MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
8-6 Hotspot Configuration Explained

8-6 Hotspot Configuration Explained

Hotspot configuration is a crucial feature for providing internet access to users in public or private networks. Understanding how to set up and manage hotspots is essential for the MikroTik Certified Network Associate (MTCNA) certification.

Key Concepts

1. Hotspot Overview

A hotspot is a wireless network that provides internet access to users. It typically requires users to authenticate before gaining access, often through a web-based login page.

2. Hotspot Authentication

Hotspot authentication methods include:

3. Hotspot Profiles

Hotspot profiles define the settings for hotspot networks, including authentication methods, time limits, and bandwidth limits.

4. Hotspot Users

Hotspot users are the individuals who connect to the hotspot network. They can be managed through user profiles, which define their access rights and usage limits.

5. Hotspot Servers

Hotspot servers handle the authentication and management of hotspot users. They provide the web-based login interface and manage user sessions.

Detailed Explanation

Hotspot Overview

A hotspot extends the network coverage by providing wireless internet access to users. It is commonly used in public places like cafes, airports, and hotels, where users need temporary internet access.

Hotspot Authentication

Web-based authentication is the most common method, where users are redirected to a login page when they connect to the hotspot. RADIUS authentication provides a more secure method by using a centralized authentication server. MAC authentication allows devices with specific MAC addresses to connect without additional authentication.

Hotspot Profiles

Hotspot profiles define the settings for hotspot networks, including the authentication method, time limits, and bandwidth limits. For example, you can create a profile that allows users to access the internet for 2 hours with a maximum bandwidth of 1 Mbps.

Hotspot Users

Hotspot users can be managed through user profiles, which define their access rights and usage limits. For example, you can create a user profile that allows a specific user to access the internet for 1 hour per day.

Hotspot Servers

Hotspot servers handle the authentication and management of hotspot users. They provide the web-based login interface and manage user sessions. For example, a hotspot server can log user activity, enforce time limits, and manage bandwidth usage.

Examples and Analogies

Example: Hotspot Overview

Think of a hotspot as a public library that provides internet access to anyone who enters. Just as the library allows people to use its resources, a hotspot allows users to access the internet.

Example: Hotspot Authentication

Consider web-based authentication as a library card that users must present to access the internet. RADIUS authentication is like a security guard who checks the library card against a central database. MAC authentication is like a library that allows specific members (devices) to enter without a card.

Example: Hotspot Profiles

Imagine hotspot profiles as different membership plans at a gym. Just as a gym offers different plans with varying access rights and usage limits, hotspot profiles offer different settings for user access.

Example: Hotspot Users

Think of hotspot users as gym members with specific membership plans. Just as each member has different access rights and usage limits, each hotspot user has different access rights and usage limits.

Example: Hotspot Servers

Consider hotspot servers as the front desk staff at a gym. Just as the front desk staff handle membership registration and access, hotspot servers handle user authentication and management.

By mastering hotspot configuration, you can effectively provide secure and managed internet access to users in various environments, ensuring a seamless and controlled user experience.