Professional Documents
Culture Documents
Raid-5 Technology
About Mikrotik
Raid-5 Technology
Mikrotik’s History
1995: Established
www.mikrotik.com
www.routerboard.com
Raid-5 Technology
What is Router OS ?
Raid-5 Technology
First Time Access
Raid-5 Technology
First Time Access
Raid-5 Technology
Winbox
Raid-5 Technology
Access to Router ( Winbox)
Open Winbox
Default IP : 192.168.88.1 ( LAN )
Username : admin
Password : ( blank )
Raid-5 Technology
Access to Router ( Webfig)
Open Browser ( Firefox or Chrome )
https://192.168.88.1
Raid-5 Technology
MAC Addresses
Media Access Control are unique addresses assigned to NICs
First part of the MAC address is assigned to the manufacturer
of the hardware
The rest of the address is determined by the
manufacturer
Devices, that are not manageable (e.g., HUBs and some switches) do
not have MAC addresses
Example: 00:0C:42:04:9F:AE
MAC addresses are used for addressing in the Data Link Layer (Layer 2)
of the OSI network model (This means all communications in one LAN
segment use MAC addresses)
Analogy: MAC address is like person’s social
Security number
Raid-5 Technology
MAC Addresses
Example: 00:0C:42:20:97:68
Example: 159.148.60.20
Raid-5 Technology
Name Functions Hosts
Raid-5 Technology
Subnet Mask
Raid-5 Technology
Packet Management
Raid-5 Technology
Packet Information
Name Functions
Raid-5 Technology
NTP
Raid-5 Technology
Netinstall
Available at www.mikrotik.com
Raid-5 Technology
Netinstall
List of routers
Net Booting
Packages
Install
Raid-5 Technology
RouterOS Licnese
All RouterBOARDs shipped with license
Raid-5 Technology
RouterOS Licnese
Raid-5 Technology
Useful Link
Raid-5 Technology
Bandwidth Test Utility
Raid-5 Technology
ARP ( Address Resolution Protocol )
ARP Table
Raid-5 Technology
Internet Access to your Router
Raid-5 Technology
Laptop to Router
Raid-5 Technology
DHCP Client
Raid-5 Technology
Masquerade
Select IP >>Firewall >> NAT >> Create Masquerade
A Masquerade used for Public Network Access , when Private
Network present
Masquerade is a specific application of Network Address Translation
(NAT). It is most commonly used to hide multiple hosts behind the
router's public IP addresses
Masquerade replaces the private source address of an IP packet
with a router's public IP address as it travels through the router
Raid-5 Technology
Backup Configuration
You can backup and restore configuration in the Files menu of Winbox
Raid-5 Technology
Backup
Backup file can be created and restored under Winbox file menu
Raid-5 Technology
Export
Import Command
[admin@MikroTik] > /import file= < asurlike >
Verify Command
[admin@MikroTik] > file print
Raid-5 Technology
Reset Configuration
Raid-5 Technology
Router Identify
Raid-5 Technology
RouterOS Users
Default User and Group is Full and Other group is Read and Write
Raid-5 Technology
IP Assign
Raid-5 Technology
Dynamic Host Configuration Protocol
Raid-5 Technology
Bridge
Bridge are OSI layer 2 devices and also known as transparent devices
Raid-5 Technology
Creating Bridge
Raid-5 Technology
Creating Bridge
Raid-5 Technology
Wireless Bridge
Raid-5 Technology
Lab : Wireless Bridge
Instruction :
We are going to run bridge from Raid-5 Technology Wi-fi to your
laptop by using wireless bridge
Raid-5 Technology
Lab : Wireless Bridge
Chose Wireless >> Mode to Station Bridge >> Scan >> Connect to
Raid-5 Technology Wi-fi
Disable DHCP Server because bridge didn’t support that
Before Lab , you need to add Wireless Interface into existing bridge
interface
Create Security Profile for Wi-Fi Password
Renew your own laptop’s IP
Ping test to Instructor router and Your friends router
Your router is now transparent bridge
Raid-5 Technology
Routing
IP >> Routes
Raid-5 Technology
Dynamic Route
Raid-5 Technology
Router Flags
A - active
D - dynamic
C - connected
S - static
Raid-5 Technology
Lab : Static Route
Raid-5 Technology
Lab : Static Route
Raid-5 Technology
Open Shortest Path Fast
Raid-5 Technology
Area Type
Raid-5 Technology
Backbone Area
Raid-5 Technology
Virtual Link
Used to connect remote areas
to the backbone area through a
non-backbone area
ABR ABR
Routing >> OSPF >>
V Link Tab >>
Create New V Link
Raid-5 Technology
Lab : OSPF
OSPF is very fast and optimal for dynamic routing & easy to configure
Raid-5 Technology
Wireless
Raid-5 Technology
Wireless Standard ( Legacy)
Raid-5 Technology
Wireless Channel
2.4 GHZ
(11) 22 MHz wide channels (US) & 14 in Japan
3 non-overlapping channels
Raid-5 Technology
Wireless Channel
5 GHz
RouterOS support full range of 5 GHz
Raid-5 Technology
Country Regulation
Raid-5 Technology
Firewall
Raid-5 Technology
Firewall Filter
Accept
Raid-5 Technology
Define Criteria (IF)
Src IP
Dst IP
Protocol ( TCP/UDP/ICMP)
Src Port
Dst Port
Raid-5 Technology
Perform Action ( Then )
Packet Decision
• Accept – Forward packet
Raid-5 Technology
Firewall ( LAB )
Facebook Block by Address List
Raid-5 Technology
Firewall ( LAB )
ICMP Ping Block
Speed Limiting
Forthright control over data rate of inbound traffic is impossible
The router controls the data rate indirectly by dropping incoming
packets
TCP protocol adapts itself to the effective connection speed
Simple Queue is the easiest way to limit data rate
Raid-5 Technology
Quality Of Service
Simple Queues
Simple queues make data rate limitation easy.
One can limit:
Client's rx rate (client's download)
Client's tx rate (client's upload)
Client's tx + rx rate (client's aggregate)
While being easy to configure, Simple Queues give control over all
QoS features
Raid-5 Technology
Simple Queues ( LAB )
Raid-5 Technology
Guaranteed Bandwidth
Raid-5 Technology
Torch
Raid-5 Technology
Burst
Bursts are used to allow higher data rates for a short period of time
Raid-5 Technology
Limitation with Burst
Raid-5 Technology
Virtual Private Network
Raid-5 Technology
Ethernet Over IP
Raid-5 Technology