MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
6.3 OpenVPN Explained

6.3 OpenVPN Explained

Key Concepts

1. OpenVPN Overview

OpenVPN is an open-source VPN (Virtual Private Network) solution that allows secure communication over public networks. It uses a custom security protocol that utilizes SSL/TLS for key exchange. OpenVPN is highly configurable and can run on various platforms, including MikroTik routers.

Example: Think of OpenVPN as a secure tunnel that allows data to travel safely between two points, even if the path is through a public and potentially unsafe area.

2. OpenVPN Components

OpenVPN consists of several key components:

Example: Consider the OpenVPN server as a secure office, the clients as employees, the CA as a security guard, and the certificates as employee badges. The configuration files are the rules that govern how employees can enter and exit the office.

3. OpenVPN Configuration

Configuring OpenVPN involves setting up the server, generating certificates, and creating configuration files. Key steps include:

Example: Configuring OpenVPN is like setting up a secure office. You need to install security systems (OpenVPN software), issue employee badges (certificates), and define the rules for entering and exiting (configuration files).

4. Security Features

OpenVPN offers several security features to protect data:

Example: Think of OpenVPN's security features as layers of protection for a package. Encryption is like wrapping the package in a secure material, authentication is like adding a lock with a unique key, data integrity is like adding a seal, and PFS is like changing the lock for each delivery.

5. Troubleshooting Tips

Troubleshooting OpenVPN issues can involve several steps:

Example: Troubleshooting OpenVPN is like diagnosing a problem with a secure delivery system. You need to check the logs (delivery records), verify the certificates (employee badges), ensure the network settings (delivery routes) are correct, and make sure the firewalls (security gates) are not blocking the path.