DBII-F20 Wireless Minipci 500mW BG

Posted by Admin Saturday, December 25, 2010 0 comments

DBii-F20 wireless minipci card work at 2,4GHz, output power 500 mWatt have Rx sensivity until -97 dbm. Include pigtail MMCX to N-Female.

Transmitter Characteristics (Tx)

Transparent Mikrotik Web Proxy

Posted by Admin Tuesday, December 21, 2010 0 comments
first set web proxy
/ ip web-proxy
set enabled=yes –>> to make ip web proxy enable
set src-address=0.0.0.0 –>> to make source address to access web proxy will allow
set port=8080 –>> to make port for web proxy
set hostname=”proxy.war.net.id” –>> setting for visble hostname web proxy
set transparent-proxy=yes –>> make transparant proxy enable
set parent-proxy=0.0.0.0:0–>> if we used parent proxy x
set cache-administrator=”support@somethink.org” –>> make set administrator info support

NAT for Create DOTA Server

Posted by Admin Thursday, December 16, 2010 0 comments
Three simple rules for for Create DOTA Server
/ip
firewall
nat
add
chain=srcnat
action=masquerade
out-interface=Public

/ip
firewall
nat
add
chain=dstnat
dst-address=202.xxx.xxx.xxx(ip public)
protocol=tcp
dst-port=xxx(DOTA port)
action=dst-nat
to-addresses=192.168.xxx.xxx(private ip)
to-port=xxx(DOTA port)


Mikrotik Hotspot Setup

Posted by Admin Tuesday, December 14, 2010 0 comments
We assume that the mikrotik was connect to the internet, so we not have to write in this artilce about setting gateway.

Run the hotspot setup as below. Substitute the values in italics to suit your network. The user account bears no relation to the admin account and is used for the hotspot service only. You may also need to add a host record to your DNS server for the hostname of the hotspot box. Make sure the address pool does not conflict with any devices using static IPs, such as access points.

Mikrotik VPN Client Connection - PPTP

Posted by Admin Monday, December 13, 2010 4 comments
Mikrotik VPN Client Connection - PPTP - This one will show you how to do a simple PPTP setup on your Mikrotik and even how to configure your Windows machine to connect to said PPTP server. This will allow you to securely access your network remotely by creating a secure tunnel over the internet.
vpn1

Mikrotik Queue Bandwidth Management Using PCQ

Posted by Admin Sunday, December 12, 2010 0 comments
Per Connection Queue (PCQ) is a queuing discipline that can be used to dynamically equalize or shape traffic for multiple users, using little administration. It is possible to divide PCQ scenarios into three major groups: equal bandwidth for a number of users, certain bandwidth equal distribution between users, unknown bandwidth equal distribution between users.


Equal Bandwidth for a Number of Users

Use PCQ type queue when you need to equalize the bandwidth [and set max limit] for a number of users. We will set the 512kbps download and 128kbps upload limits.


Mikrotik Load Balancing With NTH For 3 Line Internet Source

Posted by Admin Thursday, December 9, 2010 0 comments
This is my firewall mangle, Nat, and Routing Rules for Load Balance with NTH metod at mikrotik 3.x. With This Rules, we can optimize if we have more than one internet connection from ISP's. For Example, if i have 3 line source internet where each speed is 1Mbps, we can optimize to be 3Mbps in one time. To Test this setting, i use Internet Download Manager. Ok this is my rules:

Minimum Mikrotik Firewall Rules

Posted by Admin 0 comments
To prevent our network from hacker attack, i use this Minimum Mikrotik Firewall Rules. This Rules is my minimum setting, you can expand it dpend on your network necessery. Here's the code :


/ip firewall filter

add action=drop chain=input comment="" disabled=no dst-port=20-21 protocol=\
tcp src-address-list=!allow
add action=drop chain=input comment="" disabled=no dst-port=22 protocol=tcp \
src-address-list=!allow
add action=drop chain=input comment="" disabled=no dst-port=23 protocol=tcp \
src-address-list=!allow
add action=drop chain=input comment="" disabled=no dst-port=80 protocol=tcp \
src-address-list=!allow

add action=drop chain=forward comment="" disabled=no dst-port=445 \
out-interface=public_interface protocol=tcp
add action=drop chain=forward comment="" disabled=no dst-port=137-139 \
out-interface=public_interface protocol=tcp
add action=drop chain=forward comment="" disabled=no dst-port=137-139 \
out-interface=public_interface protocol=udp
add action=drop chain=forward comment="block spammer or infected users" \
disabled=no dst-address=!xxx.xxx.xxx.xxx/xx dst-port=25 protocol=tcp \
src-address-list=spammer
add action=log chain=forward comment="trap spammers" connection-limit=30,32 \
disabled=no dst-address=!xxx.xxx.xxx.xxx/xx dst-port=25 limit=50,5 \
log-prefix=spammertrap protocol=tcp
add action=add-src-to-address-list address-list=spammer address-list-timeout=\
1d chain=forward comment="trap spammers" connection-limit=30,32 disabled=\
no dst-address=!xxx.xxx.xxx.xxx/xx dst-port=25 limit=50,5 protocol=tcp