MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
5.3 Wireless Configuration Explained

5.3 Wireless Configuration Explained

Key Concepts

1. Wireless Interface Configuration

Wireless interface configuration involves setting up the physical and logical parameters of a wireless interface on a MikroTik router. This includes enabling the wireless interface, setting the interface name, and configuring basic settings such as the operating frequency and transmit power.

Example: Think of the wireless interface as a radio station. Just as a radio station needs to be turned on, named, and set to a specific frequency, a wireless interface needs to be enabled, named, and set to a specific frequency to broadcast and receive wireless signals.

2. SSID and Security Settings

SSID (Service Set Identifier) is the name of the wireless network that devices use to connect. Security settings include configuring encryption methods (such as WPA2, WPA3) and setting up authentication methods (such as PSK, 802.1x) to secure the wireless network.

Example: Consider SSID as the name of a club, and security settings as the rules for who can enter and how they can enter. Just as a club has a name and security measures to control access, a wireless network has an SSID and security settings to control who can connect.

3. Wireless Modes

Wireless modes define how the wireless interface operates. Common modes include Access Point (AP), Station (STA), and Mesh. Each mode serves a different purpose, such as providing wireless access, connecting to another wireless network, or creating a mesh network.

Example: Think of wireless modes as different roles in a team. Just as a team member can be a leader (AP), a follower (STA), or a collaborator (Mesh), a wireless interface can operate in different modes to fulfill different roles in a network.

4. Channel Selection

Channel selection involves choosing the appropriate wireless channel for the wireless interface to operate on. Channels are specific frequencies within the wireless spectrum, and selecting the right channel can minimize interference and improve performance.

Example: Consider channels as lanes on a highway. Just as choosing the right lane can reduce traffic congestion, selecting the right wireless channel can reduce interference and improve network performance.

5. Wireless Client Configuration

Wireless client configuration involves setting up devices to connect to the wireless network. This includes configuring the SSID, security settings, and other parameters on the client devices to ensure they can successfully connect to the wireless network.

Example: Think of wireless client configuration as setting up a car to connect to a highway. Just as a car needs to be equipped with the right tools (GPS, maps) to navigate the highway, a client device needs the right configuration to connect to a wireless network.