video Tutorial

Mikrotik in VMWare share Internet to Physical PC

----------------------------------------------------------------------------------------------------------------------------------------------------

MikroTik in VMware - Setup: Interface, Address, DNS, Route, DHCP, IP Pool and Firewall

In this video :

- Deactivate all "Network Connections" and get the internet from the VM "MikroTic"

- Setup the "MikroTik" on a "VMware" Machine

- Edit the Virtual networks (Set Bridge and Host(without DHCP service))

- Add a Network Adapter to the VM

- Add Addresses to the "MikroTic"

- Change the password of the "MikroTik"

- Connect to the "MikroTic" using "WinBox Loader"

- Setup the Interfaces (Bridge and Host)

- Setup a "DNS"

- Add a "Getway" in Route

- Add "DHCP" Server

- Add an "IP Pool"

- Add a Rule in the Firewall

- Add a Rule in the Nat

The IPs :

10.5.50.1 is my real Getway

10.5.50.47 is IP located to ether1 - Bridge

192.168.0.1 is the IP of the Getway of the DHCP network

8.8.8.8 is the real IP of Google.com

192.168.0.2 - 192.168.0.254 is the range of the DHCP addresses

1.1.1.1 is a false IP just to disable the Local connection

-------------------------------------------------------------------------------------------------------------------------------------------------

Setting Mikrotik DHCP Server, Web Proxy, Block Website

---------------------------------------------------------------------------------------------------------------------------------

MikroTik PPC With Two WAN Load Balancing and Failover

Load Balancing Two or More WAN Connections With Failover

Rules:

/ip address

add address=YOUR LAN IP interface=LAN

add address=YOUR WAN1 IP interface=WAN1

add address=YOUR WAN2 IP interface=WAN2

/ip firewall mangle

add chain=input in-interface=WAN1 action=mark-connection new-connection-mark=WAN1_conn

add chain=input in-interface=WAN2 action=mark-connection new-connection-mark=WAN2_conn

add chain=output connection-mark=WAN1_conn action=mark-routing new-routing-mark=to_WAN1

add chain=output connection-mark=WAN2_conn action=mark-routing new-routing-mark=to_WAN2

add chain=prerouting dst-address=YOUR WAN1 SUBNET action=accept in-interface=LAN

add chain=prerouting dst-address=YOUR WAN1 SUBNET action=accept in-interface=LAN

add chain=prerouting dst-address-type=!local in-interface=LAN per-connection-classifier=both-addresses­-and-ports:2/0 action=mark-connection new-connection-mark=WAN1_conn passthrough=yes

add chain=prerouting dst-address-type=!local in-interface=LAN per-connection-classifier=both-addresses­-and-ports:2/1 action=mark-connection new-connection-mark=WAN2_conn passthrough=yes

add chain=prerouting connection-mark=WAN1_conn in-interface=LAN action=mark-routing new-routing-mark=to_WAN1

add chain=prerouting connection-mark=WAN2_conn in-interface=LAN action=mark-routing new-routing-mark=to_WAN2

/ip route

add dst-address=0.0.0.0/0 gateway=YOUR WAN1 GATEWAY routing-mark=to_WAN1 check-gateway=ping

add dst-address=0.0.0.0/0 gateway=YOUR WAN2 GATEWAY routing-mark=to_WAN2 check-gateway=ping

add dst-address=0.0.0.0/0 gateway=YOUR WAN1 GATEWAY distance=1 check-gateway=ping

add dst-address=0.0.0.0/0 gateway=YOUR WAN2 GATEWAY distance=2 check-gateway=ping

/ip firewall nat

add chain=srcnat out-interface=WAN1 action=masquerade

add chain=srcnat out-interface=WAN2 action=masquerade

IF YOU HAVE HOTSPOT ENABLED, ADD THIS

/ip firewall nat

add action=accept chain=pre-hotspot disabled=no dst-address-type=!local hotspot=auth

-----------------------------------------------------------------------------------------------------------------------

 Block Users from Downloading Files with a Certain Extension