MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
One-to-One NAT Explained

One-to-One NAT Explained

One-to-One NAT, also known as Static NAT, is a network address translation technique that maps a single private IP address to a single public IP address. This method ensures that the same private IP address always translates to the same public IP address, providing a consistent external identity for devices on a local network.

Key Concepts

1. Static Mapping

Static mapping involves creating a permanent, unchanging relationship between a private IP address and a public IP address. This ensures that any traffic originating from the private IP address is always translated to the same public IP address.

2. Consistent External Identity

One-to-One NAT provides a consistent external identity for devices on the local network. This is particularly useful for servers that need to be accessible from the internet using a fixed public IP address.

3. Configuration Steps

Configuring One-to-One NAT involves specifying the private IP address and the corresponding public IP address. This configuration is typically done on the router or firewall that connects the local network to the internet.

Detailed Explanation

Static Mapping

Static mapping ensures that a specific private IP address is always translated to the same public IP address. This is achieved by creating a static NAT rule that maps the private IP address to the public IP address. For example, to map the private IP address 192.168.1.10 to the public IP address 203.0.113.5, you would use the following command on a MikroTik router:

/ip firewall nat add chain=srcnat action=netmap src-address=192.168.1.10 to-address=203.0.113.5

Consistent External Identity

One-to-One NAT ensures that devices on the local network have a consistent external identity. This is particularly useful for servers that need to be accessible from the internet using a fixed public IP address. For example, a web server with the private IP address 192.168.1.20 can be configured to use the public IP address 203.0.113.10, ensuring that all incoming traffic to 203.0.113.10 is directed to the web server.

Configuration Steps

To configure One-to-One NAT on a MikroTik router, follow these steps:

  1. Navigate to the IP Firewall NAT menu.
  2. Create a new NAT rule with the chain set to srcnat.
  3. Set the action to netmap.
  4. Specify the private IP address in the src-address field.
  5. Specify the public IP address in the to-address field.
  6. Apply the rule to enable One-to-One NAT.

Examples and Analogies

Example: Static Mapping

Think of static mapping as a permanent name tag. Just as a name tag identifies a person at a conference, static mapping identifies a specific device on the internet with a consistent public IP address.

Example: Consistent External Identity

Consider a business with a main office that needs to be accessible from the internet. By using One-to-One NAT, the main office (private IP address) is always identified by the same public IP address, making it easy for clients to connect.

Example: Configuration Steps

Imagine configuring One-to-One NAT as setting up a permanent address book entry. Just as you would add a contact to your address book with a specific name and address, you configure the router to map a private IP address to a public IP address, ensuring that the mapping is permanent and consistent.

By mastering One-to-One NAT, you can ensure that devices on your local network have a consistent external identity, making it easier to manage and secure your network.