Hello, community!
We're back with an end-of-summer update. We've been quite busy cleaning up legacy code, fixing bugs, and adding remaining features planned for the future 1.4.0 (Sagitta) LTS release that we hope to finish by 2024. Soon, we'll create a sagitta branch in our git repositories to stabilize the codebase that will become the new 1.4.0 LTS release. Rolling release development will continue in the current branch, and the future 1.5 LTS release will be "Circinus". Meanwhile, the minor release 1.3.4 of the Equuleus branch is in its final stages, and we'll soon build and release its images. Here's what's happened in August.
We'll provide detailed release notes when 1.3.4 images are out, so stay tuned for updates!
# Example configuration set service monitoring zabbix-agent directory '/config/zabbix/' set service monitoring zabbix-agent limits buffer-flush-interval '8' set service monitoring zabbix-agent limits buffer-size '120' set service monitoring zabbix-agent log debug-level 'warning' set service monitoring zabbix-agent log size '1' set service monitoring zabbix-agent host-name 'foo' set service monitoring zabbix-agent server '192.0.2.5' set service monitoring zabbix-agent server-active 192.0.2.5 port '10051' set service monitoring zabbix-agent server-active 2001:db8::123
set interfaces openvpn <name> tls peer-fingerprint <sha256-digest>
tls dh-params
is now optional. Omitting it will default to ECDH (T5270).show pki certificate <certificate> fingerprint [sha256|sha384|sha512]
set interfaces wireguard <name> per-client-thread
set interfaces wireless <name> per-client-thread
set interfaces <interface-type> <interface> ipv6 accept-dad [0|1|2]
set system ip tcp mss base <n> set system ip tcp mss floor <n> set system ip tcp mss probing [on-icmp-black-hole|force]
set interfaces macsec <interface> address <address> set interfaces macsec <interface> security encrypt set interfaces macsec <interface> cipher [gcm-aes-128|gcm-aes-256] set interfaces macsec <interface> security static key <key> set interfaces macsec <interface> security static peer <peer> key <key> set interfaces macsec <interface> security static peer <peer> mac <address>
set interfaces wireless <interface> security station-address mode [accept|deny] set interfaces wireless <interface> security station-address accept mac <address> set interfaces wireless <interface> security station-address deny mac <address>
set service dns dynamic timeout <seconds>
clear dns dynamic cache
set protocols bgp address-family [ipv4|ipv6]-unicast label vpn allocation-mode per-nexthop
set container name <container> port <name> source <port> set container name <container> port <name> destination <port> set container name <container> port <name> listen-address <address-0> set container name <container> port <name> listen-address <address-1>
[monitor|show] log console-server
show firewall
now displays inbound and outbound interfaces as separate columns (T5496):set system option time-format [12-hour|24-hour]
That's all for now, but stay tuned for more updates!