SlideShare a Scribd company logo
MikrotikRouter OS Training Class
Eng.AhmedR. Nassir
1
About Mikrotik
 MikroTik is a Latvian company which was founded in
1996 to develop routers and wireless ISP systems.
 MikroTik now provides hardware and software for
Internet connectivity in most of the countries around
the world.
2
Some MK Devices
You can see more at https://mikrotik.com/products
3
Top 5 Reasons to Choose MikroTik for Networking
 Highly Configurable - MikroTik devices are designed to offer
the highest level of functional control and flexibility.
 Value - Not only are MikroTik networking devices flexible, but
they also provide cost effective carrier-grade routing and
network management solutions.
 Easy to Manage - MikroTik devices feature easy to manage
configuration backup and restoration processes to give you peace
of mind when managing your devices.
 Enterprise Ready - Strong and powerful, MikroTik networking
devices are perfectly adapted to work within an enterprise
environment from LANs up to far more demanding networks.
 Aesthetic Product Design - Many of the MikroTik networking
devices feature an aesthetic design and are also easy to mount
where required.
4
Course Objective
 Provide the necessary knowledge and
hands-on training for installing
 Configuring and troubleshooting
 Router OS functions
5
First Access
6
Downloading Winbox Loader
7
ways
Configuring Router
8
Winbox loader Maintenance
 Save addresses
 Save Passwords
 Use secure mode
 Export and import addresses
 Clear the cache
9
Connecting to the router
 Connect to Router using its MAC –Address
 Username :admin
 Password:
 It is possible to disable admin user so make
sure to add user before disable admin user.
10
Router File Management
 Include backups
 Update files
 Highlight all files and delete them
 You can backup and restore router from here
11
Winbox interface
12
Default user
 admin is the default user with no password
 admin is full-group access
 Group full has max permissions
 To secure router you should add new user
 At least there is one full user
 Use user group to specify permissions
13
Adding user
14
Secure the router
IP services used To change the default
Winbox,SSh,Telnet router port 15
Lose password
16
User group
 Read (has reboot right)
 Write (no user add or change)
 Full (can do any thing)
 You can create custom group with different skins
17
User group-permissions
18
Tools-ping
 Check internet connectivity from router using ping
 It can show weather host is reachable or not
 Its available from
 Winbox tools-ping
 New terminal
 Cmd
19
Assign IP addresses
 Go to IP address in winbox and click “+” to open new
dialogue
 No need to put network only prefix
20
System identity
21
Neighbor discovery
 By default its enables for all interfaces
 Enable discovery is to see neighbor
devices
 MNDP is l2 local network
 Its used UDP port 5678
22
Bridging
23
Adding Bridge
 To add a bridge interface to the router
 􏀭 Click Bridge in winbox to open up the
 bridge window
 􏀭 Click + to add a new bridge interface, give the bridge
a name
 (if desired) and click OK
 In command line, use command
 􏀭 /interface bridge add to add a bridge
 􏀭 /interface bridge print to see the bridge interface
24
Adding bridge-ports
25
Advantage of bridge
 Collation isolation
 Broadcast expansion
 Access control and network management
 Easy programming services like PPPOE
,Hotspot and DHCP-Server
26
Bridge Disadvantage
 Don’t limit broadcast
 Not scale to large networks
 Can result in loops
To prevent loop RSTP is enabled by default on Bridge
RSTP (Rapid Spanning Tree Protocol)
27
System backup and restore
 backup will create files identified with identity and
date and time
 You can change the name of backup files
 The restoration is for same device
 Backup files non editable
 Entire configuration loaded with backup including
user-password of router
28
Configuration reset
29
Web administration
 Webfig
 IP services (www) enable
 Access via “http://router - ip “
30
Network management tools
 Ping
 Trace route
 Bandwidth test
 IP scan
 All these tools found at “Tools menu”
31
Bandwidth test
32
Monitor traffic
33
Interface traffic monitor
34
Torch Tool
35
Torch Tool
(see addresses and ports) real-time connections which
are processed by the router
36
Graphing
37
Logging
 You can log to
 Memory
 Disk
 Email
 Remote syslog
 All messages can be viewed at log menu
 Each entry has time and date of all events when they
occurred and all statistics of router interfaces
38
Logging configuration
39
SNMP
 Simple Network Management Protocol
 Internet standard protocol for managing devices on
IP- networks
 Can used to provide graphs of data for a period of time
 Like PRTG ,Dude
 Enabled at IP ->SNMP
40
Router OS package
 Package can be enabled or disabled to
achieve function
 Install or reinstall to free disk space
 Upgraded or downgraded
 Reboot router to take effect
41
OS package
42
Router upgrade
•From package
43
Router manual upgrade
•From Files
•Drag and drop
to files
•Reboot
44
Import and Export
45
Safe-Mode
46
Safe-Mode
47
NTP(Network Time Protocol)
 To upgrade time from internet or local NTP
server
 For logging and graphing
 Router OS have both NTP Server and Client
 NTP Server need package installing
 NTP Client in system->NTP Client and add
NTP address
48
More things
49
DNS Client and Cache
 Can be DNS-Server
 Minimize DNS resolution time
 Adding DNS address to router
 Click “Allow remote request” check box to
use as DNS-Server
 The DNS configuration provided to DHCP
,PPPOE and Hotspot
50
Adding DNS
•Static
•Dynamic
51
DHCP lease process
52
DHCP Client
53
DHCP Client
54
DHCP Server Step 1
There is one DHCP server can be configured per
interface 55
Step 2
56
DHCP Static Lease
57
Factory reset
 Ether 1 is WAN port with DHCP-client and no
discovery
 Ether 2-x is bridged and have DHCP-Server
192.168.88.0/24 pool
 If there is WLAN it will have SSID: Mikrotik
bridged to LAN
58
ARP
 Its used to associate MAC to IP addresses
 ARP requester send broadcast frame asking about
destination MAC
 The destination respond to requester sending
direct frame filling its MAC address and save
requestor MAC address in ARP Table
 IP -> ARP
 Static entry can added if ARP is disabled
 Used only with IPv4
59
ARP Table
60
Bandwidth management
61
Speed limiting
 Router controls the rate of data by dropping
packets
 Simple queue is the easiest way
 One can limit
 Client Rx (download)
 Client Tx (upload)
 Both(aggregate)by using Total-Max-limit
62
Simple Queue
63
Simple Queue
Simple Queue basic parts are Target address and Max-Limit
That speed is dedicated its just make a Max-Limit
Queue don’t guarantees 64
Burst
 Ensure batter QoS
 Allow higher data rates (exceed the max-limit for
period of time)
 To calculate the actual burst time
 Actual Time=burst time/(burst limit/burst
threshold)
65
66
67
PCQ
 PCQ was introduced to optimize massive QoS systems,
where most of the queues are exactly the same for different
sub-streams. For example a sub-stream can be download or
upload for one particular client (IP) or connection to
server.
 PCQ parameters:
 pcq-classifier (dst-address | dst-port | src-address | src-
port; default: "") : selection of sub-stream identifiers
 pcq-rate (number) : maximal available data rate of each
sub-steam
 pcq-limit (number) : queue size of single sub-stream (in
KiB)
 pcq-total-limit (number) : maximum amount of queued
data in all sub-streams (in KiB)
68
PCQ Example
69
70
Hard rate limit
71
72
73
Queue Tree(HTB)
 All Quality of Service implementation in
RouterOS is based on Hierarchical Token
Bucket
 HTB allows to create hierarchical queue
structure and determine relations between
parent and child queues and relation
between child queues
74
HTB
75
HTB
 HTB has two rate limits:
 CIR (Committed Information Rate) – (limit-at in
RouterOS) worst case scenario
 MIR (Maximal Information Rate) – (max-limit in
RouterOS) best case scenario
 At first HTB will try to satisfy every child queue's
limit-at – only then it will try to reach max-limit
76
Example 1
Queue03 will receive 6Mbps
Queue04 will receive 2Mbps
Queue05 will receive 2Mbps
77
Example 2
Queue03 will receive 2Mbps
Queue04 will receive 6Mbps
Queue05 will receive 2Mbps
78
Example 3
Queue03 will receive 2Mbps
Queue04 will receive 6Mbps
Queue05 will receive 2Mbps
79
VPN
 A virtual private network is a way of linking
computers into a network with the same
privacy and security as a LAN but by using
public internet connections.
 A VPN is a much cheaper way to connect
company networks than a dedicated leased
line.
80
VPN
81
Point to point protocol tunnel
 Authentication
 Encryption
 Such tunnels are
 PPPOE
 PPTP
 L2TP
 SSTP
82
PPTP and L2TP
83
84
SSTP
 TCP connection is established from client to server (by
default on port 443);
 SSL validates server certificate. If certificate is valid
connection is established otherwise connection is torn
down.
 The client sends SSTP control packets within the HTTPS
session which establishes the SSTP state machine on both
sides.
 PPP negotiation over SSTP. Client authenticates to the
server and binds IP addresses to SSTP interface
 SSTP tunnel is now established and packet encapsulation
can begin.
85
SSTP
86
PPPOE tunnel(Point To Point
Protocol Over Ethernet)
 Its work on L2(data link)
 Its not routed protocol
 Client must be direct connected to server
 It deliver IP based on user authentication
 It’s a tool for ISPs to mange and account users
 Most operating systems have PPPOE Client software or
built-in
 Bandwidth management
 You can Configure more than one PPPOE server per
interface
87
88
Server setup
89
PPP Secret
90
Adding PPPOE Server
91
92
Enable VPN-Server
93
PPPOE Scanner
94
95
Firewall Filters
 Firewall provides security for data flow to
from and through the router
 Most firewall functions depend on
connection tracking table
 You can use address list to apply rules to sets
of IPs (a Network)
96
Firewall filter stricture
 The firewall operates through rules
 Each rule have two parts
 The matcher
 Action
 IF (conditions) -> (action)
97
Firewall filter stricture
 Firewall rules are organized in chains
 There are three built-in chains
 Input chain: processes packets addressed to the
router itself(router is destination)
 Forward chain : processes traffic going through the
router
 Output chain : processes packets originated from
router(router is the source)
98
99
Example
100
101
TCP 3-way Handshake
102
Connection tracking
 It’s the heart of firewall
 Allow kernel to keep track of all logical network
connections or sessions.
 See addresses and ports real-time connections which
are processed by the router .
 NAT relies on this information to translate all related
packets.
 Firewall filter rules also depends on this information
to match the traffic.
103
Condition connection state
104
105
Invalid dropping
106
Fastrack
107
Important issues
 Firewalls don’t filter MAC level communication
 You should disable MAC-Telnet and MAC- Winbox at
least on facing interface
 Tools -> MAC-Server
 You can disable router discovery so no one can see
router
 IP -> Neighbor -> Discovery
108
NAT (Network Address Translation)
 Is a method of mapping an IP address space into
another by modifying network address
information in the IP header of packets
 It has become a popular and essential tool in
conserving global address space in the face of IPv4
address exhaustion
109
NAT types
 Source NAT: Which rewrites the source IP
and/or port also known as overloading (one
to many)
 Destination NAT: Which rewrites the
destination IP and/or port also known as
port forwarding
110
111
Firewall NAT
112
To use masquerade, you need to specify it action = masquerade, out-interface, chain = src-nat
113
114
115
IP Firewall mangle
 Mangle is a kind of 'marker' that marks packets for
future processing with special marks
 Many other facilities in Router-OS make use of
these marks
 Queue tree
 NAT
 Routing
 Use matcher also
116
Example
117
Using packet mark
118
Address list option
119
Hotspot
120
Hotspot
 The MikroTik HotSpot Gateway provides
authentication for clients before access to public
networks
 Authentication is based on HTTP / HTTPS protocol
 Hotspot system provides “Plug and Play “ access
 You must Set "Shared Users" option at /ip hotspot user
profile to a specific number when one user have
multiple devices and needs login with all devices with
what unique user account
121
Hotspot page
122
Hotspot Wizard
123
124
125
IP Routing
126
IP Routing
 The objective is the delivery of packets between two
systems connected to different networks.
 When a host need to send a packet to another host it
will examine the IP/Mask combination to determine if
host is on local network or on remote network.
 If the host is on remote network the sender will look at
its own routing table to find route match to that
specific host to se
 nd packet to relevant gateway . If not found it will send
packet to the default route .
127
IP Route
 Static routing is the most basic routing you can do
it’s very fast, but has no redundancy .
 Go to IP -> Routes in Winbox
 Add IP address to interfaces
 A (D) Dynamic (A) Active route for the directly
Connected (C) network should appear.
 Note if you have a default route from
DHCP/PPPOE it can appear as both Dynamic and
Static at the same time.
128
Static Routing
 You need to statically configure routes that
tells router where to send packets.
 You should add routes to specific networks
at specific gateways.
 Gateway must be reachable from any router
interfaces.
129
Static Route
130
Static Route
131
Default Route
 If there is a smart host on a network which know how
to send packet to different networks then use its IP
address as your gateway .
 For your router to add default route
-Destination 0.0.0.0/0 (any address)
-The IP address of smart host as the gateway
 If the router cannot find a valid route in its static or
dynamic route then it will send the packet to the
default route gateway.
132
133
Specific Route
134
Route Distance
The route with lower distance will be chosen
135
Thanks
136

More Related Content

Similar to MTCNA Show.pptx

PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEEditor IJCTER
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinChiradeep Vittal
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkIRJET Journal
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu theviper0308
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07Truong NGUYEN
 

Similar to MTCNA Show.pptx (20)

Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
Chapter04
Chapter04Chapter04
Chapter04
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
Firewalls
FirewallsFirewalls
Firewalls
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private Network
 
Lec 2.pptx
Lec 2.pptxLec 2.pptx
Lec 2.pptx
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 
Wan networks
Wan networksWan networks
Wan networks
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07
 

Recently uploaded

Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdfKamal Acharya
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptxfaamieahmd
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdfKamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxwendy cai
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...Amil baba
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 

Recently uploaded (20)

Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptx
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 

MTCNA Show.pptx

  • 1. MikrotikRouter OS Training Class Eng.AhmedR. Nassir 1
  • 2. About Mikrotik  MikroTik is a Latvian company which was founded in 1996 to develop routers and wireless ISP systems.  MikroTik now provides hardware and software for Internet connectivity in most of the countries around the world. 2
  • 3. Some MK Devices You can see more at https://mikrotik.com/products 3
  • 4. Top 5 Reasons to Choose MikroTik for Networking  Highly Configurable - MikroTik devices are designed to offer the highest level of functional control and flexibility.  Value - Not only are MikroTik networking devices flexible, but they also provide cost effective carrier-grade routing and network management solutions.  Easy to Manage - MikroTik devices feature easy to manage configuration backup and restoration processes to give you peace of mind when managing your devices.  Enterprise Ready - Strong and powerful, MikroTik networking devices are perfectly adapted to work within an enterprise environment from LANs up to far more demanding networks.  Aesthetic Product Design - Many of the MikroTik networking devices feature an aesthetic design and are also easy to mount where required. 4
  • 5. Course Objective  Provide the necessary knowledge and hands-on training for installing  Configuring and troubleshooting  Router OS functions 5
  • 9. Winbox loader Maintenance  Save addresses  Save Passwords  Use secure mode  Export and import addresses  Clear the cache 9
  • 10. Connecting to the router  Connect to Router using its MAC –Address  Username :admin  Password:  It is possible to disable admin user so make sure to add user before disable admin user. 10
  • 11. Router File Management  Include backups  Update files  Highlight all files and delete them  You can backup and restore router from here 11
  • 13. Default user  admin is the default user with no password  admin is full-group access  Group full has max permissions  To secure router you should add new user  At least there is one full user  Use user group to specify permissions 13
  • 15. Secure the router IP services used To change the default Winbox,SSh,Telnet router port 15
  • 17. User group  Read (has reboot right)  Write (no user add or change)  Full (can do any thing)  You can create custom group with different skins 17
  • 19. Tools-ping  Check internet connectivity from router using ping  It can show weather host is reachable or not  Its available from  Winbox tools-ping  New terminal  Cmd 19
  • 20. Assign IP addresses  Go to IP address in winbox and click “+” to open new dialogue  No need to put network only prefix 20
  • 22. Neighbor discovery  By default its enables for all interfaces  Enable discovery is to see neighbor devices  MNDP is l2 local network  Its used UDP port 5678 22
  • 24. Adding Bridge  To add a bridge interface to the router  􏀭 Click Bridge in winbox to open up the  bridge window  􏀭 Click + to add a new bridge interface, give the bridge a name  (if desired) and click OK  In command line, use command  􏀭 /interface bridge add to add a bridge  􏀭 /interface bridge print to see the bridge interface 24
  • 26. Advantage of bridge  Collation isolation  Broadcast expansion  Access control and network management  Easy programming services like PPPOE ,Hotspot and DHCP-Server 26
  • 27. Bridge Disadvantage  Don’t limit broadcast  Not scale to large networks  Can result in loops To prevent loop RSTP is enabled by default on Bridge RSTP (Rapid Spanning Tree Protocol) 27
  • 28. System backup and restore  backup will create files identified with identity and date and time  You can change the name of backup files  The restoration is for same device  Backup files non editable  Entire configuration loaded with backup including user-password of router 28
  • 30. Web administration  Webfig  IP services (www) enable  Access via “http://router - ip “ 30
  • 31. Network management tools  Ping  Trace route  Bandwidth test  IP scan  All these tools found at “Tools menu” 31
  • 36. Torch Tool (see addresses and ports) real-time connections which are processed by the router 36
  • 38. Logging  You can log to  Memory  Disk  Email  Remote syslog  All messages can be viewed at log menu  Each entry has time and date of all events when they occurred and all statistics of router interfaces 38
  • 40. SNMP  Simple Network Management Protocol  Internet standard protocol for managing devices on IP- networks  Can used to provide graphs of data for a period of time  Like PRTG ,Dude  Enabled at IP ->SNMP 40
  • 41. Router OS package  Package can be enabled or disabled to achieve function  Install or reinstall to free disk space  Upgraded or downgraded  Reboot router to take effect 41
  • 44. Router manual upgrade •From Files •Drag and drop to files •Reboot 44
  • 48. NTP(Network Time Protocol)  To upgrade time from internet or local NTP server  For logging and graphing  Router OS have both NTP Server and Client  NTP Server need package installing  NTP Client in system->NTP Client and add NTP address 48
  • 50. DNS Client and Cache  Can be DNS-Server  Minimize DNS resolution time  Adding DNS address to router  Click “Allow remote request” check box to use as DNS-Server  The DNS configuration provided to DHCP ,PPPOE and Hotspot 50
  • 55. DHCP Server Step 1 There is one DHCP server can be configured per interface 55
  • 58. Factory reset  Ether 1 is WAN port with DHCP-client and no discovery  Ether 2-x is bridged and have DHCP-Server 192.168.88.0/24 pool  If there is WLAN it will have SSID: Mikrotik bridged to LAN 58
  • 59. ARP  Its used to associate MAC to IP addresses  ARP requester send broadcast frame asking about destination MAC  The destination respond to requester sending direct frame filling its MAC address and save requestor MAC address in ARP Table  IP -> ARP  Static entry can added if ARP is disabled  Used only with IPv4 59
  • 62. Speed limiting  Router controls the rate of data by dropping packets  Simple queue is the easiest way  One can limit  Client Rx (download)  Client Tx (upload)  Both(aggregate)by using Total-Max-limit 62
  • 64. Simple Queue Simple Queue basic parts are Target address and Max-Limit That speed is dedicated its just make a Max-Limit Queue don’t guarantees 64
  • 65. Burst  Ensure batter QoS  Allow higher data rates (exceed the max-limit for period of time)  To calculate the actual burst time  Actual Time=burst time/(burst limit/burst threshold) 65
  • 66. 66
  • 67. 67
  • 68. PCQ  PCQ was introduced to optimize massive QoS systems, where most of the queues are exactly the same for different sub-streams. For example a sub-stream can be download or upload for one particular client (IP) or connection to server.  PCQ parameters:  pcq-classifier (dst-address | dst-port | src-address | src- port; default: "") : selection of sub-stream identifiers  pcq-rate (number) : maximal available data rate of each sub-steam  pcq-limit (number) : queue size of single sub-stream (in KiB)  pcq-total-limit (number) : maximum amount of queued data in all sub-streams (in KiB) 68
  • 70. 70
  • 72. 72
  • 73. 73
  • 74. Queue Tree(HTB)  All Quality of Service implementation in RouterOS is based on Hierarchical Token Bucket  HTB allows to create hierarchical queue structure and determine relations between parent and child queues and relation between child queues 74
  • 76. HTB  HTB has two rate limits:  CIR (Committed Information Rate) – (limit-at in RouterOS) worst case scenario  MIR (Maximal Information Rate) – (max-limit in RouterOS) best case scenario  At first HTB will try to satisfy every child queue's limit-at – only then it will try to reach max-limit 76
  • 77. Example 1 Queue03 will receive 6Mbps Queue04 will receive 2Mbps Queue05 will receive 2Mbps 77
  • 78. Example 2 Queue03 will receive 2Mbps Queue04 will receive 6Mbps Queue05 will receive 2Mbps 78
  • 79. Example 3 Queue03 will receive 2Mbps Queue04 will receive 6Mbps Queue05 will receive 2Mbps 79
  • 80. VPN  A virtual private network is a way of linking computers into a network with the same privacy and security as a LAN but by using public internet connections.  A VPN is a much cheaper way to connect company networks than a dedicated leased line. 80
  • 82. Point to point protocol tunnel  Authentication  Encryption  Such tunnels are  PPPOE  PPTP  L2TP  SSTP 82
  • 84. 84
  • 85. SSTP  TCP connection is established from client to server (by default on port 443);  SSL validates server certificate. If certificate is valid connection is established otherwise connection is torn down.  The client sends SSTP control packets within the HTTPS session which establishes the SSTP state machine on both sides.  PPP negotiation over SSTP. Client authenticates to the server and binds IP addresses to SSTP interface  SSTP tunnel is now established and packet encapsulation can begin. 85
  • 87. PPPOE tunnel(Point To Point Protocol Over Ethernet)  Its work on L2(data link)  Its not routed protocol  Client must be direct connected to server  It deliver IP based on user authentication  It’s a tool for ISPs to mange and account users  Most operating systems have PPPOE Client software or built-in  Bandwidth management  You can Configure more than one PPPOE server per interface 87
  • 88. 88
  • 92. 92
  • 95. 95
  • 96. Firewall Filters  Firewall provides security for data flow to from and through the router  Most firewall functions depend on connection tracking table  You can use address list to apply rules to sets of IPs (a Network) 96
  • 97. Firewall filter stricture  The firewall operates through rules  Each rule have two parts  The matcher  Action  IF (conditions) -> (action) 97
  • 98. Firewall filter stricture  Firewall rules are organized in chains  There are three built-in chains  Input chain: processes packets addressed to the router itself(router is destination)  Forward chain : processes traffic going through the router  Output chain : processes packets originated from router(router is the source) 98
  • 99. 99
  • 101. 101
  • 103. Connection tracking  It’s the heart of firewall  Allow kernel to keep track of all logical network connections or sessions.  See addresses and ports real-time connections which are processed by the router .  NAT relies on this information to translate all related packets.  Firewall filter rules also depends on this information to match the traffic. 103
  • 105. 105
  • 108. Important issues  Firewalls don’t filter MAC level communication  You should disable MAC-Telnet and MAC- Winbox at least on facing interface  Tools -> MAC-Server  You can disable router discovery so no one can see router  IP -> Neighbor -> Discovery 108
  • 109. NAT (Network Address Translation)  Is a method of mapping an IP address space into another by modifying network address information in the IP header of packets  It has become a popular and essential tool in conserving global address space in the face of IPv4 address exhaustion 109
  • 110. NAT types  Source NAT: Which rewrites the source IP and/or port also known as overloading (one to many)  Destination NAT: Which rewrites the destination IP and/or port also known as port forwarding 110
  • 111. 111
  • 113. To use masquerade, you need to specify it action = masquerade, out-interface, chain = src-nat 113
  • 114. 114
  • 115. 115
  • 116. IP Firewall mangle  Mangle is a kind of 'marker' that marks packets for future processing with special marks  Many other facilities in Router-OS make use of these marks  Queue tree  NAT  Routing  Use matcher also 116
  • 121. Hotspot  The MikroTik HotSpot Gateway provides authentication for clients before access to public networks  Authentication is based on HTTP / HTTPS protocol  Hotspot system provides “Plug and Play “ access  You must Set "Shared Users" option at /ip hotspot user profile to a specific number when one user have multiple devices and needs login with all devices with what unique user account 121
  • 124. 124
  • 125. 125
  • 127. IP Routing  The objective is the delivery of packets between two systems connected to different networks.  When a host need to send a packet to another host it will examine the IP/Mask combination to determine if host is on local network or on remote network.  If the host is on remote network the sender will look at its own routing table to find route match to that specific host to se  nd packet to relevant gateway . If not found it will send packet to the default route . 127
  • 128. IP Route  Static routing is the most basic routing you can do it’s very fast, but has no redundancy .  Go to IP -> Routes in Winbox  Add IP address to interfaces  A (D) Dynamic (A) Active route for the directly Connected (C) network should appear.  Note if you have a default route from DHCP/PPPOE it can appear as both Dynamic and Static at the same time. 128
  • 129. Static Routing  You need to statically configure routes that tells router where to send packets.  You should add routes to specific networks at specific gateways.  Gateway must be reachable from any router interfaces. 129
  • 132. Default Route  If there is a smart host on a network which know how to send packet to different networks then use its IP address as your gateway .  For your router to add default route -Destination 0.0.0.0/0 (any address) -The IP address of smart host as the gateway  If the router cannot find a valid route in its static or dynamic route then it will send the packet to the default route gateway. 132
  • 133. 133
  • 135. Route Distance The route with lower distance will be chosen 135