Mtcwe PDF
Mtcwe PDF
Mtcwe PDF
©MikroTik 2010 3
Housekeeping
• Course materials
• Routers, cables
• B k titimes and
Break d llunch
h
• Restrooms and smoking area locations
©MikroTik 2010 4
Course Objective
• P
Provide
id th
thoroughh kknowledge
l d and dh
hands-on
d
training for MikroTik RouterOS advanced
wireless capabilities for small and medium
size networks
• Introduce the 802.11n
802 11n wireless networking
• Upon completion of the course you will be
able to plan
plan, implement
implement, adjust and debug
wireless MikroTik RouterOS network
configurations
©MikroTik 2010 5
Topics Overview
• Wireless Standard overview
• Wireless tools
• T bl h ti wireless
Troubleshooting i l clients
li t
• Wireless Advanced settings
– DFS and country regulation
– Data Rates and TX-power
p
– Virtual AP
©MikroTik 2010 6
Topics Overview (cont
(cont.))
• Wireless Securityy measures
– Access List and Connect List
– Management Frame Protection
– RADIUS MAC Authentication
– Encryption
• Wireless WDS and MESH
• Wireless Transparent Bridge
– WDS
– VPLS/MPLS transparent bridging
• Wireless Nstreme Protocol
• 802.11n
©MikroTik 2010 7
Introduce Yourself
• Please, introduce yourself to the class
• Your name
Y
• Your Company
• Your previous knowledge about RouterOS
• Your previous knowledge about networking
• What do you expect from this course?
My
number is:_________
is:
©MikroTik 2010 8
Class Setup Lab
• Create an 192.168.XY.0/24 Ethernet network
between the laptop (.1) and the router (.254)
• Connect routers to the AP SSID “AP_N”
• Assign IP address 10.1.1.XY/24 to the wlan1
• Main GW and DNS address is 10.1.1.254
• Gain access to the internet from your laptops via
local router
• Create new user for your router and change
“admin” access rights
g to “read”
©MikroTik 2010 9
Class Setup
©MikroTik 2010 10
Class setup Lab (cont
(cont.))
• Set system identity of the board and wireless
radio name to “XY_<your_name>”. Example:
“00_Mani”
• Upgrade your router to the latest Mikrotik
RouterOS version 4.x
• Upgrade your Winbox loader version
• Set up NTP client – use 10.1.1.254 as server
• Create a configuration backup and copy it to the
laptop (it will be default configuration)
©MikroTik 2010 11
Quick Check
• Everyone
y must be in main AP's registration
g list
©MikroTik 2010 12
Wireless Standards
• 802.11b
802 11b – 11Mbps,
11Mbps 2.4Ghz
2 4Ghz
• 802.11g – 54Mbps, 2.4Ghz
• 802 11 – 54Mbps,
802.11a 54Mb 5Gh
5Ghz
• 802.11n – 300Mbps, 2.4/5Ghz
©MikroTik 2010 13
Wireless Bands
• 2Ghz
– B, B/G, Only-G, G-Turbo, Only-N, B/G/N,
5mhz 10mhz
5mhz,
• 5Ghz
– A,
A A-Turbo,
A Turbo Only
Only-N,
N A/N
A/N, 5mhz,
5mhz 10mhz
©MikroTik 2010 14
Supported Bands by chipsets
• AR5213/AR5414
– A/B/G, G-Turbo, A-Turbo, 5Mhz, 10Mhz
• AR5416/AR9160/AR9220
– A/B/G/N, 5Mhz*, 10Mhz*
*not fully
y supported
pp
©MikroTik 2010 15
Supported Frequencies
• A/B/G Atheros chipset cards usually
support such frequencies
– 2Ghz band: 2192-2539Mhz
2192 2539Mhz
– 5Ghz band: 4920-6100Mhz
• N Ath
Atheros chipset
hi t cards
d usually
ll supportt
such frequencies
– 2Ghz band: 2192-2539Mhz
– 5Ghz band: 4800-6075Mhz
©MikroTik 2010 16
Scan List
• Default frequencies
q from the scan-list shown
bold in the frequency field (Winbox only)
• Default scan-list value from the country shown
as ‘default’
‘d f l ’
• Frequency range is specified by the dash
– 5500-5700
5500 5700
• Exact frequencies specified by comma
– 5500,5520,5540
5500 5520 5540
• Mixed option also possible
– default,5520,5540,5600-5700
, , ,
©MikroTik 2010 17
Wireless tools for finding
g the best
band/frequency
©MikroTik 2010 18
Wireless Tools
• Scan
• Frequency Usage
• S
Spectral
t l Scan/History
S /Hi t
• Snooper
• Align
• Sniffer
©MikroTik 2010 19
Scan and Frequency Usage
• Both tools use the Scan-list
Scan list
• Interface is disabled during the usage of
tools
• Scan shows all 802.11 based APs
• Frequency usage shows every 802.11
traffic
©MikroTik 2010 20
Spectral Scan/History
• Uses only Atheros Merlin 802.11n
802 11n chipset
wireless cards
• Range
– 2ghz, 5ghz, current-channel, range
• Value
– avg, avg-peak, interference, max, min
• Classify-samples
– wifi,, bluetooth,, microwave-oven,, etc
©MikroTik 2010 21
Spectral history
Spectral-history
• Plot spectrogram
• Power values are printed in different colors
• Audible
A dibl option
ti - plays
l each
h line
li as it iis
printed on the routers speaker
– Each line is played from left to right, with
higher frequencies corresponding to higher
values
l iin th
the spectrogram
t
©MikroTik 2010 22
Spectral history
Spectral-history
©MikroTik 2010 23
Spectral scan
Spectral-scan
• Continuously monitor spectral data
• Each line displays one spectrogram bucket:
– Frequency
– Numeric value of power average
– Character graphic bar
• average power value - ':'
• average peak hold - '.'
• maximum lone floating - ':':
• Show Interference option
©MikroTik 2010 24
Spectral-scan
p
©MikroTik 2010 25
Wireless Snooper Tool
©MikroTik 2010 26
Alignment Tool
©MikroTik 2010 27
Wireless Sniffer
©MikroTik 2010 28
Wireless Tools Lab
• Enable your AP on one of the 5ghz
frequencies
• Check if that frequency is the less
occupied by using the RouterOS wireless
tools
©MikroTik 2010 29
Use of DFS for automatic
frequency selection
©MikroTik 2010 30
DFS
• Dynamic Frequency Selection (DFS)
• “no radar detect” - at startup AP scans
channel list from "scan-list" and chooses the
frequency which is with the lowest amount of
other networks detected
• “radar
radar detect”
detect - adds capability to detect radar
at start up for 60 seconds and avoid them by
changing
g g frequency
q y
• By most country regulations DFS must be
set to “radar detect”
©MikroTik 2010 31
DFS Lab
• Enable the AP on frequency
q y 5180Mhz
• Enable DFS mode to “no radar detect”
• Disable wireless interface on the AP for
few seconds and enable it back
• Observe
Ob frequency
f jumps
j
©MikroTik 2010 32
Wireless Country Regulations
• Frequency mode
• “regulatory domain”
- restricts usage only
to allowed channels
with allowed transmit
powers
• “manual txpower” -
ignore transmit power
restrictions but apply
restrictions,
to frequency limitations
• “superchannel”
p -
ignore all restrictions
©MikroTik 2010 33
Analyzing registration table for
troubleshooting the wireless
connection
©MikroTik 2010 34
Troubleshooting Wireless Client
• ACK-timeout
ACK timeout
• CCQ
• TX/RX Signal
Si l St
Strength
th
• Frames vs. HW-frames
• Data-rate jumping
©MikroTik 2010 35
Registration table
©MikroTik 2010 36
CCQ – Client Connection Quality
• Value in percent that shows how effective
the bandwidth is used regarding the
theoretically maximum available
b d idth
bandwidth
• Weighted average of values Tmin/Treal
calculated
l l t d ffor every ttransmitted
itt d frame
f
– Tmin is time it would take to transmit given
frame at highest rate with no retries
– Treal is time it took to transmit frame in real
life
©MikroTik 2010 37
Frames vs
vs. HW-frames
HW frames
• Wireless retransmission is when the card sends
out a frame and you don't receive back the
acknowledgment (ACK), you send out the frame
once more till you get back the acknowledgment
• If the hw-frames value is bigger
than frames value then it means that the
wireless link is making retransmissions
• I case of Nstreme you can’t compare the frames
with hw-frames
©MikroTik 2010 38
Using advanced settings for
troubleshooting and fine tuning the
wireless connection
©MikroTik 2010 39
Wireless Advanced Settings
• Advanced Wireless Tab settings
• HW-retries
• HW-protection
HW t ti
– RTS/CTS
– CTS to self
• Adaptive-noise-immunity
p y
• Configuration Reset
• WMM
©MikroTik 2010 40
Wireless Advanced Tab
©MikroTik 2010 41
Advanced Wireless Tab
• Area – string
g that describes the AP,, used in the
clients Connect-list for choosing the AP by the
area-prefix
• Ack-timeout
A k i – acknowledgement
k l d code
d timeout
i i
in
µs; “dynamic” by default
• Periodic-calibration
Periodic calibration – to ensure performance of
chipset over temperature and environmental
changes
• Hide-ssid – whether to hide ssid or not in the
beacon frames
©MikroTik 2010 42
HW retries
HW-retries
• Number of frame sending retries until the
transmission is considered failed
• Data rate is decreased upon failure
• But
B t if there
th is
i no llower rate,
t 3 sequential
ti l
failures activate on-fail-retry-time
transmission pause and the counter
restarts
• The frame is being retransmitted either
until success or until client is disconnected
– disconnect
disconnect-timeout
timeout reached
©MikroTik 2010 43
HW protection
HW-protection
• Frame protection helps to fight "hidden
hidden
node" problem
• CTS/RTS protection
• “CTS to self” protection
• hw-protection-threshold – frame size
threshold at which protection should be
used; 0 – used for all frames
©MikroTik 2010 44
RTS/CTS based protection
• RTS/CTS based protection
– Device willing to send frame at first sends
RequestToSend frame and waits for
ClearToSend frame from intended destination
– By "seeing"
seeing RTS or CTS frame 802.11
compliant devices know that somebody is
about to transmit and therefore do not initiate
transmission themselves
©MikroTik 2010 45
“CTS
CTS to self
self” based protection
• "CTS
CTS to self"
self based protection
– Device willing to send frame sends CTS frame
"to itself“
– As in RTS/CTS protocol every 802.11
compliant device receiving this frame know
not to transmit
transmit.
– "CTS to self" based protection has less
overhead but it must be taken into account
overhead,
that this only protects against devices
receiving CTS frame
©MikroTik 2010 46
“CTS
CTS to self
self” or RTS/CTS
• If there are 2 "hidden"
hidden stations,
stations there is no
use for them to use "CTS to self"
protection because they will not be able to
protection,
receive CTS sent by other station - in this
case stations must use RTS/CTS so that
other station knows not to transmit by
seeing CTS transmitted by AP
• Use only one protection
©MikroTik 2010 47
HW fragmentation threshold
HW-fragmentation-threshold
• Maximum fragment size in bytes when
transmitted over wireless medium
• Fragmentation allows packets to be fragmented
before transmiting g over wireless medium to
increase probability of successful transmission
• Only fragments that did not transmit correctly are
retransmitted
• Transmission of fragmented packet is less
efficient than transmitting unfragmented packet
b
because off protocol
t l overhead
h d and d iincreased
d
resource usage at both - transmitting and
receivinggp partyy
©MikroTik 2010 48
Adaptive noise immunity
Adaptive-noise-immunity
• Adjusts
j various receiver p
parameters dynamically
y y
to minimize interference and noise effect on the
signal quality
• Works on Atheros 5212 or newer Atheros
chipset
• Uses CPU power
• 3 options:
– None – disabled
– Client-mode – will be enabled only if station or
station-wds used
– Ap-and-client-mode – will be enabled in any mode
©MikroTik 2010 49
Wireless Configuration reset
• Sometimes after
reconfiguring
advanced settings
you might want to get
back the default
settings
g
• Use the “Reset
Configuration” option
– resets
t the
th currentt
wireless cards all
configuration
©MikroTik 2010 50
Wireless MultiMedia (WMM)
• 4 transmit queues with priorities:
• 1,2 – background
• 0 3 – best effort
0,3
• 4,5 – video
• 6 7 – voice
6,7
• Priorities set by
• Bridge or IP firewall
• Ingress (VLAN or WMM)
• DSCP
©MikroTik 2010 51
Modifying
y g data rates and tx-power
p
for stabilizing wireless connection
©MikroTik 2010 52
Basic and supported rates
• Supported rates –
client data rates
• Basic rates – link
management data
rates
• If router can't send
or receive
i ddata
t att
basic rate – link
goes down
d
©MikroTik 2010 53
Data rates changing options
• Lower the higher
g supported
pp data-rates on the
client which have stability issues
• Lower the higher supported data-rates on the AP
if most of the clients have problems running on
higher data rates.
• Not recommended to disable lower data rates
andd lleave only
l th
the hi
higher
h d data
t rates
t as
disconnection of the link could happen more
often
• Note that AP and the Client should support the
same Basic rates to establish the wireless
connection
©MikroTik 2010 54
TX power
• Different TX-power
TX power for
each data-rate –
higher date rate, less
power
• Disabling the higher
data-rates could
improve the signal as it
uses higher tx
tx-power
power
on lower data-rates
©MikroTik 2010 55
TX power mode
TX-power-mode
• Default – uses tx-power
p values from cards
eeeprom
• Card-rates – use tx-power, that for different rates
i calculated
is l l d according
di the
h cards
d transmit i power
algorithm, which as an argument takes tx-
power value
• All-rates-fixed – use one tx-power value for all
rates
• Manual-table – use the tx-power as defined
in /interface wireless manual-tx-power-table
©MikroTik 2010 56
Data rates Lab
• Configure the AP to allow the data-rates
data rates
up to 24Mbps data rates and test the max
throughput
• Configure the AP to allow only the 54Mbps
data rate and check the max throughput
and check how stable is the connection
©MikroTik 2010 57
Use of Virtual AP feature for
creating multiple APs
©MikroTik 2010 58
Virtual AP
• Used for creating a new AP on top of the
physical wireless card
• Works for AR5212 and newer Atheros
Chipset cards
• Up to 128 Virtual AP per wireless card
• Uses different MAC address and can be
changed
• Can have different SSID, security profile,
Access/Connect-list,
Access/Connect list, WDS options
©MikroTik 2010 59
Virtual AP Setup
©MikroTik 2010 60
Virtual AP Lab
• Work two together
• Connect both routers using Ethernet cable
• First
Fi t router
t
– Create 2 VLAN interfaces on that Ethernet
– Create 2 hotspots – one on each VLAN
– For one Hotspot change the background color of login page
• add background-color: #A9F5A9; in the body line in the login.html page
• Second router
– Create 2 VLAN interfaces on the Ethernet interfaces with the VLAN ID
from the first router
– Create 2 Virtual APs with different SSID
– Bridge first VLAN with first Virtual AP
– Create second bridge g with second VLAN and second Virtual AP
• Connect to each Virtual AP and check if one AP has different login
page
• Reset the configuration and switch places
©MikroTik 2010 61
Managing
g g access for AP/Clients
using Access-List and Connect-List
©MikroTik 2010 62
Access Management
• default-forwarding (on AP) – whether the
wireless clients may communicate with each
other directly (access list may override this
setting for individual clients)
• default-authentication – default authentication
policy that applies to all hosts not mentioned in
the AP's access list or client's connect list
©MikroTik 2010 64
Wireless Access List
• It is p
possible to specify
p y authentication p
policy
y for
specific signal strength range
• Example: allow clients to connect with good signal
level or not connect at all
• It is possible to specify authentication policy for
specific
p time pperiods
• Example: allow clients to connect only on weekends
• It is possible to specify authentication policy for
specific security keys:
• Example: allow clients only with specific security key
to connect to the AP.
AP
©MikroTik 2010 65
Wireless Access List
©MikroTik 2010 66
Wireless Connect List
• Used for allowing/denying access based on:
• SSID
• MAC address of the AP
• Area Prefix of the AP
• Signal Strength Range
• Security Profile
• It is possible to prioritize one AP over another AP
b changing
by h i order
d off ththe entries
ti
• Connect list is used also for WDS links, when
one AP connects t to
t other
th AP
©MikroTik 2010 67
Wireless Connect List
1
2
3
4
©MikroTik 2010 68
Access/Connect List Lab
• Peer up with other group (so that there will
be two APs and two clients in one group)
• Leave default-forwarding,
default forwarding, default-
default
authentication enabled
• On APs:
• Ensure that only clients from your group and
with -70..120 signal strength are able to
connect
• (Advanced) Try out Time settings
©MikroTik 2010 69
Access/Connect List Lab
• On clients:
• Ensure that your client will connect only to
your group APs
• Try to prioritize one AP over another
• When APs have same SSID
• When APs have different SSID
• Delete all access list and connect list rules
– change places and repeat the lab
©MikroTik 2010 70
Centralized Access List
Management – RADIUS
©MikroTik 2010 71
RADIUS MAC Authentication
• Option for remote centralized MAC RADIUS
authentication and accounting
• Possibilityy of using
g radius-incoming
g feature to
disconnect specific MAC address from the AP
• MAC mode – username or username and
password
• MAC Caching Time – how long the RADIUS
authentication reply for MAC address
authentication if considered valid for caching
©MikroTik 2010 72
RADIUS MAC Authentication
©MikroTik 2010 73
RADIUS Client Configuration
• Create a RADIUS
client under ‘Radius’
menu
• Specify
S if the
h SService,
i
IP address of
RADIUS Server and
Secret
• Use Status section to
monitor the
connection status
©MikroTik 2010 74
Wireless securityy for protecting
p g
wireless connection
©MikroTik 2010 75
Wireless Security
• Authentication
– PSK Authentication
– EAP Authentication
• Encryption
– AES
– TKIP
– WEP
• EAP RADIUS Security
y
©MikroTik 2010 76
Security Principles
• Authentication - ensures acceptance of
transmissions only from confirmed source
• Data encryption
• Confidentiality - ensures that information is
accessible only to those authorized to have
access
• Integrity – ensures that information is not
changed by any other source and are exactly
the same as it was sent out
©MikroTik 2010 77
©MikroTik 2010 78
PSK Authentication
• Pre-Shared
Pre Shared Key is an authentication
mechanism that uses a secret which was
previously shared between the two parties
• Most common used wireless security type
• Multiple
M lti l authentication
th ti ti ttypes ffor one profile
fil
• Optional PSK key for each MAC address
(using Access list)
©MikroTik 2010 79
EAP Authentication
• Extensible Authentication Protocol
provides a negotiation of the desired
authentication mechanism (a.k.a.
(a k a EAP
methods)
• There are about 40 different EAP methods
• RouterOS support EAP-TLS method and
also
l iis capable
bl tto passtrough
t h allll methods
th d
to the RADIUS server
©MikroTik 2010 80
©MikroTik 2010 81
AES CCM
AES-CCM
• AES
AES-CCM
CCM – AES with CTR with CBC
CBC-MAC
MAC
©MikroTik 2010 85
WEP (obsolete)
©MikroTik 2010 86
Pre-Shared
Pre Shared Key (PSK)
• To make PSK authentication
• Use “Dynamic Keys” mode
• Enable WPAx
WPAx-PSK
PSK authentication type
• Specify Unicast and Group Ciphers (AES
CCM TKIP)
CCM,
• Specify WPAx-Pre-Shared Key
• Keys generated on association from PSK
will be used in ciphers as entry key
©MikroTik 2010 87
Pre-Shared
Pre Shared Key (PSK)
©MikroTik 2010 88
Unicast Cipher
• On the AP and on Station at least one
unicast cipher should match to make the
wireless connection between 2 devices
©MikroTik 2010 89
Group Cipher
• For the AP
– If on AP the group cipher will be AES and
TKIP the strongest will be used – AES
– It is advised to choose only one group cipher
on the AP
• For the Station
– If on the Station both group ciphers are used it
means that it will connect to the AP that
supports any of these ciphers
©MikroTik 2010 90
EAP RADIUS Security
• To make the EAP passthrough authentication
• Enable WPAx-EAP authentication type
• Enable MAC authentication
• Set EAP Method to passthrough
• Enable RADIUS client
• To make EAP-TLS authentication
• Enable WPAx-EAP authentication type
• Configure TLS option if you plan to use certificate
• Import and decrypt certificate
©MikroTik 2010 91
EAP RADIUS Security
©MikroTik 2010 92
Wireless Security Lab
• Make wireless link with your neighbour
using WPA-PSK:
• Create a security profile and use the same
pre-shared key to establish a wireless
connection with yyour neighbour
g router.
• On the AP add an Access List entry with
the neighbours MAC address and specify
different PSK key, ask your neighbour to
connect to it again
©MikroTik 2010 93
Protecting wireless clients from
deauthentication and MAC cloning
attacks
©MikroTik 2010 94
Management Frame Protection
• RouterOS implements proprietary
management frame protection algorithm
based on shared secret
• RouterOS wireless device is able to verify
g
source of management frame and confirm
that particular frame is not malicious
• Allows to withstand deauthentication and
disassociation attacks on RouterOS based
wireless devices.
©MikroTik 2010 95
Management Protection Settings
• Configured in the security-profile
– disabled - management protection is disabled
– allowed - use management protection if supported by
remote party
p y
• for AP - allow both, non-management protection and
management protection clients
• for client - connect both to APs with and without management
g
protection
– required - establish association only with remote
devices that support
pp management
g p
protection
• for AP - accept only clients that support management
protection
• for client - connect only
y to APs that support
pp management
g
protection
©MikroTik 2010 96
Management Protection key
• Configured with security
security-
profile management-protection-
key setting
• When interface is in AP mode, default
management protection key can be
overridded by key specified in access-list
or RADIUS attribute
attribute.
©MikroTik 2010 97
Management Protection Lab
• Work in g
groupp with 3 p
persons
• One makes an AP
• Other two connect to the AP
• One of the client clones the other clients MAC
address
• Check connectivity from both clients to the AP
• Set the management protection to required and
specif a ke
specify key on the AP and on the original client
• Check which client connected – original or
cloned
©MikroTik 2010 98
Wireless WDS and MESH
©MikroTik 2010 99
WDS and MESH
• WDS
– Dynamic WDS Interface
– Static WDS Interface
• RSTP Bridge
• HWMP+ MESH
– Reactive mode
– Proactive mode
– Portals
• Create WDS link with your neighbor router and add that
to the mesh port
• Check again the MESH traceroute to your neighbor