MikroTik RBwAPR-2nD&R11e-LTE-US with LTE Modem With Verizon HowTo

I grabbed one of these RBwAPR-2nD&R11e-LTE-US off the shelf today at ISP Supplies  and wanted to see how hard it would be to make it work with Verizon Wireless.  I had an active SIM card from an old Verizon Jetpack to use with it.  I inserted the SIM card and fired it up and attached to the onboard 2 GHz WiFi.  As suspected, it did not work out of the box.  I did a little Googling and figure out Verizon uses an APN which is basically a way  LTE carriers differentiate themselves from other carriers on the same technologies.  I created the APN profile, applied it to the LTE interface, disabled the DHCP Client and I had internet.  This is simple and here are the steps:

  1. Start with the default configuration, no changes.  Upgrade to the latest version of RouterOS.  This is covered a million other places. Reboot.
  2.  Click Interfaces-LTE-LTE APNs and delete the APN’s there. Make a new one named whatever you like.  Fill in the AOPN value to “vzwinternet”.

3.Ok out of everything.  Double click the LTE interface and select your APN profile you just created.

Count to ten and your device will connect to Verizon.  Modify as you wish.

The DHCP Client is not needed (and will be red so delete or disable it so it doesn’t bother you…) as the LTE interface will get it’s IP from the authentication process.

Source: Blog

MikroTik + Slingshot Malware, Is it a Threat?

Chances are you have recently heard about Slingshot.  A ZDNet article explains “Researchers at Kaspersky Lab have discovered espionage malware that appears to have been developed by a government to spy on targets across Africa and the Middle East for the past six years.  The researchers haven’t named Slingshot’s country of origin, but note the presence of debug messages written in perfect English, while various component names such as Gollum and Smeagol suggest the authors are fans of The Hobbit. Slingshot reached targets using a compromised software update for routers made by Latvian firm MikroTik.”

So, do you need to be concerned? This email from Normunds at MikroTik explains the slingshot malware attack and why you should or should not worry about it.

All RouterOS versions are safe if you use Winbox 3. Only the old Winbox v2 downloads DLL files from the router. Winbox v3 has been available since the year 2014.

Kaspersky said they have found a malicious DLL file that was loaded to the end users Windows computer with Winbox from a MikroTik router. They said this is a targeted attack on specific organizations and this tool is not spreading itself.

1. Winbox no longer downloads any DLL files from the device, if you are using Winbox v3. Make sure to upgrade RouterOS and Winbox loader. It has been out for ~4 years.

2. As to how this DLL file got it’s way inside a MikroTik router in the first place, is unclear. Most likely this is related to a previously discovered vulnerability in the www service, which was patched in March 2017. Please note that devices affected were only those which did not have a firewall configured.

After the mentioned fixes, we have repeatedly increased RouterOS file system security and made additional internal mechanisms to prevent anything like this in the future. Please keep your devices up to date and configure a firewall (if you disabled the default one) to prevent any unauthorized IPs from accessing your router.

Best regards,
Normunds R.

So, the bottom line is to use WInbox version 3, do a one time upgrade to the current version of RouterOS and worry about something else like, “What’s for lunch?”.


Source: Blog

Why should I invest in MikroTik Training?

This year, 2018 marks my tenth year as a MikroTik trainer and I have been asked this question more times than I can count.  Typically, the question is accompanied by the asker’s reasoning for asking the question.  Their reasonings are valid and so I would like to address these questions:

  1. “I am an owner or manager and I don’t actually log into routers so how could I benefit from training?”
  2. “I have been using MikroTik RouterOS for more than X years, and I use it on a daily basis so why would I need a certification?”

Owners or Managers

With respect to the owner or manager, I can tell you that attending training is one of the most important things you can do to improve your effectiveness as a manager and strategic planner.  Formal training enables you to understand at a deeper level, the capabilities of RouterOS, thereby enabling you to better direct your staff.  Network expansion options, changes to architecture, new services for your customers, all of these are much more clear when you understand at a granular level, the capabilities of the product.  For the owner, this knowledge also facilitates your ability to hire the right technicians and to vet the resume of a potential hire.  Finally, it is important to not overlook the opportunity to network with other owners and managers at one of the few events that attract people in exactly your same position.  Networking creates new opportunities and new ideas you can incorporate into your business.

Seasoned Technicians

I have trained literally thousands of people, many of which introduced themselves as having a level of knowledge adequate to “teach this class themselves” and I always welcome these people with open arms for many reasons.  First, I am always wearing two hats, trainer and student because every day I learn something new myself.  Technology changes so rapidly, I will never “know it all” or even a fraction of what is possible to learn on a daily basis.  Secondly, teaching a group of twenty-something people by myself can be a challenge so having some extra help during the labs is a benefit to me.  Finally, I always say “I never learned so much about a subject until I started teaching it” and the same is true for the seasoned technician involved in formal training.  Although you may have a good foundation, often based on self-paced learning, imparting that knowledge to others makes it grow and progress at a pace far faster than otherwise possible working on your own.  Finally, the most common feedback I get from an experienced person in my classes is that they learned many new ways to do things they had been doing for years “the hard way”.  Standardized training teaches the most optimal way to perform essential tasks using best practices.  This makes your job easier and makes you more efficient.

Finally, I always make it a practice to make myself available to speak with every student that leaves my classroom on the last day of training to get this important feedback and I can say with great confidence, I do not know of a single person, regardless of experience level that didn’t get something important from the class.  That doesn’t speak so much of my ability to teach as it does to the value of formal training.

So, how can you benefit from formal training and when is the next opportunity?  Check our training calendar at https://mywisptraining.com and get signed up.  I hope to see you in class soon.


Source: Blog

Baicells LTE Adds Halo B Support

HaloB is a feature that Baicells LTE introduced in February of 2018. Any Baicells eNodeB (eNB) can be purchased with or upgraded to HaloB through software feature activation. A HaloB eNB eliminates the transport layer between the Evolved Packet Core (EPC) and the eNB by embedding a “Lite EPC” directly on the eNB. Therefore, critical control plane signaling is kept local.

With HaloB installed, S1 (transport) failures are eliminated. This removes wireless PTP backhaul failures, fiber outages, or routing mistakes from causing customer service disruption. CloudCore is still available for OMC monitoring and upgrade functions, as well as the BOSS HSS functions. SIM card activation and bandwidth package assignment are still performed by the BOSS. Operators using the Baicells API for billing software integration will see no change. When a UE attempts to attach to a HaloB eNB, the HaloB contacts the BOSS to verify the IMSI is valid and active and collects the bandwidth packages. All information is downloaded to the HaloB memory bank. Once stored, the UE will remain attached indefinitely. In the event of an eNB or UE reboot, attachment only needs to check the local HaloB memory data for the UE to reattach.

SIM card IMSIs can attach to multiple HaloB eNBs, and each will store the SIM data for future attachments. In the event of a rare CloudCore outage, new installs may not be able to attach during the outage if the SIM data has never been downloaded from the BOSS before. This is not a mission-critical event in most cases and once the CloudCore connection is resumed, the HaloB eNB will collect the SIM data for the new install and commence attachment.

With HaloB:

  • Operators entering the world of fixed LTE wireless have a lower initial investment.
  • The simplified structure means there is no need for professional design and maintenance.
  • The self-configuration, plug-and-play deployment model means a shorter time-to-market (TTM) and faster return-on-investment (ROI).
  • Operators can provide a Layer 2 environment for SMEs and LAN gaming.
  • The eNBs and the core network functions are decoupled.
  • The control plane is processed within HaloB; user equipment will always be online.

What does Halo B Cost?

Per eNodeB: BAICELLS-HALOB-1 $249.99
Per 10 eNodeB’s: BAICELLS-HALOB-10 $1999.99.

Ready to add Halo B?  Now in stock at ISP Supplies HERE.


Source: Blog

Connecting and Managing Remote Grandstream Phones with MikroTik, UCM and Zero Config

If you are familiar with the Grandstream UCM VOIP PBX, you know the value of the Zero Configuration service.  if not, Zero Configuration service allows you to create profiles that are common to all phones, certain models of phones or only certain phones on your network.  These profiles can do things like push configuration changes, push software upgrades, or set new names or extensions on the extension modules or “sidecars” as we call them.  You can, of course, manage each phone individually through a web browser interface but this method does not scale well.

Here is an example of how we use Zero Config in our phone network.

  1. Globally, we set the time zone and the Screen Saver/Background on all phones and rotate them as banners as a message board system.  We also set the path for firmware upgrades for all new phones.
  2. We use a Model Template to configure the Speed Dial buttons on one model of phone and set the names and extensions on other models that have the auxiliary boards.
  3. Adding a new phone is simple for us, plug it in, wait for it to appear in Zero Config, assign an extension, push the changes and that phone is now configured and provisioned.

There are many more capabilities for Zero Config that you can take advantage of but these are a few that I like a lot.

Now, all of this works well in a LAN environment but how can you easily do Zero Configuration with Remote Phones when you have users working from home across the internet?  Easy, MikroTik and RouterOS.  Here is our example:

To make Grandstream Zero Configuration work, we need to get the remote phone and the office LAN on the same Layer2 segment.,  Obviously, this is the job of a VPN protocol, but I wanted to make it as easy and simple as possible, hence fewer issues down the road. I also did not want all the remote LAN traffic to traverse the tunnel and MikroTik L2TP + BCP makes it really easy.

There was one trick that threw me off, and I want to make sure you take notice.  I am telling you this up front for those of you searching to see why a bridged L2TP tunnel BCP is not passing DHCP, do not address the tunnel.  That means, no remote or local address on the server end of the L2TP server.  It is not needed (that itself surprised me) and in fact, it breaks DHCP for some reason.  Also, the MTU, MRU settings must be exactly as shown or bridging will not work.  Again, this caused me a lot of heartache until I figured it out.

Here is the configuration we want to create:

In summary, port Ether5 on the remote router is bridged to the L2TP tunnel on the remote end and on the Office end, the L2TP tunnel is bridged to the port that connects to the office LAN switch.  The net result is that the remote phone pulls an IP address from the UCM which is running DHCP server and the remote phone appears on the same Layer 2 segment as the UCM so it can be used with Zero Configuration.  Here is how you set that up in RouterOS.  I assume basic connectivity is in place at both ends and we are only building the tunnel and the bridges.  Here is how my network looks in my Dude Server:

 

Remote End Configuration:

Each remote device has 2 L2TP interfaces, one for managing the router and one for the VOIP.

First, create the profile because that is where the bridging takes place.  Here is that PPP profile:

Next, create the L2TP Client.  Notice the MTU, MRU, MRRU settings and set as shown because they are critical for bridging to work:

Finally, here are the bridge settings.  Notice the Max MTU, MRU, etc in the red box.  These must be set to these values or bridging will not work:

  

Server End Configuration:

First, create the Bridged profile:

Next, enable the L2TP server and again, the MTU, MRU, MRRU settings are important, set as shown.  Use the profile just created:

Finally, create the bridge and on the Ports tab add the ethernet port connected to the office LAN or switch.  The L2TP interfaces will be added automatically when these users connect.

 

Once this is done, your remote phone, plugged into ether4 pulls an IP from the UCM DHCP Server on the office LAN and is configurable using Grandstream Zero Configuration.

 

 

 

 

 


Source: Blog

Mikrotik RouterOS Dynamic IP Firewall Address List Entries for CDN’s, etc.

Has anyone noticed a new behavior for address lists in RouterOS?  The release notes for 6.37.3 show “firewall – fixed timeout option on address lists with domain name;” but I don’t see when that feature was actually added.

Specifically, if you add a DNS name as the address entry, it dynamically resolves all the IP’s for that name.

The best example is a name record that points to a CDN like WIndows’ Updates. I discovered this trying to mark and prioritize Windows’ updates, MAC Updates, iCloud photo uploads, etc.

Here is an example. Our website, www.ispsupplies.com is distributed by a CDN. One entry in the address list produces 8 dynamic entries, one for each CDN IP. I also noticed they update themselves dynamically, on an unknown schedule. I don’t see this in the Who wants to work together on a QOS system using this feature?

 

No automatic alt text available.
No automatic alt text available.


Source: Blog

How to use Ubiquiti’s AirLink tool to plan wireless links

To properly select Ubiquiti gear for a point to point or point to multipoint link, this need to do proper planning.  Fortunately, Ubiquiti has a great tool that allows you to try different products in a real-world link simulation to select the right product for your application.

You can begin mapping out your service area using Ubiquiti’s Airlink tool here: https://airlink.ubnt.com/#/ptmp

You can plan your backhaul links using this function: https://airlink.ubnt.com/#/ptp

This Youtube video produced shows the features of the Airlink software and how to use it for mapping.


Source: Blog

Grandstream security vulnerability in the UCM series firmware

Grandstream posted this today…

A security vulnerability has recently been discovered in the UCM series IP PBX firmware version 1.0.14.23 or older. We highly recommend that any UCM customer upgrade their firmware version to 1.0.14.24 or 1.0.15.13 as soon as possible in order to install a permanent fix to this issue.

The security vulnerability affects the UCM6100 series, UCM6200 series, and UCM6510. For more information on the details behind the security issue please read the special security bulletin below.

Grandstream Security Bulletin GS17-003

To upgrade your firmware, please visit the firmware page below and install either 1.0.14.24 (official release) or 1.0.15.13 (currently a beta release).

Grandstream Firmware Page

If you are not familiar with how to upgrade the firmware, please see below for a link to each UCM series user manual:

UCM6100 User Manualpage 349

UCM6200 User Manual page 336

UCM6510 User Manualpage 364

For additional support resources please see the options below. If you are opening a Help Desk ticket please be sure to log in with your ResellerConnect credentials to receive priority technical support.

Help Desk

Grandstream Forums

UCM Security Manual

 

The post Grandstream security vulnerability in the UCM series firmware appeared first on Steve Discher.


Source: Blog

Using Baicells LTE L2 Mode

Baicells LTE provides an L2 mode to bridge the UE’s.  To change LGW mode, navigate to the Network -> LGW page. In LGW L2 mode, the eNB will create a virtual interface for every UE that attaches. Each virtual interface will then do a DHCP request and create a 1:1 mapping between the UE IP (from Cloud EPC) and LGW IP. In L2 mode, the MAC address that the CPE uses is generated from the IMSI number. To calculate the CPE Mac address, convert the last 12 digits of the IMSI number to hex, then prefix it with 8A. For example, if the IMSI is 311980000002918, you would take the last 12 digits “980000002918” and convert it to hex which would equal “E42C8D5366”, which brings us to the MAC address of 8A:E4:2C:8D:53:66. Once you know the MAC address, you can provision your networking accordingly.

Note:

About the LGW, the CPEs will get private IPs from the cloud EPC. Since the operator has no control over this, LGW is used to translate the IPs to match your own network. You can find some more details on this in the Nova LGW User Guide. We currently do not support VLANs using LGW. With LGW, your options are: NAT mode (L3 w/ NAT), where all CPEs will share the same IP address as the eNB, or Router mode (L3), where you can route to the LGW subnet.

To access the CPE remotely.
First, you have to do some settings on eNB and CPE before you can access into the CPE remotely.

From base station web GUI:
Under LTE Settings->LGW Settings, you can select either NAT (default) or Router mode. Under either mode, you can remotely access the CPE. Details of which are included in the attached LGW User Guide. Also, as described in this guide, you can statically assign an IP address to each CPE based on the SIM card’s IMSI number.

From CPE web GUI:
To enable remote access to the CPE, please remember to enable the “Allow HTTPS Login from WAN” parameter on the System->Web Setting page.

Baicells LTE Attachment(s)
Nova LGW User Guide (8).pdf
LGW Bridge Flowchart (5).png
CPE Working Mode.docx

 

 

 

 

 

 

 

 

 

 

 

 

The post Using Baicells LTE L2 Mode appeared first on Steve Discher.


Source: Blog

One Reason IPV6 on MikroTik Doesn’t Stink

One word, auto configuration.  That’s two words, ok, but if you scrunch it together it is one, autoconfiguration.  My spell check keeps complaining about making it one but oh well.  In the MikroTik world, enabling the MikroTik IPv6 package is really all you need to do to start using it (provided your computer is dual stacked as well).  Today, I realized how nice it is to take a router, reset to factory defaults, and as long as IPv6 is enabled, I can log into the router, Layer 3 with no configuration because IPv6 autoconfigures itself.

That is a big deal because often times on certain laptops, I can’t get MAC WInbox to work.  It can be really flaky but with IPv6 I don’t need it.

Example: I reset this router to factory defaults and look at Winbox:

I can click the MAC address (green arrow) and put up with disconnects or failed connections or click the red arrow and have instant Layer 3 access with no configuration on the router. This one benefit is enough for me to start running IPv6. Obviously, there are many others but this should get your attention at least.

If you want to start learning IPv6, watch some YouTube videos, there are tons, and then create a free IPv6 tunnel with Hurricane Elecric’s Tunnelbroker.com.  Try it, it works!

 

 

The post One Reason IPV6 on MikroTik Doesn’t Stink appeared first on Steve Discher.


Source: Blog