Using MikroTik LHG as a UE With a Baicells eNodeB

MikroTik LHG – RBLHGR&R11e-4G

This has been a dream for a long time, and a DIY project for those industrious individuals willing to cobble it together, but now it is a reality in a production device.

First of all why would you want to do that? Well, would you like advanced features at the customer location like Layer2 via EoIP or VPLS, rate limiting at the UE, advanced queueing, a more directional antenna and on an on, all the cool features we enjoy with RouterOS? It is here in the MikroTik LHG.

To make the LHG work with your Baicells eNodeB, first understand what it will not do. First, it will not show up in the CloudCore as a UE. So, to manage it remotely you will need to use an ACS with TR-069 or Unimus or some other management system. Secondly, some people have reported it will not connect to the base station as fast as other UE’s but the throughput speeds are generally better.

The only real configuration required is to insert a registered SIM card in the device and boot it up. There has been some debate whether or not the default APN has to be changed in the LTE setup. We have seen it work with no changes to the APN and other times the APN Name has to be changed to 1 . Some people claim you have to uncheck bands other than Band 43.

So, we are going to set one up here at our office and test it on our Baicells LTE network and post the results back here. If you have any experience, please email me through our Support System and let me know. I will include your experiences and comments here. Good luck!

UPDATE 5-1-19

I set up one here in our office. The only setting I made was to set the Band to Band 43 only. I used the default APN and it connected immediately. The one challenge I had was getting the SIM in correctly, it is not obvious. It did not work the first way I had it. I called Jim Bouse and he sent me his config which matched mine and so I tried flipping the SIM and it came right up. Here is how it goes in the slot:



Here are the property pages of my LTE interface:

I think this is a great setup!

Update: Block Countries Based on IP Addresses and Networks

If you never used my web site https://mikrotikconfig.com to build firewalls and QOS, you have been working too hard!  I recently (today) updated the database of IP addresses by Country to generate MikroTik IP Address Lists by country.  Check it out!

UPDATE: 12/31/18  With the help of Google, I wrote a bash script to automatically update the lists daily!

 

Unhacking Your MikroTik Router

Several vulnerabilities and exploits have recently plagued MikroTIk users.  Specifically, these vulnerabilities affected the RouterOS webfig configuration interface, if no firewall was put in place to protect it.  Granted, you can be critical of MikroTik but after all, running without a firewall is a user problem not a MikroTik problem.

MikroTik fixed the vulnerability in the following RouterOS releases:

  • 6.37.5 in the Bugfix channel
  • 6.38.5 in the Current channel

The vulnerability in question was exploited by several malicious tools and affected users of RouterOS who had not upgraded RouterOS above the mentioned versions, and had opened the www service port (TCP port 80) to untrusted networks.

Many users may have unknowingly had their credentials compromised BEFORE their router was upgraded, but not yet actually hacked.  This means many upgraded and thought they were completely safe until a few weeks ago when strange behaviors may have been observed.  Specifically what we have seen is IP blacklisting by game sites like Playstation and XBox, slow speeds, inability to manage the router and so on.  The telltale sign of this hack is viewing the system log and it is only one line long.  If this has happened to you, the best solution is to clean up the config to remove the hack, export the config, check the config closely and then Netinstall the router and import the config.  Again, this is the most drastic but the safest approach.  Here are the things we have seen done by the hacker you will need to clean up:

/system logging

Reset it to 1000 lines

/ip firewall filter

Remove this rule and enable your drop rule if disabled

/ip socks

Disable it

/system scheduler

Delete any scheduled entries you didn’t add.  Look for one that starts a script named “port 54321”

/system script

Delete this script

/system users

The hack adds a user “system”, delete that

I saw one router thad had a ppp user added. I can’t remember the user name but check that as well.

Those are the things we have found in many routers so get your routers cleaned up, change the passwords, add a real set of firewall rules (http://mikrotikconfig.com is a good place to star) and be safe.

MikroTik RBwAPR-2nD&R11e-LTE-US with LTE Modem With Verizon HowTo

NOTE: Although I was able to make this work, it not work on all of Verizon’s US network outside large metro areas because the LTE card will not run Band 13.  They are also not certified on Verizon so use them at your own risk.  Check with your cellular provider before using on that carrier’s network.  Email [email protected] and complain to them about this limitation.

I grabbed one of these RBwAPR-2nD&R11e-LTE-US off the shelf today at ISP Supplies  and wanted to see how hard it would be to make it work with Verizon Wireless.  I had an active SIM card from an old Verizon Jetpack to use with it.  I inserted the SIM card and fired it up and attached to the onboard 2 GHz WiFi.  As suspected, it did not work out of the box.  I did a little Googling and figure out Verizon uses an APN which is basically a way  LTE carriers differentiate themselves from other carriers on the same technologies.  I created the APN profile, applied it to the LTE interface, disabled the DHCP Client and I had internet.  This is simple and here are the steps:

  1. Start with the default configuration, no changes.  Upgrade to the latest version of RouterOS.  This is covered a million other places. Reboot.
  2.  Click Interfaces-LTE-LTE APNs and delete the APN’s there. Make a new one named whatever you like.  Fill in the AOPN value to “vzwinternet”.

3.Ok out of everything.  Double click the LTE interface and select your APN profile you just created.

Count to ten and your device will connect to Verizon.  Modify as you wish.

The DHCP Client is not needed (and will be red so delete or disable it so it doesn’t bother you…) as the LTE interface will get it’s IP from the authentication process.

Source: Blog

MikroTik + Slingshot Malware, Is it a Threat?

Chances are you have recently heard about Slingshot.  A ZDNet article explains “Researchers at Kaspersky Lab have discovered espionage malware that appears to have been developed by a government to spy on targets across Africa and the Middle East for the past six years.  The researchers haven’t named Slingshot’s country of origin, but note the presence of debug messages written in perfect English, while various component names such as Gollum and Smeagol suggest the authors are fans of The Hobbit. Slingshot reached targets using a compromised software update for routers made by Latvian firm MikroTik.”

So, do you need to be concerned? This email from Normunds at MikroTik explains the slingshot malware attack and why you should or should not worry about it.

All RouterOS versions are safe if you use Winbox 3. Only the old Winbox v2 downloads DLL files from the router. Winbox v3 has been available since the year 2014.

Kaspersky said they have found a malicious DLL file that was loaded to the end users Windows computer with Winbox from a MikroTik router. They said this is a targeted attack on specific organizations and this tool is not spreading itself.

1. Winbox no longer downloads any DLL files from the device, if you are using Winbox v3. Make sure to upgrade RouterOS and Winbox loader. It has been out for ~4 years.

2. As to how this DLL file got it’s way inside a MikroTik router in the first place, is unclear. Most likely this is related to a previously discovered vulnerability in the www service, which was patched in March 2017. Please note that devices affected were only those which did not have a firewall configured.

After the mentioned fixes, we have repeatedly increased RouterOS file system security and made additional internal mechanisms to prevent anything like this in the future. Please keep your devices up to date and configure a firewall (if you disabled the default one) to prevent any unauthorized IPs from accessing your router.

Best regards,
Normunds R.

So, the bottom line is to use WInbox version 3, do a one time upgrade to the current version of RouterOS and worry about something else like, “What’s for lunch?”.


Source: Blog

Why should I invest in MikroTik Training?

This year, 2018 marks my tenth year as a MikroTik trainer and I have been asked this question more times than I can count.  Typically, the question is accompanied by the asker’s reasoning for asking the question.  Their reasonings are valid and so I would like to address these questions:

  1. “I am an owner or manager and I don’t actually log into routers so how could I benefit from training?”
  2. “I have been using MikroTik RouterOS for more than X years, and I use it on a daily basis so why would I need a certification?”

Owners or Managers

With respect to the owner or manager, I can tell you that attending training is one of the most important things you can do to improve your effectiveness as a manager and strategic planner.  Formal training enables you to understand at a deeper level, the capabilities of RouterOS, thereby enabling you to better direct your staff.  Network expansion options, changes to architecture, new services for your customers, all of these are much more clear when you understand at a granular level, the capabilities of the product.  For the owner, this knowledge also facilitates your ability to hire the right technicians and to vet the resume of a potential hire.  Finally, it is important to not overlook the opportunity to network with other owners and managers at one of the few events that attract people in exactly your same position.  Networking creates new opportunities and new ideas you can incorporate into your business.

Seasoned Technicians

I have trained literally thousands of people, many of which introduced themselves as having a level of knowledge adequate to “teach this class themselves” and I always welcome these people with open arms for many reasons.  First, I am always wearing two hats, trainer and student because every day I learn something new myself.  Technology changes so rapidly, I will never “know it all” or even a fraction of what is possible to learn on a daily basis.  Secondly, teaching a group of twenty-something people by myself can be a challenge so having some extra help during the labs is a benefit to me.  Finally, I always say “I never learned so much about a subject until I started teaching it” and the same is true for the seasoned technician involved in formal training.  Although you may have a good foundation, often based on self-paced learning, imparting that knowledge to others makes it grow and progress at a pace far faster than otherwise possible working on your own.  Finally, the most common feedback I get from an experienced person in my classes is that they learned many new ways to do things they had been doing for years “the hard way”.  Standardized training teaches the most optimal way to perform essential tasks using best practices.  This makes your job easier and makes you more efficient.

Finally, I always make it a practice to make myself available to speak with every student that leaves my classroom on the last day of training to get this important feedback and I can say with great confidence, I do not know of a single person, regardless of experience level that didn’t get something important from the class.  That doesn’t speak so much of my ability to teach as it does to the value of formal training.

So, how can you benefit from formal training and when is the next opportunity?  Check our training calendar at https://mywisptraining.com and get signed up.  I hope to see you in class soon.


Source: Blog

Connecting and Managing Remote Grandstream Phones with MikroTik, UCM and Zero Config

If you are familiar with the Grandstream UCM VOIP PBX, you know the value of the Zero Configuration service.  if not, Zero Configuration service allows you to create profiles that are common to all phones, certain models of phones or only certain phones on your network.  These profiles can do things like push configuration changes, push software upgrades, or set new names or extensions on the extension modules or “sidecars” as we call them.  You can, of course, manage each phone individually through a web browser interface but this method does not scale well.

Here is an example of how we use Zero Config in our phone network.

  1. Globally, we set the time zone and the Screen Saver/Background on all phones and rotate them as banners as a message board system.  We also set the path for firmware upgrades for all new phones.
  2. We use a Model Template to configure the Speed Dial buttons on one model of phone and set the names and extensions on other models that have the auxiliary boards.
  3. Adding a new phone is simple for us, plug it in, wait for it to appear in Zero Config, assign an extension, push the changes and that phone is now configured and provisioned.

There are many more capabilities for Zero Config that you can take advantage of but these are a few that I like a lot.

Now, all of this works well in a LAN environment but how can you easily do Zero Configuration with Remote Phones when you have users working from home across the internet?  Easy, MikroTik and RouterOS.  Here is our example:

To make Grandstream Zero Configuration work, we need to get the remote phone and the office LAN on the same Layer2 segment.,  Obviously, this is the job of a VPN protocol, but I wanted to make it as easy and simple as possible, hence fewer issues down the road. I also did not want all the remote LAN traffic to traverse the tunnel and MikroTik L2TP + BCP makes it really easy.

There was one trick that threw me off, and I want to make sure you take notice.  I am telling you this up front for those of you searching to see why a bridged L2TP tunnel BCP is not passing DHCP, do not address the tunnel.  That means, no remote or local address on the server end of the L2TP server.  It is not needed (that itself surprised me) and in fact, it breaks DHCP for some reason.  Also, the MTU, MRU settings must be exactly as shown or bridging will not work.  Again, this caused me a lot of heartache until I figured it out.

Here is the configuration we want to create:

In summary, port Ether5 on the remote router is bridged to the L2TP tunnel on the remote end and on the Office end, the L2TP tunnel is bridged to the port that connects to the office LAN switch.  The net result is that the remote phone pulls an IP address from the UCM which is running DHCP server and the remote phone appears on the same Layer 2 segment as the UCM so it can be used with Zero Configuration.  Here is how you set that up in RouterOS.  I assume basic connectivity is in place at both ends and we are only building the tunnel and the bridges.  Here is how my network looks in my Dude Server:

 

Remote End Configuration:

Each remote device has 2 L2TP interfaces, one for managing the router and one for the VOIP.

First, create the profile because that is where the bridging takes place.  Here is that PPP profile:

Next, create the L2TP Client.  Notice the MTU, MRU, MRRU settings and set as shown because they are critical for bridging to work:

Finally, here are the bridge settings.  Notice the Max MTU, MRU, etc in the red box.  These must be set to these values or bridging will not work:

  

Server End Configuration:

First, create the Bridged profile:

Next, enable the L2TP server and again, the MTU, MRU, MRRU settings are important, set as shown.  Use the profile just created:

Finally, create the bridge and on the Ports tab add the ethernet port connected to the office LAN or switch.  The L2TP interfaces will be added automatically when these users connect.

 

Once this is done, your remote phone, plugged into ether4 pulls an IP from the UCM DHCP Server on the office LAN and is configurable using Grandstream Zero Configuration.

 

 

 

 

 


Source: Blog

Mikrotik RouterOS Dynamic IP Firewall Address List Entries for CDN’s, etc.

Has anyone noticed a new behavior for address lists in RouterOS?  The release notes for 6.37.3 show “firewall – fixed timeout option on address lists with domain name;” but I don’t see when that feature was actually added.

Specifically, if you add a DNS name as the address entry, it dynamically resolves all the IP’s for that name.

The best example is a name record that points to a CDN like WIndows’ Updates. I discovered this trying to mark and prioritize Windows’ updates, MAC Updates, iCloud photo uploads, etc.

Here is an example. Our website, www.ispsupplies.com is distributed by a CDN. One entry in the address list produces 8 dynamic entries, one for each CDN IP. I also noticed they update themselves dynamically, on an unknown schedule. I don’t see this in the Who wants to work together on a QOS system using this feature?

 

No automatic alt text available.
No automatic alt text available.


Source: Blog

One Reason IPV6 on MikroTik Doesn’t Stink

One word, auto configuration.  That’s two words, ok, but if you scrunch it together it is one, autoconfiguration.  My spell check keeps complaining about making it one but oh well.  In the MikroTik world, enabling the MikroTik IPv6 package is really all you need to do to start using it (provided your computer is dual stacked as well).  Today, I realized how nice it is to take a router, reset to factory defaults, and as long as IPv6 is enabled, I can log into the router, Layer 3 with no configuration because IPv6 autoconfigures itself.

That is a big deal because often times on certain laptops, I can’t get MAC WInbox to work.  It can be really flaky but with IPv6 I don’t need it.

Example: I reset this router to factory defaults and look at Winbox:

I can click the MAC address (green arrow) and put up with disconnects or failed connections or click the red arrow and have instant Layer 3 access with no configuration on the router. This one benefit is enough for me to start running IPv6. Obviously, there are many others but this should get your attention at least.

If you want to start learning IPv6, watch some YouTube videos, there are tons, and then create a free IPv6 tunnel with Hurricane Elecric’s Tunnelbroker.com.  Try it, it works!

 

 

The post One Reason IPV6 on MikroTik Doesn’t Stink appeared first on Steve Discher.


Source: Blog

MikroTik Optimal Wireless Config for Transparent Point to Point or Backhaul

I am often asked what is the optimal configuration for a point to point with Mikrotik, typically SXT’s.  I would stress that the fewer settings you make, the better the link will work so I don’t recommend tweaking, just set the basics.  Here are screen shots of everything that needs to be set to make a high capacity point to point.  The red boxes are settings that are peculiar to that end of the link and the blue boxes are the settings that must match both ends of the link:

Wireless AP End of Link (also called bridge mode on a point to point)

Station End

ISP Supplies is a premiere MikroTik stocking distributor in the USA and we pride ourselves on offering more than boxes; we also offer knowledge.  Our team is knowledgeable, willing and able to provide technical assistance with any MikroTik device.

 

The post MikroTik Optimal Wireless Config for Transparent Point to Point or Backhaul appeared first on Steve Discher.


Source: Blog