MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
6 Firewall and Security Explained

6 Firewall and Security Explained

Firewall and security are critical components in network management, ensuring that only authorized traffic is allowed to pass through the network. Understanding these concepts is essential for the MikroTik Certified Network Associate (MTCNA) certification.

Key Concepts

1. Firewall Basics

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.

2. Firewall Chains

Firewall chains are sequences of rules that determine how packets are processed. Common chains include INPUT, OUTPUT, FORWARD, PREROUTING, and POSTROUTING. Each chain is associated with a specific stage of packet processing.

3. Firewall Rules

Firewall rules define the conditions under which packets are allowed or denied. These rules can be based on criteria such as source IP address, destination IP address, protocol, and port number.

4. Stateful Inspection

Stateful inspection is a firewall feature that tracks the state of active connections and makes decisions based on the context of each packet. This allows the firewall to distinguish between legitimate packets and potential threats.

5. Network Address Translation (NAT)

NAT is a technique used to modify IP address information in packet headers. It can be used to hide internal IP addresses from external networks, conserve public IP addresses, and improve network security.

6. Intrusion Detection and Prevention Systems (IDPS)

IDPS are security systems that monitor network traffic for suspicious activity and potential threats. They can alert administrators to potential security breaches and take action to prevent them.

Detailed Explanation

Firewall Basics

A firewall operates at the network layer (Layer 3) and the transport layer (Layer 4) of the OSI model. It uses a set of predefined rules to determine whether to allow or block packets. Firewalls can be hardware-based, software-based, or a combination of both.

Firewall Chains

Firewall chains are used to organize rules based on the stage of packet processing. For example, the PREROUTING chain is used to modify packets before they are routed, while the POSTROUTING chain is used to modify packets after they are routed.

Firewall Rules

Firewall rules are created to allow or deny traffic based on specific criteria. For example, a rule might allow HTTP traffic (port 80) from a specific IP address while denying all other traffic. Rules are processed in order, and the first matching rule determines the action taken.

Stateful Inspection

Stateful inspection allows the firewall to maintain a state table that tracks the status of active connections. This enables the firewall to make more informed decisions about packet handling. For example, it can allow return traffic for established connections while blocking unsolicited packets.

Network Address Translation (NAT)

NAT is used to translate private IP addresses to public IP addresses and vice versa. This can be done using static NAT, dynamic NAT, or PAT. NAT helps in conserving public IP addresses and enhancing network security by hiding internal IP addresses.

Intrusion Detection and Prevention Systems (IDPS)

IDPS monitor network traffic for signs of malicious activity, such as unauthorized access attempts, malware, and policy violations. They can generate alerts, log events, and take automated actions to prevent potential threats.

Examples and Analogies

Firewall Basics

Think of a firewall as a security guard at the entrance of a building. The guard checks each person (packet) against a list of authorized visitors (rules) and allows or denies entry based on the list.

Firewall Chains

Consider firewall chains as different checkpoints in a factory. Each checkpoint (chain) performs a specific task, such as inspecting the product (packet) before it is packaged (routed) or after it is packaged.

Firewall Rules

Imagine firewall rules as a set of instructions for a bouncer at a nightclub. The bouncer (firewall) follows the instructions (rules) to decide who can enter (allow) and who must leave (deny).

Stateful Inspection

Think of stateful inspection as a receptionist who remembers who has checked in (established connections) and can quickly verify their identity (context of each packet) when they return.

Network Address Translation (NAT)

Consider NAT as a mailroom that changes the return address on packages (packets) before they are sent out. This helps in tracking the packages and ensures that the internal addresses are not exposed to the outside world.

Intrusion Detection and Prevention Systems (IDPS)

Imagine IDPS as a surveillance system in a store. The system monitors the store for suspicious activity (potential threats), alerts the security personnel (administrators), and can trigger alarms (preventive actions) to stop the threat.

By mastering these firewall and security concepts, you can effectively protect your network from unauthorized access and potential threats, ensuring a secure and reliable network environment.