mikrotik vlan trunk example

Most Relevant Content

  • MikroTik VLAN Routing Configuration with Manageable Switch

    A VLAN (Virtual LAN) is a group of computers, servers, network printers and other network devices that behave as if they were connected to a single network. VLAN is a logical topology that divides a single broadcast domain into multiple broadcast domains. VLAN is a layer 2 method. So, a manageable switch is required to manage VLAN in your network and a router is required to route and control your inter-VLAN. VLAN increases network security and performance as well as improves IT efficiency. So, it will be a better plan to implement VLAN in your network. If you have or manage MikroTik Router and manageable switch, VLAN implementation in your network is not so difficult. In this article, I will show how to easily configure inter-VLAN routing with MikroTik Router and manageable switch. Core Devices and IP Information To configure a VLAN network and inter-VLAN routing, I am using a MikroTik RouterBoard 1100 AHX2 (RouterOS v6.38.1) and Level One (GEP-2450) manageable switch. IP information that I am using for VLAN network configuration are given below. WAN IP 192.168.30.2/30 and Gateway IP 192.168.30.1 LAN networks: 10.10.20.0/24, 10.10.30.0/24 and 10.10.40.0/24 DNS IP: 8.8.8.8 and 8.8.4.4 This IP information is just for my R&D purpose. [...]

    READ MORE »

  • You May Also Like

  • »

    Turn Computer into Wi-Fi Hotspot |   September 17, 2015

    Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]

    READ MORE »

  • »

    Red Hat/CentOS Network Configuration |   August 4, 2017

    Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]

    READ MORE »

  • »

    How to Block a Phone from WiFi Router |   May 8, 2024

    We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]

    READ MORE »

  • »

    MikroTik Site to Site VPN with L2TP/IPsec |   March 3, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]

    READ MORE »

  • »

    Getting Started with Red Hat Linux |   May 20, 2017

    Red Hat Linux is an open source server operating system.  Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported  server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]

    READ MORE »

  • »

    System Restore in Windows 10 |   August 30, 2015

    Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]

    READ MORE »

  • »

    HTTP vs. HTTPS: The Impact Of Using SSL Certificates |   November 29, 2021

    Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra “S” at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]

    READ MORE »

  • »

    Guest WiFi – How to Setup on MikroTik AP |   April 30, 2024

    Guest WiFi helps to keep your network safe and secure. Any sensitive wireless network should have a guest network. So, Guest WiFi is so essential for an office network. In a corporate office, guests or visitors frequently come and get connected to get internet for a few times. It is so much security issue to keep guest or visitor in the core network because among them someone can damage important network resources. So, to keep them isolated from the core [...]

    READ MORE »

  • »

    Single IP NAT Strategy in MikroTik RouterOS 7 |   September 29, 2015

    MikroTik Router has a lot of features which help to customize network as our requirement. Sometimes, it may be our requirement that we need to allow internet access on per IP. Normally, when we apply masquerade NAT rule in our MikroTik Router, all private IPs will be masqueraded or a network block will be masqueraded. If we do normal masqurade and enable a DHCP Server in our network, we may face a lot of unauthorized access in our network. Because [...]

    READ MORE »