tracked connections
df25c2d41b ffmpeg: harmonize build recipes with upstream
d87ba15f6c Merge branch 'master' into mainline
1d5e7f333d Revert "ffmpeg: harmonize build recipes with upstream"
856ab96e53 zebra: strongswan: remove unused static libs
04d3f7b276 build: removed Beceem support from SDK6/SDK7 models, saving 2.3 MB of flash space
3654f63d06 Bumped revision to 384.10 alpha 1
Complete list of changes between 384.9 and the alpha build you tried:
Code:8bdff96906 Merge branch 'master' into mainline e5ecf7d04c openssl11: Enable OpenSSL 1.1.x on all models 8ac309d1e5 Merge branch 'master' into mainline c61f03731a Bumped revision to 384.10 alpha 2 953fdb28f8 Updated documentation f7e8aece92 tor: Update to 0.3.5.8; enable OpenSSL 1.1.x support d414591de4 strongswan: remove version 5.2.1 from the tree 758b811b8d strongswan: switch to 5.7.2; enable OpenSSL 1.1.x support 51966ea1ff rc: strongswan: Re-enable modp1024 DH, as the built-in Android client doesn't support newer dhgroups with ikev1 8df9f4014e rc: strongswan: Update strongswan.conf content for 5.7.2 fbd510087a strongswan: kernel-netlink: Fix compilation on old kernels (< 2.6.39) (backport from upstream) f6895a2f9a strongswan: port threading fixes for HND from Asus's 5.2.1 523777ec1a strongswan: fix 32-bit building on 64-bit HND kernel; switch strongswan to 32-bit build, with shared openssl linking 2a2ec0e577 strongswan: Add 5.7.2 to the tree (required for OpenSSL 1.1.x) 45104dbebc openssl11: email: Enable OpenSSL 1.1.x support 8c0ad421ce openssl11: acme-client: Enable OpenSSL 1.1.x support dcfd174e87 openssl11: net-snmp: Enable OpenSSL 1.1.x support f0f9f5d985 openssl11: vsftpd: Enable OpenSSL 1.1.x support 47b0262d42 openssl11: Enable OpenSSL 1.1.1 for httpd, mssl, libvpn, wget, inadyn e67db647fd httpd: Fix OpenSSL 1.1.x support 2fcbe91ecd inadyn: Fix compilation without deprecated OpenSSL 1.1 APIs 0b49f44251 openssl: openssl11: Performance optimizations 8fed354c55 openssl11: priorize CHACHA over GCM for models with no AES acceleration c00cbfe5d5 openssl11: Add OPENSSL_PREFER_CHACHA_OVER_GCM option 7d3e9174fc openssl11: Add build recipes 944bc2e3ff openssl11: add OpenSSL 1.1.1a to the tree 3fd2098b6c webui: fixed IPSEC log display, which was all shown on one single line e255fdbba6 Updated documentation 1c4ae65240 openvpn: update to 2.4.7 67346424ae quagga: size it down and fix path a2255cb4b1 httpd: properly use an "_" if MU-MIMO is not present on a Guest client 804e77ca22 usb-modeswitch: remove unused 1.2.3 version from the tree 30e9599651 curl: updated to 7.64.0 98b3c6630f openvpn: drop CFB ciphers from client as they are never really used 57708c7fe8 Merge branch 'master' of github.com:RMerl/asuswrt-merlin.ng 6beef0d060 openvpn: remove OFB ciphers from client, not supported by current OpenSSL build anyway 48947ded3c use sizeof in fgets to reduce risk of buffer over runs 17b451c130 Don't risk over running the buffer 46e7847441 Don't compare the pointer, compare the value 3141317540 btconfig: removed component that's not used by any of the AM supported models 19c271ed5c Make array argv the right size af3452a561 Merge pull request #268 from dp111/patch-8 cf9c38653f Merge pull request #267 from dp111/patch-7 59b8571234 Check -C parameters correctly a7d3a96204 Check port range correctly 24be8ee85c correct size of structure ab0e53fb28 Correct memset parameter order 0c1e93f868 Correct order of memset parameters ed3c77883d build: fix/optimize HND_ROUTER checks in inadyn. ncurses and ipset_arm recipes 40c24630c4 openvpn: cleanup build recipe 4d0f428c14 webui: display number of tracked connections on Classification table 7bafe66260 webui: disable automatic refresh of Classification page if more than 300 tracked connections df25c2d41b ffmpeg: harmonize build recipes with upstream d87ba15f6c Merge branch 'master' into mainline 1d5e7f333d Revert "ffmpeg: harmonize build recipes with upstream" 856ab96e53 zebra: strongswan: remove unused static libs 04d3f7b276 build: removed Beceem support from SDK6/SDK7 models, saving 2.3 MB of flash space 3654f63d06 Bumped revision to 384.10 alpha 1
At a first glance I cannot see any of this code even remotely touching the VLAN code.
Is it just the IPTV service that stops working?
Asuswrt-Merlin 384.10 is now available for all supported models. The focus of this release was the partial migration to OpenSSL 1.1.1 (not all services can be migrated by me, as some would require Asus to recompile them against OpenSSL 1.1.1).
The highlight:
- Added OpenSSL 1.1.1b in parallel to 1.0.2. The most relevant services linked against 1.1.1:
o httpd (the webui)
o OpenVPN
o In-a-dyn
o Strongswan
o Netatalk
o vsftpd
o net-snmp
o Tor
o wget
The userspace "openssl" tool is called openssl11.- Merged with GPL 384_5640 (RT-AX88U)
- Updated components: OpenSSL 1.0 (1.0.2r), OpenVPN (2.4.7), curl (7.64.0), Tor (0.3.5.8), Strongswan (5.7.2). dnsmasq (2.80-g6799320)
- Fixed Samba compatibility issue with recent Tuxera NTFS driver.
- Fixed NFSv2 support (and enabled on HND models).
- Enhancements to OpenVPN key/certs storage and management
- Enhancements to Classification page, which should be faster, and offer filtering
- Various other fixes and tweaks
Downloads are here.
Changelog is here.
Asuswrt-Merlin 384.10 is now available for all supported models. The focus of this release was the partial migration to OpenSSL 1.1.1 (not all services can be migrated by me, as some would require Asus to recompile them against OpenSSL 1.1.1).
The highlight:
- Added OpenSSL 1.1.1b in parallel to 1.0.2. The most relevant services linked against 1.1.1:
o httpd (the webui)
o OpenVPN
o In-a-dyn
o Strongswan
o Netatalk
o vsftpd
o net-snmp
o Tor
o wget
The userspace "openssl" tool is called openssl11.- Merged with GPL 384_5640 (RT-AX88U)
- Updated components: OpenSSL 1.0 (1.0.2r), OpenVPN (2.4.7), curl (7.64.0), Tor (0.3.5.8), Strongswan (5.7.2). dnsmasq (2.80-g6799320)
- Fixed Samba compatibility issue with recent Tuxera NTFS driver.
- Fixed NFSv2 support (and enabled on HND models).
- Enhancements to OpenVPN key/certs storage and management
- Enhancements to Classification page, which should be faster, and offer filtering
- Various other fixes and tweaks
Downloads are here.
Changelog is here.
and internet was working
Anyone tried to run a script at the CLI ? I keep getting "access denied" (must be doing something wrong)
RT-AX5300U / 384.10.0
You need to troubleshoot your setup first, as I highly doubt that "nothing is working" for the hundreds of other people who already upgraded.
There has been no change surrounding the core networking code, and the RT-AX88U is the only model that saw any GPL-related change.
Have tried three times after downloading but after flashing it still shows 384.10 beta 3. Wonder if anyone else has this problem.
I have only detected issues with iptv, other services works correctly (internet and openvpn client/server).I know, i have ur github on favorites and i visit that place almost all days to see ur work progress. This .10 build changelog is to move to OpenSSL 1.1.x and none of the changes i see could affect IPTV... but my problem is real and after test .10 with totaly clean flash and didnt work im totally confused.
Idk if other services stop working because i use the router on basic options and i disable all... no ftp, no telnet, no aicloud, no vpn, only internet and iptv and internet was working.
I know u cant do nothing because u cant reproduce the issue due u cant use Movistar IPTV, so i hope more spanish guys with "Movistar Triple VLAN" come here and post if its working or not but im 99% sure its not my fault when configure the router
Coming from 384.8.2 can I update without reconfigure from scratch?
the only significant stuff I found is the fact that the RAM used is about 85%...
with older firmwares was 50-60%...
I don´t know if this is relevant...
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!