Thanks for fast answer. I'll give any info, just ask. Users from network #1 can use internet #1 only and FTP. Network #2 users can use both internet #1 and internet #2 and FTP also (it's logical to use load balancing in this case, right?). No other special requirements, users are browsing sites, sending email's, chatting in ICQ. But no torrents or something high-load.of course it's possible, but need more info. you will have several uplinks, do you plan to use some load balancing, or send certain users through one, and some through the other? what are the other requirements, bandwidth shaping, firewall?
The most important question, then, is whether or not you have proper authorization to touch the network at all.the story is simple it can be configured by headquarter company only, so we haven't password for it
It will do everything the 1811 will minus Cisco proprietary things like EIGRP. Mikrotik is very capable and a lot more flexible, but Cisco has enterprise level reliability and quality assurance behind it. There's good reason it's the industry standard.i can't pull 1811 because it used to connect 20.0/24 to other offices and hq
can mikrotik route/nat ip aliases?
now i have three questions:I. define static ip's for all interfaces
/ip address
add address=192.168.1.32/24 interface=ether1 – dsl modem
add address=10.201.64.251/24 interface=ether2 – local network
add address=172.30.6.6/30 interface=ether3 – cable main, internet
add address=172.31.24.6/30 interface=ether3 – cable alias, FTP only
add address=172.32.7.6/24 interface=ether4 – ftp server
add address=172.33.25.6/24 interface=ether5 – cisco router
II. configure internet #2 for 64.0/24 network
1) add interface pppoe – ether1:
/interface pppoe-client add name=xDSL interface=ether1 user=dsl_login password=dsl_password add-default-route=yes use-peer-dns=yes disabled=no
2) allow 64.0/24 to use internet #2:
/ip firewall nat add chain=srcnat src-address=10.201.64.0/24 action=masquerade
3) define filters:
/ ip firewall filter
add chain=input connection-state=established comment=”Accept established connections”
add chain=input connection-state=related comment=”Accept related connections”
add chain=input connection-state=invalid action=drop comment=”Drop invalid connections”
add chain=input protocol=udp action=accept comment=”UDP” disabled=no
add chain=input protocol=icmp limit=50/5s,2 comment=”Allow limited pings”
add chain=input protocol=icmp action=drop comment=”Drop excess pings”
add chain=input in-interface=ether2 src-address=10.201.64.0/24 comment=”From our LAN” action=accept
add chain=input action=log log-prefix=”DROP INPUT” comment=”Log everything else”
add chain=input action=drop comment=”Drop everything else”
4) allow to use dns:
/ip dns set allow-remote-requests=yes
III. configure transparent bridge between internet #1 and cisco
/interface
bridge add name=cisco_bridge
bridge port add interface=ether3 bridge=cisco_bridge
bridge port add interface=ether5 bridge=cisco_bridge
...
and then change the routing list/ip firewall mangle
add action=mark-routing chain=prerouting src-address=172.31.24.5/30 dst-address=172.29.4.5/30 new-routing-mark=ftp_flow_a
add action=mark-routing chain=prerouting src-address=10.201.0.0/16 dst-address=172.29.4.5/30 new-routing-mark=ftp_flow_b
is this correct?/ip route
add dst-address=172.29.4.5/30 gateway=172.29.4.6 routing-mark=ftp_flow_a
add dst-address=172.29.4.5/30 gateway=10.201.64.251 routing-mark=ftp_flow_b