Posts

Showing posts from 2018

Reset Cisco switch port/interface to default then apply vlan

I recently had to wrestle some switch port configurations back to default after applying to dumb settings to them. This was for a Catalyst 3750x in a stack, although it likely applies to many cisco switches. Reset interface (port) to default 1 2 3 4 Switch > en Switch # conf t Switch ( config ) # default interface Gi1/0/1 Switch ( config ) # exit Unfortunately I could not figure out how to do this to the range like in the example below – it’s likely possible, but after the interface range command, trying to give the command default wanted another parameter, and I didn’t want to have to reset each config to default, so I just rant the above command for each interface, then did bulk range operations for applying the vlans. Apply vlans to ranges or interfaces (ports) 1 2 3 4 5 6 7 8 Switch > en Switch # conf t Switch ( config ) # interface range gigabitEthernet 1/0/1-47 Switch ( if - range ) # switchport ac...

How to Block windows update in mikrotik

Image
i dont have the smartest people in the world (what else is new) and the problem is they complain about slow internet when infact windows update is doing its thing in the background and slowing the connection thats already not so fast. /ip firewall layer7-protocol add name="windows update " regexp="^.+(http://windowsupdate.microsoft.com|http://*.windowsupdate.microsoft.\     com|https://*.windowsupdate.microsoft.com|http://*.update.microsoft.com|https://*.update.microsoft.com|\     http://*.windowsupdate.com|http://download.windowsupdate.com|http://download.microsoft.com|http://*.dow\     nload.windowsupdate.com).*\$" /ip firewall filter add action=drop chain=forward comment="windows update Drop" layer7-protocol="windows update " src-address=\     192.168.128.0/24 add action=drop chain=input dst-port=21-23 protocol=tcp

Queues - PCQ Examples

Image
Per Connection Queue (PCQ) is a queuing discipline that can be used to dynamically equalize or shape traffic for multiple users, using little administration. It is possible to divide PCQ scenarios into three major groups: equal bandwidth for a number of users, certain bandwidth equal distribution between users, unknown bandwidth equal distribution between users. Equal Bandwidth for a Number of Users Use PCQ type queue when you need to equalize the bandwidth [and set max limit] for a number of users. We will set the 64kbps download and 32kbps upload limits. There are two ways how to make this: using mangle and queue trees, or, using simple queues. 1. Mark all packets with packet-marks upload/download: (lets constider that ether1-WAN is public interface to the Internet and ether2-LAN is local interface where clients are connected /ip firewall mangle add chain=prerouting action=mark-packet \ in-interface=ether2-LAN new-packet-mark=client_upload /ip firewall mangle add c...

Policy Base Routing

Image
Policy Base Routing In this article you can know what is PBR ( Policy Base Routing ) and how it work with One Example . In your network you may need to get a Strategy for Routing and Setup your Routing In Some Varios Reasons Such as Security , Load Balancing , Routing Decision , Monitoring And etc … With PBR you can get your Policy to route Packet From a Source To a Destination And Select Which of one Path Used for Communications . In this Example I Want Shown To you how you can use PBR to Route Your Request To Internet And Route Your Request To Facebook Website To VPN Client Connection . In My Country Some Social Websites Are Filtered By DCI Office ( Data Communication ) And Best And better way to Visit These Website Is Setup VPN Connection To Other Country And Get Internet From Them . Use VPN Connection To Visit Have Free Internet have Some Problems , Such as Delay , Low Speed And Etc … For This Reason I Want When Request Was For Facebook And Youtube Website , The Pack...

important some tips in mikrotik

Image
Running Mikrotiks in the field? Here are my top tips for making the most of your Mikrotik Experience: 1. Secure 1.1 - Users and Passwords 1.2 - Access Ports 1.3 - Protect against brute force hacks 1.4 - Anonymize your connection 2. Manual Backups (and why a backup is not a backup) 3. Blocking Sites 5. Remote wake your computer 6. Remote access to your network 1. Securing your router. I once installed a new router at the edge of my network connecting to a new provider. After installing I took a ten minute drive home, from where I planned to do my configuration. By the time I got home, the router had already been compromised. I cannot overstate the importance of securing your router, it is absolutely crucial in terms of maintaining a stable network. 1.1 Users and Passwords The default Mikrotik Username is admin, and it has no password. My first step when setting up a new router is to remove the admin user and replacing it with something more secure: Log in u...