SlideShare a Scribd company logo
1 of 15
Download to read offline
HOTSPOT	
  MIKROTIK
PREPARED	
  BY	
  MR	
  EAN	
  SARATH
,	
  4	
  MAY	
  2016
Name: EAN Sarath
Technical Support at MaxBIT ISP
Certification : MTCNA
Areas of Interest : VPN Tunnel, Routing & Switching
Skype : sarath.ean1
FB: Sarath EAN
2
About	
  Me
1. What is Hotspot
2. Benefit of Hotspot
3. Configure Hotspot
4. Bypassing Hotspot
5. Limit User Bandwidth
6. Shared Users Hotspot
7. Question & Answer
3
Content
• Hotspots are used to provide access services (Internet /
Intranet)in the public area, using cable or wireless. And
provide web services authenticated username and password
before access to internet.
• Remote Authentication Dial-­‐In User Service (RADIUS) is a
networking protocol that provides centralized Authentication,
Authorization, and Accounting (AAA) management for users
who connect and use a network service.
4
What	
  is	
  Hotspot	
  
5
Benefit	
  of	
  Hotspot	
  
Copyright®MaximumBusiness informationTechnology
• Require	
  Security	
  login	
  page	
  to	
  
internet.
• Provide	
  friendly	
  page	
  login	
  by	
  
editing.
• Provide	
  Advertisement	
  own	
  
company	
  web	
  page	
  login.
• Provide	
  specific	
  website,	
  bypass	
  
the	
  more	
  specific	
  resource	
  at	
  a	
  
certain	
  protocol	
  and	
  port.
• Provide	
  bandwidth	
  limitation	
  per	
  
user	
  login	
  hotspot.
• Share	
  User	
  Hotspot	
  can	
  access	
  in	
  
the	
  same	
  time.
• Interact	
  with	
  other	
  radius	
  server	
  
&	
  user-­‐manager	
  in	
  Mikrotik.	
  
Configure	
  Hotspot	
  
Hotspot	
  server	
  
o We	
  will	
  run	
  hotspot	
  in	
  LAN,	
  your	
  laptop	
  is	
  hotspot	
  client.
o Hotspot	
  will	
  run	
  on	
  interface	
  connecting	
  to	
  your	
  laptop
7
There	
  are	
  some	
  step	
  configure	
  Hotspot	
  :	
  
a. Configure	
  IP	
  interface	
  Hotspot	
  
IP à Address à Click	
  Add
b.	
  	
  	
  	
  Configure	
  IP	
  Pool	
  
IP à Pool	
  à click	
  Add
c. Configure	
  DHCP	
  server
IP	
  à DHCP	
  SERVER	
  à click	
  Add
d.	
  	
  	
  	
  	
  Configure	
  Hotspot	
  Server	
  
In	
  menu	
  IP	
  à Hotspot à Setup	
  
7
Configure	
  Hotspot	
  
Follow	
  the	
  same	
  steps	
  :
Configure	
  Hotspot	
  Wizard	
  
in	
  Menu	
  IP à Hotspot	
  à Setup
Wizard	
  
8
Configure	
  Hotspot	
  
In menu IP>Hotspot>Setup Wizard
1 2
34
5 6
7
8
There	
  are	
  several	
  ways	
  you	
  can	
  do	
  to	
  bypass	
  the	
  host	
  in	
  order	
  not	
  to	
  perform	
  
authentication	
  when	
  it	
  will	
  enter	
  the	
  hotspot	
  network,	
  as	
  follows.
• IP	
  Binding	
  
o Allow	
  	
  specific	
  user	
  to	
  access	
  without	
  login.
o Use	
  bypass	
  Printers,	
  IP	
  phones,	
  Security	
  camera	
  …	
  etc.
o Configure	
  in	
  menu	
  IP à Hotspot à IP	
  Binding.
9
Bypassing	
  Hotpots	
  
• Walled	
  Garden
o Allow	
  all	
  users	
  to	
  access	
  specific	
  websites.
o Company	
  website,	
  intranet,	
  internet	
  banking	
  …etc.	
  
o Configure	
  in	
  menu	
  IP à Hotspot à Walled	
  Garden
10
Bypassing	
  Hotpots	
  
• Walled	
  Garden	
  IP
o Allow	
  all	
  user	
  access	
  specific	
  protocol
o To	
  bypass	
  HOST/IP	
  with	
  several	
  or	
  ALL	
  services	
  can	
  be	
  accessible	
  from	
  
hotspot	
  client	
  without	
  authentication	
  (router,	
  mail	
  server,	
  etc.)
o Configure	
  in	
  menu	
  IP à Hotspot	
  à Walled	
  Garden	
  IP
11
Bypassing	
  Hotpot
12
Limit	
  User	
  Bandwidth	
  (Local)
• Limit	
  user	
  bandwidth,	
  using	
  Mikrotik	
  hotspot	
  local	
  user	
  profile.
• Can	
  be	
  set	
  from	
  Hotspot	
  à User	
  Profile	
  
• Configure	
  :	
  General	
  à Rate	
  Limit	
  (rx/tx)
1 2
• One	
  user	
  name	
  can	
  be	
  used	
  more	
  than	
  once,	
  for	
  limit	
  number.
• Set	
  the	
  limit	
  number	
  of	
  user	
  from	
  hotspot	
  à User	
  profile.	
  
• Configuration	
  :	
  
-­‐ General	
  à Share	
  User	
  (	
  Set	
  the	
  maximum	
  limit)
13
Shared	
  Users
14
Hotspot	
  New	
  Generation
15
Question	
  &	
  Answer
Thanks	
  for	
  your	
  spend	
  valuable	
  times	
  JJ

More Related Content

What's hot

Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Rofiq Fauzi
 

What's hot (20)

Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configuration
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
OSPF On Router OS7
OSPF On Router OS7OSPF On Router OS7
OSPF On Router OS7
 
Queue Type on Mikrotik
Queue Type on MikrotikQueue Type on Mikrotik
Queue Type on Mikrotik
 
Tunnel vs VPN on Mikrotik
Tunnel vs VPN on MikrotikTunnel vs VPN on Mikrotik
Tunnel vs VPN on Mikrotik
 
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
 
Policy Based Routing (PBR) on Mikrotik
Policy Based Routing (PBR) on MikrotikPolicy Based Routing (PBR) on Mikrotik
Policy Based Routing (PBR) on Mikrotik
 
MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1
 
MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2
 
BGP filter with mikrotik
BGP filter with mikrotikBGP filter with mikrotik
BGP filter with mikrotik
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
Routing fundamentals with mikrotik
Routing fundamentals with mikrotikRouting fundamentals with mikrotik
Routing fundamentals with mikrotik
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Using mikrotik with radius
Using mikrotik with radiusUsing mikrotik with radius
Using mikrotik with radius
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Mikrotik firewall filter
Mikrotik firewall filterMikrotik firewall filter
Mikrotik firewall filter
 
Mikrotik router os qos best practice
Mikrotik router os qos best practiceMikrotik router os qos best practice
Mikrotik router os qos best practice
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
 
GLC webinar: limiting bandwidth using mikrotik
GLC webinar: limiting bandwidth using mikrotikGLC webinar: limiting bandwidth using mikrotik
GLC webinar: limiting bandwidth using mikrotik
 

Similar to HOTSPOT on MikroTik Router

Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourself
Guest Internet
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
Warren Bent
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
CODE BLUE
 

Similar to HOTSPOT on MikroTik Router (20)

Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourself
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call Control
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
 
Wireless Hotspot Kit
Wireless Hotspot KitWireless Hotspot Kit
Wireless Hotspot Kit
 
Yeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series HandoutsYeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series Handouts
 
Jag Techno’s JT-Spot
Jag Techno’s JT-Spot Jag Techno’s JT-Spot
Jag Techno’s JT-Spot
 
Outdoor 4G LTE CPE Installation Guide
Outdoor 4G LTE CPE Installation GuideOutdoor 4G LTE CPE Installation Guide
Outdoor 4G LTE CPE Installation Guide
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
X lite3.0 user-guide (1)
X lite3.0 user-guide (1)X lite3.0 user-guide (1)
X lite3.0 user-guide (1)
 
OpUtils Free training
OpUtils Free training OpUtils Free training
OpUtils Free training
 
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
 
WebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP WorldsWebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP Worlds
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdfAttacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 

More from KHNOG

More from KHNOG (20)

SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
 
Wireless Network Pentestration
Wireless Network PentestrationWireless Network Pentestration
Wireless Network Pentestration
 
Core Concept of TCP/IP
Core Concept of TCP/IPCore Concept of TCP/IP
Core Concept of TCP/IP
 
Bonding Interface in MikroTik
Bonding Interface in MikroTikBonding Interface in MikroTik
Bonding Interface in MikroTik
 
Network Exploitation
Network ExploitationNetwork Exploitation
Network Exploitation
 
Network Security-Honeypot
Network Security-HoneypotNetwork Security-Honeypot
Network Security-Honeypot
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
Why / How to become the Linux certified
Why / How to become the Linux certifiedWhy / How to become the Linux certified
Why / How to become the Linux certified
 
Terminal Access Controller
Terminal Access ControllerTerminal Access Controller
Terminal Access Controller
 
Cambodia International Backbone Network
Cambodia International Backbone NetworkCambodia International Backbone Network
Cambodia International Backbone Network
 
Introduction to BRAS
Introduction to BRASIntroduction to BRAS
Introduction to BRAS
 
ElasticISP
ElasticISPElasticISP
ElasticISP
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik Router
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
 
Routing Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. MikrotikRouting Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. Mikrotik
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

HOTSPOT on MikroTik Router

  • 1. HOTSPOT  MIKROTIK PREPARED  BY  MR  EAN  SARATH ,  4  MAY  2016
  • 2. Name: EAN Sarath Technical Support at MaxBIT ISP Certification : MTCNA Areas of Interest : VPN Tunnel, Routing & Switching Skype : sarath.ean1 FB: Sarath EAN 2 About  Me
  • 3. 1. What is Hotspot 2. Benefit of Hotspot 3. Configure Hotspot 4. Bypassing Hotspot 5. Limit User Bandwidth 6. Shared Users Hotspot 7. Question & Answer 3 Content
  • 4. • Hotspots are used to provide access services (Internet / Intranet)in the public area, using cable or wireless. And provide web services authenticated username and password before access to internet. • Remote Authentication Dial-­‐In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. 4 What  is  Hotspot  
  • 5. 5 Benefit  of  Hotspot   Copyright®MaximumBusiness informationTechnology • Require  Security  login  page  to   internet. • Provide  friendly  page  login  by   editing. • Provide  Advertisement  own   company  web  page  login. • Provide  specific  website,  bypass   the  more  specific  resource  at  a   certain  protocol  and  port. • Provide  bandwidth  limitation  per   user  login  hotspot. • Share  User  Hotspot  can  access  in   the  same  time. • Interact  with  other  radius  server   &  user-­‐manager  in  Mikrotik.  
  • 6. Configure  Hotspot   Hotspot  server   o We  will  run  hotspot  in  LAN,  your  laptop  is  hotspot  client. o Hotspot  will  run  on  interface  connecting  to  your  laptop 7
  • 7. There  are  some  step  configure  Hotspot  :   a. Configure  IP  interface  Hotspot   IP à Address à Click  Add b.        Configure  IP  Pool   IP à Pool  à click  Add c. Configure  DHCP  server IP  à DHCP  SERVER  à click  Add d.          Configure  Hotspot  Server   In  menu  IP  à Hotspot à Setup   7 Configure  Hotspot   Follow  the  same  steps  : Configure  Hotspot  Wizard   in  Menu  IP à Hotspot  à Setup Wizard  
  • 8. 8 Configure  Hotspot   In menu IP>Hotspot>Setup Wizard 1 2 34 5 6 7 8
  • 9. There  are  several  ways  you  can  do  to  bypass  the  host  in  order  not  to  perform   authentication  when  it  will  enter  the  hotspot  network,  as  follows. • IP  Binding   o Allow    specific  user  to  access  without  login. o Use  bypass  Printers,  IP  phones,  Security  camera  …  etc. o Configure  in  menu  IP à Hotspot à IP  Binding. 9 Bypassing  Hotpots  
  • 10. • Walled  Garden o Allow  all  users  to  access  specific  websites. o Company  website,  intranet,  internet  banking  …etc.   o Configure  in  menu  IP à Hotspot à Walled  Garden 10 Bypassing  Hotpots  
  • 11. • Walled  Garden  IP o Allow  all  user  access  specific  protocol o To  bypass  HOST/IP  with  several  or  ALL  services  can  be  accessible  from   hotspot  client  without  authentication  (router,  mail  server,  etc.) o Configure  in  menu  IP à Hotspot  à Walled  Garden  IP 11 Bypassing  Hotpot
  • 12. 12 Limit  User  Bandwidth  (Local) • Limit  user  bandwidth,  using  Mikrotik  hotspot  local  user  profile. • Can  be  set  from  Hotspot  à User  Profile   • Configure  :  General  à Rate  Limit  (rx/tx) 1 2
  • 13. • One  user  name  can  be  used  more  than  once,  for  limit  number. • Set  the  limit  number  of  user  from  hotspot  à User  profile.   • Configuration  :   -­‐ General  à Share  User  (  Set  the  maximum  limit) 13 Shared  Users
  • 15. 15 Question  &  Answer Thanks  for  your  spend  valuable  times  JJ