MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
6-5 VPN Basics Explained

6-5 VPN Basics Explained

Virtual Private Networks (VPNs) are essential tools for creating secure and private connections over public networks. Understanding VPN basics is crucial for the MikroTik Certified Network Associate (MTCNA) certification.

Key Concepts

1. VPN Overview

A VPN extends a private network across a public network, allowing users to send and receive data as if their devices were directly connected to the private network. This is achieved by creating an encrypted tunnel between the user's device and the VPN server.

2. VPN Protocols

VPN protocols define the methods used to secure data transmission. Common VPN protocols include:

3. VPN Types

There are several types of VPNs, including:

4. VPN Configuration

Configuring a VPN involves setting up the VPN server, defining the VPN protocol, and creating user accounts. This process includes specifying the encryption method, authentication type, and network settings.

Detailed Explanation

VPN Overview

VPNs create a secure tunnel over the internet, ensuring that data transmitted between the user's device and the VPN server is encrypted and private. This is particularly useful for remote workers, businesses with multiple locations, and individuals seeking privacy online.

VPN Protocols

Each VPN protocol has its strengths and weaknesses. PPTP is easy to set up but offers weaker security. L2TP/IPsec provides stronger encryption but can be slower. OpenVPN is highly configurable and secure, making it a popular choice. WireGuard is a newer protocol that offers high performance and security with a simpler design.

VPN Types

Remote Access VPNs are ideal for employees who need to connect to their company's network from home. Site-to-Site VPNs are used to connect multiple offices, allowing seamless communication between them. Intranet-based VPNs connect offices within the same organization, while Extranet-based VPNs connect different organizations.

VPN Configuration

To configure a VPN on a MikroTik router, you would typically use the following steps:

  1. Navigate to the VPN menu.
  2. Select the VPN protocol (e.g., OpenVPN).
  3. Set up the VPN server with the appropriate encryption and authentication settings.
  4. Create user accounts with the necessary permissions.
  5. Apply the configuration to enable the VPN.

Examples and Analogies

Example: VPN Overview

Think of a VPN as a secure tunnel that protects your data as it travels over the internet. Just as a tunnel keeps trains safe from external threats, a VPN keeps your data safe from prying eyes.

Example: VPN Protocols

Consider VPN protocols as different types of locks on a door. PPTP is like a basic lock, easy to install but not very secure. L2TP/IPsec is like a combination lock, offering better security but requiring more effort to use. OpenVPN is like a high-security lock, highly configurable and secure. WireGuard is like a modern, efficient lock, offering both security and speed.

Example: VPN Types

Imagine Remote Access VPNs as a key that allows an employee to unlock the office door from home. Site-to-Site VPNs are like a bridge connecting two offices, allowing them to communicate seamlessly. Intranet-based VPNs are like a secure hallway connecting different rooms in a building, while Extranet-based VPNs are like a secure hallway connecting different buildings.

Example: VPN Configuration

Think of configuring a VPN as setting up a secure vault. You need to choose the type of lock (protocol), set the combination (encryption), and create keys (user accounts) for authorized personnel to access the vault.

By mastering VPN basics, you can create secure and private connections over public networks, ensuring data integrity and privacy for your network.