combine multiple unequal internet connections
Most Relevant Content
MikroTik PCC Load Balancing over Unequal Dual WAN Links
Hi, you are here means you are finding a Load Balancing and Link Redundancy solution with Unequal WAN links in your MikroTik Router. If so, it is your right place. In my previous article I discussed how to configure a Dual WAN Load Balancing and Link Redundancy network using PCC method but it was assumed that both WAN links have equal bandwidth. But in real situation, you may have unequal WAN links such as ISP1 may have 10MB bandwidth and ISP2 may have 20MB bandwidth. In this case, PCC Load Balancing and Link Redundancy configuration will be a little bit different. So, in this article I will show how to configure Load Balancing and Link Redundancy network using PCC method which will have unequal Dual WAN connections. Core Devices and IP Information To configure a load balancing with failover network, I am using MikroTik RouterOS v6.38.1 that has two ISP connections and a LAN network. IP information that I am using for this network configuration are given below. ISP1 IP 192.168.30.2/30 and Gateway IP 192.168.30.1 ISP2 IP 192.168.60.2/30 and Gateway IP 192.168.60.1 LAN network: 10.10.70.0/24 and LAN Gateway IP 10.10.70.1/24 DNS IP: 8.8.8.8 and 8.8.4.4 This IP information is just [...]
- »
MikroTik OpenVPN Configuration on TCP Port 443 with Windows OS | April 6, 2020
MikroTik OpenVPN is an amazing VPN solution. IT provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which are poorly designed and can easily be blocked, OpenVPN can highly be customized and even can be run on so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN is a site to site [...]
- »
Web Server Configuration in Linux with Apache, MariaDB and PHP | January 2, 2018
Web Server is one of the most important and most used servers today. Without web server internet cannot imagine. Even, the article you are reading is also served by a web server. So, having web server configuration knowledge is beneficial for you, I think. A web server is responsible to serve HTTP (Hypertext Transfer Protocol) contents such as text, image, audio, video etc. to its clients. A lot of web servers are present today such as Apache, IIS, Nginx and [...]
- »
MikroTik Bandwidth Management using Simple Queue | September 3, 2015
MikroTik is one of the most popular routers in computer networking. It is said that no office or ISP company cannot go a single day without MikroTik Router. MikroTik Router is also a popular router to a network administrator because MikroTik Router is easily maintainable with graphical user interface software named winbox than other routers. A lot of services are available in MikroTik router to run a network smoothly. Among these services, Bandwidth Management Service is the most popular service in [...]
- »
MikroTik WiFi MAC Authentication with UserMan RADIUS Server | December 23, 2019
MikroTik Wireless Router is popularly used as WiFi AP. MikroTik WiFi AP has a lot of features to tune WiFi network as your requirements. MAC authentication is one the amazing and useful features in MikroTik WiFi. MAC authentication enables filtering MAC address that means no MAC can be able to connect to WiFi AP without authentication. MAC authentication can be done either local database or RADIUS Server. MAC authentication with RADIUS Server provides facility to manage multiple APs from centralized [...]
- »
MikroTik Router Integration and Configuration on GNS3 | September 19, 2018
GNS3 is a network simulator software used by hundreds of thousands of network engineers worldwide to emulate, configure, test and troubleshoot virtual and real networks. GNS3 can talk a large number of network vendors including MikroTik. MikroTik introduces Cloud Hosted Router (a RouterOS version) that is used to run as virtual machine and a virtual machine can easily be integrated with GNS3. So, network administrators who are fond of MikroTik Router can now configure, test and troubleshoot their MikroTik network [...]
- »
How to Block MAC Address in MikroTik RouterOS 7 | July 11, 2024
MikroTik RouterOS 7 by default allows any MAC address to get internet connection through it. But we may need to block some MAC addresses sometimes. There are three methods to block MAC address in MikroTik RouterOS 7 – Blocking MAC Address using Bridge Filter Rule. Blocking MAC Address using Firewall Filter Rule and Blocking MAC Address from DHCP Lease. We can use any of these methods if we want to block MAC Address in MikroTik Router. In this article, we [...]
- »
Turn Computer into Wi-Fi Hotspot | September 17, 2015
Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]
- »
Setting Google as Default Search Engine | September 30, 2015
Google is one of the most popular search engines to any online user. It is said that no online user cannot go a single day without Google search engine. Google search statistics shows that over 40,000 search queries are processed every second by Google. If you have any query about any subject, just type in Google search box and Google will show you billion of results related to your search query within less than a second. So, usually you will want [...]
- »
How to Block a Phone from WiFi Router | May 8, 2024
We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]
You May Also Like