This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
user_guide:mikrotik:rb751 [2017/02/01 12:30] – [Our situation] admin | user_guide:mikrotik:rb751 [2022/05/09 12:22] (current) – [Converting an Unknown client] admin | ||
---|---|---|---|
Line 5: | Line 5: | ||
With this scenario we assume you have: | With this scenario we assume you have: | ||
* A recent installation of RADIUSdesk which includes Dynamic RADIUS Clients support. | * A recent installation of RADIUSdesk which includes Dynamic RADIUS Clients support. | ||
- | * We will use our **Radiusdesk Hosted** server which has an IP Address of **178.32.59.137** in this document. | + | * We will use our **cloud.radiusdesk.com** demo server which has an IP Address of **164.160.89.129** in this document. |
- | * Our **Radiusdesk Hosted** server has a site wide RADIUS shared secret of **RDhostedXYZ2525**. | + | * Our **cloud.radiusdesk.com** demo server has a site wide RADIUS shared secret of **testing123**. |
* A new (or reset to defaults) Mikrotik RouterBOARD 751U which you will set up from scratch. | * A new (or reset to defaults) Mikrotik RouterBOARD 751U which you will set up from scratch. | ||
* You want to run a Captive portal on the Mikrotik' | * You want to run a Captive portal on the Mikrotik' | ||
Line 15: | Line 15: | ||
* If you connect with a machine which has DHCP enabled; you will get a 192.168.88.x IP Address while the RouterBOARD 751U can be reached through 192.168.88.1. | * If you connect with a machine which has DHCP enabled; you will get a 192.168.88.x IP Address while the RouterBOARD 751U can be reached through 192.168.88.1. | ||
* The default username is **admin** with **no password**. | * The default username is **admin** with **no password**. | ||
+ | * Newer versions of ROS insist you set a password. If you never had password on the device specify the old password as blank text and specify the new value and confirm it to set the password on the device. | ||
===== Our approach ===== | ===== Our approach ===== | ||
We will take the following configuration approach. This approach very common on the 751U. | We will take the following configuration approach. This approach very common on the 751U. | ||
- | * Ethernet port 1 (Marked PoE) will be used to connect the 751U to the Internet. (Typically a DSL router' | + | * Ethernet port 1 (Marked PoE) will be used to connect the 751U to the Internet. (Typically a LTE router' |
* Ethernet port 1 will be configured to be a **DCHP Client**. | * Ethernet port 1 will be configured to be a **DCHP Client**. | ||
* Ethernet ports 2-5 will be used as a Ethernet switch which runs a DHCP Server and NAT traffic between Ethernet port 1 and Ethernet ports 2-5. | * Ethernet ports 2-5 will be used as a Ethernet switch which runs a DHCP Server and NAT traffic between Ethernet port 1 and Ethernet ports 2-5. | ||
Line 45: | Line 46: | ||
===== Set the Mikrotik' | ===== Set the Mikrotik' | ||
- | * We will use a fictional | + | * We will use a geographic naming |
- | * The systems identity will thus be **za-gp-pta-001**. | + | * The systems identity will thus be **za-gp-jhb-001**. |
* Connect to the Mikrotik' | * Connect to the Mikrotik' | ||
- | * Specify the Identiry | + | * Specify the Identity |
===== Confirm Ethernet-1' | ===== Confirm Ethernet-1' | ||
* Connect to the Mikrotik' | * Connect to the Mikrotik' | ||
* The **ether1-gateway** interface should be listed along with it's DHCP supplied IP Address. | * The **ether1-gateway** interface should be listed along with it's DHCP supplied IP Address. | ||
- | {{ : | + | {{: |
* If this is not listed or the interface does not have an IP Address assigned to it; ensure that it is fixed before continuing. | * If this is not listed or the interface does not have an IP Address assigned to it; ensure that it is fixed before continuing. | ||
Line 59: | Line 60: | ||
* Connect to the Mikrotik' | * Connect to the Mikrotik' | ||
* Select the **Ports** sub-tab to see the list of ports and to which bridge they are assigned. | * Select the **Ports** sub-tab to see the list of ports and to which bridge they are assigned. | ||
- | * By default **wlan1** and **ether2-master-local** will be members of the bridge named **bridge**. | + | * By default |
- | * Remove **wlan1** from the list of ports (thus being a member of the bridge | + | * Remove **wlan1** from the list of ports. |
- | {{ : | + | {{: |
+ | | ||
+ | {{: | ||
===== Add a RADIUS server ===== | ===== Add a RADIUS server ===== | ||
Line 68: | Line 71: | ||
* Click the **Add new** button to add a RADIUS server. | * Click the **Add new** button to add a RADIUS server. | ||
* Select the **Hotspot** service. | * Select the **Hotspot** service. | ||
- | * Specify the IP Address of the RADIUSdesk server running FreeRADIUS. (We use 178.32.59.137) | + | * Specify the IP Address of the RADIUSdesk server running FreeRADIUS. (We use 164.160.89.129) |
- | * Specify the shared secret. (We use RDhostedXYZ2525) | + | * Specify the shared secret. (We use testing123) |
* Since our server is somewhere out on the Internet, we increase the timeout to 5000ms. | * Since our server is somewhere out on the Internet, we increase the timeout to 5000ms. | ||
* Leave **Accounting Backup** unchecked. | * Leave **Accounting Backup** unchecked. | ||
- | {{: | + | {{: |
* Next we will set-up the hotspot | * Next we will set-up the hotspot | ||
Line 129: | Line 132: | ||
===== Our situation ===== | ===== Our situation ===== | ||
- | * With our setup in this document, we make use of a VPS server that runs RADIUSdesk somewhere in the cloud. (We use our **Radiusdesk Hosted** server.) | + | * The setup described here makes use of a VPS server that runs RADIUSdesk somewhere in the cloud. (We use cloud.radiusdesk.com) |
- | * Recent versions of RADIUSdesk makes it super easy to add a RADIUS client to the FreeRADIUS server | + | * RADIUSdesk makes it super easy to add a RADIUS client to the FreeRADIUS server. |
- | * One simply have to take care of the following items when you are pointing a RADIUS client to the RADIUSdesk server. | + | * Simply |
- | * Specify the public | + | * Public |
* Ensure the site wide shared secret is correct. (Check this with the person who configured the RADIUSdesk server) | * Ensure the site wide shared secret is correct. (Check this with the person who configured the RADIUSdesk server) | ||
- | * Ensure there is a unique identifier the RADIUS client can identify itself to the server. (We did this by setting the **Identity** of the Mikrotik router.) | + | * Ensure there is a unique identifier the RADIUS client can identify itself |
- | * After you took care of that a simply reboot the Mikrotik router while it has an active Internet connection. | + | * After you took care of that simply reboot the Mikrotik router while it has an active Internet connection. |
- | * It should then be reported under the **Unknown Clients** list of the **RADIUS -> Dynamic | + | * It should then be reported under the **Unknown Clients** list of the **RADIUS -> RADIUS Clients** applet. |
+ | * The **Unknown Clients** tab is closed by default. To launch it, click the **Unknown Clients** button in the **RADIUS Clients** | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | ===== Converting An Unknown Client | ||
+ | * After the Mikrotik appeared under the **Unknown clients** tab we can convert it to a known client. | ||
+ | * Select the unknown client you want to convert and click on the **Attach** button. | ||
+ | * This will bring up a window where you can select the owner (if there are sub-providers belonging to the user who logged in) | ||
+ | * Next you can give it a name: | ||
+ | {{ : | ||
+ | * The **Monitor** and **Maps** sub-tabs you can leave as default. | ||
+ | * The **Enhancements** tab has some handy enhancements. You are also advised to leave the defaults. | ||
+ | {{ : | ||
+ | * Finally select some realms who you want to allow to use this RADIUS Client. If the list is empty, click on the **Make available to sub-providers** checkbox to give a list of realms belonging to sub-providers. | ||
+ | {{ : | ||
+ | * After you click the **Next** button this item will be moved to the list of known Dynamic Radius Clients. As you can see this item indicates that it never contacted the RADIUSdesk server. | ||
+ | {{ : | ||
+ | * Simply reboot the Mikrotik to confirm that contact is now established: | ||
+ | {{ : | ||
+ | * This brings us to the end of this section | ||
- | ===== Our actions ===== | ||
- | * We will add a NAS device of **Connection type** -> **Dynamic client**. | ||
- | <WRAP center round tip 60%> | ||
- | If the **Connection type** -> **Dynamic client** is not available form the list, confirm it is activated in the //< | ||
- | </ | ||
- | * The value of NAS-Identifier (on the Mikrotik => System -> Identification) will be crucial when adding a new NAS device. This value will have to be defined in <wrap em>three places</ | ||
- | * The **Dynamic AVP detail** sub-tab in the add wizard will specify | ||
- | * Attribute = NAS Identifier | ||
- | * Value = za-gp-pta-001 | ||
- | * The **NAS** sub-tab in the add wizard will specify | ||
- | * Name = za-gp-pta-001 | ||
- | * After the NAS device has been added; you need to edit the NAS device. Select the **NAS** -> **Optional info** sub tab and make sure the value of **NAS Identifier** is specified as **za-gp-pta-001**. | ||
- | * Log into the RADIUSdesk webtop as either an Access Provider or the root user. | ||
- | * Select **Menu** -> **NAS Devices** -> **NAS Devices** to open the **NAS Devices** applet. | ||
- | * An optional start screen may ask you to specify the owner of this NAS device. | ||
- | * Select **Next** to continue. | ||
- | * Select the **Dynamic client** connection type. | ||
- | * Select **Next** to continue. | ||
- | * Specify the **Attribute** and **NAS-Identifier** and the **Value** as **za-gp-pta-001** in the **Dynamic AVP Detail** sub-tab | ||
- | * Specify the **Name** as **za-gp-pta-001** and specify a secret in the **NAS** sub-tab. | ||
- | * Specify the realms who will be able to use this NAS device in the **Realms** sub-tab. | ||
- | * Select **Next** to complete the action. | ||
- | * Once the NAS device has been added; edit it and select the **NAS** -> **Optional info** sub tab. | ||
- | * Specify the **NAS-Identifier** as **za-gp-pta-001**. | ||
- | * Also select the type as **Mikrotik** | ||
- | * Save the changes. | ||
- | * Wait at least ten minutes to allow **FreeRADIUS** to go thorough an auto restart cycle in order to activate the changes. | ||
- | * Alternatively you can (only as root user) go **Menu** -> **Tools** -> **Logfile Viewer** and **Stop**; **Start** in the Logfile viewer applet' | ||
-------------- | -------------- | ||
Line 182: | Line 177: | ||
====== What next ====== | ====== What next ====== | ||
Although your system is up and running now you may want to do the following advanced configurations | Although your system is up and running now you may want to do the following advanced configurations | ||
- | * Incorporate a heartbeat system to sent heartbeats from the Mikrotik to the RADIUSdesk server for monitor purposes. | ||
* Introduce central managed Dynamic Login Pages for Mikrotik. | * Introduce central managed Dynamic Login Pages for Mikrotik. | ||
- | |||
The Advanced setup page will cover these topics. | The Advanced setup page will cover these topics. |