You are on page 1of 4

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer Configuracin Topologa MIKROTIK tyuiopasdfghjklzxcvbnmqwertyuiopas Proxy, DHCP, OSPF con Autenticacin, Acceso a internet

dfghjklzxcvbnmqwertyuiopasdfghjklzx cvbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyuio pasdfghjklzxcvbnmqwertyuiopasdfghj klzxcvbnmqwertyuiopasdfghjklzxcvbn mqwertyuiopasdfghjklzxcvbnmqwerty uiopasdfghjklzxcvbnmqwertyuiopasdf ghjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmrty uiopasdfghjklzxcvbnmqwertyuiopasdf ghjklzxcvbnmqwertyuiopasdfghjklzxc
07/12/2010 BY Pablo Bernab Guaico Navarro

Configuracin topologa MIKROTIK

La topologa adems debe estar con ospf rea 0 con autenticacin solo entre ether3ether3

Primero reiniciamos el Reuter MIK1


#system reset configuration Ver interface >interface >interface>print todas las interfaces que aparezcan con X estn deshabilitadas para habilitarlas colocamos enable y el numero de la interface. >interface >interface>enable 1 Asignar IP estticas a las interfaces >ip Ip>address Ip address> add address=172.16.1.129/25 interface=ether2 Ip address> add address=172.16.0.1/30 interface=ether3 Configurar acceso a internet > Ip Ip > dhcp-client Ip dhcp-client> add interface=ether1 disabled=no

Ahora tenemos que crear un nat para poder distribuir la internet en la red, para simplificar la topologa creamos los nat necesarios en MIK1. >Ip Ip> Firewall Ip Firewall >Nat Ip Firewall Nat>Add chain=srcnat src-address=172.16.1.128/25 action=masquerade Ip Firewall Nat>Add chain=srcnat src-address=172.16.2.0/23 action=masquerade Ip Firewall Nat>Add chain=srcnat src-address=172.16.4.0/23 action=masquerade

Configurar ospf >Routing Routing> ospf Routing ospf>network Routing ospf network> add network=172.16.0.0/30 area=backbone Redistribuir la ruta esttica para que MIK 2 acceda a internet >Routing Routing> ospf Routing ospf>instance Routing ospf instance> set redistribute-static=as-type-2 Routing ospf instance> set distribute-default=always-as-type-2 Autenticar ospf >Routing Routing> ospf Routing ospf>interface Routing ospf interface> add interface=ether3 authentication=md5 authentication-key=Cisco Crear proxy >Ip Ip >Proxy Ip proxy> set enable=yes Ip proxy> set src-address=172.16.0.0 Para efectos de prueba deshabilite el nat creado anteriormente Ip Firewall Nat>disable 0 Ip Firewall Nat> disable1 Ip Firewall Nat> disable2 Ahora denegamos el acceso a lum.com Ip proxy> access add dst-host=www.lum.com action=deny

Configuraciones MIK2
#system reset configuration Asignar IP estticas a las interfaces >ip Ip>address Ip address> add address=172.16.0.2/30 interface=ether3 Las ip de los host sern entregadas por un servidor DHCP que se configurara posteriormente Se crean primero los pool con los rangos de ip >Ip Ip>pool Ip pool> add name=500host ranges=172.16.2.2-172.16.3.244 Ip pool> add name=300host ranges=172.16.4.2-172.16.5.44 Crear el servidor DHCP >Ip Ip> dhcp-server Ip dhcp-server> network Ip dhcp-server network> add address=172.16.2.0/23 gateway=172.16.2.1 dns-server=192.168.1.1 Ip dhcp-server network> add address=172.16.4.0/23 gateway=172.16.4.1 dns-server=192.168.1.1 Agregar el DHCP a las interfaces >Ip Ip> dhcp-server Ip dhcp-server> add interface=ether1 address-pool=500host Ip dhcp-server> add interface=ether2 address-pool=300host Ip dhcp-server>print Si el DHCP sale deshabilitado con una X lo habilitamos con enable Ip dhcp-server>enable 0 Habilitar ospf >Routing Routing> ospf Routing ospf>network Routing ospf network> add network=172.16.0.0/30 area=backbone Autenticar ospf >Routing Routing> ospf Routing ospf>interface Routing ospf interface> add interface=ether3 authentication=md5 authentication-key=Cisco

You might also like