SlideShare a Scribd company logo
Mikrotik® MPLS/VPN
Lab Part-1
By Kaveh Khosravi
What will be covered
• Introduction
• How to set up the Lab
• Configuration
• Connectivity Check
• Introduction
In this lab you are going to learn how to use Mikrotik’s powerful operating system , Router OS® , in
order to implement MPLS/VPN functionality , although it lacks Important features like fast reroute * .
All of the main examples and configurations for MPLS/VPN are given from Mikrotik’s documentations
** website .
• How to set up the Lab
 The DELL Labtop is used for runnig vmware workstation to simulate the MPLS network
with virtual machines running as Mikrotik Router-OS as Provider (P) and Provider Edge (PE)
routers,Windows Server 2003 as Customer Edge ( CE) routers . Juniper SRX 210HM , First SSG-5
and Second SSG-5 act as HUB site , Spoke-Branch-1 and Spoke-Branch-2 respectively .
Labtop’s FastEthernet and Pluggable USB to Gigabit Ethernets are used for connecting CE-1 to
HUB site , CE-2 to spoke-2 and CE-3 to spoke-3 so we can make bridge between real world
and Virtual world .


Lets take a look at physical lab components
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Hardware
1.
2.
3.
4.

DELL® N-4030 Labtop x1
Juniper® Networks SRX 210HM x1
Juniper® Networks Secure Services Gateway ( SSG5-SB) x2
Pluggable® USB 2.0 to Gigabit Ethernet Converter x2
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Hardware (DELL® N-4030 Labtop )
Processor

Intel Core i3-370M 2.4GHz Processor with Intel
Hyper-Threading Technology (3MB Cache)

Memory
Hard Drive

2GB DDR3-1333
320GB 5400RPM

Chipset

Mobile Intel® 5 Series Express Chipset HM57

Graphics

Intel HD Graphics

Display

14.0" High Definition (720p) 1366 x 768 WLED
Display with TrueLifeTM

Optical Drive
Network

DVD+/-RW Optical Drive
Integrated 10/100 Ethernet

Communication

Dell Wireless 1501 802.11 b/g/n; Dell Wireless
365 Bluetooth

Audio

Integrated Stereo Sound

Camera

Integrated .3 Megapixel Web Camera
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Hardware (Juniper® Networks SRX 210HM )

SRX210 Services Gateway with 2 GbE+ 6 Fast
Ethernet ports, 1 Mini-PIM slot, 1 ExpressCard
slot and high memory (1 GB RAM, 1 GB Flash)
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Hardware (Juniper® Networks Secure Services Gateway )

Juniper Networks Secure Services Gateway 5
with RS-232 Aux backup, Wireless
802.11a/b/g, 128 MB Memory
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Hardware (Pluggable® USB 2.0 to Gigabit Ethernet Converter )
• How to set up the Lab
Hardware (Pluggable® USB 2.0 to Gigabit Ethernet Converter )

•
•

•
•
•

USB 2.0 male A to RJ45 female adapter supporting gigabit ethernet at USB 2.0 speeds
Drivers for Windows 7, Vista, XP, and Mac (requires download, see OS X 10.7 instructions), and
Linux (built into kernel 3.2 and above, earlier kernels require download and compile).
Supports 10/100/1000 with auto-sensing (IEEE 802.3, 802.3u, and 802.3ab)
Supports auto MDIX (straight and cross cable auto-detection)
ASIX AX88178 Controller – Jumbo packets up to 9KB (Windows only), along with suspend mode
and remote wakeup
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Software
1.
2.
3.

Vmware® Workstation 9 ( evaluation )
Windows® Server 2003 ( evaluation ) as Virtual machine
Mikrotik® Router OS ( evaluation) as Vitual machine
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Software (Windows® Server 2003 )
There is no need for no one in the networking field , with a few years of experience ,
to say : what is W2K3 ?
Just like a previous slide , W2K3 is going to be installed in Vmware .
• How to set up the Lab
The Lab used in this tutorials consists of the following :
 Software ( Vmware® Workstation 9 )
In the Implementation section you can see how to warm it up !
Everything is clear !
Juniper SRX & SSG-5 Devices
USB-> Ethernet &
Spoke-1 labeled
cable
The link between
CE-1 & Spoke-1 via
USB->Ethernet
Spoke-2

Spoke-1

HUB
OC-3 155.52Mbps

OC-3 155.52Mbps
OC-3 155.52Mbps

T1 1.544Mbps
T3- 6.312Mbps

T1 1.544Mbps
NEXT :
Physical lab video 1

More Related Content

What's hot

TD_complet_reseau__CISCO__Packet Tracer.pdf
TD_complet_reseau__CISCO__Packet Tracer.pdfTD_complet_reseau__CISCO__Packet Tracer.pdf
TD_complet_reseau__CISCO__Packet Tracer.pdf
Ines Ben Hassine
 
Red Hat Certified engineer course
  Red Hat Certified engineer course   Red Hat Certified engineer course
Red Hat Certified engineer course
Ali Abdo
 
Les Vpn
Les VpnLes Vpn
Les Vpn
medalaa
 
Zabbix - fonctionnement, bonnes pratiques, inconvenients
Zabbix - fonctionnement, bonnes pratiques, inconvenientsZabbix - fonctionnement, bonnes pratiques, inconvenients
Zabbix - fonctionnement, bonnes pratiques, inconvenients
biapy
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
DH Da Lat
 
Routing in 6lowpan (in French)
Routing in 6lowpan (in French) Routing in 6lowpan (in French)
Routing in 6lowpan (in French)
Abed Zine-Eddine BENAMAR
 
Spanning-Tree
Spanning-TreeSpanning-Tree
Spanning-Tree
Thomas Moegli
 
Rapport nagios miniprojet
Rapport nagios miniprojetRapport nagios miniprojet
Rapport nagios miniprojet
Ayoub Rouzi
 
GRE Tunnel Configuration
GRE Tunnel ConfigurationGRE Tunnel Configuration
GRE Tunnel Configuration
NetProtocol Xpert
 
Formation gns3
Formation gns3Formation gns3
Formation gns3
Joeongala
 
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - PrésentationImplémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
Rihab Chebbah
 
Alphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans Fil
Alphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans FilAlphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans Fil
Alphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans Fil
Alphorm
 
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Alaaeddine Tlich
 
Protocole OSPF
Protocole OSPFProtocole OSPF
Protocole OSPF
Thomas Moegli
 
Vpn site to site avec les équipements JUNIPER
Vpn site to site avec les équipements JUNIPERVpn site to site avec les équipements JUNIPER
Vpn site to site avec les équipements JUNIPER
Hermann Gbilimako
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
3Anetwork com
 
Tunnel vs VPN on Mikrotik
Tunnel vs VPN on MikrotikTunnel vs VPN on Mikrotik
Tunnel vs VPN on Mikrotik
GLC Networks
 
Mpls
MplsMpls

What's hot (20)

TD_complet_reseau__CISCO__Packet Tracer.pdf
TD_complet_reseau__CISCO__Packet Tracer.pdfTD_complet_reseau__CISCO__Packet Tracer.pdf
TD_complet_reseau__CISCO__Packet Tracer.pdf
 
Red Hat Certified engineer course
  Red Hat Certified engineer course   Red Hat Certified engineer course
Red Hat Certified engineer course
 
Les Vpn
Les VpnLes Vpn
Les Vpn
 
Zabbix - fonctionnement, bonnes pratiques, inconvenients
Zabbix - fonctionnement, bonnes pratiques, inconvenientsZabbix - fonctionnement, bonnes pratiques, inconvenients
Zabbix - fonctionnement, bonnes pratiques, inconvenients
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
 
Routing in 6lowpan (in French)
Routing in 6lowpan (in French) Routing in 6lowpan (in French)
Routing in 6lowpan (in French)
 
Spanning-Tree
Spanning-TreeSpanning-Tree
Spanning-Tree
 
Rapport nagios miniprojet
Rapport nagios miniprojetRapport nagios miniprojet
Rapport nagios miniprojet
 
rapportfinal
rapportfinalrapportfinal
rapportfinal
 
GRE Tunnel Configuration
GRE Tunnel ConfigurationGRE Tunnel Configuration
GRE Tunnel Configuration
 
Formation gns3
Formation gns3Formation gns3
Formation gns3
 
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - PrésentationImplémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
 
Alphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans Fil
Alphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans FilAlphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans Fil
Alphorm.com Formation CCNP ENCOR 350-401 (3of8) : Sans Fil
 
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
 
Routage
RoutageRoutage
Routage
 
Protocole OSPF
Protocole OSPFProtocole OSPF
Protocole OSPF
 
Vpn site to site avec les équipements JUNIPER
Vpn site to site avec les équipements JUNIPERVpn site to site avec les équipements JUNIPER
Vpn site to site avec les équipements JUNIPER
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
 
Tunnel vs VPN on Mikrotik
Tunnel vs VPN on MikrotikTunnel vs VPN on Mikrotik
Tunnel vs VPN on Mikrotik
 
Mpls
MplsMpls
Mpls
 

Viewers also liked

Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Rofiq Fauzi
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
Kaveh Khosravi
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu theviper0308
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
Ali Layth
 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
Andry Ansah
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
 
2013 Juniper Lab Madness Bracket
2013 Juniper Lab Madness Bracket2013 Juniper Lab Madness Bracket
2013 Juniper Lab Madness Bracket
Juniper Networks
 
Multivendor MPLS L3VPN
Multivendor MPLS L3VPNMultivendor MPLS L3VPN
Multivendor MPLS L3VPN
Stefano Sasso
 
Overview of Linux
Overview of LinuxOverview of Linux
Overview of LinuxThang Man
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 
Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70
symple9
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
Elsa Cariello
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
Sylvain Maret
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
Group of company MUK
 
SERVIDORES DEDICADOS
SERVIDORES DEDICADOSSERVIDORES DEDICADOS
SERVIDORES DEDICADOS
Jargon Web Hosting Argentina
 
Making the urban small cell happen
Making the urban small cell happenMaking the urban small cell happen
Making the urban small cell happen
CCS
 
Cambridge Wireless Small Cell SIG presentation from CCS
Cambridge Wireless Small Cell SIG presentation from CCSCambridge Wireless Small Cell SIG presentation from CCS
Cambridge Wireless Small Cell SIG presentation from CCS
CCS
 
ipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grosseteteipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick GrosseteteFebrian ‎
 
WISP LLAVE EN MANO
WISP LLAVE EN MANOWISP LLAVE EN MANO
WISP LLAVE EN MANO
Jargon Web Hosting Argentina
 

Viewers also liked (19)

Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
2013 Juniper Lab Madness Bracket
2013 Juniper Lab Madness Bracket2013 Juniper Lab Madness Bracket
2013 Juniper Lab Madness Bracket
 
Multivendor MPLS L3VPN
Multivendor MPLS L3VPNMultivendor MPLS L3VPN
Multivendor MPLS L3VPN
 
Overview of Linux
Overview of LinuxOverview of Linux
Overview of Linux
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
SERVIDORES DEDICADOS
SERVIDORES DEDICADOSSERVIDORES DEDICADOS
SERVIDORES DEDICADOS
 
Making the urban small cell happen
Making the urban small cell happenMaking the urban small cell happen
Making the urban small cell happen
 
Cambridge Wireless Small Cell SIG presentation from CCS
Cambridge Wireless Small Cell SIG presentation from CCSCambridge Wireless Small Cell SIG presentation from CCS
Cambridge Wireless Small Cell SIG presentation from CCS
 
ipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grosseteteipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grossetete
 
WISP LLAVE EN MANO
WISP LLAVE EN MANOWISP LLAVE EN MANO
WISP LLAVE EN MANO
 

Similar to Mikrotik® MPLS/VPN Lab Part 1

[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
OpenStack Korea Community
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
jww330015
 
Ceph Day Beijing - Ceph all-flash array design based on NUMA architecture
Ceph Day Beijing - Ceph all-flash array design based on NUMA architectureCeph Day Beijing - Ceph all-flash array design based on NUMA architecture
Ceph Day Beijing - Ceph all-flash array design based on NUMA architecture
Ceph Community
 
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA ArchitectureCeph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
Danielle Womboldt
 
QNAP for IoT
QNAP for IoTQNAP for IoT
QNAP for IoT
qnapivan
 
PNETLab.pdf
PNETLab.pdfPNETLab.pdf
PNETLab.pdf
RigobertoZarate4
 
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Michelle Holley
 
Automating Yourself Out of Trouble
Automating Yourself Out of TroubleAutomating Yourself Out of Trouble
Automating Yourself Out of Trouble
Jose De La Rosa
 
IBM Power Systems E850C and S824
IBM Power Systems E850C and S824IBM Power Systems E850C and S824
IBM Power Systems E850C and S824
David Spurway
 
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
Sungman Jang
 
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
OpenStack Korea Community
 
Oracle virtual appliance
Oracle virtual applianceOracle virtual appliance
Oracle virtual appliance
solarisyougood
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administrationAshish Sharma
 
AEO Training - 2023.pdf
AEO Training - 2023.pdfAEO Training - 2023.pdf
AEO Training - 2023.pdf
Mohamed Taoufik TEKAYA
 
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under LinuxPractical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Samsung Open Source Group
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
woodruffeloisa
 
Case study for it03 roshan
Case study for it03 roshanCase study for it03 roshan
Case study for it03 roshanrosu555
 
the NML project
the NML projectthe NML project
the NML projectLei Yang
 
Virtualization with Lenovo X6 Blade Servers: white paper
Virtualization with Lenovo X6 Blade Servers: white paperVirtualization with Lenovo X6 Blade Servers: white paper
Virtualization with Lenovo X6 Blade Servers: white paper
Lenovo Data Center
 
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwareBenchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
solarisyougood
 

Similar to Mikrotik® MPLS/VPN Lab Part 1 (20)

[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
Ceph Day Beijing - Ceph all-flash array design based on NUMA architecture
Ceph Day Beijing - Ceph all-flash array design based on NUMA architectureCeph Day Beijing - Ceph all-flash array design based on NUMA architecture
Ceph Day Beijing - Ceph all-flash array design based on NUMA architecture
 
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA ArchitectureCeph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
 
QNAP for IoT
QNAP for IoTQNAP for IoT
QNAP for IoT
 
PNETLab.pdf
PNETLab.pdfPNETLab.pdf
PNETLab.pdf
 
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
 
Automating Yourself Out of Trouble
Automating Yourself Out of TroubleAutomating Yourself Out of Trouble
Automating Yourself Out of Trouble
 
IBM Power Systems E850C and S824
IBM Power Systems E850C and S824IBM Power Systems E850C and S824
IBM Power Systems E850C and S824
 
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
 
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
 
Oracle virtual appliance
Oracle virtual applianceOracle virtual appliance
Oracle virtual appliance
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
 
AEO Training - 2023.pdf
AEO Training - 2023.pdfAEO Training - 2023.pdf
AEO Training - 2023.pdf
 
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under LinuxPractical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
 
Case study for it03 roshan
Case study for it03 roshanCase study for it03 roshan
Case study for it03 roshan
 
the NML project
the NML projectthe NML project
the NML project
 
Virtualization with Lenovo X6 Blade Servers: white paper
Virtualization with Lenovo X6 Blade Servers: white paperVirtualization with Lenovo X6 Blade Servers: white paper
Virtualization with Lenovo X6 Blade Servers: white paper
 
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwareBenchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Mikrotik® MPLS/VPN Lab Part 1

  • 2. What will be covered • Introduction • How to set up the Lab • Configuration • Connectivity Check
  • 3. • Introduction In this lab you are going to learn how to use Mikrotik’s powerful operating system , Router OS® , in order to implement MPLS/VPN functionality , although it lacks Important features like fast reroute * . All of the main examples and configurations for MPLS/VPN are given from Mikrotik’s documentations ** website .
  • 4. • How to set up the Lab  The DELL Labtop is used for runnig vmware workstation to simulate the MPLS network with virtual machines running as Mikrotik Router-OS as Provider (P) and Provider Edge (PE) routers,Windows Server 2003 as Customer Edge ( CE) routers . Juniper SRX 210HM , First SSG-5 and Second SSG-5 act as HUB site , Spoke-Branch-1 and Spoke-Branch-2 respectively . Labtop’s FastEthernet and Pluggable USB to Gigabit Ethernets are used for connecting CE-1 to HUB site , CE-2 to spoke-2 and CE-3 to spoke-3 so we can make bridge between real world and Virtual world .  Lets take a look at physical lab components
  • 5. • How to set up the Lab The Lab used in this tutorials consists of the following :  Hardware 1. 2. 3. 4. DELL® N-4030 Labtop x1 Juniper® Networks SRX 210HM x1 Juniper® Networks Secure Services Gateway ( SSG5-SB) x2 Pluggable® USB 2.0 to Gigabit Ethernet Converter x2
  • 6. • How to set up the Lab The Lab used in this tutorials consists of the following :  Hardware (DELL® N-4030 Labtop )
  • 7. Processor Intel Core i3-370M 2.4GHz Processor with Intel Hyper-Threading Technology (3MB Cache) Memory Hard Drive 2GB DDR3-1333 320GB 5400RPM Chipset Mobile Intel® 5 Series Express Chipset HM57 Graphics Intel HD Graphics Display 14.0" High Definition (720p) 1366 x 768 WLED Display with TrueLifeTM Optical Drive Network DVD+/-RW Optical Drive Integrated 10/100 Ethernet Communication Dell Wireless 1501 802.11 b/g/n; Dell Wireless 365 Bluetooth Audio Integrated Stereo Sound Camera Integrated .3 Megapixel Web Camera
  • 8. • How to set up the Lab The Lab used in this tutorials consists of the following :  Hardware (Juniper® Networks SRX 210HM ) SRX210 Services Gateway with 2 GbE+ 6 Fast Ethernet ports, 1 Mini-PIM slot, 1 ExpressCard slot and high memory (1 GB RAM, 1 GB Flash)
  • 9. • How to set up the Lab The Lab used in this tutorials consists of the following :  Hardware (Juniper® Networks Secure Services Gateway ) Juniper Networks Secure Services Gateway 5 with RS-232 Aux backup, Wireless 802.11a/b/g, 128 MB Memory
  • 10. • How to set up the Lab The Lab used in this tutorials consists of the following :  Hardware (Pluggable® USB 2.0 to Gigabit Ethernet Converter )
  • 11. • How to set up the Lab Hardware (Pluggable® USB 2.0 to Gigabit Ethernet Converter ) • • • • • USB 2.0 male A to RJ45 female adapter supporting gigabit ethernet at USB 2.0 speeds Drivers for Windows 7, Vista, XP, and Mac (requires download, see OS X 10.7 instructions), and Linux (built into kernel 3.2 and above, earlier kernels require download and compile). Supports 10/100/1000 with auto-sensing (IEEE 802.3, 802.3u, and 802.3ab) Supports auto MDIX (straight and cross cable auto-detection) ASIX AX88178 Controller – Jumbo packets up to 9KB (Windows only), along with suspend mode and remote wakeup
  • 12. • How to set up the Lab The Lab used in this tutorials consists of the following :  Software 1. 2. 3. Vmware® Workstation 9 ( evaluation ) Windows® Server 2003 ( evaluation ) as Virtual machine Mikrotik® Router OS ( evaluation) as Vitual machine
  • 13. • How to set up the Lab The Lab used in this tutorials consists of the following :  Software (Windows® Server 2003 ) There is no need for no one in the networking field , with a few years of experience , to say : what is W2K3 ? Just like a previous slide , W2K3 is going to be installed in Vmware .
  • 14. • How to set up the Lab The Lab used in this tutorials consists of the following :  Software ( Vmware® Workstation 9 ) In the Implementation section you can see how to warm it up !
  • 15.
  • 17. Juniper SRX & SSG-5 Devices
  • 18. USB-> Ethernet & Spoke-1 labeled cable
  • 19. The link between CE-1 & Spoke-1 via USB->Ethernet Spoke-2 Spoke-1 HUB
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. OC-3 155.52Mbps OC-3 155.52Mbps OC-3 155.52Mbps T1 1.544Mbps T3- 6.312Mbps T1 1.544Mbps
  • 26.
  • 27.
  • 28.
  • 29.

Editor's Notes

  1. * : http://wiki.mikrotik.com/wiki/Manual:MPLS/Overview** : http://wiki.mikrotik.com/wiki/Manual:MPLS
  2. * : http://wiki.mikrotik.com/wiki/Manual:MPLS/Overview** : http://wiki.mikrotik.com/wiki/Manual:MPLS
  3. http://www.villman.com/Product-Detail/Dell_Insp_4030_W7B
  4. http://www.villman.com/Product-Detail/Dell_Insp_4030_W7B
  5. http://www.juniper.net/as/en/products-services/security/srx-series/srx210/
  6. http://www.juniper.net/us/en/products-services/security/ssg-series/ssg5/#specifications
  7. http://plugable.com/products/usb2-e1000
  8. http://plugable.com/products/usb2-e1000