Network Services

Hotspot Mikrotik 777

Technology has been used Bootstrap Compatible Mobile.

Design Hotspot-12 beautiful Server Mikrotik

Design Hot Spot Mikrotik Free

Hotspot login server free

Hotspot login server free.

Merge 2 lines in server Pfsense?

Merge 2 lines in server Pfsense server free.

setup squid cahce in Ubuntu

How to setup squid cahce in Ubuntu ?

Monday, May 21, 2012

Load Balance Mikrotik

Load Balance Mikrotik BY Winbox 


Preparation


A. Configure existing modems with IP management as in the topology
• Modem green: 192.168.10.2 / 24
• Modem blue: 192.168.20.2 / 24
• Red Modem: 192.168.30.2 / 24


2. Configure PC workstation on the network with the IP as follows:
• IP: 192.168.1.x (x, from 2-254, because the one for the gateway)
• Netmask: 255.255.255.0
• Gateway: 192.168.1.1
Mikrotik Set Interface IP Address (IP> Address)

3. IP configuration by IP address mikrotik as follows:
Ether1: 192.168.1.1 / 24
Ether2: 192.168.10.1/24 (interface to the modem green)
Ether3: 192.168.20.1/24 (interface to the modem blue)
Ether4: 192.168.30.1/24 (red interface to the modem)


Note:

After configuring the IP Address on mikrotik, recheck the connectivity between the modem with mikrotik.
ping 192.168.10.2
ping 192.168.20.2
ping 192.168.30.2
Mangling (IP> Firewall> Mangle)
Mangle a process of separation. On the mangle, in fact no change nothing on the package or we will send the data, but in this process only in the package checkbox.
Mark Connection
First we will do the connection mark.
A. General
• Add chain: prerouting
• In Interface: Eth 1 (local network interface)
• Connection State: new

2. Extra - nth
• Nth
a. Every: 3
b. Packet: 1


Note:

Nth part is determining whether the package will go into group 1, group 2 or group 3. For the third line, it will be made ​​to the Nth rule 3 31, 32 and 33.

3. Action
• Action: mark the connection
• New Connection mark: conn_1
• Passtrough: yes




Note:


In this section we will name our connection. Conn_1 is the first connection, Conn_2, for the second connection, and Conn_3 for connection to 3.
Note:
Perform this connection marking 3 times, masing2 with NTH 31, 32 and 33, with the name Conn_1, Conn_2 and Conn_3

Route Mark

4. General
• Add chain: prerouting
• In Interface: Eth 1 (local network interface)
• Connection mark: conn_1
5. Action
• Action: routing mark
• New Connection mark: route_1
• Passtrough: no




Note:


In this section we will give our name on the routing. route_1 is the first route, route_2, for the second route, and route_3 for routing to 3.


Note:


Perform routing marking this 3 times, masing2 to Conn_1, Conn_2 and Conn_3, with the name route_1, route_2 and route_3
NAT (IP> Firewall> NAT)
NAT, Network Address Translation, is a process of addressing the changes. There are several types of NAT, which will be used in this process is the src-nat (source nat).
Src-nat is a change in the source of a packet.
A. General

• Chain: src nat
• In Interface: Eth 1 (local network interface)
• Connection mark: conn_1







2. Action
• Action : src nat
• To address : 192.168.10.1




Note:


Src-nat to do this 3 times with the rule as follows:
Conn_1 ==> 192.168.10.1
Conn_2 ==> 192.168.20.1
Conn_3 ==> 192.168.30.1
Policy Routing (IP> Route)
Routing policy is the routing arrangement. In this section we set up a gateway or an exit point for each group
A. General

• gateway: 192.168.10.2
• Routing mark: route_1




Note:


Src-nat to do this 4 times with the rule as follows:
route_1 ==> 192.168.10.2
route_2 ==> 192.168.20.2
route_3 ==> 192.168.30.2
default ==> 192.168.10.2


See you in the next lesson

 with you
Mohamed Samir






Saturday, May 19, 2012

QoS for VOIP in Mikrotik





QoS for VOIP in Mikrotik

In the bottom rolls help to give VOIP quality of service


Mikrotik 2.9:

/ip firewall mangle 
 add chain=prerouting tos=104 action=mark-packet new-packet-mark=voip-sip passthrough=yes
 add chain=prerouting tos=184 action=mark-packet new-packet-mark=voip-rtp passthrough=yes



Mikrotik 3:

 /ip firewall mangle 
 add chain=prerouting dscp=26 action=mark-packet new-packet-mark=voip-sip passthrough=yes
 add chain=prerouting dscp=46 action=mark-packet new-packet-mark=voip-rtp passthrough=yes




Mikrotik 3,2.9

 /queue simple
  add name="VOIP-SIP" interface=all packet-marks=voip-sip priority=1
  add name="VOIP-RTP" interface=all packet-marks=voip-rtp priority=1



Example
Photos of work (( Mikrotik 3 ))




ip firewall mangle









queue simple






See you in the next lesson

 with you
Mohamed Samir

Friday, May 18, 2012

ISA 2006 Array

Quoting Microsoft 

ISA 2006 Array, Step by step configuration guide

ISA 2006 Array

Step by step configuration guide



Index
Preface. 


Step 1, Install Configuration Storage Server.


Step 2, Create an array.


Step 3, Install your ISA servers .


Step 4, Configure network objects .


Step 5, Finishing up and some notes .




Preface
This guide will guide you step by step in order to deploy an ISA 2006 array in AD
environment. It does not cover server publishing in any way. It just covers CSS, NLB
and VIP configuration to get the array up and running.
This guide will be based on a setup of five computers in a lab environment configured
as the exhibit below:

All of the computers are running Windows 2003 w. SP1
The environment consists of two network segments like:



Network A


IP: 10.42.43.0
Mask: 255.255.255.0
Router: 10.42.43.254





Network B


IP: 192.168.15.0
Mask: 255.255.255.0
Router: 192.168.15.254



Step 1, Install Configuration Storage Server


First we need to ensure that we have the CSS (Configuration Storage Server)
installed. This server will hold the configuration for the enterprise and this is where
the ISA servers will get their firewall configuration from.
The Configuration Storage server uses Active Directory Application Mode (ADAM) for
storage. When you install the CSS, you also automatically install ADAM on the
server.
The CSS may be one of the ISA servers, but my recommendation is to place this on
a separate server on the inside, in our case Network B. You may also install an
alternative CSS later on to be used as backup if the first CSS fails.
The communication between CSS and the ISA servers are done through MS Firewall
Storage protocol, which is based on LDAP, outbound TCP protocol on port 2171.

Choose to install Configuration Storage Server on your separate windows 2003
server or one of your ISA servers. Click Next





Next would be to configure a new ISA server enterprise for our new array to exist in.
Click Next



We´ll deploy this in an already configured AD environment, but we could also have
chosen to deploy within workgroups or domains without trusts.
In the later case we would use certificates between the ISA servers and the CSS.
This, however, will require a CA server.


Click Next to finish up here



Step 2, Create an array
Let the installation progress now and when it´s ready open up the ISA Server
Management MMC and navigate to Array, rightclick and select New array




Type in the name for your new array and click Next

Type in the DNS name of the array to be used by Firewall Clients and click Next



Accept Default Policy and click Next


Specify what kind of firewall rules that will be available to this array and click Next



Let the installation progress now and when it´s ready open up the ISA Server
Management MMC



Navigate to Firewall Policy

Add the ISA servers that belong to your array into the Managed ISA Server
Computers in the Network Objects tab under Toolbox



Apply the changes.


Step 3, Install your ISA servers
This step must be repeated for each of your ISA servers that will be working in the
array


This time we´ll choose to install just the ISA server services. Click Next


Enter the FQDN of the CSS or just browse the directory. Click Next

Let the installation progress now and when it´s ready open up the ISA Server
Management MMC

If you got this error you probably forgot to add the ISA servers that belong to your
array into the Managed ISA Server Computers in the Network Objects tab under
Toolbox as seen in Step 3



Now the ISA server must join the array we created earlier. Click Next


Choose the array. In our example the name of the array is Skynet

Since the ISA server and the CSS belong to the same AD we´ll use Windows
authentication



Accept probed value is it´s correct or specifiy the IP range of the Internal interface
Let the installation progress now and when it´s ready open up the ISA Server
Management MMC


Step 4, Configure network objects
Now NLB (Network Load Balancing) and VIP (Virtual IP) must be configured.



Navigate to Enterprise Networks

Edit the Internal properties. Add the internal IP range. Click OK
Navigate to Networks under your array configuration

Click Add Network and select the Internal object. Click OK
Click Add Adapter and select the Internal interfaces for ALL your ISA servers
belonging to the array. Click OK all the way back to MMC main window.
Choose Enable Load Balancing Integration from the Tasks tab in the right section of
MMC and a wizard will start



Now enter the VIP (Virtual IP) for each Interface and click Next to finish the wizard.




Step 5, Finishing up and some notes

Just a note regarding CARP here. I´ve myself encountered problems when
configuring systems like payment aso. These systems can be quite sensitive to
changes in the client session, especially if the session all of a sudden changes IP.
These sessions must then be configured as so called Sticky Sessions that will remain
the same as long as communication is established.
If you have this problem then disable CARP.



Now look at your Server status. If everything is OK you should have small green
icons indicating that there are not problems. If you see small timers instead it´s just
because the CSS have not yet retrieved status information from your ISA servers.
To test the configuration using ICMP (ping) you might have to make some temporary
changes to the System Policy as seen below



Now you should be able to do a ping from a host on Network B to a host on Network
A and kill one of the ISA servers. All you should notice is a few Request time out
before the surviving firewall takes over.
















RouterBOARD 750G

Quoting the official website Mikrotik

Quick Setup Guide and Warranty Information







First use

       1. Connect your WAN cable to port 1, and LAN computers to ports 2-5
       2. Set LAN computer IP configuration to automatic (DHCP)
       3. RB750G Default IP address from LAN is 192.168.88.1 or http://router


Powering

The board accepts powering from the power jack or from the first ethernet port (Passive PoE):
       ● direct-input power jack (5.5mm outside and 2mm inside diameter, female, pin positive plug) accepts              .           8..28V DC
       ● first ethernet port accepts passive Power over Ethernet accepts 8-28V DC
Normally the power consumption of this device is 2.4W, under maximum load - 3.6W

Booting process

This device doesn't come fitted with a Serial Port connector, so initial connection has to be done via the Ethernet cable, using
the MikroTik Winbox utility. Winbox should be used to connect to the default IP address of 192.168.88.1 with the username
admin and no password.




In case IP connection is not available, Winbox can also be used to connect to the MAC address of the device. More
information here:

      http://wiki.mikrotik.com/wiki/First_time_startup


In case you wish to boot the device from network, for example to use MikroTik Netinstall, hold the RESET button of the
device when starting it until the LED light turns off, and RB750G will start to look for Netinstall servers.
By default, the device is preconfigured with a simple firewall on the WAN port, this configuration can be viewed when first
connecting to the Router via Winbox. It will ask whether to keep this configuration or clean it to use your own.


Extension Slots and Ports
● Five individual Gigabit Ethernet ports, supporting automatic cross/straight cable correction (Auto MDI/X), so you can
use either straight or cross-over cables for connecting to other network devices. The First Ethernet port accepts 8..28
V DC powering from a passive PoE injector.

Buttons and Jumpers
       ● ROS reset jumper hole (on the bottom of case, behind one of the rubber feet) – resets RouterOS .    .         software to
         defaults. Must short circuit the metallic sides of the hole (with a screwdriver, for example) and boot the  .        device. Hold
         screwdriver in place until RouterOS configuration is cleared.
       ● RouterBOOT reset button (RESET, front panel) has two functions:
       ● Hold this button during boot time until LED light starts flashing,
         release the button to reset RouterOS configuration (same result as with reset hole)
       ● Hold this button during boot time longer, until LED turns off,
         then release it to make RB750G look for Netinstall servers.


Operating System Support
Currently tested operating system is MikroTik RouterOS (starting from version v4).

Copyright and Warranty Information
Copyright and Trademarks. Copyright MikroTikls SIA. This manual contains information protected by copyright law. No
part of it may be reproduced or transmitted in any form without prior written permission from the copyright holder.
RouterBOARD, RouterOS, RouterBOOT and MikroTik are trademarks of MikroTikls SIA. All trademarks and registered
trademarks appearing in this manual are the property of their respective holders.
Hardware. MikroTikls SIA warrants all RouterBOARD series equipment for the term of one year from the shipping date to be
free of defects in materials and workmanship under normal use and service, except in case of damage caused by
mechanical, electrical or other accidental or intended damages caused by improper use or due to wind, rain, fire or other
acts of nature.
If you have purchased your product from a MikroTik Reseller, please contact the Reseller company regarding all warranty
and repair issues, the following instructions apply ONLY if you purchased your equipment directly from MikroTik Latvia
To return failed unit or units to MikroTikls you must perform the following RMA (Return Material Authorization) procedure.
Follow the instructions below to save time, efforts, avoid costs, and improve the speed of the RMA process. Take into
account that all goods have one year warranty.
Instructions are located on our webpage here: http://rma.mikrotik.com
Manual. This manual is provided “as is” without a warranty of any kind, expressed or implied, including, but not limited to,
the implied warranty of merchantability and fitness for a particular purpose. The manufacturer has made every effort to
ensure the accuracy of the contents of this manual, however, it is possible that it may contain technical inaccuracies,
typographical or other errors. No liability is assumed for any inaccuracy found in this publication, nor for direct or indirect,
incidental, consequential or other damages that may result from such an inaccuracy, including, but not limited to, loss of
data or profits. Please report any inaccuracies found to support@mikrotik.com






Wednesday, May 16, 2012

Add an external Hard to Mikrotik and use in the Cache

Today's lesson

How to activate the external hard property to be used to store cached

To enable this feature

Follow the following images 

after conecting hard desk to server Mikrotik 

open the  winbox 

Direct to Stores ,Disks

Format the new hard desk 

Following the images





Direct to Stores

Add New
Following the images 




Name: Proxy Cache

Type: Web-Proxy

 Disk: Select the New hard desk
=====
Now directed to Firewall ,NAT

Settings as the image to activate Proxy




Direct to 

IP,Web Proxy



Activate in the picture Always From Cache
=========================================

See you in the next lesson

 with you
Mohamed Samir