video Tutorial
Mikrotik in VMWare share Internet to Physical PC
----------------------------------------------------------------------------------------------------------------------------------------------------
MikroTik in VMware - Setup: Interface, Address, DNS, Route, DHCP, IP Pool and Firewall
In this video :
- Deactivate all "Network Connections" and get the internet from the VM "MikroTic"
- Setup the "MikroTik" on a "VMware" Machine
- Edit the Virtual networks (Set Bridge and Host(without DHCP service))
- Add a Network Adapter to the VM
- Add Addresses to the "MikroTic"
- Change the password of the "MikroTik"
- Connect to the "MikroTic" using "WinBox Loader"
- Setup the Interfaces (Bridge and Host)
- Setup a "DNS"
- Add a "Getway" in Route
- Add "DHCP" Server
- Add an "IP Pool"
- Add a Rule in the Firewall
- Add a Rule in the Nat
The IPs :
10.5.50.1 is my real Getway
10.5.50.47 is IP located to ether1 - Bridge
192.168.0.1 is the IP of the Getway of the DHCP network
8.8.8.8 is the real IP of Google.com
192.168.0.2 - 192.168.0.254 is the range of the DHCP addresses
1.1.1.1 is a false IP just to disable the Local connection
-------------------------------------------------------------------------------------------------------------------------------------------------
Setting Mikrotik DHCP Server, Web Proxy, Block Website
---------------------------------------------------------------------------------------------------------------------------------
MikroTik PPC With Two WAN Load Balancing and Failover
Load Balancing Two or More WAN Connections With Failover
Rules:
/ip address
add address=YOUR LAN IP interface=LAN
add address=YOUR WAN1 IP interface=WAN1
add address=YOUR WAN2 IP interface=WAN2
/ip firewall mangle
add chain=input in-interface=WAN1 action=mark-connection new-connection-mark=WAN1_conn
add chain=input in-interface=WAN2 action=mark-connection new-connection-mark=WAN2_conn
add chain=output connection-mark=WAN1_conn action=mark-routing new-routing-mark=to_WAN1
add chain=output connection-mark=WAN2_conn action=mark-routing new-routing-mark=to_WAN2
add chain=prerouting dst-address=YOUR WAN1 SUBNET action=accept in-interface=LAN
add chain=prerouting dst-address=YOUR WAN1 SUBNET action=accept in-interface=LAN
add chain=prerouting dst-address-type=!local in-interface=LAN per-connection-classifier=both-addresses-and-ports:2/0 action=mark-connection new-connection-mark=WAN1_conn passthrough=yes
add chain=prerouting dst-address-type=!local in-interface=LAN per-connection-classifier=both-addresses-and-ports:2/1 action=mark-connection new-connection-mark=WAN2_conn passthrough=yes
add chain=prerouting connection-mark=WAN1_conn in-interface=LAN action=mark-routing new-routing-mark=to_WAN1
add chain=prerouting connection-mark=WAN2_conn in-interface=LAN action=mark-routing new-routing-mark=to_WAN2
/ip route
add dst-address=0.0.0.0/0 gateway=YOUR WAN1 GATEWAY routing-mark=to_WAN1 check-gateway=ping
add dst-address=0.0.0.0/0 gateway=YOUR WAN2 GATEWAY routing-mark=to_WAN2 check-gateway=ping
add dst-address=0.0.0.0/0 gateway=YOUR WAN1 GATEWAY distance=1 check-gateway=ping
add dst-address=0.0.0.0/0 gateway=YOUR WAN2 GATEWAY distance=2 check-gateway=ping
/ip firewall nat
add chain=srcnat out-interface=WAN1 action=masquerade
add chain=srcnat out-interface=WAN2 action=masquerade
IF YOU HAVE HOTSPOT ENABLED, ADD THIS
/ip firewall nat
add action=accept chain=pre-hotspot disabled=no dst-address-type=!local hotspot=auth
-----------------------------------------------------------------------------------------------------------------------