MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
8.5 Hotspot and Captive Portal Explained

8.5 Hotspot and Captive Portal Explained

Key Concepts

1. Hotspot

A hotspot is a wireless network that provides internet access to users within a specific area. Hotspots are commonly found in public places like cafes, airports, and hotels. They allow multiple users to connect to the internet using Wi-Fi.

Example: Think of a hotspot as a public water fountain. Just as a water fountain provides water to anyone nearby, a hotspot provides internet access to anyone within range.

2. Captive Portal

A captive portal is a web page that users must interact with before gaining access to the internet through a hotspot. This page typically requires users to log in, agree to terms of service, or make a payment before they can access the internet.

Example: Consider a captive portal as a ticket booth at an amusement park. Just as you need a ticket to enter the park, users need to interact with the captive portal to access the internet.

3. Authentication Methods

Authentication methods are used to verify the identity of users attempting to access a hotspot. Common methods include:

Example: Think of authentication methods as different ways to enter a secure building. Just as you might use a keycard, a password, or a fingerprint to enter, users can use various methods to authenticate and access the hotspot.

4. Configuration Steps

Configuring a hotspot and captive portal on a MikroTik router involves several steps:

Example: Configuring a hotspot and captive portal is like setting up a new store. You need to build the store (enable hotspot), design the entrance (create captive portal), set up security (authentication methods), define who can enter (access rules), and ensure everything works smoothly (test and monitor).

5. Use Cases

Hotspots and captive portals have various use cases, including:

Example: Think of use cases as different types of stores. A public Wi-Fi hotspot is like a convenience store, a guest network is like a hotel, marketing use cases are like a pop-up shop, and security use cases are like a secure vault.