SlideShare a Scribd company logo
1 of 17
Download to read offline
WISP 101
The DO’s and DON’T’s of
becoming a Wireless ISP
WISP 101 topics
• Choosing your hardware
• Setting up the Highsite
– Hardware
– Software
– Security
– Wireless
– Backhaul
• Setting up the client
Choosing your hardware
• Highly dependant on current and future
client requirements
• Routerboard 532 is fine for highsites
handling around 20 clients
• For 20 - 40 clients consider the newer RB
532A – 400Mhz + 64MB RAM
• For 40+ clients consider using multiple
RB532’s or check the Routerboard
roadmap for upcoming higher speed units
Setting up the highsite –
Hardware
• The hardware you use will determine the
highsite setup
• Remember to allow for future expansion!
Highsite Hardware
• DO use a IP65 rated metal enclosure with STP
cable and sinewave PSU
• DON’T use plastic with switch mode power
supply unless you enjoy have 2-way radio
operators take an axe to your equipment!
• DO use multiple sector antenna’s to distribute
the signal
• DON’T use omni-directional antenna’s on
highsites unless you enjoy other WISP
operators taking an axe to your equipment…
WAPA Guidelines for Highsites
• Members will conform to basic WAPA high site
requirements, including:
– Any antenna with a beam width of greater than 120
degrees is restricted to maximum gain of 6dbi in
2400-2483 MHz;
– Any antenna with a beam width of greater than 120
degrees is restricted to maximum gain of 10dbi in
5470-5875MHz;
– No Amplifiers may be used; and
• Power backup system needs to be in place
Setting up the highsite - software
• Several factors are involved in setting up the
RouterOS software
• The authentication that clients will use will
determine how complex setup will be
– The WISP standard is to use PPPOE for client
authentication for easy management and tracking.
– PPPOE also makes the most efficient use of IP
addresses
– Manual IP addressing can also be used – this will
be easier to setup but less secure and manageable
in the long run
Setting up the highsite -
software
– Your IP addressing scheme will depend on
how many sectors you have along with your
backhaul and routing strategy
– DHCP can be used to assign IP addresses for
both manual addressing and PPPOE
– Larger networks can use RADIUS to
authenticate PPPOE clients and assign IP
addresses
– Consider Mikrotik Usermanager as an easy to
setup and configure RADIUS solution
Highsite Software Setup
• DO spend some time planning your IP and
routing setup – get an expert to do it for
you if necessary
• DON’T choose a random highsite IP layout
– you will just have to redo it sometime in
the future
Security 1/2
• Several methods are available to protect
your investment
• Use wireless access lists to stop
unauthorized users connecting to the
highsite
• Considering using WEP / WPA to encrypt
communication – this will place extra CPU
load on the system
• Use PPPOE with MSCHAPv2 to encrypt
username and password setting
Security 2/2
• Use firewall address lists to drop all outgoing
traffic not listed as a registered client
• Use separate NAT rules per client as
additional security
• Static ARP or Reply-only can enhance
security
• HotSpot can be used where you require
clients to enter a username and password for
internet access
Wireless
• Wireless setup depends on client side equipment
• Use technology like Nstreme if all clients run
Mikrotik to more efficiently manage data transfer
and also enhance security
• Disable Default Authenticate and Default
Forward
• Use 6 channel spacing on 2.4Ghz for multiple
sector layouts. Even better use 5.8Ghz for clients
• Use 5.8 Ghz on backhaul point to point links
• Use the Regulatory Domain feature of Mikrotik to
keep within legal power limits
Backhaul
• The backhaul link will carry all the traffic
for your clients
• Use 5.8Ghz only to ensure a solid link
• Use ptp addressing and good security
between backhaul links
• Consider active routing technology such
as OSPF to maintain redundancy and load
balancing on your network
Backhaul
• DON’T use /30 addressing unless
combined with additional security – it is
very easy to hack
• DO use multiple paths for redundancy on
the network
Setting up the Client
• Client setup depends on the highsite
configuration
• Typical client setup:
– Wireless connection
– PPPoE / IP Address on Wlan interface
– IP Routing (for manual IP setup)
– IP DNS (for manual IP setup)
– LAN IP setup
– LAN DHCP Setup
– Masquerade rule
Basic Router Setup Checklist
1. Connect via MAC Winbox to router
2. Add ethernet IP address 192.168.1.254/24
3. Connect to highsite wireless SSID=wisp101
4. Add wlan ip 10.1.1.x/24. Confirm that you can ping
10.1.1.254
5. Add a default route of 10.1.1.254
6. Add a DNS server 10.1.1.254. Allow remote
requests
7. Change the router’s Identity
8. Add a firewall masquerade rule
9. Setup DHCP Server on the ethernet port
10. Setup / check the client computers IP settings
11. Confirm that you can access the Internet
More Information
• WAPA – Wireless Access Providers
Association
http://wapa.org.za
• Mikrotik support in South Africa
http://www.mikrotiksa.com
david@mikrotiksa.com
• Mikrotik Global
http://www.mikrotik.com

More Related Content

Similar to WISP 101.pdf

17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
IPv6 translation methods
IPv6 translation methodsIPv6 translation methods
IPv6 translation methodsAhmad Hijazi
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-FiCisco Canada
 
IPv6 Basics - pfSense Hangout July 2015
IPv6 Basics - pfSense Hangout July 2015IPv6 Basics - pfSense Hangout July 2015
IPv6 Basics - pfSense Hangout July 2015Netgate
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEEAfaq Siddiqui
 
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB WirelessCampus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB WirelessAniruddh Rao Kabbinale
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingCisco Service Provider
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Cisco Russia
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networksprimeteacher32
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2Muhammad Ahad
 

Similar to WISP 101.pdf (20)

17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
IPv6 translation methods
IPv6 translation methodsIPv6 translation methods
IPv6 translation methods
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IPv6 Basics - pfSense Hangout July 2015
IPv6 Basics - pfSense Hangout July 2015IPv6 Basics - pfSense Hangout July 2015
IPv6 Basics - pfSense Hangout July 2015
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB WirelessCampus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB Wireless
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment Routing
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
 
Zigbee
ZigbeeZigbee
Zigbee
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
MTCTCE.pdf
MTCTCE.pdfMTCTCE.pdf
MTCTCE.pdf
 
Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
 
Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
 

Recently uploaded

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

WISP 101.pdf

  • 1. WISP 101 The DO’s and DON’T’s of becoming a Wireless ISP
  • 2. WISP 101 topics • Choosing your hardware • Setting up the Highsite – Hardware – Software – Security – Wireless – Backhaul • Setting up the client
  • 3. Choosing your hardware • Highly dependant on current and future client requirements • Routerboard 532 is fine for highsites handling around 20 clients • For 20 - 40 clients consider the newer RB 532A – 400Mhz + 64MB RAM • For 40+ clients consider using multiple RB532’s or check the Routerboard roadmap for upcoming higher speed units
  • 4. Setting up the highsite – Hardware • The hardware you use will determine the highsite setup • Remember to allow for future expansion!
  • 5. Highsite Hardware • DO use a IP65 rated metal enclosure with STP cable and sinewave PSU • DON’T use plastic with switch mode power supply unless you enjoy have 2-way radio operators take an axe to your equipment! • DO use multiple sector antenna’s to distribute the signal • DON’T use omni-directional antenna’s on highsites unless you enjoy other WISP operators taking an axe to your equipment…
  • 6. WAPA Guidelines for Highsites • Members will conform to basic WAPA high site requirements, including: – Any antenna with a beam width of greater than 120 degrees is restricted to maximum gain of 6dbi in 2400-2483 MHz; – Any antenna with a beam width of greater than 120 degrees is restricted to maximum gain of 10dbi in 5470-5875MHz; – No Amplifiers may be used; and • Power backup system needs to be in place
  • 7. Setting up the highsite - software • Several factors are involved in setting up the RouterOS software • The authentication that clients will use will determine how complex setup will be – The WISP standard is to use PPPOE for client authentication for easy management and tracking. – PPPOE also makes the most efficient use of IP addresses – Manual IP addressing can also be used – this will be easier to setup but less secure and manageable in the long run
  • 8. Setting up the highsite - software – Your IP addressing scheme will depend on how many sectors you have along with your backhaul and routing strategy – DHCP can be used to assign IP addresses for both manual addressing and PPPOE – Larger networks can use RADIUS to authenticate PPPOE clients and assign IP addresses – Consider Mikrotik Usermanager as an easy to setup and configure RADIUS solution
  • 9. Highsite Software Setup • DO spend some time planning your IP and routing setup – get an expert to do it for you if necessary • DON’T choose a random highsite IP layout – you will just have to redo it sometime in the future
  • 10. Security 1/2 • Several methods are available to protect your investment • Use wireless access lists to stop unauthorized users connecting to the highsite • Considering using WEP / WPA to encrypt communication – this will place extra CPU load on the system • Use PPPOE with MSCHAPv2 to encrypt username and password setting
  • 11. Security 2/2 • Use firewall address lists to drop all outgoing traffic not listed as a registered client • Use separate NAT rules per client as additional security • Static ARP or Reply-only can enhance security • HotSpot can be used where you require clients to enter a username and password for internet access
  • 12. Wireless • Wireless setup depends on client side equipment • Use technology like Nstreme if all clients run Mikrotik to more efficiently manage data transfer and also enhance security • Disable Default Authenticate and Default Forward • Use 6 channel spacing on 2.4Ghz for multiple sector layouts. Even better use 5.8Ghz for clients • Use 5.8 Ghz on backhaul point to point links • Use the Regulatory Domain feature of Mikrotik to keep within legal power limits
  • 13. Backhaul • The backhaul link will carry all the traffic for your clients • Use 5.8Ghz only to ensure a solid link • Use ptp addressing and good security between backhaul links • Consider active routing technology such as OSPF to maintain redundancy and load balancing on your network
  • 14. Backhaul • DON’T use /30 addressing unless combined with additional security – it is very easy to hack • DO use multiple paths for redundancy on the network
  • 15. Setting up the Client • Client setup depends on the highsite configuration • Typical client setup: – Wireless connection – PPPoE / IP Address on Wlan interface – IP Routing (for manual IP setup) – IP DNS (for manual IP setup) – LAN IP setup – LAN DHCP Setup – Masquerade rule
  • 16. Basic Router Setup Checklist 1. Connect via MAC Winbox to router 2. Add ethernet IP address 192.168.1.254/24 3. Connect to highsite wireless SSID=wisp101 4. Add wlan ip 10.1.1.x/24. Confirm that you can ping 10.1.1.254 5. Add a default route of 10.1.1.254 6. Add a DNS server 10.1.1.254. Allow remote requests 7. Change the router’s Identity 8. Add a firewall masquerade rule 9. Setup DHCP Server on the ethernet port 10. Setup / check the client computers IP settings 11. Confirm that you can access the Internet
  • 17. More Information • WAPA – Wireless Access Providers Association http://wapa.org.za • Mikrotik support in South Africa http://www.mikrotiksa.com david@mikrotiksa.com • Mikrotik Global http://www.mikrotik.com