MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
User Management Explained

User Management Explained

Key Concepts

User Management in networking involves creating, configuring, and managing user accounts to control access to network resources. Key concepts include:

User Accounts

User accounts are essential for managing individual access to network resources. Each user account typically includes a username, password, and associated permissions.

Example: In a small office, you might create a user account for each employee, such as "jdoe" for John Doe. This account allows John to log in to the network and access his files and applications.

Permissions

Permissions define what actions a user can perform on network resources. Common permissions include read, write, execute, and delete. Permissions can be assigned at various levels, such as file, folder, or system-wide.

Example: A user account for a marketing team member might have read and write permissions for the marketing folder, allowing them to create and edit files, but only read permissions for the finance folder.

Groups

Groups are collections of user accounts that share common permissions. Grouping users simplifies the management of permissions, as changes can be applied to the entire group rather than individual users.

Example: You might create a "Sales" group and add all sales team members to it. Assigning permissions to the "Sales" group ensures that all members have the same access to sales-related resources.

Authentication

Authentication is the process of verifying a user's identity. Common methods include username and password, multi-factor authentication (MFA), and biometric verification.

Example: When logging into a network, a user must provide a username and password. If MFA is enabled, the user might also need to enter a code sent to their mobile device.

Authorization

Authorization occurs after authentication and determines what resources and actions the authenticated user is allowed to access. It relies on the permissions assigned to the user or their group.

Example: After successfully logging in, the system checks the user's permissions to determine if they can access a specific file or perform a particular action, such as deleting a file.

Mastering User Management is crucial for securing and efficiently managing network resources. Understanding these concepts will enable you to create a robust and secure user environment in your network infrastructure.