The Use of Mikrotik Router Boards With Radius Server for ISPs.



Similar documents
» David Bisschoff» Durban, South Africa» Work at Kinsey Computers» Discovered MikroTik in Kinsey Computers cc

MikroTik Certified Network Associate (MTCNA) Training outline

Multi-Homing Security Gateway

Networking Basics for Automation Engineers

Building Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth.

Load Balancing Using PCC & RouterOS

How To Configure Apple ipad for Cyberoam L2TP

Load Balancing Using PCC & RouterOS

Chapter 9 Monitoring System Performance

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

DV230 Web Based Configuration Troubleshooting Guide

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Application Description

DSL-2600U. User Manual V 1.0

Chapter 6 Using Network Monitoring Tools

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

LAN TCP/IP and DHCP Setup

Best Practices: Pass-Through w/bypass (Bridge Mode)

PPTP Server Access Through The

estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server

University of Hawaii at Manoa Professor: Kazuo Sugihara

Multi-Homing Dual WAN Firewall Router

Chapter 6 Using Network Monitoring Tools

Chapter 3 Security and Firewall Protection

HREP Series DVR DDNS Configuration Application Note

How to configure your Thomson SpeedTouch 780WL for ADSL2+

Configuring Routers and Their Settings

Basic IPv6 WAN and LAN Configuration

User Manual. Page 2 of 38

LOHU 4951L Outdoor Wireless Access Point / Bridge

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Installation of the On Site Server (OSS)

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1

Edgewater Routers User Guide

Chapter 3 LAN Configuration

Knowledgebase Solution

Chapter 1 Configuring Basic Connectivity

How To Check If Your Router Is Working Properly

1 PC to WX64 direction connection with crossover cable or hub/switch

VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS

RAP Installation - Updated

WAN Failover Scenarios Using Digi Wireless WAN Routers

Chapter 4 Customizing Your Network Settings

Application Note Secure Enterprise Guest Access August 2004

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Cisco Virtual Office Express

UIP1868P User Interface Guide

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Lab Configuring Access Policies and DMZ Settings

WISP 101. The DO s and DON T s of becoming a Wireless ISP

Load Balance Router R258V

Edgewater Routers User Guide

User Manual DIR-632. Multifunction Wireless Router Supporting WiMAX, 3G GSM/CDMA with Built-in 8-port Switch

DSL-G604T Install Guides

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Basic Network Configuration

Configuring a customer owned router to function as a switch with Ultra TV

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

VLANs. Application Note

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Nokia Siemens Networks. CPEi-lte User Manual

How To Configure L2TP VPN Connection for MAC OS X client

Quick Installation Guide DAP Wireless N 300 Access Point & Router

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

GregSowell.com. Mikrotik Basics

Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the

Chapter 2 Connecting the FVX538 to the Internet

For extra services running behind your router. What to do after IP change

Gigabit Content Security Router

Quality of Service in wireless Point-to-Point Links

Wireless-N Broadband Router

Innominate mguard Version 6

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G

Using a VPN with Niagara Systems. v0.3 6, July 2013

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

Integrating a Hitachi IP5000 Wireless IP Phone

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Controller Management

Appendix C Network Planning for Dual WAN Ports

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router

VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router


Protecting the Home Network (Firewall)

Quick Installation Guide

Chapter 1 Personal Computer Hardware hours

SIP Trunk Configuration Guide. using

ReadyNAS Remote Troubleshooting Guide NETGEAR

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

TALKSWITCH VOIP NETWORK TROUBLESHOOTING GUIDE

Using Remote Desktop Software with the LAN-Cell

Transcription:

The Use of Mikrotik Router Boards With Radius Server for ISPs. By Zaza Zviadadze, Irakli Nozadze. Intellcom Group, Georgia.

RouterOS features for ISP s RouterOS reach features gives possibilities to ISP s, for managing Their users, including: User authorization Traffic shaping Internet access restriction

RouterOS as radius client Configuring multiple RouterOS based devices as radius clients and setting up radius server, gives possibility to ISP s for centralizing user management.

Network components The network consists of at least three basic components: 1. Remote Stations (WiFi Stations, PC s, SoHo routers, etc) 2. RouterOS s 3. Radius Server Remote stations connect to the RouterOS via LAN or WLAN, and

Network Diagram

1. Remote Stations should be configured as DHCP clients. 2. RouterOS s should be configured as DHCP servers and as Radius clients. 3. Radius Server stores Remote Stations data (IP Addresses, MAC Addresses, Rate Limits, etc.) in their database.

Remote Stations as DHCP Station/PC is configured as DHCP client. After DHCP client is powered on, it s requesting following parameters from DHCP Server: IP Address Default Gateway Subnet Mask DNS

RouterOS as DHCP server and as Radius client RouterOS is configured as DHCP Server + Radius Client. After getting DHCP request from user, RouterOS sends MAC address as username to Radius Server. First, Radius server checks whether user exists, in their database. If user exists, Radius server sends Access-Accept

Radius Server Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization and Accounting (AAA) management for computers to connect and use a network service. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport RADIUS protocol often used by ISPs and enterprises to

Radius Server Data Radius server has abilities to store and retrieve data from SQL databases. In our case radius server is used to retrieve following data: 1) Framed-IP-Address. 2) MT-Rate-Limit.

Framed-IP-Address Framed-IP-Address is user IP address. In our case they statically are assigned to remote station s MAC Addresses. This data is stored in Radius Server Database.

MT-Rate-Limit MT-Rate-Limit defines RX/TX bit rate limits for remote stations, including: Max Limit Burst Limit Burst Threshold Burst Time Priority Min Limit

MT-Address-List MT-Address-List is string used for identifying user groups. In our case, nopayment used to identify suspended users. After service period expiration, a application changes user status, assigns address-list nopayment and stores this data in Radius Server Database. When Remote Station sends DHCP request to DHCP server, address-list among other data are being retrieved from Radius Server. Then some rules configured in RouterOS are used to make appropriate action.

Session-Timeout Session-Timeout attribute sets the maximum number of seconds of service to be provided to the user before this session is expired. This attribute is configured at Radius Server, to be sent by the server to the client in an Access-Accept. Attribute configured in RouterOS, will be overridden by value sent from Radius Server. Changes made in user status (suspension/ unsuspension) or rate limits at Radius Server side, will be effective after current session expiration and new session establishment.

RouterOS Configuration Steps IP Addresses, Gateway, DNS Radius client DHCP server Interface Firewall Web proxy Additional configuration

IP Addresses, Gateway, DNS Assigning IP addresses to the interfaces. /ip address add address=192.168.1.1/24 Interface=ether1 comment= LAN add address=10.0.0.2/24 interface=ether2 comment= WAN Adding Default Gateway /ip route add dst-address=0.0.0.0/0 gateway=10.0.0.1 Configuring DNS client. /ip dns set servers=213.157.196.131, 213.157.196.132

Radius client Configuring Radius client and adding DHCP service. /radius add service=dhcp address=80.200.100.200 Adding backup radius servers is also possible.

DHCP server During DHCP server configuration we are selecting ether1 interface and enabling following options: add ARP for leases, use RADIUS. /ip dhcp-server add add-arp=yes address-pool=static-only interface=ether1 useradius=yes disabled=no Adding network parameters for DHCP server. /ip dhcp-server network add address=192.168.1.0/24 gateway=192.168.1.1 comment= LAN

Interface After DHCP server setup we are configuring Ethernet interface (ether1) and selecting option: arp=reply-only. So, only DHCP server will be able to add Data to the ARP. /interface ethernet set arp=reply-only ether1 If user enters network configuration manually it will not work. This provides additional security to the network.

Web-proxy Next we are enabling Web-proxy server and setting port to 8080. /ip proxy set enabled=yes port=8080 Now we are enabling some URLs in order to make certain web sites available for suspended users. For example, web site of ISP and/or online payments. /ip proxy access add dst-host=isp.com action=allow Finally we are restricting access to all other URLs and redirecting users to suspend page. add dst-host=* action=deny redirect-to= isp.com/suspend"

Firewall Identification of suspended users is being performed via address-list. For example: address-list=nopayment. In the firewall -> nat a rule should be added which will redirect all http traffic of suspended users to Web proxy. /ip firewall nat add chain=dstnat action=redirect to-ports=8080 protocol=tcp src-addresslist=nopayment dst-port=80 Next, should be opened HTTP and DNS ports in Firewall - > Filter. Finally, access to all other protocols are to be restricted. /ip firewall filter add chain=forward action=accept protocol=tcp dst-port=80 add chain=forward action=accept protocol=udp dst-port=53 add chain=forward action=reject reject-with=icmp-host-prohibited src-addresslist=nopayment

Additional Configuration RouterOS also acts as AP For additional security, Radius MAC authentication in wireless security policies should be enabled. In this case, AP accepts only the stations with MAC addresses registered in Radius Server database. / interface wireless security-profiles set [ find default=yes ] radius-mac-authentication=yes /radius Add address=80.200.100.200 service=wireless,dhcp In addition it s also possible to use other security mechanisms

Additional Configuration When AP is placed between RouterOS and Remote Stations, AP must be configured in bridge Mode in order to make possible MAC authentication via RouterOS. For security purposes it s also preferable to use other wi-fi security Mechanisms like WPA/WPA2 authentication, EAP TLS, etc.

Additional Configuration When managed switch is placed between RouterOS and Remote Stations (PC s), for security purposes port isolation should be enabled in the switch configuration. Otherwise users can discover and connect to each other, which may cause serious security issue.

Address List (additional usage) Optionally, Address-List can be used to apply additional policies for different user groups. For example, for the following tasks: Bandwidth limitations for Local and global traffic Bandwidth limitations based on certain time periods Traffic prioritization Access restriction by protocols

Securing Radius Server To secure connections betweens Radius Server and Radius Clients, it is possible to use the following mechanisms: VPN Tunnels between Server and Clients. Firewall configuration on Radius Server side, to allow connections only from certain IP addresses. Use Secret to authorize radius requests from Clients.

Integration with billing system Using RouterOS based devices as Radius clients and Radius Server with custom applications gives possibilities to fully Centralize and Automate all processes : Suspension / unsuspension of users Integration with payment gateways SMS notifications Sending Invoices via email Integration with Web Services etc.

Thank you!