MikroTik Experience Overview - Wireless ISP Solutions

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

MikroTik Vendor Session © MikroTik MikroTik Vendor Session WISPNOG February th, 2005 Chicago, IL.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
300Mbps n Wireless Gigabit Router
Module 5: Configuring Access for Remote Clients and Networks.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
Remote Networking Architectures
RouterBOARD 1000 September, 2008 product overview.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
300Mbps Dual Band Wireless VDSL2 Router VDR-300NU.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Tunnel & VPN Divisi Training PT UFOAKSES SUKSES LUARBIASA Jakarta
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Wireless Networks Tamus, Zoltán Ádám
Computer Concepts 2014 Chapter 5 Local Area Networks.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Networks.
USRxx8011: Wireless Cable and DSL Router. 11 Mbps Wireless Networking Products USR 11Mbps Wireless PCI Card USR 11Mbps Wireless PCMCIA Card USR 11Mbps.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Module 10: Providing Secure Access to Remote Offices.
Wireless ISP Infrastructure
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
RouterOS, in a Distributed Internet Services Delivery Environment Mike Everest, DuxTel Pty Ltd.
Fun with EoIP Mike Everest, DuxTel Pty Ltd. Ethernet over IP …not just another GRE tunnel! Transparent layer2 transport Presents as a virtual Interface.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Building Corporate Data Networks – A Case Study
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Getting Connected to NGS while on the Road…
Virtual Private Network (VPN)
Virtual Private Networks
Planning and Troubleshooting Routing and Switching
Faiza Iqbal Mobile Networks Faiza Iqbal EC-425 Mobile Networks Lab 1.
Network+ Guide to Networks 6th Edition
Virtual Private Network (VPN)
PPPoE Internet Point to Point Protocol over Ethernet
Virtual Private Network
Getting Connected to NGS while on the Road…
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Presentation transcript:

MikroTik Experience Overview - Wireless ISP Solutions 19.02.2002. MikroTik Experience Overview - Wireless ISP Solutions Arnis Riekstins, Chief Technical Officer John Tully, Managing Director, MikroTik PPPoE Seminārs

Wireless Presentation Program Overview of MikroTik experience Basics of Wireless ISP solutions “Question and answer” to clarify the most important topics for the attendees Wireless ISM issues – interference Network infrastructure Traffic shaping AP setup and backbone routing Low cost wireless client setups with PPPoE 10.05.2002. MikroTik Overview

Contents MikroTik Company Overview 19.02.2002. Contents MikroTik Company Overview What’s new in MikroTik RouterOS V2.5 PPPoE Overview and Applications PPTP Applications OSPF Routing and Backup Links Combining PPTP and OSPF for Backup Links 10.05.2002. MikroTik Overview PPPoE Seminārs

MikroTik 19.02.2002. MikroTik Mission We create Intel (PC) based network solutions, because: Hardware cost can be adjusted to the client’s needs – contemporary or ‘server-quality’ Intel is the most powerful and most price attractive platform Easy hardware upgrade RouterOS can be easily upgraded with new functionality 10.05.2002. MikroTik Overview PPPoE Seminārs

MikroTik Mission (cont.) 19.02.2002. MikroTik Mission (cont.) How do we do things?: We are a small WISP ourselves, therefore we are able to develop solutions for our customers based on our own experience Our customers are: Internet Service Providers (ISPs) Hardware wireless ISPs – more than 45 countries Software RouterOS – almost all countries (120+) Organizations requiring IP network solutions for their own needs – corporate networks (Intranets) 10.05.2002. MikroTik Overview PPPoE Seminārs

MikroTik’s History Active in WISP solutions since 1995 19.02.2002. MikroTik’s History Active in WISP solutions since 1995 Incorporated in 1996 Wireless ISP Projects around the World Since 1996 Development of own Software for Intel (PC) based routing solutions 2002: 20+ employees (programmers, engineers, sales, technical support, administrative) 10.05.2002. MikroTik Overview PPPoE Seminārs

MikroTik News New Hardware platforms Software V2.5 released 19.02.2002. MikroTik News New Hardware platforms Software V2.5 released MikroTik provides training on wireless installations and network setup – next seminar in Prague, Czech Republic, June 26-28 10.05.2002. MikroTik Overview PPPoE Seminārs

New Hardware platforms MikroTik 19.02.2002. New Hardware platforms MikroTik Thin Router 333MHz Processor, 10/100Mbps Ethernet, one expansion slot for ISA or PCI 19” Rackmount 4U – Silver Server style Gigabit Ethernet Prism II 200mW Wireless Interfaces 10.05.2002. MikroTik Overview PPPoE Seminārs

MikroTik RouterOS V2.5 PPPoE Access Concentrator 2.4GHz Access Point 19.02.2002. MikroTik RouterOS V2.5 PPPoE Access Concentrator 2.4GHz Access Point VPN (PPTP tunnels between routers) PPTP Access Concentrator (PPTP tunnels between the router and workstations) EoIP tunnels – for transparent bridging of networks 10.05.2002. MikroTik Overview PPPoE Seminārs

PPPoE Access Concentrator MikroTik 19.02.2002. PPPoE Access Concentrator Usage: For Ethernet LANs, to assign IP addresses to workstations, e.g.: Multi-apartment buildings Offices, to provide user authentication and accounting Schools and universities, computer classes Connections to Wireless ISPs Connections to xDSL providers 10.05.2002. MikroTik Overview PPPoE Seminārs

PPPoE Access Concentrator MikroTik 19.02.2002. PPPoE Access Concentrator Advantages User authentication 128bit tunnel between the workstation and the PPPoE Access Concentrator Easy user management using RADIUS server 10.05.2002. MikroTik Overview PPPoE Seminārs

VPN 128bit encrypted tunnels Applications: MikroTik 19.02.2002. VPN 128bit encrypted tunnels Applications: Permanent tunnels between routers PPTP Access Concentrator for many clients (Windows workstations) and mobile clients (work from home and while traveling) 10.05.2002. MikroTik Overview PPPoE Seminārs

Ethernet over IP (EoIP) Tunnels MikroTik 19.02.2002. Ethernet over IP (EoIP) Tunnels Application: To bridge Ethernet LANs Can be used together with PPTP tunnels Bandwidth can be limited over the tunnels Providers can sell bandwidth to the corporate customers for their Intranet needs 10.05.2002. MikroTik Overview PPPoE Seminārs

2.4GHz Access Point Can be used as IEEE 802.11b AP in several ways: MikroTik 19.02.2002. 2.4GHz Access Point Can be used as IEEE 802.11b AP in several ways: Simple Access Point Wireless AP and Ethernet router in one box Wireless AP and PPPoE Access Concentrator Can have several wireless interfaces Can be a wireless client and an AP Can be used to register other APs and bridge the networks 10.05.2002. MikroTik Overview PPPoE Seminārs

Synchronous Adapters Cyclades PC300 V.35 Synchronous MikroTik 19.02.2002. Synchronous Adapters Cyclades PC300 V.35 Synchronous For leased lines with baseband modems, supports Frame Relay Cyclades PC300 E1/T1 For leased lines MOXA C101 V.35 Synchronous 10.05.2002. MikroTik Overview PPPoE Seminārs

Training Topics Contact us: MikroTik 19.02.2002. Training Topics MikroTik RouterOS Installation and Configuration Wireless Network Planning and Developing LAN Development using PPPoE Protocol Contact us: sales@mikrotik.com support@mikrotik.com 10.05.2002. MikroTik Overview PPPoE Seminārs

PPTP Protocol Virtual Private Networks (VPN) MikroTik 19.02.2002. PPTP Protocol Virtual Private Networks (VPN) Data Encryption over PPTP Links PPTP and Corporate Networks Bandwidth Management on PPTP Tunnels 10.05.2002. MikroTik Overview PPPoE Seminārs

PPTP Applications MikroTik 19.02.2002. 10.05.2002. MikroTik Overview PPPoE Seminārs

Interconnecting Offices MikroTik 19.02.2002. Interconnecting Offices 10.05.2002. MikroTik Overview PPPoE Seminārs

OSPF Backup MikroTik 19.02.2002. 10.05.2002. MikroTik Overview PPPoE Seminārs

OSPF Backup over PPTP MikroTik 19.02.2002. 10.05.2002. MikroTik Overview PPPoE Seminārs

Conclusions OSPF to be used for routing and connection backup MikroTik 19.02.2002. Conclusions OSPF to be used for routing and connection backup VPNs (PPTP) to be used for secure (128bit encryption) tunnels EoIP for bridging the Ethernet LANs PPPoE Access Concentrator for secure access to IP networks 10.05.2002. MikroTik Overview PPPoE Seminārs