Autoplay
Autocomplete
Previous Lesson
Complete and Continue
MikroTik User Management Engineer with LABS
Understand the need of VPN in our network
Introduction to VPN (0:57)
What is VPN and why is it important to use it in our network (15:52)
PPTP Tunneling Protocol
PPTP Tunneling Protocol - Explanation (8:30)
Configuring PPTP site to site VPN (20:49)
Configuring PPTP Client to site VPN (same local IP addresses) (23:54)
Configuring PPTP with Bridge Control Protocol (BCP) (23:17)
L2TP/IPSEC Tunneling protocol
L2TP IPSEC Tunneling protocol - Explanation (7:10)
Configuring L2TP site to site VPN (23:02)
Configuring L2TP IPSEC client to site VPN (10:38)
EOIP Tunneling Protocol
Introduction to EOIP Tunnel (0:55)
Configuring EOIP Tunneling Protocol on MikroTik (18:59)
Configuring EOIP Tunnel over L2TP Tunnel (13:24)
Internet Protocol Security (IPSEC) Framework
3- What is IPSEC - Intro (1:37)
4- What is IPSEC - Explanation (9:10)
5- IPSEC Protocol suite explained (5:14)
6- IPSEC modes of communication - Transport vs Tunnel mode (8:16)
7- Types of Encryption - Symmetric vs Asymmetric (5:57)
8- Security over the internet using IPSEC (14:47)
9- Encyption Protocols (DES-3DES-AES-Blowfish-Camellia-RSA-DH) (15:30)
10- Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512) (8:52)
11- IPSEC Authentication (Pre-shared key vs Certificates) (8:47)
12- IPSEC Negotiation Protocols (AH vs ESP) (8:10)
IPSEC Negotiation Process
13- IPSEC Negotiation Process - Introduction (1:00)
14- IPSEC Negotiation Process and choices of IPSEC interesting traffic (9:04)
15- IPSEC IKE Phase 1 (ISAKMP Tunnel) (8:40)
16- IPSEC IKE Phase 1 (Main vs Aggressive mode) (5:42)
17- IPSEC IKE Phase 2 (IPSEC Tunnel) (7:02)
18- IPSEC Data Transfer (2:59)
19- Difference between IKEv1 and IKEv2 (5:45)
Site to Site IPSEC VPN
20- Introduction to the IPSEC LAB (1:27)
21- Pre-configuration of the IPSEC Tunnel (16:27)
22- Configuring site-to-site IPSEC tunnel using IKEv1 and IKEv2 - Part1 (21:00)
23- Configuring site-to-site IPSEC tunnel using IKEv1 and IKEv2 - Part2 (7:03)
PPPoE - The full story
Lesson 6 - Introduction to PPPoE (3:22)
Lesson 6 - PPPoE Explanation Part1 (16:20)
Lesson 6 - PPPoE Explanation Part2 (8:26)
Lesson 6- LAB #6 - Configuring PPPoE server including Profiles and Secrets (16:37)
Lesson 6 -LAB 6 - Configuring the switch, PPPoE client on C1 and PPPoE client on C2 (15:26)
Lesson 6 - LAB7 - Options available on PPPoE - Part1 (13:56)
Lesson 6 - LAB7 - Options available on PPPoE - Part2 (6:47)
MikroTik Wireless Hotspot
Lecture 1 - The need of the wireless Hotspot1 (2:47)
Lecture 1- How MikroTik Hotspot works (9:09)
Lecture 2- Main requirements for the MikroTik Hotspot (3:04)
Lecture 2 - LAB 1 - Configuring the main requirements of the MikroTik hotspot (17:12)
Lecture 2 - LAB2 - Configuring the Hotspot on the MikroTik router (19:38)
Lecture 3 - LAB 3 - Setting up Cookies and trial profile (15:37)
Lecture 3 - LAB 4 - Limit user uptime based on time or upload download traffic (14:42)
LAB 5 - Creating users profile for speed limitation - Part1 (15:35)
LAB 5 - Creating users profile for speed limitation - Part2 (7:32)
LAB 6 - Advertising on the hotspot (19:06)
LAB 7 - Bypass user authentication on hotspot using IP Bindings (9:45)
LAB 8 – allow access to a website without hotspot authentication using Walled Garden (12:57)
LAB 9 – Changing the look of captive portal (19:40)
LAB 10 – Hotspot Https redirect using self certificate (15:28)
MikroTik official trainings with Maher Haddad (3:27)
6- IPSEC modes of communication - Transport vs Tunnel mode
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock