routeros load balancing with fialover
Most Relevant Content
MikroTik Load Balancing and Link Redundancy with PBR
In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% uptime guarantee. So, it will be better to use more than one ISP connection to ensure 100% uptime network. Sometimes you may have dependency (such as Mail, IPPBX etc.) on your uplink ISP but their service is not so good. In this case, you can use another ISP which provides better service. Your current ISP is better but high paid bandwidth. In this case, you can purchase another ISP bandwidth which is cheap but their connection is good, not better. If these are your current status, it is suggested to configure a load balancing and link redundancy network with multiple gateways. MikroTik Router has various load balancing and link redundancy methods (such as ECMP method, PCC method and PBR method) [...]
- »
MikroTik Bandwidth and Resource Monitoring with Graphs | January 31, 2018
“Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and [...]
- »
User Management in Linux (Red Hat/CentOS) | September 28, 2017
User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]
- »
MikroTik Site to Site VPN with L2TP/IPsec | March 3, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]
- »
MikroTik User Management (RouterOS User) | October 22, 2017
MikroTik User Management plays an important role in MikroTik system administration as well as MikroTik security. Don’t be confused the title User Management with the MikroTik UserManager. UserManager is an optional and totally separate package distributed by MikroTik. UserManager is an implementation of Radius server that is used to maintain not only RouterOS users but also PPPoE, PPTP, Hotspot, Wireless and DHCP users. In my few future articles, I will discuss how to maintain these users with MikroTik UserManager Radius [...]
- »
Free Internet Speed Test Online | August 31, 2015
You are here because you want to check your broadband internet speed. Don’t worry, I will show you how to check your internet speed from online absolutely free and fastest way. I will show you top 4 websites link from which your broadband internet speed can be checked so easily. I will also show you how to check bandwidth usage continuously with windows operating system’s utility and a third party software utility. So, keep reading this article and find how [...]
- »
Ubuntu RADIUS Server Configuration with freeRADIUS | September 3, 2022
Ubuntu Server is one of most popular open-source Linux Server distribution. It is stable and reliable than other Linux distributions. So, enterprise level application can be hosted on Ubuntu Server. Ubuntu RADIUS Server is popularly used for remote authentication and mostly used with the freeRADIUS open source RAIDUS application. freeRADIUS is one of the most popular and powerful AAA (Authorization, Authentication and Accounting) application. Any enterprise (specially ISP company) can use freeRADIUS for AAA solution and can develop billing system. [...]
- »
MikroTik Hotspot Customized Login Template | April 14, 2022
MikroTik Hotspot is a popular service which is used to manage ISP, Hotel, Restaurant, Airport, and Public WiFi. Using billing application like GalaxyRAD with MikroTik Hotspot, a WiFi network can manage professionally. MikroTik Hotspot loads a login page for new user authentication. So, this login page is a vital source for promoting your brands. The default login template provided by MikroTik Hotspot is a simple template which cannot fulfill branding requirements. But it is possible to customize the login template [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
- »
Single IP NAT Strategy in MikroTik RouterOS 7 | September 29, 2015
MikroTik Router has a lot of features which help to customize network as our requirement. Sometimes, it may be our requirement that we need to allow internet access on per IP. Normally, when we apply masquerade NAT rule in our MikroTik Router, all private IPs will be masqueraded or a network block will be masqueraded. If we do normal masqurade and enable a DHCP Server in our network, we may face a lot of unauthorized access in our network. Because [...]
You May Also Like