SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
1
Guideline Configuration Mikrotik Router
for Biznet Metronet Service.
 Please download application "Winbox" first, for access to Mikrotik.
 Connect the LAN cable to Laptop or Computer and connecting to LAN-1 on
the Mikrotik Router.
 Click "..." and select MAC or IP.
 Click "Connect".
2
1. After successful login, please select menu "PPP".
2. Select tab "Interface" and click "+".
3. And then select "PPPoE Client".
1. Later will be show "New Interface", You can fill in the name of PPPoE that
what you want.
2. Select "Interface" port that what you want, Usually most people using
"Ether-1" or commonly called LAN-1.
3
1. Next select tab "Dial Out".
2. For "Username" and "Password" use Biznet Customer ID and password on
the form information provided at the time of installation. Note: * If forgot
password, you can contact at 1500988 or email
- customer_care@biznetnetworks.com.
3. Click "Apply" then "Ok".
4
1. Next select menu "IP".
2. Select "Firewall".
1. Select tab "NAT.
2. Click "+".
5
1. Select tab "General".
2. For Chain menu please change to "srcnat".
3. Out Interface "PPPoE Name that you create before".
4. Select tab "Action" , then change to "masquarade".
5. Click "Apply" then "Ok".
6
1. Next select menu "IP".
2. Select "Routes".
7
1. Select tab "Routes" , then click "+".
2. Dst. Address fill to "0.0.0.0/0" with PPPoE Name that you create before.
3. Click "Apply" then "Ok".
Create DHCP IP for Private IP allocation for Internal Network.
8
1. Select menu "IP".
2. And then select "Pool".
9
1. Click "+".
2. Fill in the DHCP name that what you want.
3. And fill in the IP Address number that what you want. Usually for many IP
addresses that using "192.168.1.2-192.168.1.200".
4. Click "Apply" then "Ok".
5. And then select menu "IP --> DHCP Server"
10
1. Select Tab "DHCP" then click "+".
2. Fill in the DHCP Server name that what you want .
3. Interface menu please change to "Bridge1".
4. Address Pool you must select DHCP Pool Name that you create before.
5. Click "Apply" then "Ok".
11
1. Click Tab "Networks".
2. Click "+".
3. Fill in the IP Address & Gateway according to the IP address you created
earlier, If you follow the example above it is usually filled in IP
Address "192.168.1.0/24" with Gateway "192.168.1.1".
4. Click "Apply" then "Ok".

Weitere ähnliche Inhalte

Was ist angesagt?

How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 
Socket Programming with Python
Socket Programming with PythonSocket Programming with Python
Socket Programming with PythonGLC Networks
 
Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configurationTola LENG
 
Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3
Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3
Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3I Putu Hariyadi
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testingeightbit
 
HowYourAPIBeMyAPI
HowYourAPIBeMyAPIHowYourAPIBeMyAPI
HowYourAPIBeMyAPIJie Liau
 
MikroTik Certified Network Associate (MTCNA) - Training Indonesia
MikroTik Certified Network Associate (MTCNA) - Training IndonesiaMikroTik Certified Network Associate (MTCNA) - Training Indonesia
MikroTik Certified Network Associate (MTCNA) - Training IndonesiaMuhammad Ridwan
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik RouterKHNOG
 
Ftp server configuration on cisco packet tracer
Ftp server configuration on cisco packet tracerFtp server configuration on cisco packet tracer
Ftp server configuration on cisco packet tracerprodhan999
 
Introduction to Git for Network Engineers
Introduction to Git for Network EngineersIntroduction to Git for Network Engineers
Introduction to Git for Network EngineersJoel W. King
 
Developing rich SIP applications with SIPSIMPLE SDK
Developing rich SIP applications with SIPSIMPLE SDKDeveloping rich SIP applications with SIPSIMPLE SDK
Developing rich SIP applications with SIPSIMPLE SDKSaúl Ibarra Corretgé
 
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020I Putu Hariyadi
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
Mikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCCMikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCCGLC Networks
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfTaherAzzam2
 

Was ist angesagt? (20)

How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Socket Programming with Python
Socket Programming with PythonSocket Programming with Python
Socket Programming with Python
 
Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configuration
 
Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3
Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3
Konfigurasi Site-to-Site IPSec VPN Tunnel di Mikrotik menggunakan GNS3
 
Subnet mask
Subnet maskSubnet mask
Subnet mask
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
 
HowYourAPIBeMyAPI
HowYourAPIBeMyAPIHowYourAPIBeMyAPI
HowYourAPIBeMyAPI
 
MikroTik Certified Network Associate (MTCNA) - Training Indonesia
MikroTik Certified Network Associate (MTCNA) - Training IndonesiaMikroTik Certified Network Associate (MTCNA) - Training Indonesia
MikroTik Certified Network Associate (MTCNA) - Training Indonesia
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik Router
 
Instalacion de asterisk
Instalacion de asteriskInstalacion de asterisk
Instalacion de asterisk
 
Ftp server configuration on cisco packet tracer
Ftp server configuration on cisco packet tracerFtp server configuration on cisco packet tracer
Ftp server configuration on cisco packet tracer
 
Mikrotik VRRP
Mikrotik VRRPMikrotik VRRP
Mikrotik VRRP
 
Introduction to Git for Network Engineers
Introduction to Git for Network EngineersIntroduction to Git for Network Engineers
Introduction to Git for Network Engineers
 
Developing rich SIP applications with SIPSIMPLE SDK
Developing rich SIP applications with SIPSIMPLE SDKDeveloping rich SIP applications with SIPSIMPLE SDK
Developing rich SIP applications with SIPSIMPLE SDK
 
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Mikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCCMikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCC
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
 

Ähnlich wie Biznet guideline configuration mikrotik router

Mikro tik site to site eoip tunnel with i psec
Mikro tik site to site eoip tunnel with i psecMikro tik site to site eoip tunnel with i psec
Mikro tik site to site eoip tunnel with i psecUttam Ds
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1reddydivakara
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of networkKak Yong
 
Uccn1003 -may10_-_lect02b1_-_lan_basic_in_packet_tracer
Uccn1003  -may10_-_lect02b1_-_lan_basic_in_packet_tracerUccn1003  -may10_-_lect02b1_-_lan_basic_in_packet_tracer
Uccn1003 -may10_-_lect02b1_-_lan_basic_in_packet_tracerShu Shin
 
Huawei guide www.mobilemoviesite.com
Huawei guide www.mobilemoviesite.comHuawei guide www.mobilemoviesite.com
Huawei guide www.mobilemoviesite.comYasir Butt
 
IP-PBX with Raspberry Pi3
IP-PBX with Raspberry Pi3IP-PBX with Raspberry Pi3
IP-PBX with Raspberry Pi3Doni Kuswaryadi
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guideNishant Gandhi
 
Mikro tik vpn configuration with site converted
Mikro tik vpn configuration with site convertedMikro tik vpn configuration with site converted
Mikro tik vpn configuration with site convertedUttam Ds
 
Vo ip guide
Vo ip guideVo ip guide
Vo ip guideACP
 
ACN Micro- Project Group no. 22.pptx
ACN Micro- Project Group no. 22.pptxACN Micro- Project Group no. 22.pptx
ACN Micro- Project Group no. 22.pptxMohdHasnainRaza1
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902mark scott
 
Wi fi ruckus config
Wi fi ruckus configWi fi ruckus config
Wi fi ruckus configtmukumba
 
Experiment CCNA Lab manual
Experiment CCNA Lab manualExperiment CCNA Lab manual
Experiment CCNA Lab manualSonesh yadav
 
How to find router ip address on mac (1)
How to find router ip address on mac (1)How to find router ip address on mac (1)
How to find router ip address on mac (1)pooja singh
 

Ähnlich wie Biznet guideline configuration mikrotik router (20)

Mikro tik site to site eoip tunnel with i psec
Mikro tik site to site eoip tunnel with i psecMikro tik site to site eoip tunnel with i psec
Mikro tik site to site eoip tunnel with i psec
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Uccn1003 -may10_-_lect02b1_-_lan_basic_in_packet_tracer
Uccn1003  -may10_-_lect02b1_-_lan_basic_in_packet_tracerUccn1003  -may10_-_lect02b1_-_lan_basic_in_packet_tracer
Uccn1003 -may10_-_lect02b1_-_lan_basic_in_packet_tracer
 
Huawei guide www.mobilemoviesite.com
Huawei guide www.mobilemoviesite.comHuawei guide www.mobilemoviesite.com
Huawei guide www.mobilemoviesite.com
 
IP-PBX with Raspberry Pi3
IP-PBX with Raspberry Pi3IP-PBX with Raspberry Pi3
IP-PBX with Raspberry Pi3
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
Laptop to mobile y5
Laptop to mobile y5Laptop to mobile y5
Laptop to mobile y5
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
Plc networking basics - controllogix
Plc networking basics - controllogixPlc networking basics - controllogix
Plc networking basics - controllogix
 
Mikro tik vpn configuration with site converted
Mikro tik vpn configuration with site convertedMikro tik vpn configuration with site converted
Mikro tik vpn configuration with site converted
 
Lightspeed ii-manual-2012-jan
Lightspeed ii-manual-2012-janLightspeed ii-manual-2012-jan
Lightspeed ii-manual-2012-jan
 
Basic configuration access point (1)
Basic configuration access point (1)Basic configuration access point (1)
Basic configuration access point (1)
 
Mikrotik pcq
Mikrotik   pcqMikrotik   pcq
Mikrotik pcq
 
Vo ip guide
Vo ip guideVo ip guide
Vo ip guide
 
ACN Micro- Project Group no. 22.pptx
ACN Micro- Project Group no. 22.pptxACN Micro- Project Group no. 22.pptx
ACN Micro- Project Group no. 22.pptx
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902
 
Wi fi ruckus config
Wi fi ruckus configWi fi ruckus config
Wi fi ruckus config
 
Experiment CCNA Lab manual
Experiment CCNA Lab manualExperiment CCNA Lab manual
Experiment CCNA Lab manual
 
How to find router ip address on mac (1)
How to find router ip address on mac (1)How to find router ip address on mac (1)
How to find router ip address on mac (1)
 

Mehr von arimayawulantara

Pertempuran yarmuk 636 masehi 14 hijriah
Pertempuran yarmuk 636 masehi 14 hijriahPertempuran yarmuk 636 masehi 14 hijriah
Pertempuran yarmuk 636 masehi 14 hijriaharimayawulantara
 
Thariq bin ziyad sang penakluk spanyol
Thariq bin ziyad sang penakluk spanyolThariq bin ziyad sang penakluk spanyol
Thariq bin ziyad sang penakluk spanyolarimayawulantara
 
Enterprise resource-planning
Enterprise resource-planningEnterprise resource-planning
Enterprise resource-planningarimayawulantara
 
Zentyal adalah server_linux_untuk_small
Zentyal adalah server_linux_untuk_smallZentyal adalah server_linux_untuk_small
Zentyal adalah server_linux_untuk_smallarimayawulantara
 
Sistem informasi yang mendukung organisasi
Sistem informasi yang mendukung organisasiSistem informasi yang mendukung organisasi
Sistem informasi yang mendukung organisasiarimayawulantara
 
Erp system in supply chain
Erp system in supply chainErp system in supply chain
Erp system in supply chainarimayawulantara
 
Sistem perusahaan dari_supply_chains
Sistem perusahaan dari_supply_chainsSistem perusahaan dari_supply_chains
Sistem perusahaan dari_supply_chainsarimayawulantara
 
Tabel temuan audit_produksi_riset_develo
Tabel temuan audit_produksi_riset_develoTabel temuan audit_produksi_riset_develo
Tabel temuan audit_produksi_riset_develoarimayawulantara
 
Atkearney soe digital transformation report present
Atkearney   soe digital transformation report presentAtkearney   soe digital transformation report present
Atkearney soe digital transformation report presentarimayawulantara
 
Sugar community edition_userguide_5.2
Sugar community edition_userguide_5.2Sugar community edition_userguide_5.2
Sugar community edition_userguide_5.2arimayawulantara
 
The power of own cloud (sd)
The power of own cloud (sd)The power of own cloud (sd)
The power of own cloud (sd)arimayawulantara
 

Mehr von arimayawulantara (20)

khulafaur rasyidin
khulafaur rasyidinkhulafaur rasyidin
khulafaur rasyidin
 
Pertempuran yarmuk 636 masehi 14 hijriah
Pertempuran yarmuk 636 masehi 14 hijriahPertempuran yarmuk 636 masehi 14 hijriah
Pertempuran yarmuk 636 masehi 14 hijriah
 
Thariq bin ziyad sang penakluk spanyol
Thariq bin ziyad sang penakluk spanyolThariq bin ziyad sang penakluk spanyol
Thariq bin ziyad sang penakluk spanyol
 
Enterprise resource-planning
Enterprise resource-planningEnterprise resource-planning
Enterprise resource-planning
 
Zentyal adalah server_linux_untuk_small
Zentyal adalah server_linux_untuk_smallZentyal adalah server_linux_untuk_small
Zentyal adalah server_linux_untuk_small
 
Sistem informasi yang mendukung organisasi
Sistem informasi yang mendukung organisasiSistem informasi yang mendukung organisasi
Sistem informasi yang mendukung organisasi
 
Erp system in supply chain
Erp system in supply chainErp system in supply chain
Erp system in supply chain
 
Sistem perusahaan dari_supply_chains
Sistem perusahaan dari_supply_chainsSistem perusahaan dari_supply_chains
Sistem perusahaan dari_supply_chains
 
Lime survei user manual
Lime survei   user manualLime survei   user manual
Lime survei user manual
 
Management hotspot user
Management hotspot userManagement hotspot user
Management hotspot user
 
Rb 30011 uias rm
Rb 30011 uias rmRb 30011 uias rm
Rb 30011 uias rm
 
Tabel temuan audit_produksi_riset_develo
Tabel temuan audit_produksi_riset_develoTabel temuan audit_produksi_riset_develo
Tabel temuan audit_produksi_riset_develo
 
Atkearney soe digital transformation report present
Atkearney   soe digital transformation report presentAtkearney   soe digital transformation report present
Atkearney soe digital transformation report present
 
6234 11797-1-sm
6234 11797-1-sm6234 11797-1-sm
6234 11797-1-sm
 
Rb
RbRb
Rb
 
Rb
RbRb
Rb
 
Sugar community edition_userguide_5.2
Sugar community edition_userguide_5.2Sugar community edition_userguide_5.2
Sugar community edition_userguide_5.2
 
The power of own cloud (sd)
The power of own cloud (sd)The power of own cloud (sd)
The power of own cloud (sd)
 
153084837 makalah-cobit
153084837 makalah-cobit153084837 makalah-cobit
153084837 makalah-cobit
 
X ref auto cad 2007-r2
X ref auto cad 2007-r2X ref auto cad 2007-r2
X ref auto cad 2007-r2
 

Kürzlich hochgeladen

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Biznet guideline configuration mikrotik router

  • 1. 1 Guideline Configuration Mikrotik Router for Biznet Metronet Service.  Please download application "Winbox" first, for access to Mikrotik.  Connect the LAN cable to Laptop or Computer and connecting to LAN-1 on the Mikrotik Router.  Click "..." and select MAC or IP.  Click "Connect".
  • 2. 2 1. After successful login, please select menu "PPP". 2. Select tab "Interface" and click "+". 3. And then select "PPPoE Client". 1. Later will be show "New Interface", You can fill in the name of PPPoE that what you want. 2. Select "Interface" port that what you want, Usually most people using "Ether-1" or commonly called LAN-1.
  • 3. 3 1. Next select tab "Dial Out". 2. For "Username" and "Password" use Biznet Customer ID and password on the form information provided at the time of installation. Note: * If forgot password, you can contact at 1500988 or email - customer_care@biznetnetworks.com. 3. Click "Apply" then "Ok".
  • 4. 4 1. Next select menu "IP". 2. Select "Firewall". 1. Select tab "NAT. 2. Click "+".
  • 5. 5 1. Select tab "General". 2. For Chain menu please change to "srcnat". 3. Out Interface "PPPoE Name that you create before". 4. Select tab "Action" , then change to "masquarade". 5. Click "Apply" then "Ok".
  • 6. 6 1. Next select menu "IP". 2. Select "Routes".
  • 7. 7 1. Select tab "Routes" , then click "+". 2. Dst. Address fill to "0.0.0.0/0" with PPPoE Name that you create before. 3. Click "Apply" then "Ok". Create DHCP IP for Private IP allocation for Internal Network.
  • 8. 8 1. Select menu "IP". 2. And then select "Pool".
  • 9. 9 1. Click "+". 2. Fill in the DHCP name that what you want. 3. And fill in the IP Address number that what you want. Usually for many IP addresses that using "192.168.1.2-192.168.1.200". 4. Click "Apply" then "Ok". 5. And then select menu "IP --> DHCP Server"
  • 10. 10 1. Select Tab "DHCP" then click "+". 2. Fill in the DHCP Server name that what you want . 3. Interface menu please change to "Bridge1". 4. Address Pool you must select DHCP Pool Name that you create before. 5. Click "Apply" then "Ok".
  • 11. 11 1. Click Tab "Networks". 2. Click "+". 3. Fill in the IP Address & Gateway according to the IP address you created earlier, If you follow the example above it is usually filled in IP Address "192.168.1.0/24" with Gateway "192.168.1.1". 4. Click "Apply" then "Ok".