Material MTCNA Mar24
Material MTCNA Mar24
Material MTCNA Mar24
(MTCNA)
Pekanbaru - Riau
1-3 Maret 2024
1
About the Trainer
2
Course Objectives
●
Provide an overview of RouterOS software and RouterBOARD
products
●
Hands-on training for MikroTik router configuration, maintenance
and basic troubleshooting
3
Learning Outcomes
The student will:
4
MikroTik Certified Courses
mikrotik.com/training/about
5
MTCNA Outline
●
Module 1: Introduction
●
Module 2: DHCP
●
Module 3: Bridging
●
Module 4: Routing
●
Module 5: Wireless
●
Module 6: Firewall
6
MTCNA Outline
●
Module 7: QoS
●
Module 8: Tunnels
●
Module 9: Misc
●
Hands on LABs during each module (more than 40 in
total)
●
Detailed outline available on mikrotik.com
7
Schedule
●
Training day: 9AM - 5PM
●
30 minute breaks: 10:30AM and 3PM
●
1 hour lunch: 12:30PM
●
Certification test: last day, 1 hour
8
Housekeeping
●
Emergency exits
●
Bathroom location
●
Food and drinks while in class
●
Please set phone to 'silence' and take calls outside the classroom
9
Introduce Yourself
●
Your name and company
●
Your prior knowledge about networking
●
Your prior knowledge about RouterOS
●
What do you expect from this course?
●
Please, note your number (XY): ___
10
Certified Network Associate
(MTCNA)
Module 1
Introduction
11
About MikroTik
12
About MikroTik
●1996: Established
13
About MikroTik
●
Located in Latvia
●
mikrotik.com
14
MikroTik RouterOS
● Is the operating system of MikroTik RouterBOARD hardware
15
RouterOS Features
● Full 802.11 a/b/g/n/ac support
● Firewall/bandwidth shaping
16
MikroTik RouterBOARD
●
A family of hardware solutions created by MikroTik that run
RouterOS
●
Ranging from small home routers to carrier-class access
concentrators
17
Ethernet Wireless for home and
routers office
Wireles
s
Switche 18
RouterBO ARDs
First Time Access
●
Null modem cable
●
Ethernet cable
●
WiFi
Ethernet
Null Modem cable
Cable WiFi
19
First Time Access
●
WinBox - www.mikrotik.com/download/winbox.exe
●
WebFig
●
SSH
●
Telnet
●
Terminal emulator in case of serial port connection
20
WinBox
●
Default IP address (LAN side): 192.168.88.1
●
User: admin, Password: (blank)
21
MAC WinBox
●
Observe the WinBox title when connected using IP address
●
Connect to the router using MAC address
●
Observe the WinBox title
22
MAC WinBox
●
Disable the IP address on the bridge interface
●
Try to log in the router using the IP address (not possible)
●
Try to log in the router using the MAC WinBox (works)
23
MAC WinBox
●
Enable the IP address on the bridge interface
●
Log in the router using the IP address
24
WebFig
●
Browser - http://192.168.88.1
25
Quick Set
●
Basic router configuration in one window
●
Accessible from both WinBox and WebFig
●
In more detail described in “Introduction to MikroTik RouterOS and
RouterBOARDs” course
26
Quick Set
27
Default Configuration
●
Different default configuration applied
●
For more info see default configuration wiki page
●
Example: SOHO routers - DHCP client on Ether1, DHCP server on
rest of ports + WiFi
●
Can be discarded and ‘blank’ used instead
28
Command Line Interface
● Available via SSH, Telnet or ‘New Terminal’ in WinBox and
WebFig
[admin@MikroTik] >
29
Command Line Interface
●
<tab> completes command
●
double <tab> shows available commands
●
‘?’ shows help
●
Navigate previous commands with <↑>, <↓> buttons
30
Command Line Interface
●
Hierarchical structure (similar to WinBox menu)
●
For more info see console wiki page
In WinBox: Interfaces
menu
31
Internet Access
Class
Your laptop Your router AP
192.168.88.1
32
Laptop - Router
●
Connect laptop to the router with a cable, plug it in any of LAN
ports (2-5)
●
Disable other interfaces (wireless) on your laptop
●
Make sure that laptop's Ethernet interface is set to obtain IP
configuration automatically (via DHCP)
33
Router - Internet
● The Internet gateway of your class is accessible over wireless - it is
an access point (AP)
Class
Your laptop Your router AP
192.168.88.1
34
Router - Internet
●
To connect to the AP you have to:
○ Remove the wireless interface from the bridge interface
(used in default configuration)
35
Router - Internet
●
To connect to the AP you have to:
○ Create and configure a wireless security profile
36
Router - Internet
Remove
the WiFi
interface
from the
bridge
Bridge → Ports
38
Router - Internet
Set
DHCP
client to
the WiFi
interface
IP → DHCP Client
39
Router - Internet
Set Name
and
Pre-Shared
Keys
40
Router - Internet
Set Mode to
‘station',
SSID to
'ClassAP'
and Security
Profile to
'class'
Wireless → Interfaces
●
Private networks include 10.0.0.0-10.255.255.255, 172.16.0.0-
172.31.255.255, 192.168.0.0-192.168.255.255
43
Router - Internet
Configure
masquerade
on the WiFi
interface
IP → Firewall →
NAT
44
Check Connectivity
●
Ping www.mikrotik.com from your laptop
45
Troubleshooting
●
The router cannot ping further than AP
●
The router cannot resolve names
●
The laptop cannot ping further than the router
●
The laptop cannot resolve domain names
●
Masquerade rule is not working
46
RouterOS Releases
● Long-term - fixes, no new features
Archive
Long -
term
Stable
Testing
47
Upgrading the RouterOS
● The easiest way to upgrade
49
Package Management
●
RouterOS functions are enabled/disabled by packages
System → Packages
50
RouterOS Packages
Package Functionality
advanced-tools Netwatch, wake-on-LAN
dhcp DHCP client and server
hotspot HotSpot captive portal server
ipv6 IPv6 support
ppp PPP, PPTP, L2TP, PPPoE clients and servers
routing Dynamic routing: RIP, BGP, OSPF
security Secure WinBox, SSH, IPsec
system Basic features: static routing, firewall, bridging, etc.
wireless 802.11 a/b/g/n/ac support, CAPsMAN v2
51
RouterOS Packages
●
Each CPU architecture has a combined package, e.g. ‘routeros-
mipsbe’, ‘routeros-tile’
●
Contains all the standard RouterOS features (wireless, dhcp, ppp,
routing, etc.)
●
Extra packages can be downloaded from
www.mikrotik.com/download page
52
RouterOS Extra Packages
●
Provide additional functionality
●
Upload package file to the router and reboot
Package Functionality
gps GPS device support
ntp Network Time Protocol server
ups APC UPS management support
user-manager MikroTik User Manager for managing HotSpot users
53
Package Management
●
Disable the wireless package
●
Reboot the router
●
Observe the interface list
●
Enable the wireless package
●
Reboot the router
54
Package Management
●
Observe WinBox System menu (no NTP client/server)
●
Download extra packages file for your router’s CPU architecture
●
Install ntp package and reboot the router
●
Observe WinBox System menu
55
Downgrading Packages
●
From System → Packages menu
●
‘Check For Updates’ and choose different Channel (e.g. longterm)
●
Click ‘Download’
●
Click ‘Downgrade’ in ‘Package List’ window
56
Downgrading Packages
●
Downgrade RouterOS from stable to longterm version
●
Upgrade it back to the stable version
57
RouterBOOT
●
Firmware responsible for starting RouterOS on RouterBOARD
devices
●
Two boot loaders on RouterBOARD - main and backup
●
Main can be updated
●
Backup loader can be loaded if needed
58
RouterBOOT
System → Routerboard
59
Router Identity
●
Option to set a name for each router
●
Identity information available in different places
System → Identity
60
Router Identity
●
Set the identity of your router as follows:
YourNumber(XY)_YourName
●
For example: 13_JohnDoe
●
Observe the WinBox title menu
61
RouterOS Users
●
Default user admin, group full
●
Additional groups - read and write
●
Can create your own group and fine tune access
62
RouterOS Users
System → Users
63
RouterOS Users
●
Add a new user to the RouterOS with full access (note name and
password)
●
Change admin user group to read
●
Login with the new user
●
Login with the admin user and try to change router’s settings (not
possible)
64
RouterOS Users
●
Generate SSH private/public key pair using ‘ssh-keygen’ (OS X and
Linux) or ‘puttygen’ (Windows)
●
Upload the public part of the key to the router
●
Import and attach it to the user
●
Login to the router using the private key
65
RouterOS Services
●
Different ways to connect to the
RouterOS
●
API - Application Programming
Interface
●
FTP - for uploading/downloading
files to/from the RouterOS
IP → Services
66
RouterOS Services
●
SSH - secure command line
interface
●
Telnet - insecure command line
interface
●
WinBox - GUI access
●
WWW - access from the web
browser
IP → Services
67
RouterOS Services
●
Disable services which are not used
●
Restrict access with ‘available from’
field
●
Default ports can be changed
IP → Services
68
RouterOS Services
●
Open RouterOS web interface -
http://192.168.88.1
●
In WinBox disable www service
●
Refresh browser page
69
Configuration Backup
●
Two types of backups
●
Backup (.backup) file - used for restoring configuration
on the same router
●
Export (.rsc) file - used for moving configuration to
another router
70
Configuration Backup
●
Backup file can be created and restored under Files
menu in WinBox
●
Backup file is binary, by default encrypted with user
password. Contains a full router configuration
(passwords, keys, etc.)
71
Configuration Backup
●
Custom name and password can be entered
●
Router identity and current date is used as a backup file
name
72
Configuration Backup
●
Export (.rsc) file is a script with which router configuration can be
backed up and restored
●
Plain-text file (editable)
●
Contains only configuration that is different than the factory
default configuration
73
Configuration Backup
●
Export file is created using ‘export’ command in CLI
●
Whole or partial router configuration can be saved to an export file
●
RouterOS user passwords are not saved when using export
74
Configuration Backup
●
Store files in ‘flash’ folder
●
Contains ready to use RouterOS commands
75
Configuration Backup
●
Export file can be edited by hand
●
Can be used to move configuration to a different RouterBOARD
●
Restore using ‘/import’ command
76
Configuration Backup
●
Download to a computer using WinBox (drag&drop), FTP or WebFig
●
Don’t store the copy of the backup only on the router! It is not a
good backup strategy!
77
Reset Configuration
●
Reset to default configuration
●
Retain RouterOS users after reset
●
Reset to a router without any configuration (‘blank’)
●
Run a script after reset
78
Reset Configuration
● Using physical ‘reset’ button on the router
○ Load backup RouterBOOT loader
79
Netinstall
●
Used for installing and reinstalling RouterOS
●
Direct network connection to the router is required (can be
used over switched LAN)
●
Cable must be connected to Ether1 port (except CCR and
RB1xxx - last port)
●
Runs on Windows
●
For more info see Netinstall wiki page
80
Netinstall
●
Available at www.mikrotik.com/download
81
Configuration Backup
●
Create a .backup file
●
Copy it to your laptop
●
Delete the .backup file from the router
●
Reset router configuration
●
Copy .backup file back to the router
●
Restore router configuration
82
Configuration Backup
●
Create a backup using ‘export’ command
●
Copy it to your laptop
●
Delete the export file from the router
●
Reset router configuration
●
Copy export file back to the router
●
Restore router configuration
83
Netinstall
●
Download Netinstall
●
Boot your router in Netinstall mode
●
Install RouterOS on your router using Netinstall
●
Restore configuration from previously saved backup file
84
RouterOS License
●
All RouterBOARDs are shipped with a
license
●
Different license levels (features)
●
RouterOS updates for life
●
CHR or x86 license can be purchased
from mikrotik.com or distributors System → License
85
RouterOS Licensing
1 Free Demo
86
Cloud Hosted Router
●RouterO S version tailored for running in virtual
environments
●Runs on most popular virtualisation platforms like -
VMware, Microsoft HyperV, VirtualBox, XEN,
KVM, etc.
●Cloud services - Amazon, Azure and others
87
CHR Use Cases
●Firewall for the cloud services
●VPN server in the cloud
●The Dude monitoring server
●Simulate networks for learning or training
●And many more
88
CHR Licensing
P1 1Gbit 45 US$
●
60 day trial available
●
Purchased license can be transferred to another CHR
89
CHR Licensing
90
CHR Licensing
mikrotik.com/client
91
CHR Licensing
mikrotik.com/client/cloudhosting
92
CHR Licensing
mikrotik.com/client/cloudhosting
93
CHR Licensing
mikrotik.com/client/cloudhosting
94
CHR Licensing
●The CHR licenses are tied to the account
●The license is for one CHR instance at a time
●Can transfer to another CHR
●The same L4/L5/L6 prepaid keys can be used for
the CHR L4=P1, L5=P10, L6=PUnlimited
95
Additional Information
●
wiki.mikrotik.com - RouterOS documentation and
examples
●
forum.mikrotik.com - communicate with other RouterOS
users
●
mum.mikrotik.com - MikroTik User Meeting page
●
Distributor and consultant support
96
Module 1
Summary
97
Certified Network Associate
(MTCNA)
Module 2
DHCP
98
DHCP
●
Dynamic Host Configuration Protocol
●
Used for automatic IP address distribution over a local network
●
Use DHCP only in trusted networks
●
Works within a broadcast domain
●
RouterOS supports both DHCP client and server
99
DHCP Client
●
Used for automatic acquiring of IP address, subnet mask, default
gateway, DNS server address and additional settings if provided
●
MikroTik SOHO routers by default have DHCP client configured on
ether1(WAN) interface
10
0
DHCP Client
IP → DHCP Client
10
1
DNS
●
By default DHCP client asks for a
DNS server IP address
●
It can also be entered manually if
other DNS server is needed or
DHCP is not used
IP → DNS
10
2
DNS
●
RouterOS supports static DNS entries
●
By default there’s a static DNS A record named router which
points to 192.168.88.1
●
That means you can access the router by using DNS name
instead of IP
●
http://router
IP → DNS → Static
10
3
DHCP Server
●
Automatically assigns IP addresses to requesting hosts
●
IP address should be configured on the interface which DHCP
Server will use
●
To enable use ‘DHCP Setup’ command
10
4
DHCP Server
●
Disconnect from the router
●
Reconnect using the router’s MAC address
10
5
DHCP Server
●
We’re going to remove existing DHCP Server and setup a new one
●
Will use your number (XY) for the subnet, e.g. 192.168.XY.0/24
●
To enable DHCP Server on the bridge, it must be configured on the
bridge interface (not on the bridge port)
10
6
DHCP Server
Remove
DHCP Server
Remove
DHCP
Network
IP → DHCP Server
10
7
DHCP Server
Remove
IP Pool
IP → Pool
Remove
IP Address
IP →
Address
10
8
DHCP Server
Add IP Address
192.168.XY.1/24
on the bridge
interface
10
9
DHCP Server
1 2
3 4
5 6
IP → DHCP Server → DHCP Setup
11
0
DHCP Server
●
Disconnect from the router
●
Renew the IP address of your laptop
●
Connect to the router’s new IP address 192.168.XY.1
●
Check that the connection to the Internet is available
11
1
DHCP Server
●
DHCP Server Setup wizard
has created a new IP pool
and DHCP Server
11
2
DHCP Static Leases
●
It is possible to always assign the same IP address to the same
device (identified by MAC address)
●
DHCP Server could even be used without dynamic IP pool and
assign only preconfigured addresses
11
3
DHCP Static Leases
Convert dynamic
lease to static
●
Create a static lease for your laptop
●
Change the IP address assigned to your laptop by DHCP
server to 192.168.XY.123
●
Renew the IP address of your laptop
●
Ask your neighbor to connect his/her laptop to your
router (will not get an IP address)
11
5
ARP
●
Address Resolution Protocol
●
ARP joins together client’s IP address (Layer3) with MAC address
(Layer2)
●
ARP operates dynamically
●
Can also be configured manually
11
6
ARP Table
●
Provides information about IP address, MAC address and the
interface to which the device is connected
IP →
ARP
11
7
Static ARP
●
For increased security ARP entries can be added manually
●
Network interface can be configured to reply-only to known ARP
entries
●
Router’s client will not be able to access the Internet using a
different IP address
11
8
Static ARP
IP →
ARP
11
9
Static ARP
Interface will
reply only to
known ARP
entries
Interfaces → bridge-local
12
0
DHCP and ARP
●
DHCP Server can add ARP entries automatically
●
Combined with static leases and reply-only ARP can increase
network security while retaining the ease of use for users
12
1
DHCP and ARP
IP → DHCP Server
12
2
Static ARP
●
Make your laptop’s ARP entry static
●
Set the bridge interface ARP to reply-only to disable
adding dynamic ARP entries
●
You should still have the DHCP server to static-only and a
static lease for the laptop. If not, repeat the previous LAB
●
Enable ‘Add ARP For Leases’ on DHCP server
12
3
Static ARP
●
Remove your laptop’s static entry from the ARP table
●
Check the Internet connection (not working)
●
Renew the IP address of your laptop
●
Check the Internet connection (should work)
●
Connect to the router and observe the ARP table
12
4
Module 2
Summary
12
Certified Network Associate
(MTCNA)
Module 3
Bridging
12
6
Bridge
●
Bridges are OSI layer 2 devices
●
Bridge is a transparent device
●
Traditionally used to join two network segments
●
Bridge splits collision domain in two parts
●
Network switch is multi-port bridge - each port is a collision
domain of one device
12
7
Bridge
●
All hosts can communicate with each other
●
All share the same collision domain
12
8
Bridge
●
All hosts still can communicate with each other
●
Now there are 2 collision domains
12
9
Bridge
●
RouterOS implements software bridge
●
Ethernet, wireless, SFP and tunnel interfaces can be
added to a bridge
●
Default configuration on SOHO routers bridge wireless
with ether2 port
●
Ether2-5 are combined together in a switch. Ether2 is
master, 3-5 slave. Wire speed switching using switch chip
13
0
Bridge
●
It is possible to remove master/slave configuration and use bridge
instead
●
Switch chip will not be used, higher CPU usage
●
More control - can use IP firewall for bridge ports
13
1
Bridge
●
Due to limitations of 802.11 standard, wireless clients (mode:
station) do not support bridging
●
RouterOS implements several modes to overcome this limitation
13
2
Wireless Bridge
●
station bridge - RouterOS to RouterOS
●
station pseudobridge - RouterOS to other
●
station wds (Wireless Distribution System) - RouterOS to RouterOS
13
3
Wireless Bridge
●
To use station bridge, ‘Bridge Mode’ has to be enabled on the AP
13
4
Bridge
●
We are going to create one big network by bridging local Ethernet
with wireless (Internet) interface
●
All the laptops will be in the same network
●
Note: be careful when bridging networks!
●
Create a backup before starting this LAB!
13
5
Bridge
●
Change wireless to station bridge mode
●
Disable DHCP server
●
Add wireless interface to existing bridge-local interface as a port
13
6
Bridge
Set mode to
station bridge
Wireless → wlan1
Disable
DHCP Server
IP → DHCP Server
13
7
Bridge
Bridge → Ports
13
8
Bridge
●
Renew the IP address of your laptop
●
You should acquire IP from the trainer’s router
●
Ask your neighbor his/her laptop IP address and try to ping it
●
Your router now is a transparent bridge
13
9
Bridge Firewall
●
RouterOS bridge interface supports firewall
●
Traffic which flows through the bridge can be processed by the
firewall
●
To enable: Bridge → Settings → Use IP Firewall
14
0
Bridge Firewall
14
1
Bridge
●
Restore your router’s configuration from the backup you created
before bridging LAB
●
Or restore previous configuration by hand
14
2
Module 3
Summary
14
Certified Network Associate
(MTCNA)
Module 4
Routing
14
4
Routing
●
Works in OSI network layer (L3)
●
RouterOS routing rules define where the packets should be sent
IP → Routes
14
5
Routing
●
Dst. Address: networks which can be reached
●
Gateway: IP address of the next router to reach the destination
IP → Routes
14
6
New Static Route
IP → Routes
14
7
Routing
●
Check gateway - every 10 seconds send either ICMP echo request
(ping) or ARP request.
●
If several routes use the same gateway and there is one that has
check-gateway option enabled, all routes will be subjected to the
behaviour of check-gateway
14
8
Routing
●
If there are two or more routes pointing to the same address, the
more precise one will be used
○ Dst: 192.168.90.0/24, gateway: 1.2.3.4
14
9
Default Gateway
●
Default gateway: a router (next hop) where all the traffic for which
there is no specific destination defined will be sent
●
It is distinguished by 0.0.0.0/0 destination network
15
0
Default Gateway
●
Currently the default gateway for your router is
configured automatically using DHCP-Client
●
Disable ‘Add Default Route’ in DHCP-Client settings
●
Check the Internet connection (not working)
15
1
Default Gateway
●
Add default gateway manually (trainer’s router)
●
Check that the connection to the Internet is available
15
2
Dynamic Routes
●
Routes with flags DAC are added automatically
●
DAC route originates from IP address configuration
IP →
Addresses
IP → Routes
15
3
Route Flags
●
A - active
●
C - connected
●
D - dynamic
●
S - static
IP → Routes
15
4
Static Routing
●
Static route defines how to reach a specific destination network
●
Default gateway is also a static route. It directs all traffic to the
gateway
15
5
Static Routing
●
The goal is to ping your neighbor’s laptop
●
Static route will be used to achieve this
●
Ask your neighbor the IP address of his/her wireless interface
●
And the subnet address of his/her internal network
(192.168.XY.0/24)
15
6
Static Routing
●
Add a new route rule
●
Set Dst. Address - your neighbor’s local network address
(eg. 192.168.37.0/24)
●
Set Gateway - the address of your neighbor’s wireless
interface (eg. 192.168.250.37)
●
Now you should be able to ping your neighbor’s laptop
15
7
Static Routing
●
Team up with 2 of your neighbors
●
Create a static route to one of your neighbor’s (A) laptop via the
other neighbor’s router (B)
●
Ask your neighbor B to make a static route to neighbor’s A laptop
●
Ping your neighbor’s A laptop
15
8
Static Routing
Create a route to
laptop A via
Neighbor’s A Neighbor’s
laptop A router
router B
Your Your
laptop router Class
AP
Neighbor’s B Neighbor’s
laptop B router
15
9
Static Routing
●
Easy to configure on a small network
●
Limits the use of router’s resources
●
Does not scale well
●
Manual configuration is required every time a new subnet needs to
be reached
16
0
Module 4
Summary
16
Certified Network Associate
(MTCNA)
Module 5
Wireless
16
2
Wireless
●
MikroTik RouterOS provides a complete support for IEEE
802.11a/n/ac (5GHz) and 802.11b/g/n (2.4GHz) wireless networking
standards
16
3
Wireless Standards
16
4
2.4GHz Channels
●
13x 22MHz channels (most of the world)
●
3 non-overlapping channels (1, 6, 11)
●
3 APs can occupy the same area without interfering
16
5
2.4GHz Channels
●
US: 11 channels, 14th Japan-only
●
Channel width:
○ 802.11b 22MHz, 802.11g 20MHz, 802.11n 20/40MHz
16
6
5GHz Channels
●
RouterOS supports full range of 5GHz frequencies
●
5180-5320MHz (channels 36-64)
●
5500-5720MHz (channels 100-144)
●
5745-5825MHz (channels 149-165)
●
Varies depending on country regulations
16
7
5GHz Channels
802.11a 20MHz
20MHz
802.11n
40MHz
20MHz
40MHz
802.11ac
80MHz
160MHz
16
8
Country Regulations
●
Switch to ‘Advanced Mode’ and select your country to
apply regulations
16
9
Country Regulations
● Dynamic Frequency Selection (DFS) is a feature which is meant to
identify radars when using 5GHz band and choose a different
channel if a radar is found
● Some channels can only be used when DFS is enabled (in EU: 52-
140, US: 50-144)
17
0
Country Regulations
● DFS Mode radar detect will select a channel with the lowest
number of detected networks and use it if no radar is
detected on it for 60s
Wireless
17
1
Radio Name
●
Wireless interface “name”
●
RouterOS-RouterOS only
●
Can be seen in Wireless tables
17
2
Radio Name
●
Wireless interface “name”
●
RouterOS-RouterOS only
●
Can be seen in Wireless tables
Wireless → Registration
17
3
Radio Name
●
Set the radio name of your wireless interface as follows:
YourNumber(XY)_YourName
●
For example: 13_JohnDoe
17
4
Wireless Chains
●
802.11n introduced the concept of MIMO (Multiple In and Multiple
Out)
●
Send and receive data using multiple radios in parallel
●
802.11n with one chain (SISO) can only achieve 72.2Mbps (on
legacy cards 65Mbps)
17
5
Tx Power
●
Use to adjust transmit power of the wireless card
●
Change to all rates fixed and adjust the power
Wireless → Tx
Power
17
6
Tx Power
●
Note on implementation
Wireless Enabled of Tx Power on RouterOS
Power per Chain Total Power
card Chains
Equal to the selected
1
Tx Power
Equal to the selected
802.11n 2 +3dBm
Tx Power
3 +5dBm
3 -5dBm
17
7
Rx Sensitivity
●
Receiver sensitivity is the lowest power level at which the interface
can detect a signal
●
When comparing RouterBOARDS this value should be taken into
account depending on planned usage
●
Smaller Rx sensitivity threshold means better signal detection
17
8
Wireless Network
Trainer
AP
Wireless stations
17
9
Wireless Station
●
Wireless station is client (laptop, phone, router)
●
On RouterOS wireless mode station
18
0
Wireless Station
●
Set interface
mode=station
●
Select band
●
Set SSID (wireless network
ID)
●
Frequency is not
important for client, use
scan-list
18
1
Security
●
Only WPA (WiFi Protected Access) or WPA2 should be used
●
WPA-PSK or WPA2-PSK with AES-CCM encryption
●
Trainer AP already is using WPA-PSK/WPA2-PSK
18
2
Security
● Both WPA and WPA2 keys can
be specified to allow
connection from devices
which do not support WPA2
18
3
Connect List
●
Rules used by station to select (or not to select) an AP
18
4
Connect List
●
Currently your router is connected to the class AP
●
Create a rule to disallow connection to the class AP
18
5
Access Point
• Set interface mode=ap bridge
• Select band
• Set frequency
18
6
WPS
●
WiFi Protected Setup (WPS) is a feature for convenient access to
the WiFi without the need of entering the passphrase
●
RouterOS supports both WPS accept (for AP) and WPS client (for
station) modes
18
7
WPS Accept
●
To easily allow guest access to your access point WPS
accept button can be used
●
When pushed, it will grant an access to connect to the
AP for 2min or until a device (station) connects
●
The WPS accept button has to be pushed each time
when a new device needs to be connected
18
8
WPS Accept
●
For each device it has to be done only once
●
All RouterOS devices with WiFi interface
have virtual WPS push button
●
Some have physical, check for wps button
on the router
18
9
WPS Accept
●
Virtual WPS button is available in QuickSet and in
wireless interface menu
●
It can be disabled if needed
●
WPS client is supported by most operating systems
including RouterOS
●
RouterOS does not support the insecure PIN mode
19
0
WPS Client
●
RouterOS WPS client is available in Wireless menu
●
To connect to a wireless network enable WPS accept on the AP
●
Start WPS client on the station
19
1
WPS Client
●The client will automatically create a security profile
19
2
WPS Client
Wireless → WPS
Client
Set Mode, SSID
and Security
Profile
19
3
Wireless Repeater
●
RouterOS supports repeater mode
●
When enabled the router becomes station and ap bridge at the
same time
●
Used for increasing the range of an existing AP without the need of
Ethernet cables
19
4
Access Point
●
Create a new security profile for your access point
●
Set wireless interface mode to ap bridge, set SSID to your class
number and name, select the security profile
●
Disable DHCP client on the wireless interface (will lose Internet
connection)
19
5
Access Point
●
Add wireless interface to the bridge
●
Disconnect the cable from the laptop
●
Connect to your wireless AP with your laptop
●
Connect to the router using WinBox and observe
wireless registration table
●
When done, restore previous configuration
19
6
WPS
● If you have a device that supports WPS client mode connect it to
your AP using WPS accept button on your router (either physical or
virtual)
19
7
Snooper
●
Get full overview of the wireless networks on selected band
●
Wireless interface is disconnected during scanning!
●
Use to decide which channel to choose
19
8
Snooper
Wireless → Snooper
19
9
Registration Table
●
View all connected wireless interfaces
●
Or connected access point if the router is a station
Wireless → Registration
20
0
Access List
●
Used by access point to control allowed connections from stations
●
Identify device MAC address
●
Configure whether the station can authenticate to the AP
●
Limit time of the day when it can connect
20
1
Access List
Wireless → Access
List
20
2
Access List
●
If there are no matching rules in the access list, default values from
the wireless interface will be used
20
3
Registration Table
●
Can be used to create
connect or access list
entries from currently
connected devices
Wireless → Registration
20
4
Default Authenticate
20
5
Default Authenticate
20
6
Default Forward
● Use to allow or forbid
communication between
stations
● Enabled by default
20
7
Module 5
Summary
20
Certified Network Associate
(MTCNA)
Module 6
Firewall
20
9
Firewall
●
A network security system that protects internal network from
outside (e.g. the Internet)
●
Based on rules which are analysed sequentially until first match is
found
●
RouterOS firewall rules are managed in Filter and NAT sections
21
0
Firewall Rules
●
Work on If-Then principle
●
Ordered in chains
●
There are predefined chains
●
Users can create new chains
21
1
Firewall Filter
●
There are three default chains
○ input (to the router)
output
input
forward
21
2
Filter Actions
●
Each rule has an action - what to do when a packet is
matched
●
accept
●
drop silently or reject - drop and send ICMP reject message
●
jump/return to/from a user defined chain
●
And other - see firewall wiki page
21
3
Filter Actions
21
4
Filter Chains
IP →
● Firewall
TIP: to improve readability of firewall rules, order them
sequentially by chains and add comments
21
5
Chain: input
●
Protects the router itself
●
Either from the Internet or the internal network
input
21
6
Chain: input
●
Add an accept input filter rule on the bridge interface for your
laptop IP address (Src. Address = 192.168.XY.200)
●
Add a drop input filter rule on the bridge interface for everyone
else
21
7
Chain: input
21
8
Chain: input
●
Change the IP address of your laptop to static, assign
192.168.XY.199, DNS and gateway: 192.168.XY.1
●
Disconnect from the router
●
Try to connect to the router (not possible)
●
Try to connect to the internet (not possible)
21
9
Chain: input
●
Although traffic to the Internet is controlled with firewall forward
chain, web pages cannot be opened
●
WHY? (answer on the next slide)
22
0
Chain: input
● Your laptop is using the router for domain name resolving
(DNS)
22
1
Chain: input
●
Change back your laptop IP to dynamic (DHCP)
●
Connect to the router
●
Disable (or remove) the rules you just added
22
2
Chain: forward
●
Contains rules that control packets going through the router
●
Forward controls traffic between the clients and the Internet and
between the clients themselves
forward
22
3
Chain: forward
●
By default internal traffic between the clients connected to the
router is allowed
●
Traffic between the clients and the Internet is not restricted
22
4
Chain: forward
●
Add a drop forward filter rule for http port (80/tcp)
●
When specifying ports, IP protocol must be selected
●
Try to open router WebFig http://192.168.XY.1 (works)
●
Router web page works because it is traffic going to the router
(input), not through (forward)
22
6
Frequently Used Ports
Port Service
80/tcp HTTP
443/tcp HTTPS
22/tcp SSH
23/tcp Telnet
20,21/tcp FTP
8291/tcp WinBox
5678/udp MikroTik Neighbor Discovery
20561/udp MAC WinBox
22
7
Address List
●
Address list allows to create an action for multiple IPs at
once
●
It is possible to automatically add an IP address to the
address list
●
IP can be added to the list permanently or for a
predefined amount of time
●
Address list can contain one IP address, IP range or
whole subnet
22
8
Address List
22
9
Address List
●
Instead of specifying address in General tab, switch to Advanced
and choose Address List (Src. or Dst. depending on the rule)
23
0
Address List
●
Firewall action can be used to automatically add an address to the
address list
●
Permanently or for a while
23
1
Address List
● Create an address list with allowed IPs, be sure to
include your laptop IP
23
2
Firewall Log
●
Each firewall rule can be logged when matched
●
Can add specific prefix to ease finding the records later
23
3
Firewall Log
23
4
Firewall Log
●
Enable logging for both firewall rules that were created during
Address List LAB
●
Connect to WinBox using allowed IP address
●
Disconnect and change the IP of your laptop to one which is
not in the allowed list
●
Try to connect to WinBox
●
Change back the IP and observe log entries
23
5
NAT
●
Network Address Translation (NAT) is a method of modifying
source or destination IP address of a packet
●
There are two NAT types - ‘source NAT’ and ‘destination NAT’
23
6
NAT
●
NAT is usually used to provide access to an external network from
a one which uses private IPs (src-nat)
●
Or to allow access from an external network to a resource (e.g.
web server) on an internal network (dst-nat)
23
7
NAT
Src New
address Src address
Private host
Public server
23
8
NAT
New
Dst Address Dst
Address
Public host
Server on a
private network
23
9
NAT
●
Firewall srcnat and dstnat chains are used to implement NAT
functionality
●
Same as Filter rules, work on If-Then principle
●
Analysed sequentially until first match is found
24
0
Dst NAT
New Dst Address Dst Address
192.168.1.1:80 159.148.147.196:80
Public host
Web server
192.168.1.1
24
1
Dst NAT
●
This action redirects packets to the router itself
●
Can be used to create transparent proxy services (e.g. DNS, HTTP)
24
3
Redirect
Dst Address
Configured DNS server:53
24
4
Redirect
●
Create dstnat redirect rule to send all requests with a destination
port HTTP (tcp/80) to the router port 80
●
Try to open www.mikrotik.com or any other website that uses
HTTP protocol
●
When done disable or remove the rule
24
5
Src NAT
192.168.199.200
Public server
24
6
Src NAT
●
srcnat action src-nat is meant for rewriting source IP
address and/or port
●
Example: two companies (A and B) have merged. Internally
both use the same address space (172.16.0.0/16). They will
set up a segment using a different address space as a
buffer, both networks will require src-nat and dst-nat rules.
24
7
NAT Helpers
●
Some protocols require so-called NAT helpers to work correctly in
a NAT’d network
24
8
Connections
●
New - packet is opening a new connection
●
Established - packet belongs to already known
connection
●
Related - packet is opening a new connection but it has
a relation to already known connection
●
Invalid - packet does not belong to any of known
connections
24
9
Connections
Invalid Established
New Related
250
Connection Tracking
●
Manages information about all active connections
●
Has to be enabled for NAT and Filter to work
●
Note: connection state ≠ TCP state
25
1
Connection Tracking
IP → Firewall → Connections
25
2
FastTrack
●
A method to accelerate packet flow through the router
●
An established or related connection can be marked for
fasttrack connection
●
Bypasses firewall, connection tracking, simple queue and
other features
●
Currently supports only TCP and UDP protocols
25
3
FastTrack
Without With
360Mbps 890Mbps
25
Certified Network Associate
(MTCNA)
Module 7
QoS
25
6
Quality of Service
●
QoS is the overall performance of a network, particularly the
performance seen by the users of the network
●
RouterOS implements several QoS methods such as traffic speed
limiting (shaping), traffic prioritisation and other
25
7
Speed Limiting
●
Direct control over inbound traffic is not possible
●
But it is possible to do it indirectly by dropping incoming packets
●
TCP will adapt to the effective connection speed
25
8
Simple Queue
●
Can be used to easy limit the data rate of:
○
○
Client’s download (↓) speed
○
Client’s upload (↑)speed
25
9
Simple Queue
Specify client
Specify Max Limit
for the client
26
0
Torch
● Real-time traffic monitoring tool
Observe
the traffic
Tools →
Torch
26
1
Simple Queue
●
Create speed limit for your laptop (192.168.XY.200)
●
Set upload speed 128k, download speed 256k
●
Open www.mikrotik.com/download and download current
RouterOS version
●
Observe the download speed
26
2
Simple Queue
● Instead of setting limits to the client, traffic to the server can also
be throttled
Q ueues
26
3
Simple Queue
●
Using ping tool find out the address of www.mikrotik.com
●
Modify existing simple queue to throttle connection to the
mikrotik.com server
●
Download MTCNA outline
●
Observe the download speed
26
4
Guaranteed Bandwidth
●
Used to make sure that the client will always get minimum
bandwidth
●
Remaining traffic will be split between clients on first come first
served basis
●
Controlled using Limit-at parameter
26
5
Guaranteed Bandwidth
Set limit at
26
6
Guaranteed Bandwidth
●
Example:
○ Total bandwith: 10Mbits
26
7
Guaranteed Bandwidth
Queues
Guranteed Actual
bandwidth bandwidth
26
8
Burst
●
Used to allow higher data rates for a short period of time
●
Useful for HTTP traffic - web pages load faster
●
For file downloads Max Limit restrictions still apply
26
9
Burst
27
0
Burst
●
Burst limit - max upload/download data rate that can be reached
during the burst
●
Burst time - time (sec), over which the average data rate is
calculated (this is NOT the time of actual burst).
●
Burst threshold - when average data rate exceeds or drops below
the threshold the burst is switched off or on
27
1
Burst
●
Modify the queue that was created in previous LAB
●
Set burst limit to 4M for upload and download
●
Set burst threshold 2M for upload and download
●
Set burst time 16s for upload and download
27
2
Burst
●
Open www.mikrotik.com, observe how fast the page loads
●
Download the newest RouterOS version from MikroTik download
page
●
Observe the download speed with torch tool
27
3
Per Connection Queuing
●
Queue type for optimising large QoS deployments by
limiting per ‘sub-stream’
●
Substitute multiple queues with one
●
Several classifiers can be used:
○ source/destination IP address
○ source/destination port
27
4
Per Connection Queuing
●
Rate - max available data rate of each sub-stream
●
Limit - queue size of single sub-stream (KiB)
●
Total Limit - max amount of queued data in all sub-streams (KiB)
27
5
PCQ Example
● Goal: limit all clients to 1Mbps download and 1Mbps upload
bandwidth
27
6
PCQ Example
WAN
interface
LAN
interface
Queues → Interface Queues
27
8
PCQ Example
●
All clients connected to the LAN interface will have 1Mbps upload
and download limit
Tools →
Torch
27
9
PCQ Example
●
The trainer will create two pcq queues and limit all clients (student
routers) to 512Kbps upload and download bandwidth
●
Try download newest RouterOS version from www.mikrotik.com
and observe the download speed with torch tool
28
0
Module 7
Summary
28
Certified Network Associate
(MTCNA)
Module 8
Tunnels
28
2
Point-to-Point Protocol
●
Point-to-Point Protocol (PPP) is used to establish a tunnel (direct
connection) between two nodes
●
PPP can provide connection authentication, encryption and
compression
●
RouterOS supports various PPP tunnels such as PPPoE, SSTP, PPTP
and others
28
3
PPPoE
●
Point-to-Point Protocol over Ethernet is a layer 2 protocol which is
used to control access to the network
●
Provides authentication, encryption and compression
●
PPPoE can be used to hand out IP addresses to the clients
28
4
PPPoE
●
Most desktop operating systems have PPPoE client installed by
default
●
RouterOS supports both PPPoE client and PPPoE server (access
concentrator)
28
5
PPPoE Client
Set
interface,
service,
username,
password
+)
PPP → New PPPoE Client(
28
6
PPPoE Client
●
If there are more than one PPPoE servers in a broadcast domain
service name should also be specified
●
Otherwise the client will try to connect to the one which responds
first
28
7
PPPoE Client
●
The trainer will create a PPPoE server on his/her router
●
Disable the DHCP client on your router
●
Set up PPPoE client on your router’s outgoing interface
●
Set username mtcnaclass password mtcnaclass
28
8
PPPoE Client
●
Check PPPoE client status
●
Check that the connection to the Internet is available
●
When done, disable PPPoE client
●
Enable DHCP client to restore previous configuration
28
9
IP Pool
●
Defines the range of IP addresses for handing out by RouterOS
services
●
Used by DHCP, PPP and HotSpot clients
●
Addresses are taken from the pool automatically
29
0
IP Pool
29
1
PPP Profile
●
Profile defines rules used by PPP server for it’s clients
●
Method to set the same settings for multiple clients
29
2
PPP Profile
It is suggested to
use encryption
+)
PPP → Profiles → New PPP Profile(
29
3
PPP Secret
●
Local PPP user database
●
Username, password and other user specific settings can be
configured
●
Rest of the settings are applied from the selected PPP profile
●
PPP secret settings override corresponding PPP profile settings
29
4
PPP Secret
+)
PPP → Secrets → New PPP Secret(
295
PPPoE Server
●
PPPoE server runs on an interface
●
Can not be configured on an interface which is part of a
bridge
●
Either remove from the bridge or set up PPPoE server on
the bridge
●
For security reasons IP address should not be used on
the interface on which PPPoE server is configured
29
6
PPPoE Server
29
7
PPP Status
●
Information about
currently active PPP users
PPP → Active
Connections
29
8
Point-to-Point Addresses
●
When a connection is made between the PPP client and server, /32
addresses are assigned
●
For the client network address (or gateway) is the other end of the
tunnel (router)
29
9
Point-to-Point Addresses
●
Subnet mask is not relevant when using PPP addressing
●
PPP addressing saves 2 IP addresses
●
If PPP addressing is not supported by the other device, /30 network
addressing should be used
30
0
PPPoE Server
●
Set up PPPoE server on an unused LAN interface (e.g. eth5) of the
router
●
Remove eth5 from the switch (set master port: none)
●
Check that the interface is not a port of the bridge
●
Check that the interface has no IP address
30
1
PPPoE Server
●
Create an IP pool, PPP profile and secret for the PPPoE server
●
Create the PPPoE server
●
Configure PPPoE client on your laptop
●
Connect your laptop to the router port on which the PPPoE server
is configured
30
2
PPPoE Server
●
Connect to PPPoE server
●
Check that the connection to the Internet is available
●
Connect to the router using MAC WinBox and observe
PPP status
●
Disconnect from the PPPoE server and connect the
laptop back to previously used port
30
3
PPTP
●
Point-to-point tunnelling protocol (PPTP) provides encrypted
tunnels over IP
●
Can be used to create secure connections between local networks
over the Internet
●
RouterOS supports both PPTP client and PPTP server
30
4
PPTP
●
Uses port tcp/1723 and IP protocol number 47 - GRE (Generic
Routing Encapsulation)
●
NAT helpers are used to support PPTP in a NAT’d network
30
5
PPP Tunnel
Tunne
l
30
6
PPTP Client
Set name,
PPTP server
IP address,
username,
password
+)
PPP → New PPTP Client(
30
7
PPTP Client
●
Use Add Default Route to send all traffic through the PPTP tunnel
●
Use static routes to send specific traffic through the PPTP tunnel
●
Note! PPTP is not considered secure anymore - use with caution!
●
Instead use SSTP, OpenVPN or other
30
8
PPTP Server
●
RouterOS provides simple PPTP server setup for administrative
purposes
●
Use QuickSet to enable VPN Access
Enable VPN
access and
set VPN
password
30
9
SSTP
●
Secure Socket Tunnelling Protocol (SSTP) provides
encrypted tunnels over IP
●
Uses port tcp/443 (the same as HTTPS)
●
RouterOS supports both SSTP client and SSTP server
●
SSTP client available on Windows Vista SP1 and later
versions
31
0
SSTP
●
Open Source client and server implementation available
on Linux
●
As it is identical to HTTPS traffic, usually SSTP can pass
through firewalls without specific configuration
31
1
SSTP Client
Set name,
SSTP server
IP address,
username,
password
31
2
SSTP Client
●
Use Add Default Route to send all traffic through the SSTP tunnel
●
Use static routes to send specific traffic through the SSTP tunnel
31
3
SSTP Client
●
No SSL certificates needed to connect between two RouterOS
devices
●
To connect from Windows, a valid certificate is necessary
●
Can be issued by internal certificate authority (CA)
31
4
PPTP/SSTP
●
Pair up with your neighbor
●
One of you will create PPTP server and SSTP client, the
other - SSTP server and PPTP client
●
Reuse previously created IP pool, PPP profile and secret
for the servers
●
Create client connection to your neighbor’s router
31
5
PPTP/SSTP
●
Check firewall rules. Remember PPTP server uses port tcp/1723
and GRE protocol, SSTP port tcp/443
●
Ping your neighbor’s laptop from your laptop (not pinging)
●
WHY? (answer on the next slide)
31
6
PPTP/SSTP
●
There are no routes to your neighbors internal network
●
Both create static routes to the other’s network, set PPP client
interface as a gateway
●
Ping your neighbor’s laptop from your laptop (should ping)
31
7
PPP
● In more detail PPPoE, PPTP, SSTP and other tunnel protocol
server and client implementations are covered in MTCRE and
MTCINE MikroTik certified courses
31
8
Module 8
Summary
31
Certified Network Associate
(MTCNA)
Module 9
Misc
32
0
RouterOS Tools
●
RouterOS provides various utilities
that help to administrate and
monitor the router more efficiently
32
1
E-mail
● Allows to send e-mails from the
router
Tools →
Email
/export file=export
/tool e-mail send [email protected]\
subject="$[/system identity get name] export"\
body="$[/system clock get date]\
configuration file" file=export.rsc
A script to make an export file and send it via e-mail
322
E-mail
●
Configure your SMTP server settings on the router
●
Export the configuration of your router
●
Send it to your e-mail from the RouterOS
32
3
Netwatch
●
Monitors state of hosts on the
network
●
Sends ICMP echo request (ping)
●
Can execute a script when a
host becomes unreachable or
reachable
Tools →
Netwatch
32
4
Ping
● Used to test the reachability of a
host on an IP network
Tools →
Ping
32
5
Ping
●
Ping your laptop’s IP address from the router
●
Click ‘New Window’ and ping www.mikrotik.com from the router
●
Observe the round trip time difference
32
6
Traceroute
● Network diagnostic tool
for displaying route (path)
of packets across an IP
network
Tools →
Traceroute
32
7
Traceroute
●
Choose a web site in your country and do a traceroute to it
●
Click ‘New Window’ and do a traceroute to www.mikrotik.com
●
Observe the difference between the routes
32
8
Profile
● Shows CPU usage for each
RouterOS running process in real
time
32
9
Interface Traffic Monitor
●
Real time traffic status
●
Available for each interface in
traffic tab
●
Can also be accessed from
both WebFig and command
line interface
Interfaces → wlan1 →
33 Traffic
0
Torch
●
Real-time monitoring tool
●
Can be used to monitor the traffic flow through the interface
●
Can monitor traffic classified by IP protocol name,
source/destination address (IPv4/IPv6), port number
33
1
Torch
Tools →
● Torch web
Traffic flow from the laptop to the mikrotik.com
server HTTPS port
33
2
Graphs
●
RouterOS can generate graphs showing how much traffic has
passed through an interface or a queue
●
Can show CPU, memory and disk usage
●
For each metric there are 4 graphs - daily, weekly, monthly and
yearly
33
3
Graphs
Set specific
interface to
monitor or leave
all, set IP
address/subnet
which will be able
to access the
graphs
Tools →
Graphing
33
4
Graphs
●
Available on the router: http://router_ip/graphs
33
5
Graphs
33
6
Graphs
●
Enable interface, queue and resource graphs on your router
●
Observe the graphs
●
Download a large file from the Internet
●
Observe the graphs
33
7
SNMP
●
Simple Network Management Protocol (SNMP)
●
Used for monitoring and managing devices
●
RouterOS supports SNMP v1, v2 and v3
●
SNMP write support is available only for some settings
33
8
SNMP
Tools →
SNMP
33
9
The Dude
●
Application by MikroTik which can dramatically improve the way
you manage your network environment
●
Automatic discovery and layout map of devices
●
Monitoring of services and alerting
●
Free of charge
34
0
The Dude
●
Supports SNMP, ICMP, DNS and TCP monitoring
●
Server part runs on RouterOS (CCR, hEX, RB1100AHx4
Dude Edition, CHR)
●
Client on Windows (works on Linux and OS X using Wine)
●
For more info see The Dude wiki page
34
1
The Dude
34
2
The Dude
●
Download the Dude client for Windows from
mikrotik.com/download page
●
Install and connect to MikroTik Dude demo server: dude.mt.lv
●
Observe the Dude
34
3
The Dude
34
4
Contacting Support
●
In order for MikroTik support to be able to help better, few steps
should be taken beforehand
●
Create support output file (supout.rif)
34
5
Contacting Support
●
autosupout.rif can be created automatically in case of
hardware malfunction
●
Managed by watchdog process
●
Before sending to MikroTik, support output file contents
can be viewed in your mikrotik.com account
●
For more info see Support Output File and Watchdog
documentation pages
34
6
System Logs
●
By default RouterOS already logs
information about the router
●
Stored in memory
●
Can be stored on disk
●
Or sent to a remote syslog server
System → Logging
34
7
System Logs
●
To enable detailed logs
(debug), create a new rule
●
Add debug topic
34
8
Contacting Support
●
Before contacting [email protected] check these
resources
●
wiki.mikrotik.com - RouterOS documentation and
examples
●
forum.mikrotik.com - communicate with other RouterOS
users
●
mum.mikrotik.com - MikroTik User Meeting page -
presentation videos
34
9
Contacting Support
●
It is suggested to add meaningful comments to your rules, items
●
Describe as detailed as possible so that MikroTik support team can
help you better
●
Include your network diagram
●
For more info see support page
35
0
Module 9
Summary
35
MTCNA
Summary
35
MikroTik Certified Courses
mikrotik.com/training/about
35
3
Certification Test
●
If needed reset router configuration and restore from a backup
●
Make sure that you have an access to the mikrotik.com training
portal
●
Login with your account
●
Check name in account details
●
Choose my training sessions
●
Good luck!
35
4