vrrp configuration with load sharing

Most Relevant Content

  • MikroTik VRRP Configuration with Load Sharing

    MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high availability internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back again.  In the previous article, I discussed the basic MikroTik VRRP configuration to establish a high available internet network. But in basic configuration, the backup router keeps completely idle during Backup state and this behavior may be considered as waste of valuable resources. In MikroTik VRRP, it is possible to set backup router as a gateway for some clients and this method is known as load-sharing scheme. In this article, I will discuss how to configure MikroTik VRRP with Load Sharing scheme. Network Diagram To configure MikroTik VRRP with Load Sharing scheme, I am following a network diagram like the below image. In this network, two MikroTik RouterOS (R1_RouterOS and R2_RouterOS) are member of a MikroTik VRRP with load sharing [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik RADIUS Server (User Manager) Installation |   October 28, 2017

    RADIUS Server is a centralized user authentication, authorization and accounting application. RADIUS authentication gives the ISP or network administrator ability to manage PPP users, login users and Hotspot users from one server throughout a large network. MikroTik RouterOS has a RADIUS client that is able to authenticate login users, Hotspot users and PPP users through a RADIUS server. MikroTik team also developed a totally separate RADIUS server package named User Manager that can be used to authenticate MikroTik users smoothly. [...]

    READ MORE »

  • »

    Turn Computer into Wi-Fi Hotspot |   September 17, 2015

    Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]

    READ MORE »

  • »

    CentOS 8 Installation with Screenshots (Server with GUI) |   November 21, 2020

    Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]

    READ MORE »

  • »

    Troubleshooting Common Issues with Security Cameras in MikroTik Networks |   February 7, 2025

    30 Seconds Summary When fixing security cameras on MikroTik networks, you might see issues like bad video quality, connections dropping, motion detection not working, and security weaknesses. These problems can happen because of not enough internet speed, network congestion, IP conflicts, old software, or weak security. To fix these, make sure you have enough internet speed, set up the IP settings correctly, give camera traffic priority, and update the software regularly. Also, protect the cameras with strong passwords and encryption. [...]

    READ MORE »

  • »

    MikroTik IPIP Tunnel with IPsec (Site to Site VPN) |   March 18, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]

    READ MORE »

  • »

    Red Hat/CentOS Network Configuration |   August 4, 2017

    Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »

  • »

    Hardening MikroTik RouterOS by Limiting Login Services |   February 6, 2021

    MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]

    READ MORE »

  • »

    Block Internet Access at a Certain Time in MikroTik RouterOS |   August 1, 2024

    We often find how to block or allow internet access at a certain time in our LAN network specially in WiFi network. Time based internet access is so useful for controlling Kids internet in any family or managing stuff internet accessibility in any office or other network. MikroTik RouterOS offers a feature named Kid Control to block internet access at a certain time. This feature is so useful for the parents or network engineers who want to block internet access [...]

    READ MORE »