MikroTik Certified User Management Engineer (MTCUME)
1 Introduction to MikroTik
1-1 Overview of MikroTik products
1-2 MikroTik RouterOS basics
1-3 MikroTik hardware overview
1-4 MikroTik software overview
2 User Management Fundamentals
2-1 Understanding user roles and permissions
2-2 Creating and managing users
2-3 User groups and their usage
2-4 Password policies and security
3 Advanced User Management
3-1 Implementing role-based access control (RBAC)
3-2 Customizing user profiles
3-3 User authentication methods
3-4 Integrating external authentication sources
4 User Access Control
4-1 Configuring access lists (ACLs)
4-2 Managing user access to resources
4-3 Time-based access control
4-4 Monitoring and logging user activities
5 User Management in Network Services
5-1 User management in DHCP
5-2 User management in VPN
5-3 User management in firewall
5-4 User management in hotspot
6 User Management in Cloud
6-1 Introduction to MikroTik Cloud
6-2 Managing users in MikroTik Cloud
6-3 Integrating Cloud services with user management
6-4 Security considerations in Cloud user management
7 Troubleshooting User Management
7-1 Common user management issues
7-2 Debugging user authentication problems
7-3 Resolving access control issues
7-4 Performance optimization in user management
8 Best Practices and Compliance
8-1 Best practices in user management
8-2 Compliance with industry standards
8-3 Auditing user management configurations
8-4 Continuous improvement in user management
User Management in Hotspot

User Management in Hotspot

User management in MikroTik hotspot is a critical aspect of network administration, ensuring that only authorized users can access the internet through the hotspot service. This webpage will delve into the key concepts related to user management in hotspot, providing detailed explanations and practical examples.

Key Concepts

1. Hotspot Profiles

Hotspot profiles define the settings and behavior of the hotspot service. These profiles include parameters such as authentication methods, session time limits, and bandwidth restrictions. Hotspot profiles are like templates that determine how users interact with the hotspot service.

Example: A hotspot profile named "GuestAccess" might be configured to allow users to authenticate via email and have a session time limit of 2 hours. This ensures that guests can access the internet for a limited period and must re-authenticate after the session expires.

2. Hotspot Users

Hotspot users are individual accounts that can authenticate and access the hotspot service. These users can be created manually or generated automatically through various authentication methods. Hotspot users are like individual keys that grant access to the hotspot service.

Example: A hotspot user named "JohnDoe" might be created with a username "johndoe" and a password "securepass". This user can then authenticate to the hotspot service using these credentials and access the internet.

3. Hotspot User Groups

Hotspot user groups are collections of users with similar access privileges. These groups allow administrators to manage multiple users more efficiently by applying settings to the entire group. Hotspot user groups are like departments in an organization, where each department has specific access rights.

Example: A hotspot user group named "Students" might include all student users and be configured with a session time limit of 4 hours and a bandwidth limit of 1 Mbps. This ensures that all students have consistent access to the hotspot service.

4. Hotspot Vouchers

Hotspot vouchers are pre-generated codes that users can redeem to access the hotspot service. Vouchers can be configured with specific time limits and bandwidth restrictions. Hotspot vouchers are like prepaid cards that users can use to access the hotspot service.

Example: A hotspot voucher might be generated with a code "123456" and configured for a 1-hour session with 512 Kbps bandwidth. Users can enter this code to access the hotspot service for the specified period and bandwidth.

5. Hotspot Authentication Methods

Hotspot authentication methods determine how users can authenticate to the hotspot service. Common methods include username/password, voucher codes, and external authentication sources like RADIUS or LDAP. Hotspot authentication methods are like different doors that users can use to enter the hotspot service.

Example: A hotspot service might be configured to allow users to authenticate via username/password or voucher codes. This provides flexibility for different types of users, such as guests and regular users.

Examples and Analogies

Example 1: Creating a Hotspot Profile

To create a hotspot profile named "GuestAccess" with a 2-hour session time limit, you would use the following command:

        /ip hotspot profile add name=GuestAccess session-timeout=2h
    

In this example, the "GuestAccess" profile ensures that users have a limited session time, enhancing security and managing resource usage.

Example 2: Adding a Hotspot User

To add a hotspot user named "JohnDoe" with a password "securepass", you would use the following command:

        /ip hotspot user add name=johndoe password=securepass profile=GuestAccess
    

In this example, the user "JohnDoe" can authenticate to the hotspot service using the specified credentials and the "GuestAccess" profile settings.

Example 3: Creating a Hotspot User Group

To create a hotspot user group named "Students" with a 4-hour session time limit and 1 Mbps bandwidth limit, you would use the following command:

        /ip hotspot user group add name=Students session-timeout=4h rate-limit=1M/1M
    

In this example, the "Students" group ensures that all student users have consistent access to the hotspot service with the specified limits.

Example 4: Generating Hotspot Vouchers

To generate a hotspot voucher with a code "123456" for a 1-hour session and 512 Kbps bandwidth, you would use the following command:

        /ip hotspot user add name=123456 password=123456 profile=GuestAccess limit-uptime=1h limit-bytes-total=512k
    

In this example, the voucher code "123456" allows users to access the hotspot service for the specified period and bandwidth.

Example 5: Configuring Hotspot Authentication Methods

To configure a hotspot service to allow authentication via username/password and voucher codes, you would use the following command:

        /ip hotspot add name=MyHotspot interface=ether1 address-pool=hotspot_pool login-by=http-chap,voucher
    

In this example, the hotspot service provides flexibility for users to authenticate using different methods, enhancing usability and security.

By understanding and implementing these key concepts, you can effectively manage user access to your MikroTik hotspot service, ensuring security, efficiency, and user satisfaction.