Go Back
Mostly written in English for concistency due to my prefference of keeping most Servers and Network devices set to English ...
other than Domain Controllers ofcourse :^)
Summary : Testing with my prod networks Mikrotik Routers was done to see if my projects essentials would work out with my soon to be made portable test lab for this module.
Summary : Absent but was capable of gobling together some hardware that I prefer using and make a basic repo describing my project and what will be done.
Summary :
Took testing Mikrotik Router RB2011UiAS-2HnD-IN to School with me to do basics of testing due to actual router going missing for some reason.
Only changed values from default are listed to save on documentation work having to be done.
Summary :
Work was done outside of school but was interupted by a taking wrong routerboard with me from home and water pipe bursting and flooding the basement of my grandpas workshop lol.
Due to some mistakes with my original planing new MikroTik Hardware was ordered with next day shipping.
README was changed to reflect hardware changes.
Summary :
Ethernet ports 6-10 were removed from bridge.
Wifi Configs deleted (new router doesnt have one built in)
Exported to backup file.
Summary :
Connected to its default SSID that it Broadcasts (sometimes takes a few tries on MacOS machines)
Updates were installed from RouterOS 6.43 to 7.18.1.
Set a Password for admin user
Detailed work :
- System -> Reset Configuration
- Keep users : X
- CAPS Mode : X
Summary :
Connection to the board was established.
Config was reset to defconf.
Updates were installed from RouterOS 6.43 to 7.18.1.
Config from RB2011 was imported.
Detailed work :
- Enabling CAPsMAN (something like a CloudKey but for Mikrotik APs built into MT Routers) and forbidding it broadcasting onto the WAN link.
- Wireless -> CAPsMAN -> Manager
- Interfaces
- new
- Interface : ether1
- Forbid : X
- Making a default config
- Wireless -> CAPsMAN
- New
- Name : default-config
- Mode : ap
- SSID : teleco-admin
- Country : Switzerland
- Auth. Type : WPA2 PSK
- Passprhase : PasswordYouWontGet123
- Making profisioning profile for APs
- Wireless -> CAPsMAN
- New
- Action : create dynamic enabled
- Master Configuration : default-config
- Make the other VLANs show up through their respective wifi
- Wireless -> CAPsMAN -> Datapaths
- New
- Bridge : bridge
- VLAN mode : no tag for admin, use tag for others
- VLAN ID : none for admin, respective ID for others
- Interface List : LAN for all
- Wireless -> CAPsMAN -> Configurations
- default-config
- clone
- rinse and repeat for guest
- Provisioning Tab
- default-config
- slave configurations : user-config, guest-config
Summary :
Spent alot of time figuring out why my site to site VPN wasnt working on my already present infra.
Then spent some time actually getting the VPN working on the hEX s
- Created two new WireGuard interfaces
- Interfaces -> WireGuard
- New
- Name : wg-v6
- Comment : reserved for future IPv6 testing
- New
- Name : wg-site-to-site
- Comment : site-to-site VPN interface
- Listen Port : 13331
- Private Key :
- IP -> Addresses
- New
- Address : 10.99.99.4/24
- Interface : wg-site-to-site
- Added wg-site-to-site interface to LAN interface list
- Interfaces -> Interface List
- New
- List : LAN
- Interface : wg-site-to-site
- Added Peer for Main Site VPN Gateway
- Interfaces -> WireGuard -> Peers
- New
- Interface : wg-site-to-site
- Public Key :
- Allowed Address :
- 10.99.99.1/32
- 10.201.0.0/24
- 10.201.1.0/24
- Persistent Keepalive : 25
- Added static routes to access main site VLANs
- IP -> Routes
- New
- Dst. Address : 10.0.0.0/8
- Gateway : 10.99.99.1