vrrp with local dhcp

Most Relevant Content

  • MikroTik VRRP Configuration with DHCP Server

    MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high available internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back again. In my previous article, I discussed how to configure MikroTik VRRP to establish a high available internet network. But most of the office network as well as ISP network use DHCP Server to assign their device IP automatically. So, in this article I will show how to configure MikroTik VRRP with active and backup DHCP Server. Network Diagram To configure VRRP network with MikroTik DHCP Server, I am following a network diagram like the below image. In this network, two MikroTik RouterOS (Master_RouterOS and Backup_RouterOS) are the member of a MikroTik VRRP. So, when both routers are up and running, network traffic will pass through Master_RouterOS. If Master_RouterOS fails to operate due to hardware failure or any other cause, [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block a Phone from WiFi Router |   May 8, 2024

    We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]

    READ MORE »

  • »

    MikroTik Block Website (Facebook, YouTube and Other Sites) |   October 12, 2017

    MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]

    READ MORE »

  • »

    FreeRADIUS User Group Management with MySQL |   January 3, 2019

    FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »

  • »

    HTTP vs. HTTPS: The Impact Of Using SSL Certificates |   November 29, 2021

    Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra ā€œSā€ at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]

    READ MORE »

  • »

    Managing Disk Partition with the parted Tool in CentOS 7 |   March 2, 2019

    As a system administrator, sometimes you may require to manage partitions of your CentOS/Red Hat Linux Operating System. Partition management is always a risky task. But there are some useful tools those are so helpful to manage CentOS/Red Hat Linux disk partition easily. In my previous article, I discussed how to manage CentOS/Red Hat 7 HDD partitions with the fdisk utility. The fdisk tool is only eligible to manage MBR partition table. But GPT partition table is now becoming more [...]

    READ MORE »

  • »

    CentOS 8 Installation with Screenshots (Server with GUI) |   November 21, 2020

    Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]

    READ MORE »

  • »

    MikroTik Bandwidth and Resource Monitoring with Graphs |   January 31, 2018

    “Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and [...]

    READ MORE »

  • »

    Hardening MikroTik RouterOS by Limiting Login Services |   February 6, 2021

    MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]

    READ MORE »