MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
9-1 Basic Troubleshooting Techniques Explained

9-1 Basic Troubleshooting Techniques Explained

Basic troubleshooting techniques are essential for diagnosing and resolving network issues efficiently. Understanding these techniques is crucial for the MikroTik Certified Network Associate (MTCNA) certification.

Key Concepts

1. Ping

Ping is a basic network utility used to test the reachability of a host on an Internet Protocol (IP) network. It works by sending an Internet Control Message Protocol (ICMP) echo request to the target host and waiting for an ICMP echo reply.

2. Traceroute

Traceroute is a diagnostic tool used to trace the path that packets take from a source to a destination. It helps identify the route and the performance of each hop along the way.

3. Telnet

Telnet is a protocol used to connect to remote devices over a network. It allows administrators to access and control network devices, such as routers and switches, from a remote location.

4. SSH (Secure Shell)

SSH is a secure protocol used to connect to remote devices over a network. It provides a secure channel over an unsecured network, ensuring that data transmitted between the client and server is encrypted.

5. Wireshark

Wireshark is a network protocol analyzer that captures and analyzes network traffic in real-time. It helps identify network issues by providing detailed information about the packets being transmitted.

Detailed Explanation

Ping

Ping is used to check if a device is reachable on the network. It measures the round-trip time for messages sent from the source to the destination and back. A successful ping indicates that the device is online and responding to network requests.

Traceroute

Traceroute helps identify the path that packets take from the source to the destination. It sends packets with increasing Time to Live (TTL) values, allowing it to trace each hop along the route. This tool is useful for diagnosing network latency and identifying points of failure.

Telnet

Telnet allows administrators to access and control network devices remotely. It is commonly used to configure and troubleshoot routers and switches. However, Telnet transmits data in plain text, making it less secure compared to SSH.

SSH (Secure Shell)

SSH provides a secure way to access and manage network devices remotely. It encrypts the data transmitted between the client and server, ensuring that sensitive information is protected from eavesdropping and tampering.

Wireshark

Wireshark captures and analyzes network traffic, providing detailed information about each packet. It helps identify network issues, such as packet loss, latency, and protocol errors. Wireshark is a powerful tool for network troubleshooting and analysis.

Examples and Analogies

Example: Ping

Think of ping as a doorbell. When you press the doorbell (send a ping request), you expect someone to answer (receive a ping reply). If no one answers, the doorbell might be broken (the device is unreachable).

Example: Traceroute

Consider traceroute as a GPS navigation system. Just as a GPS shows the route from your current location to your destination, traceroute shows the path that packets take from the source to the destination, highlighting each stop (hop) along the way.

Example: Telnet

Imagine Telnet as a phone call. You can talk to someone (control a device) from a distance, but the conversation is not private (data is transmitted in plain text). Anyone listening can hear what you are saying.

Example: SSH (Secure Shell)

Think of SSH as a secure phone line. Just as a secure phone line encrypts the conversation, SSH encrypts the data transmitted between the client and server, ensuring that the conversation is private and secure.

Example: Wireshark

Consider Wireshark as a traffic camera. Just as a traffic camera captures and records the movement of vehicles, Wireshark captures and analyzes network traffic, providing detailed information about each packet.

By mastering these basic troubleshooting techniques, you can efficiently diagnose and resolve network issues, ensuring a reliable and secure network environment.