versión de Mikrotik RouterOS

What’s new in RouterOS v6.19 rc6

NOTE: in this build we applied a patch that should solve most of the queueing related performance issues on CCR. If these changes will provide positive feedback we will consider to put them into release of 6.19. Please, test queues on CCR and report results and any problems you might find.

It also brings improvements for long term stability of the CCR.

What’s new in RouterOS v6.19 rc6 (2014-Aug-08 12:38):CCR – major queueing performance fix, now

  • CCR – fixed crash on L2MTU change
  • CCR – improved performance
  • firewall – packet defragmenting will only happen with connection tracking enabled
  • firewall – optimized option matching order with-in a rule
  • firewall – rules that require CONNTRACK to work will now have Invalid flag when CONNTRACK is disabled
  • firewall – rules that require use-ip-firewall to work will now have invalid flag when use-ip-firewall is disabled
  • firewall – rules that have interface with “Slave” flag specified as in-/out-interface will now have Invalid flag
  • firewall – rules that have interface without “Slave” flag specified as in-/out-bridge-port will now have Invalid flag
  • firewall – rules with Invalid flags will now be auto-commented to explain why
  • console – added unary operator ‘any’ that evaluates to true if argument is not null or nothing value
  • l2tp – force l2tp to not use MPPE encryption if IPsec is used
  • sstp – force sstp to not use MPPE encryption (it already has TLS one)
  • sstp – report TLS encryption as well
Read More
versión de Mikrotik RouterOS

Que hay de nuevo en la versión de Mikrotik RouterOS in 6.14rc25

Que hay de nuevo en la versión de Mikrotik RouterOS in 6.14rc25 (2014-May-30 14:03):

  • wireless-fp package is now included in routeros one (disabled by default)
  • webfig – fixed quickset, it didn’t work with disabled wireless pacakge
  • sstp – fixed problem where session was closed every 2min
  • pptp,l2tp,pppoe – fixed problem where some of the static bindings become dynamic interfaces
  • eoip – lowered default MTU to avoid IP packet fragmentation
  • eoip – added clamp-tcp-mss setting with default=yes for new tunnels to avoid IP packet fragmentation
  • fixed – bridge could sometimes get added without ~running~ flag
  • fixed – simple queues could sometimes crash router
  • fixed – simple queue stats freeze (empty winbox queue window)
  • ssh server – allow none cipher
  • proxy – added ‘anonymous’ option which will skip adding X-* and Via headers
  • dhcp server – added option use-framed-as-classless and added support for DHCP-Classless-Static-Route RADIUS attribute

También le puede interesar Licencias Mikrotik RouterOS desde $24

Read More
Version RouterOS
Mikrotik, Noticias

Version Mikrotik RouterOS v6.13 Liberada

Ya se ha publicado la  nueva Version Mikrotik RouterOS v6.13 Liberada

Que hay de nuevo en la 6.13:

  • console – comments are now accepted where new command can start, that is, where ‘/’ or ‘:’ characters can be used to start new command, e.g.

                /interface { # comment until the end of the line



  • backup – backups by default are encrypted now (with user password). To use backup on older versions, you should disable encryption with dont-encrypt flag when creating it.
  • files with ‘.sensitive.’ in the filename require ‘sensitive’ permission to manipulate
  • lcd – reduce CPU usage when displaying static screens
  • l2tp – fixed occasional server lockup
  • pptp – fixed memory leak
  • sstp – fixed crashes

Solo hay que hace clic en “Check for updates” en QuickSet, Webfig o Winbox packages menu. Si aun esta usando la version 5 o anterior, descargue la version mas reciente del paquete NPK, subalo a su routerboard, y recinicie:

Read More
versión de Mikrotik RouterOS
Mikrotik, Noticias

Curso Administración RouterOS 6 Mikrotik

Curso Administración RouterOS 6 Mikrotik

Requisitos para el curso: Conocimientos básicos de TCP/IP, Conexion a Internet al menos Banda Ancha.

Incluye: Licencia Nivel 5 al final del curso. 

Fecha: A Partir del 4 Agosto

Duración: 3 Días

Lugar: En Línea en Vivo


Modulo 1 – MikroTik RouterOS – Introducción

• MikroTik RouterOS y RouterBOARD

• Primer acceso al router + LAB
• Winbox y MAC-Winbox
• Cable Null Modem
• SSH and Telnet

• Configurar una conexión a Internet vía router + LAB
• Dirección IP y puerta de enlace
• DHCP-cliente
• NAT masquerade

• TCP/IP Básico
• Modelo OSI layer y encapsulado
• Comunicación entre equipos de dos redes
• Direcciones IP
• Máscara de red y Subredes

• Actualizar RouterOS + LAB
• encontrar los paquetes
• Formas de actualización
• Tipo de paquetes

• Gestionar RouterOS logins + LAB

• Gestionar servicios de RouterOS

• Realización de Backups y exportar/importar configuración + LAB
• Guardar y restaurar backup
• Editar fichero export

• Licencia RouterOS
• Niveles
• Actualizar licencia + LAB

• Configuración cliente NTP

• Netinstall + LAB
• Reinstalar RouterOS
• Resetear RouterOS

Módulo 2 – Firewall

• Principios del Firewall
• Estructura
• Cadenas y acciones + LAB

• Filtros Firewall en acción
• Acciones de Filtrado
• Cadenas de Filtrado;
• Protegiendo tu router (input) + LAB
• Protegiendo a tus clientes (forward) + LAB

• Seguimiento de conexiones en RouterOS
• Impactos en el router
• Estados de la conexión + LAB

• Lista de direcciones básica + LAB

• Source NAT
• Acciones + LAB

• Destination NAT
• Acciones
• Caché DNS + LAB

• Limitaciones NAT

Módulo 3 – QoS

• Cola Simple + LAB
• target-address
• max-limit y limit-at
• dst-address
• bursts

• Priorización de Tráfico + LAB

• Simple Mangle y Tree Queue + LAB
• mark-connection y mark-packet
• queue tree

• PCQ setup + LAB
• Configuración pcq-rate
• Configuración pcq-limit

• Test de Bandwidth + LAB
• cliente
• servidor

• Monitorización
• Monitor de tráfico de interface
• Torch
• Gráifcos + LAB

Módulo 4 – Gestión de Red

• ARP modes
• RouterOS ARP table

• DHCP servidor y cliente + LAB
• DHCP cliente
• Configuración del servidor
• Gestión de préstamos
• Configiración de red en el servidor DHCP

• HotSpot + LAB
• setup
• users
• walled-garden
• ip-binding
• user profiles
• server profiles

• Proxy + LAB
• setup
• Proxy transparente
• HTTP firewall
• HTTP logging

• Almacenamiento
• formatear discos adicionales
• mover servicios al almacenamiento

• RouterOS tools
• E-mail
• Netwatch + LAB
• Ping, Traceroute
• Profile (CPU load)

Módulo 5 – Wireless

• Conceptos 802.11a/b/g/n
• Bandas
• Frecuencias
• Canales
• Regulación por país

• Configurar un enlace wireless simple + LAB
• Configurar un Access Point
• Configurar una Estación

• Filtrado por dirección MAC + LAB
• default-authentication
• access-list
• connect-list
• default-forwarding

• Seguridad Wireless y Encriptación + LAB

• Confiiguración específica 802.11n + LAB
• data-rates
• HT chains
• HT guard interval

• MikroTik wireless protocols + LAB
• Nstreme uso y configuración
• Nstreme Dual configuración
• NV2 (TDMA) configuración

• Herramientas de Monitorización
• Scanear Wireless
• Snooper
• Tabla de Registro

Módulo 6 – Bridging

• Concepto Bridging + LAB
• Introducción al bridge
• crear un bridge
• añadir puertos a un bridge

• Bridge wireless networks + LAB
• WDS modes
• station-pseudobridge

• Bridge Wireless y redes remotas + LAB
• Túneles EoIP
• Túneles VPLS

Módulo 7 – Routing

• Introducción al Routing
• Conceptos routing
• Tabla de rutas
• Abriviación de rutas
• Crear rutas

• Rutas estáticas
• Configurar default gateway + LAB
• Gestionar rutas dinámicas
• Implementar rutas estáticas en una red simple + LAB

• enable OSPF
• implementar un área simple OSPF

Módulo 8 – Túneles

• Red Local Segura
• Direcciones punto a punto
• crear PPPoE cliente en RouterOS/Windows/MacOS + LAB
• PPPoE service-name
• crear PPPoE server + LAB

• Configurar PPP
• ppp secret + LAB
• ppp profile + LAB
• ppp status

• IP pool
• crear pool
• gestionar rangos
• asignar a servicio

• Comunicaciones segura con redes remotas + LAB
• crear PPTP(L2TP) client
• crear PPTP(L2TP) server
• configurar rutas entre redes

Para mayor información contáctenos  o puede realizar su reservar en Curso Administración RouterOS Mikrotik.



Read More
Nueva version de RouterOs de Mikrotik lieberada

Version Mikrotik RouterOS v6.12 Liberada

Ya se ha publicado la  nueva Version Mikrotik RouterOS v6.12

Ha arreglos en el Winbox y mejoras en la estabilidad.

Version Mikrotik RouterOS v6.12 Liberada el 2014-Apr-07 09:04:

  • ipsec – support IPv4 over IPv6 and vice versa
  • pppoe – report correctly number of active links
  • updated timezone information
  • many fixes for CRS managed switch functionality –particularly improved VLAN support, port isolation, defaults
  • www – added support for HTTP byte ranges
  • l2tp – fixed ~no buffer space available~ problem
  • added trunk support for CRS switches
  • added policing support for CRS switches
  • lte – provide signal strength using snmp and make ‘info once’ work in console

Puede conseguir su Licencias Mikrotik en nuestra tienda.


Read More
Version RouterOS
Mikrotik, Noticias

Version RouterOS v6.5 Liberada

Version RouterOS v6.5 Liberada:

Que hay de nuevo en la versión 6.5 (2013-Oct-16 15:32):

  • tftp – added data packet pipelining for read requests
  • console – exported physical interface configuration uses ‘default-name’
  • instead of item number to match relevant interface
  • console – report all constituent errors for parameters with multiple alternative value types
  • certificates – merge ‘/certificate ca’ into ‘/certificate’, use set-ca-passphrase to maintain CA functionality
  • lcd – backlight option is replaced with “/lcd backlight” command
  • dhcp server – added option to disable conflict-detection
  • console – ‘:return’ does not trigger ‘on-error=’ action of ‘:do’ command
  • route – fixed crash that could be triggered by change in nexthop address resolution
  • route – some imported VPNv4 routes were not using MPLS labels
  • route – imported VPNv4 routes were not always updated or removed when the original route changed
  • winbox – fixed problem where all settings were read only on first open
  • ovpn server – use only ciphers that are allowed not that client requested
  • ssh client – fixed public key authentication
  • ipsec – fix peer mathing with non byte aligned masks
  • fix routerboot upgrading if RouterOS is partitioned
  • add support for second serial port on CCR boards
  • fix serial port baudrate selection on CCR boards
  • ethernet interface stats that are behind switch chip show real hw stats instead of just the traffic that goes through cpu
Read More