mikrotik export configuration script
Most Relevant Content
MikroTik Backup and Restore Configuration using Winbox
Backup and Restore feature in MikroTik Router helps to recover router configuration when running router fails to operation due to hardware failure. If you have a backup copy of your failed router and purchase a new MikroTik Router and then upload and restore that backup file, you will get your running network without any hassle. MikroTik Backup file is also useful when you unfortunately forget your admin privilege user password. You can easily recover your forgotten password with backup file using MikroTik password recovery tools. So, taking regular backup of running MikroTik configuration is so useful to a network administrator. How to backup MikroTik configuration file automatically via email was discussed in my previous article and in this article I will show how to backup and restore MikroTik configuration file manually using Winbox. How to Backup MikroTik Configuration File It is easy to backup MikroTik configuration using Winbox GUI but you can use WebFig web interface that follows same procedure as Winbox. The following steps will show how to backup MikroTik configuration file using Winbox GUI. Login to your MikroTik Router using Winbox with admin privilege. Click on Files menu item. File List window will appear now. Click on Backup [...]
- »
FreeRADIUS MySQL Database GUI with phpMyAdmin on CentOS 7 | January 30, 2019
FreeRADIUS is a high performance RADIUS Server that accepts a large number of networking devices as RADIUS Client including MikroTik Router. MySQL is one of the best user sources for freeRADIUS server. In my previous article, I discussed how to install freeRADIUS server on CentOS 7 and how to integrate MySQL module with freeRADIUS server. I also discussed how to create user group and profile in MySQL database server and authenticate MikroTik PPPoE client with MySQL database user. I used [...]
- »
MikroTik Load Balancing and Link Redundancy with PBR | March 31, 2019
In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% [...]
- »
MikroTik RouterOS User Authentication via RADIUS Server | November 19, 2017
MikroTik RouterOS has a strong local user database that is enough to manage a single MikroTik RouterOS user. But if your network has more than one MikroTik Routers, it is always better to use a RADIUS server to manage RouterOS user centrally. MikroTik User Manager RADIUS Server is a centralized user authentication and accounting application that gives the ISP Company or network administrator ability to manage not only RouterOS users but also PPP, Hotspot, DHCP and Wireless users. How to [...]
- »
Internet Connection Sharing Ethernet to Ethernet | September 22, 2015
Windows is the most popular operating system to any computer user. It is said that no computer user cannot go a single a day without windows operating system. Windows has a lot of default internet features which help to connect our computer to internet as well as it provides internet connection sharing facility. With Internet Connection Sharing (ICS) feature, you can turn your laptop into Wi-Fi hotspot or turn your desktop into a router to share your broadband connection with your family [...]
- »
Red Hat/CentOS Network Configuration | August 4, 2017
Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]
- »
Getting Started with Red Hat Linux | May 20, 2017
Red Hat Linux is an open source server operating system. Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]
- »
MikroTik L2TP/IPsec VPN Configuration (Connecting Remote Client) | February 26, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure [...]
- »
How to Separate MikroTik Hotspot and DHCP IP Pool | October 9, 2020
MikroTik default Hotspot Setup comes with a DHCP Server (which uses same IP Pool of Hotspot Server) to provide IP address and other network information to a connected device. Using this automatic IP address connected device can access Hotspot login page. After successfully login, a one to one NAT IP address is also assigned for the device and this process happens internally in Hotspot Server. User device cannot know this one to one NAT IP assigning. However, Hotspot Server actually [...]
- »
Guest WiFi – How to Setup on MikroTik AP | April 30, 2024
Guest WiFi helps to keep your network safe and secure. Any sensitive wireless network should have a guest network. So, Guest WiFi is so essential for an office network. In a corporate office, guests or visitors frequently come and get connected to get internet for a few times. It is so much security issue to keep guest or visitor in the core network because among them someone can damage important network resources. So, to keep them isolated from the core [...]
More Similar Content
You May Also Like