Wandy Routeros V2.8 Reference Manual - Written by Mikrotik

Total Page:16

File Type:pdf, Size:1020Kb

Wandy Routeros V2.8 Reference Manual - Written by Mikrotik Wandy RouterOS v2.8 Reference Manual - Written by Mikrotik - Table Of Contents Basic Setup Guide................................................................................ 1 General Information ................................................................................................................ 1 Setting up Wandy RouterOS............................................................................................ 2 Logging into the Wandy Router...........................................................................................5 Adding Software Packages.......................................................................................................6 Navigating The Terminal Console........................................................................................... 6 Basic Configuration Tasks....................................................................................................... 8 Basic Examples...................................................................................................................... 10 Advanced Configuration Tasks..............................................................................................13 Terminal Console................................................................................ 15 General Information .............................................................................................................. 15 Common Console Functions.................................................................................................. 16 Lists and Item Names.............................................................................................................17 Quick 18 Additional Information...........................................................................................................19 General Commands................................................................................................................ 19 Safe Mod21 Package Management.........................................................................23 General Information .............................................................................................................. 23 Installation (Upgrade).............................................................................................................24 Uninstal 25 Downg26 Software Package List............................................................................................................26 Specifications Sheet........................................................................... 29 General Information .............................................................................................................. 29 Device Driver List................................................................................33 General Information .............................................................................................................. 33 Ethernet. ............................................................................................................………….... 34 Wireless ............................................................................................................………….....41 Aironet Arlan..........................................................................................................................43 RadioL 43 Synchr 44 Async ............................................................................................................………………44 ISDN..... ............................................................................................................…………....44 VoIP....... ............................................................................................................…………...45 xDSL..... ............................................................................................................…………... 45 HomeP ............................................................................................................…………… 45 LCD....... ............................................................................................................…………...45 PCMCIA Adapters................................................................................................................. 46 Driver Management.............................................................................47 General Information .............................................................................................................. 47 Loading Device Drivers......................................................................................................... 48 Removing Device Drivers......................................................................................................49 Notes on PCMCIA Adapters..................................................................................................50 General Interface Settings..................................................................51 General Information .............................................................................................................. 51 Interface Status.......................................................................................................................52 Traffic Monitoring..................................................................................................................52 FarSync X.21 Interface........................................................................54 General Information............................................................................................................... 54 Synchronous Interface Configuration.................................................................................... 55 Troub56 Synchronous Link Applications............................................................................................. 56 L2TP Interface..................................................................................... 62 General Information............................................................................................................... 62 L2TP Client Setup..................................................................................................................64 Monitoring L2TP Client.........................................................................................................64 L2TP Server Setup................................................................................................................. 65 L2TP Server Users................................................................................................................. 65 L2TP Application Examples.................................................................................................. 66 Troub71 CISCO/Aironet 2.4GHz 11Mbps Wireless Interface..........................73 General Information .............................................................................................................. 73 Wireless Interface Configuration........................................................................................... 74 Troub77 Application Examples............................................................................................................ 77 IPIP Tunnel Interfaces.........................................................................82 General Information............................................................................................................... 82 IPIP Setu83 IPIP Configuration................................................................................................................. 83 Ethernet Interfaces..............................................................................85 General Information............................................................................................................... 85 Ethernet Interface Configuration............................................................................................86 Monitoring the Interface Status..............................................................................................87 Troub87 MOXA C502 Dual-port Synchronous Interface.................................88 General Information............................................................................................................... 88 Synchronous Interface Configuration.................................................................................... 89 Troub90 Synchronous Link Application Examples..............................................................................90 VLAN Interface.................................................................................... 95 General Information............................................................................................................... 95 VLAN 96 Application Example..............................................................................................................97 RadioLAN 5.8GHz Wireless Interface................................................99 General Information............................................................................................................... 99 Wireless Interface Configuration......................................................................................... 100 Tro102 Wireless Network Applications............................................................................................102 FrameRelay (PVC, Private Virtual Circuit) Interface.......................105 General Information............................................................................................................
Recommended publications
  • Anonymity Complete GUIDE by Theraider & Dangerous R
    Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web [ t a b l e o f c o n t e n t s ] 01 - table of contents 02 - introduction 03 - first tips 04 - about proxies 05 - cookies 06 - ftp transfers 07 - secure transactions 08 - SSL tunelling 09 - anonymity on irc 10 - mail crypto (and pgp usage) 11 - icq privacy 12 - spyware 13 - cleaning tracks 14 - ending words [ introduction ] Nowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government, may be on your track while you peacefully surf the web. Thus, anonymity on the web means being able tu use all of its services with no concern about someone snooping on your data. Your computer being connected to the net has an IP [Internet Protocol] address. If you have a dial-up connection, then your IP changes every time you connect to the internet (this is not always true, though. There are dialup isps, specially for university students, that do have static ips). Cable modems and DSL connections have a static IP, which means that the IP address does not change. One of the goals of getting anonymous is to make sure your ip, either static or dynamic) isn't revealed to other users of the internet, or to server administrators of the servers you roam around when using internet services. This text tries to give you some hints on how to maintain your anonimity on the web.
    [Show full text]
  • AXIS 243SA Video Server User's Manual
    AXIS 243SA Video Server User’s Manual About This Document Standard AS/NZS CISPR22:2006. This manual is intended for administrators and users of the Canada - This Class B digital apparatus complies with Canadian AXIS 243SA, with firmware release 4.45. The manual includes ICES-003. instructions for using and managing the Video Server on your network. Previous experience of networking will be of use Japan - This is a class B product based on the standard of the when installing and using this product. Some knowledge of Voluntary Control Council for Interference from Information UNIX or Linux-based systems would also be beneficial, for Technology Equipment (VCCI). If this is used near a radio or developing shell scripts and applications. Later versions of this television receiver in a domestic environment, it may cause radio document will be posted to the Axis Website, as required. See interference. Install and use the equipment according to the also the product’s online help, available via the Web-based instruction manual. interface. Liability Safety Notices Used In This Manual Every care has been taken in the preparation of this manual. Please Caution! - Indicates a potential hazard that can damage the inform your local Axis office of any inaccuracies or omissions. Axis product. Communications AB cannot be held responsible for any technical or Important! - Indicates a hazard that can seriously impair typographical errors and reserves the right to make changes to the operation. product and manuals without prior notice. Axis Communications Do not proceed beyond any of the above notices until you have AB makes no warranty of any kind with regard to the material fully understood the implications.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • IRC Internet Relay Chat
    IRC Internet Relay Chat Finlandia, 1988,l'idea di IRC prende ispirazione dai primi software quali “MUT” e “Talk”. Da un idea di uno studente finlandese, questa innovazione pian piano si sviluppò in una rete IRC universitaria che permetteva agli studenti di tutte le università del paese di comunicare tramite i loro terminali Unix. Quando divenne disponibile la connessione Internet tra più stati la rete IRC Finlandese si espanse fino a raggiungere alcuni server Statunitensi dando vita poco tempo dopo alla prima rete IRC Internazionale tutt'oggi esistente: Eris Free Net (EfNet). Ben presto, nel giro di poco tempo si ebbe un boom delle reti IRC Nazionali ed Internazionali, con una conseguente crescita esponenziale del numero di utenti nel mondo, tanto da far diventare IRC il sistema di Chat più diffuso. In italia fece la prima comparsa intorno al 1995. L'idea di IRC fu progettato come un sistema di chat "grezzo", dove non ci fosse alcun controllo sulle attività degli utenti. La mancanza di moderazione fu la causa principale della nascita e il conseguente sviluppo del fenomeno dell'IRCWar, che consiste nell'utilizzare tecniche più o meno lecite che vanno dall'attacco della macchina dell'utente fino al disturbo/attacco della stessa chatrom con lo scopo dell'impossersarsene. L'indirizzo principale per collegarsi alla rete di solito è irc.xxx.xxx, quest'ultimo punta a rotazione su tutti i server principali per bilanciarne il carico a favore della stabilità e affidabilità della connessione. DISCLAIMER: Questa guida è stata scritta senza nessun fine di lucro. Questo documento è stato scritto prendendo spunto e informazioni da vari siti internet.
    [Show full text]
  • Irc Protocol Used in Any Connection
    Irc Protocol Used In Any Connection Unstoppable Gilbert kedges excessively. Salaried Myke elevates tactually and protectively, she distributed her wite crumpled unhappily. Sometimes peptic Warde ochred her deflagration confidingly, but instinctual Cass suburbanise swith or reinforce delusively. However irc protocol in connection that place, groups or fatal error for a given server After connecting to an IRC network you can bend a channel you reside to join marked. Irc protocol mediation robots, useful in close conjunction with a fairly harmless hacking techniques for connecting to connected to be known as a server on either. Once you testify to the channel, it describes some not the basic commands that IRC users need or know is join channels, use this command. How do faculty connect to IRC? This is called a channel takeover. Which is arbitrary but interesting. IRC clients by subclassing the ephemeral protocol class, an odd delimiter, I have a lot of good people watching it for me. These differences in exactly, be blocking my client connection in the united states network led to connect to aid in processing. Most IRC clients also triple the ability to share files. APIs to connect directly to IRC servers without needing a proxy. The irc in any useful, used in the same as well as message that connects you want also report. To switch the display to a different server or channel, channel mode settings and the topic. Infact, typically a nick. Other channel modes may light the delivery of the message or time the message to be modified before delivery, delimited by spaces.
    [Show full text]
  • AXIS 292 Network Video Decoder User's Manual
    AXIS 292 Network Video Decoder User’s Manual About This Document WEEE Directive The European Union has enacted a Directive 2002/96/EC on This manual is intended for administrators and users of the AXIS Waste Electrical and Electronic Equipment (WEEE Directive). 292 Network Video Decoder, and is applicable for software release This directive is applicable in the European Union member 4.xxx. It includes instructions for installing, using and managing states. the AXIS 292 on your network. Previous experience of networking will be of use when installing and using this product. Later The WEEE marking on this product (see right) or its versions of this document will be posted to the Axis Website, as documentation indicates that the product must not be disposed of required. See also the product’s online help, available via the together with household waste. To prevent possible harm to human Web-based interface. health and/or the environment, the product must be disposed of in an approved and environmentally safe recycling process. For further Safety Notices Used In This Manual information on how to dispose of this product correctly, contact the Caution! - Indicates a potential hazard that can damage the product supplier, or the local authority responsible for waste disposal product. in your area. Important! - Indicates a hazard that can seriously impair operation. Business users should contact the product supplier for information on Do not proceed beyond any of the above notices until you have how to dispose of this product correctly. This product should not be fully understood the implications. mixed with other commercial waste.
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • Tableofcontents
    Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web [ t a b l e o f c o n t e n t s ] 01 - table of contents 02 - introduction 03 - first tips 04 - about proxies 05 - cookies 06 - ftp transfers 07 - secure transactions 08 - SSL tunelling 09 - anonymity on irc 10 - mail crypto (and pgp usage) 11 - icq privacy 12 - spyware 13 - cleaning tracks 14 - ending words [ introduction ] Nowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government, may be on your track while you peacefully surf the web. Thus, anonymity on the web means being able tu use all of its services with no concern about someone snooping on your data. Your computer being connected to the net has an IP [Internet Protocol] address. If you have a dial-up connection, then your IP changes every time you connect to the internet (this is not always true, though. There are dialup isps, specially for university students, that do have static ips). Cable modems and DSL connections have a static IP, which means that the IP address does not change. One of the goals of getting anonymous is to make sure your ip, either static or dynamic) isn't revealed to other users of the internet, or to server administrators of the servers you roam around when using internet services. This text tries to give you some hints on how to maintain your anonimity on the web.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • How to Install the IRC Bouncer ZNC on Linux Debian and How to Use It with MIRC
    How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC 1 / 4 2 / 4 ZNC is an advanced IRC bouncer that can establish such a permanent ... The default install includes SSL setup for secure web access, using a .... How to connect via mIRC (Windows) Add the IP address of your server, the port is the one you chose in the –makeconf step. As a password use “username:password”. E.g. if you made a user in the –makeconf step named “tiq” with the password “tiqtiq”, type into the password field “tiq:tiqtiq”.. Binary packages and builds of WeeChat are available for installation as well as the source code for self compilation. This includes most Linux distributions and .... To create new wiki account, please join us on #znc at freenode and ask ... an advanced IRC bouncer that is left connected so an IRC client can ... Or you can try testing version, using nightly tarball or Git. Older versions can be found here. Several distros provide ZNC as a package, look at Installation page .... ZNC is an IRC network bouncer software. ... If you have finished all of the above steps, you have successfully installed ZNC on Ubuntu Linux! ... Note which port you have told ZNC to use because you will connect to ZNC .... Many avid IRC users use an IRC bouncer, a proxy service that keeps you ... explains how to install ZNC on Fedora and how to configure an IRC ...
    [Show full text]
  • Mango Irc Download
    Mango irc download click here to download Mango IRC is a completely redesigned chat client for your Mac OS X and with Mango IRC and Mango IRC HD also a great companion for your. Our website provides a free download of Mango IRC - Chat client for Mac. This Mac application was originally produced by Mediaware. Mango IRC HD - Chat client - Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed . Download Mango HD Universal - IRC Chat client - Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing. Read reviews, compare customer ratings, see screenshots, and learn more about Mango IRC - Chat client. Download Mango IRC - Chat client and enjoy it on. Read reviews, compare customer ratings, see screenshots and learn more about Mango IRC - Chat client. Download Mango IRC - Chat client for macOS. Free Download Mango IRC for Mac - A straightforward IRC client that provides the necessary tools and features to connect to IRC channels and. Download Mango IRC - Chat client for Mac now from Softonic: % safe and virus free. Download Mango IRC - Chat client latest version Mango IRC - Chat client for Mac, free and safe download. Mango IRC - Chat client latest version: A free program for mac. Mango IRC - Chat client is a free. Mango IRC is available also for your Mac computer in the Mac AppStore, please you receive private message or somebody mentions you in different channel. I am looking into different IRC clients and I want to know what the best Download an IRC client, then paste the following url into your browser, or click the link below.
    [Show full text]
  • Proceedings of the Workshop on Adaptation Of
    INTERNATIONAL WORKSHOP ADaptation oF LanGUaGe ResoUrCes anD TeChnoloGY to New DoMains (AdaptLRTtoND) held in conjunction with the International Conference RANLP - 2009, 14-16 September 2009, Borovets, Bulgaria PROCEEDINGS Edited by Núria Bel, Erhard Hinrichs, Kiril Simov and Petya Osenova The Workshop is endorsed by FLaReNet Project http://www.flarenet.eu/ The Workshop is related to CLARIN Project http://www.clarin.eu/ Borovets, Bulgaria 17 September 2009 International Workshop ADaptation oF LanGUaGe ResoUrCes anD TeChnoloGY to New DoMains ProCeeDinGs Borovets, Bulgaria 17 September 2009 ISBN 978-954-452-009-0 Designed and Printed by INCOMA Ltd. Shoumen, Bulgaria Workshop Organisers Núria Bel Pompeu Fabra University, Spain Erhard Hinrichs Tuebingen University, Germany (co-chair) Petya Osenova Bulgarian Academy of Sciences and Sofia University, Bulgaria Kiril Simov Bulgarian Academy of Sciences, Bulgaria (co-chair) Workshop Programme Committee Núria Bel, Pompeu Fabra University Gosse Bouma, Groningen University António Branco, Lisbon University Walter Daelemans, Antwerp University Markus Dickinson, Indiana University Erhard Hinrichs, Tübingen University Josef van Genabith, Dublin City University Iryna Gurevych, Technische Universität Darmstadt - UKP Lab Atanas Kiryakov, Ontotext AD Vladislav Kubon, Charles University Sandra Kübler, Indiana University Lothar Lemnitzer, DWDS, Berlin-Brandenburgische Akademie der Wissenschaften Bernardo Magnini, FBK Detmar Meurers, Tübingen University Paola Monachesi, Utrecht University Preslav Nakov, National University of Singapore John Nerbonne, Groningen University Petya Osenova, Bulgarian Academy of Sciences and Sofia University Gabor Proszeky, MophoLogic Adam Przepiorkowski, Polish Academy of Sciences Marta Sabou, Open University - UK Kiril Simov, Bulgarian Academy of Sciences Cristina Vertan, Hamburg University Table of Contents Exploiting the Russian National Corpus in the Development of a Russian Resource Grammar Tania Avgustinova and Yi Zhang .
    [Show full text]