MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
7.3 Policing Explained

7.3 Policing Explained

Key Concepts

1. Policing

Policing is a traffic management technique used to enforce predefined traffic policies on a network. It ensures that network traffic adheres to specified rate limits and quality of service (QoS) requirements. Policing helps in maintaining network performance and preventing congestion.

Example: Think of policing as a traffic officer directing cars to ensure they do not exceed the speed limit. Just as the officer controls traffic flow, policing controls network traffic to maintain performance.

2. Traffic Shaping

Traffic shaping is a method of controlling the rate of traffic sent or received on a network interface. It involves delaying packets to ensure that the traffic stays within the defined limits. Traffic shaping helps in smoothing out traffic bursts and improving overall network efficiency.

Example: Consider traffic shaping as a traffic light system. Just as traffic lights regulate the flow of cars to prevent congestion, traffic shaping regulates data flow to prevent network congestion.

3. Rate Limiting

Rate limiting is the process of controlling the amount of traffic that can be sent or received over a network within a specific time period. It is used to prevent network overload and ensure fair usage of network resources. Rate limiting can be applied to individual users, applications, or entire network segments.

Example: Think of rate limiting as a water tap that controls the flow of water. Just as a tap limits the amount of water that can flow, rate limiting controls the amount of data that can be transmitted over the network.

4. Match Criteria

Match criteria are the conditions used to identify which traffic should be policed. These criteria can include parameters such as source and destination IP addresses, protocol types, and port numbers. Matching the correct traffic ensures that the policing rules are applied accurately.

Example: Consider match criteria as a filter that selects specific types of mail. Just as a filter selects mail based on certain criteria, match criteria select specific network traffic for policing.

5. Action Types

Action types define what happens to the traffic that matches the policing criteria. Common actions include dropping packets, marking packets with a lower priority, or allowing packets to pass without modification. The choice of action depends on the network policy and the desired outcome.

Example: Think of action types as different responses to a traffic violation. Just as a traffic officer can issue a warning, fine, or tow a car, action types can drop packets, mark them, or allow them to pass based on the network policy.