mikrotik vlan tagging
Most Relevant Content
MikroTik VLAN Routing Configuration with Manageable Switch
A VLAN (Virtual LAN) is a group of computers, servers, network printers and other network devices that behave as if they were connected to a single network. VLAN is a logical topology that divides a single broadcast domain into multiple broadcast domains. VLAN is a layer 2 method. So, a manageable switch is required to manage VLAN in your network and a router is required to route and control your inter-VLAN. VLAN increases network security and performance as well as improves IT efficiency. So, it will be a better plan to implement VLAN in your network. If you have or manage MikroTik Router and manageable switch, VLAN implementation in your network is not so difficult. In this article, I will show how to easily configure inter-VLAN routing with MikroTik Router and manageable switch. Core Devices and IP Information To configure a VLAN network and inter-VLAN routing, I am using a MikroTik RouterBoard 1100 AHX2 (RouterOS v6.38.1) and Level One (GEP-2450) manageable switch. IP information that I am using for VLAN network configuration are given below. WAN IP 192.168.30.2/30 and Gateway IP 192.168.30.1 LAN networks: 10.10.20.0/24, 10.10.30.0/24 and 10.10.40.0/24 DNS IP: 8.8.8.8 and 8.8.4.4 This IP information is just for my R&D purpose. [...]
- »
MikroTik Hotspot Configuration in RouterOS 7 | April 25, 2023
MikroTik Hotspot is an awesome service to run a captive portal network. You can run a public Wi-Fi network, Hotel Network, Airport network, CAMP Wi-Fi network, Shopping Mall Network and so on using MikroTik Hotspot and even can monetize your network for earning if you use Hotspot Billing Software like GalaxyRAD which is specially designed for MikroTik Hotspot network. GalaxyRAD helps to monetize your any network providing online payment gateway as well as integrating voucher-based system. It also helps to [...]
- »
MikroTik DHCP Server Configuration with Radius Server | January 24, 2018
The Dynamic Host Configuration Protocol (DHCP) is a client-server protocol that is used to assign an IP address and other network configuration parameters dynamically to each device on a network so that they can communicate with other IP networks. DHCP Server is popularly used in an Enterprise Office Network because in an office network various types of IP devices such as Laptop, Desktop, Tablet, Smartphone, IP Phone and so on are maintained and almost all IP devices support DHCP. An ISP Network can also be [...]
- »
MikroTik Unequal Dual WAN Load Balancing with Failover using ECMP | September 15, 2019
MikroTik Router is capable of doing Load Balancing with Failover over multiple gateways. Policy Based Routing, ECMP, PCC and NTH Load Balancing are the popular load balancing methods in MikroTik Router. Among these methods, ECMP is so easy to configure and provides almost 100% load balancing and link redundancy solution. In my previous article, I discussed how to configure Load Balancing and Link Redundancy using ECMP over two equal bandwidth gateways. ECMP method is also capable of doing load balancing [...]
- »
NGINX and PHP-FPM: A High-Performance Web Hosting Duo | September 26, 2024
When it comes to hosting high-performance websites or web applications, Nginx and PHP-FPM are often paired together due to their complementary capabilities. NGINX is a highly efficient web server which works seamlessly with PHP-FPM. PHP-FPM is a FastCGI Process Manager for PHP that is used to deliver fast, reliable, and scalable solutions for dynamic content. What is Nginx? Nginx (pronounced as “engine-ex”) is a lightweight, high-performance web server that is widely used for serving static content, load balancing and reverse [...]
- »
How to Block WiFi Access although Password is Known | April 23, 2024
We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]
- »
MikroTik Send Browsing Log to Remote Syslog Server | August 18, 2019
MikroTik RouterOS is capable of logging various system events as well as user browsing information. Logs can be saved in router’s memory (RAM), disk, file, sent by email or even sent to remote syslog server. Sometimes it may require saving user browsing log by the law. So, a syslog server is an essential part to any network. In this article, I will discuss how to configure MikroTik Router to keep user browsing log and send that log to remote syslog [...]
- »
Block Internet Access at a Certain Time in MikroTik RouterOS | August 1, 2024
We often find how to block or allow internet access at a certain time in our LAN network specially in WiFi network. Time based internet access is so useful for controlling Kids internet in any family or managing stuff internet accessibility in any office or other network. MikroTik RouterOS offers a feature named Kid Control to block internet access at a certain time. This feature is so useful for the parents or network engineers who want to block internet access [...]
- »
MikroTik Site to Site EoIP Tunnel with IPsec | March 21, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) tunnel that is used to create a site to site VPN. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]
- »
Computer Networking Basics | February 10, 2017
Computer networking is a buzzword to the present world. By the virtue of computer networking, the world has become just like a village. So, anyone of the world can communicate with any person of the world within seconds as if they are living in a village. Computer networking does not mean a single element. A lot of networking elements and protocol work behind a computer networking. So, the computer guys who are interested to learn how computer networking works should [...]
You May Also Like