Mikrotik Configuration
Mikrotik Configuration
IP Address Configuration:
/ip address
add address=192.168.1.1/24 network=192.168.0.0
broadcast=192.168.1.255 interface=LOCAL
add address=103.7.248.206/29 network=103.7.248.200
broadcast=103.7.248.207 interface=WAN
DNS Configuration:
/ip dns set allow-remote-requests=yes cache-
max-ttl=1w cache-size=5000KiB max-udp-packet-
size=512 servers=4.4.4.4,8,8.8.8.8
NAT Configuration:
/ip firewall nat
add chain=srcnat action=masquerade src-
address=192.168.1.0/24 out-interface=WAN
IP Route Configuration:
/ip route
add dst-address=0.0.0.0/0 gateway=103.7.248.201
This article showing up how to auto detects and blocks SMTP viruses or spammers
and block temporary block.
But if we using any routing protocol such as OSPF,RIP etc then we don't drop 224.0.0.0/3 .
See for video configuration: http://www.youtube.com/watch?v=Won9MFyxnC8
This article showing up how to forwarding http traffic into the internal web server.
Let our WEB server IP address 192.168.10.100 and using port 80.
/ip firewall nat
add chain=dstnat disabled=no dst-port=80 protocol=tcp
action=dst-nat to-addresses=192.168.10.100 to-ports=80
As a result all internal http traffic forwarding internal web servers.
We can customize that firewall rule in different type of criteria.
Mikrotik Router Policy Routing 2 WAN Fail-over Configuration
IP address Configuration:
/ip address
add address=103.7.248.206/29 network=103.7.248.200 broadcast=103.7.248.207 interface=WAN1
add address=103.31.178.62/30 network=103.31.178.60 broadcast=103.31.178.63 interface=WAN2
DNS Configuration:
/ip dns set allow-remote-requests=yes cache-max-ttl=1w cache-size=5000KiB max-udp-packet-size=512
servers=4.4.4.4,8,8.8.8.8
NAT Configuration:
/ip firewall nat
add chain=srcnat action=masquerade src-address=192.168.10.0/24 out-interface=WAN1
add chain=srcnat action=masquerade src-address=172.16.10.0/24 out-interface=WAN2
NAT Configuration:
/ip firewall nat
add chain=srcnat action=masquerade src-address=192.168.10.0/24 out-interface=WAN1
add chain=srcnat action=masquerade src-address=172.16.10.0/24 out-interface=WAN2
Mangle Configuration for 192.168.10.0/24 forward interface WAN1 and 172.16.10.0/24 forward WAN2
Route Configuration
/ip route
add dst-address=0.0.0.0/0 routing-mark=WAN1 chack-gateway=ping distance=1 gateway=103.7.248.201
add dst-address=0.0.0.0/0 routing-mark=WAN2 chack-gateway=ping distance=1 gateway=103.31.178.62
Fail-Over Configuration
add dst-address=0.0.0.0/0 routing-mark=WAN1 chack-gateway=ping distance=2 gateway=103.31.178.62
add dst-address=0.0.0.0/0 routing-mark=WAN2 chack-gateway=ping distance=2 gateway=103.7.248.201
Simple Queue Configuration For Client 192.168.10.2:
/queue simple
Add name="Test1" target-addresses=192.168.10.2/32 interface=VLAN-100 parent=none
packet-marks="" direction=both priority=8
queue=default-small/default-small limit-at=0/0 max-limit=1M/1M
burst-limit=0/0 burst-threshold=0/0 burst-time=0s/0s
total-queue=default-small
AccessSwitch Configuration:
AccessSwitch>enable
AccessSwitch#configuration terminal
AccessSwitch(config)#interface fastethernet 0/0
AccessSwitch(config-if)#switchport mode trunk
AccessSwitch(config-if)#switchport trunk allowed vlan all
AccessSwitch(config-if)#switchport nonegotiate
AccessSwitch(config)#vlan 100
AccessSwitch(config)#vlan 200
AccessSwitch(config)#interface fastethernet 0/1
AccessSwitch(config-if)#switchport mode access
AccessSwitch(config-if)#switchport access vlan 100
AccessSwitch(config)#interface fastethernet 0/2
AccessSwitch(config-if)#switchport mode access
AccessSwitch(config-if)#switchport access vlan 200