SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
HOTSPOT	
  MIKROTIK
PREPARED	
  BY	
  MR	
  EAN	
  SARATH
,	
  4	
  MAY	
  2016
Name: EAN Sarath
Technical Support at MaxBIT ISP
Certification : MTCNA
Areas of Interest : VPN Tunnel, Routing & Switching
Skype : sarath.ean1
FB: Sarath EAN
2
About	
  Me
1. What is Hotspot
2. Benefit of Hotspot
3. Configure Hotspot
4. Bypassing Hotspot
5. Limit User Bandwidth
6. Shared Users Hotspot
7. Question & Answer
3
Content
• Hotspots are used to provide access services (Internet /
Intranet)in the public area, using cable or wireless. And
provide web services authenticated username and password
before access to internet.
• Remote Authentication Dial-­‐In User Service (RADIUS) is a
networking protocol that provides centralized Authentication,
Authorization, and Accounting (AAA) management for users
who connect and use a network service.
4
What	
  is	
  Hotspot	
  
5
Benefit	
  of	
  Hotspot	
  
Copyright®MaximumBusiness informationTechnology
• Require	
  Security	
  login	
  page	
  to	
  
internet.
• Provide	
  friendly	
  page	
  login	
  by	
  
editing.
• Provide	
  Advertisement	
  own	
  
company	
  web	
  page	
  login.
• Provide	
  specific	
  website,	
  bypass	
  
the	
  more	
  specific	
  resource	
  at	
  a	
  
certain	
  protocol	
  and	
  port.
• Provide	
  bandwidth	
  limitation	
  per	
  
user	
  login	
  hotspot.
• Share	
  User	
  Hotspot	
  can	
  access	
  in	
  
the	
  same	
  time.
• Interact	
  with	
  other	
  radius	
  server	
  
&	
  user-­‐manager	
  in	
  Mikrotik.	
  
Configure	
  Hotspot	
  
Hotspot	
  server	
  
o We	
  will	
  run	
  hotspot	
  in	
  LAN,	
  your	
  laptop	
  is	
  hotspot	
  client.
o Hotspot	
  will	
  run	
  on	
  interface	
  connecting	
  to	
  your	
  laptop
7
There	
  are	
  some	
  step	
  configure	
  Hotspot	
  :	
  
a. Configure	
  IP	
  interface	
  Hotspot	
  
IP à Address à Click	
  Add
b.	
  	
  	
  	
  Configure	
  IP	
  Pool	
  
IP à Pool	
  à click	
  Add
c. Configure	
  DHCP	
  server
IP	
  à DHCP	
  SERVER	
  à click	
  Add
d.	
  	
  	
  	
  	
  Configure	
  Hotspot	
  Server	
  
In	
  menu	
  IP	
  à Hotspot à Setup	
  
7
Configure	
  Hotspot	
  
Follow	
  the	
  same	
  steps	
  :
Configure	
  Hotspot	
  Wizard	
  
in	
  Menu	
  IP à Hotspot	
  à Setup
Wizard	
  
8
Configure	
  Hotspot	
  
In menu IP>Hotspot>Setup Wizard
1 2
34
5 6
7
8
There	
  are	
  several	
  ways	
  you	
  can	
  do	
  to	
  bypass	
  the	
  host	
  in	
  order	
  not	
  to	
  perform	
  
authentication	
  when	
  it	
  will	
  enter	
  the	
  hotspot	
  network,	
  as	
  follows.
• IP	
  Binding	
  
o Allow	
  	
  specific	
  user	
  to	
  access	
  without	
  login.
o Use	
  bypass	
  Printers,	
  IP	
  phones,	
  Security	
  camera	
  …	
  etc.
o Configure	
  in	
  menu	
  IP à Hotspot à IP	
  Binding.
9
Bypassing	
  Hotpots	
  
• Walled	
  Garden
o Allow	
  all	
  users	
  to	
  access	
  specific	
  websites.
o Company	
  website,	
  intranet,	
  internet	
  banking	
  …etc.	
  
o Configure	
  in	
  menu	
  IP à Hotspot à Walled	
  Garden
10
Bypassing	
  Hotpots	
  
• Walled	
  Garden	
  IP
o Allow	
  all	
  user	
  access	
  specific	
  protocol
o To	
  bypass	
  HOST/IP	
  with	
  several	
  or	
  ALL	
  services	
  can	
  be	
  accessible	
  from	
  
hotspot	
  client	
  without	
  authentication	
  (router,	
  mail	
  server,	
  etc.)
o Configure	
  in	
  menu	
  IP à Hotspot	
  à Walled	
  Garden	
  IP
11
Bypassing	
  Hotpot
12
Limit	
  User	
  Bandwidth	
  (Local)
• Limit	
  user	
  bandwidth,	
  using	
  Mikrotik	
  hotspot	
  local	
  user	
  profile.
• Can	
  be	
  set	
  from	
  Hotspot	
  à User	
  Profile	
  
• Configure	
  :	
  General	
  à Rate	
  Limit	
  (rx/tx)
1 2
• One	
  user	
  name	
  can	
  be	
  used	
  more	
  than	
  once,	
  for	
  limit	
  number.
• Set	
  the	
  limit	
  number	
  of	
  user	
  from	
  hotspot	
  à User	
  profile.	
  
• Configuration	
  :	
  
-­‐ General	
  à Share	
  User	
  (	
  Set	
  the	
  maximum	
  limit)
13
Shared	
  Users
14
Hotspot	
  New	
  Generation
15
Question	
  &	
  Answer
Thanks	
  for	
  your	
  spend	
  valuable	
  times	
  JJ

Weitere ähnliche Inhalte

Was ist angesagt?

Juniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by IrzanJuniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by Irzan
Febrian ‎
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final
Olivier Rostaing
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
Kashif Latif
 

Was ist angesagt? (20)

MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
 
Juniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by IrzanJuniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by Irzan
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Policy and firewall_filters
Policy and firewall_filtersPolicy and firewall_filters
Policy and firewall_filters
 
Detecting network virus using mikrotik
Detecting network virus using mikrotikDetecting network virus using mikrotik
Detecting network virus using mikrotik
 
Choosing Mikrotik Platform x86 vs chr
Choosing Mikrotik Platform x86 vs chrChoosing Mikrotik Platform x86 vs chr
Choosing Mikrotik Platform x86 vs chr
 
MikroTik Security
MikroTik SecurityMikroTik Security
MikroTik Security
 
Connection load balancing with mikrotik [workshop]
Connection load balancing with mikrotik [workshop]Connection load balancing with mikrotik [workshop]
Connection load balancing with mikrotik [workshop]
 
Mikrotik Bridge Deep Dive
Mikrotik Bridge Deep DiveMikrotik Bridge Deep Dive
Mikrotik Bridge Deep Dive
 
Tutorial radius client mikrotik
Tutorial radius client mikrotikTutorial radius client mikrotik
Tutorial radius client mikrotik
 
Installing Cacti openSUSE Leap 42.1
Installing Cacti openSUSE Leap 42.1Installing Cacti openSUSE Leap 42.1
Installing Cacti openSUSE Leap 42.1
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
 
205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final205583569 gb-interface-detailed-planning-final
205583569 gb-interface-detailed-planning-final
 
Basic command to configure mikrotik
Basic command to configure mikrotikBasic command to configure mikrotik
Basic command to configure mikrotik
 
Mikrotik Fastpath vs Fasttrack
Mikrotik Fastpath vs FasttrackMikrotik Fastpath vs Fasttrack
Mikrotik Fastpath vs Fasttrack
 
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with MikrotikNetwork LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
 

Andere mochten auch

Andere mochten auch (20)

Hot Spot Network Manager
Hot Spot Network ManagerHot Spot Network Manager
Hot Spot Network Manager
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
Interior Routing Protocols
Interior Routing ProtocolsInterior Routing Protocols
Interior Routing Protocols
 
Routing Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. MikrotikRouting Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. Mikrotik
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
 
Core Concept of TCP/IP
Core Concept of TCP/IPCore Concept of TCP/IP
Core Concept of TCP/IP
 
Cambodia International Backbone Network
Cambodia International Backbone NetworkCambodia International Backbone Network
Cambodia International Backbone Network
 
Mikrotik. ( hotspot )
Mikrotik. ( hotspot )Mikrotik. ( hotspot )
Mikrotik. ( hotspot )
 
Using mikrotik with radius
Using mikrotik with radiusUsing mikrotik with radius
Using mikrotik with radius
 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
Bonding Interface in MikroTik
Bonding Interface in MikroTikBonding Interface in MikroTik
Bonding Interface in MikroTik
 
Network Security-Honeypot
Network Security-HoneypotNetwork Security-Honeypot
Network Security-Honeypot
 
Mikrotik API
Mikrotik APIMikrotik API
Mikrotik API
 
Class 3
Class 3Class 3
Class 3
 
Wireless Network Pentestration
Wireless Network PentestrationWireless Network Pentestration
Wireless Network Pentestration
 
Class 1
Class 1Class 1
Class 1
 
CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
 
Fools your enemy with MikroTik
Fools your enemy with MikroTikFools your enemy with MikroTik
Fools your enemy with MikroTik
 

Ähnlich wie Hotspot on Mikrotik Router

Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourself
Guest Internet
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
Warren Bent
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
CODE BLUE
 

Ähnlich wie Hotspot on Mikrotik Router (20)

Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourself
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call Control
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Wireless Hotspot Kit
Wireless Hotspot KitWireless Hotspot Kit
Wireless Hotspot Kit
 
Yeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series HandoutsYeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series Handouts
 
Jag Techno’s JT-Spot
Jag Techno’s JT-Spot Jag Techno’s JT-Spot
Jag Techno’s JT-Spot
 
Outdoor 4G LTE CPE Installation Guide
Outdoor 4G LTE CPE Installation GuideOutdoor 4G LTE CPE Installation Guide
Outdoor 4G LTE CPE Installation Guide
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
X lite3.0 user-guide (1)
X lite3.0 user-guide (1)X lite3.0 user-guide (1)
X lite3.0 user-guide (1)
 
OpUtils Free training
OpUtils Free training OpUtils Free training
OpUtils Free training
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
 
WebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP WorldsWebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP Worlds
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdfAttacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Workshop web rtc customers and use cases
Workshop web rtc customers and use casesWorkshop web rtc customers and use cases
Workshop web rtc customers and use cases
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 

Mehr von KHNOG

Mehr von KHNOG (19)

SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
 
Network Exploitation
Network ExploitationNetwork Exploitation
Network Exploitation
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
Why / How to become the Linux certified
Why / How to become the Linux certifiedWhy / How to become the Linux certified
Why / How to become the Linux certified
 
Terminal Access Controller
Terminal Access ControllerTerminal Access Controller
Terminal Access Controller
 
Introduction to BRAS
Introduction to BRASIntroduction to BRAS
Introduction to BRAS
 
ElasticISP
ElasticISPElasticISP
ElasticISP
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
 
Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 
Transmission Technologies
Transmission TechnologiesTransmission Technologies
Transmission Technologies
 
Testing Fiber-Optic Systems
Testing Fiber-Optic Systems Testing Fiber-Optic Systems
Testing Fiber-Optic Systems
 
RPM Junos-service
RPM Junos-serviceRPM Junos-service
RPM Junos-service
 
Incoming Outgoing Spam Filter
Incoming Outgoing Spam FilterIncoming Outgoing Spam Filter
Incoming Outgoing Spam Filter
 
MPLS
MPLSMPLS
MPLS
 
How to Prevent DHCP Spoofing
How to Prevent DHCP SpoofingHow to Prevent DHCP Spoofing
How to Prevent DHCP Spoofing
 
Software Define Network (SDN) and Openflow
Software Define Network (SDN) and OpenflowSoftware Define Network (SDN) and Openflow
Software Define Network (SDN) and Openflow
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Hotspot on Mikrotik Router

  • 1. HOTSPOT  MIKROTIK PREPARED  BY  MR  EAN  SARATH ,  4  MAY  2016
  • 2. Name: EAN Sarath Technical Support at MaxBIT ISP Certification : MTCNA Areas of Interest : VPN Tunnel, Routing & Switching Skype : sarath.ean1 FB: Sarath EAN 2 About  Me
  • 3. 1. What is Hotspot 2. Benefit of Hotspot 3. Configure Hotspot 4. Bypassing Hotspot 5. Limit User Bandwidth 6. Shared Users Hotspot 7. Question & Answer 3 Content
  • 4. • Hotspots are used to provide access services (Internet / Intranet)in the public area, using cable or wireless. And provide web services authenticated username and password before access to internet. • Remote Authentication Dial-­‐In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. 4 What  is  Hotspot  
  • 5. 5 Benefit  of  Hotspot   Copyright®MaximumBusiness informationTechnology • Require  Security  login  page  to   internet. • Provide  friendly  page  login  by   editing. • Provide  Advertisement  own   company  web  page  login. • Provide  specific  website,  bypass   the  more  specific  resource  at  a   certain  protocol  and  port. • Provide  bandwidth  limitation  per   user  login  hotspot. • Share  User  Hotspot  can  access  in   the  same  time. • Interact  with  other  radius  server   &  user-­‐manager  in  Mikrotik.  
  • 6. Configure  Hotspot   Hotspot  server   o We  will  run  hotspot  in  LAN,  your  laptop  is  hotspot  client. o Hotspot  will  run  on  interface  connecting  to  your  laptop 7
  • 7. There  are  some  step  configure  Hotspot  :   a. Configure  IP  interface  Hotspot   IP à Address à Click  Add b.        Configure  IP  Pool   IP à Pool  à click  Add c. Configure  DHCP  server IP  à DHCP  SERVER  à click  Add d.          Configure  Hotspot  Server   In  menu  IP  à Hotspot à Setup   7 Configure  Hotspot   Follow  the  same  steps  : Configure  Hotspot  Wizard   in  Menu  IP à Hotspot  à Setup Wizard  
  • 8. 8 Configure  Hotspot   In menu IP>Hotspot>Setup Wizard 1 2 34 5 6 7 8
  • 9. There  are  several  ways  you  can  do  to  bypass  the  host  in  order  not  to  perform   authentication  when  it  will  enter  the  hotspot  network,  as  follows. • IP  Binding   o Allow    specific  user  to  access  without  login. o Use  bypass  Printers,  IP  phones,  Security  camera  …  etc. o Configure  in  menu  IP à Hotspot à IP  Binding. 9 Bypassing  Hotpots  
  • 10. • Walled  Garden o Allow  all  users  to  access  specific  websites. o Company  website,  intranet,  internet  banking  …etc.   o Configure  in  menu  IP à Hotspot à Walled  Garden 10 Bypassing  Hotpots  
  • 11. • Walled  Garden  IP o Allow  all  user  access  specific  protocol o To  bypass  HOST/IP  with  several  or  ALL  services  can  be  accessible  from   hotspot  client  without  authentication  (router,  mail  server,  etc.) o Configure  in  menu  IP à Hotspot  à Walled  Garden  IP 11 Bypassing  Hotpot
  • 12. 12 Limit  User  Bandwidth  (Local) • Limit  user  bandwidth,  using  Mikrotik  hotspot  local  user  profile. • Can  be  set  from  Hotspot  à User  Profile   • Configure  :  General  à Rate  Limit  (rx/tx) 1 2
  • 13. • One  user  name  can  be  used  more  than  once,  for  limit  number. • Set  the  limit  number  of  user  from  hotspot  à User  profile.   • Configuration  :   -­‐ General  à Share  User  (  Set  the  maximum  limit) 13 Shared  Users
  • 15. 15 Question  &  Answer Thanks  for  your  spend  valuable  times  JJ