0% found this document useful (0 votes)
97 views

Balanceo PPPoE Modo Bridge

The document configures a Mikrotik router for failover load balancing across three internet connections. It sets the WAN and LAN interfaces, enables PPPOE clients on the WAN interfaces, configures DHCP and DNS services for the LAN, implements connection marking and routing for load balancing outbound traffic across the WANs, enables NAT, and configures the default gateway and routing tables for failover.

Uploaded by

Ivan Montero
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views

Balanceo PPPoE Modo Bridge

The document configures a Mikrotik router for failover load balancing across three internet connections. It sets the WAN and LAN interfaces, enables PPPOE clients on the WAN interfaces, configures DHCP and DNS services for the LAN, implements connection marking and routing for load balancing outbound traffic across the WANs, enables NAT, and configures the default gateway and routing tables for failover.

Uploaded by

Ivan Montero
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Nota.

tener en cuenta que los routers tienen que estar en modo bridge, mas
adelante pondr� un tuto de como hacerlo en los tp-link en los cuales uso.
WAN1 = pppoe-out1
WAN2 = pppoe-out2
WAN3 = pppoe-out2
LAN = 192.168.100.1/24
Interfaces Mikrotik
/interface pppoe-client
add disabled=no interface=ether1 max-mru=1480 max-mtu=1480 mrru=1600 name=\
pppoe-out1 password=8095234153 user=8095234153
add disabled=no interface=ether2 max-mru=1480 max-mtu=1480 mrru=1600 name=\
pppoe-out2 password=8097924063 user=8097924063
add disabled=no interface=ether3 max-mru=1480 max-mtu=1480 mrru=1600 name=\
pppoe-out3 password=8492942380 user=8492942380

Agregando el LAN
/ip address
add address=192.168.100.1/24 interface=LAN network=192.168.100.0

Opcional dhcp para que el mikrotik brinde ip autom�ticamente


/ip dhcp-server
add address-pool=dhcp_pool1 disabled=no interface=LAN lease-time=1d name=\
dhcp1
Opcional
/ip dhcp-server network
add address=192.168.100.0/24 dns-server=200.48.225.130,200.48.225.146,8.8.8.8 \
gateway=192.168.100.1

DNS de Google
/ip dns
set servers=8.8.8.8,8.8.4.4

Address list para el Failover


/ip firewall address-list
add address=192.168.100.0/24 list=RED

LO QUE ENTRA POR 1 WAN SALE POR EL MISMO


/ip firewall mangle
add action=mark-connection chain=prerouting connection-mark=no-mark \
in-interface=pppoe-out1 new-connection-mark=ISP1_conn
add action=mark-connection chain=prerouting connection-mark=no-mark \
in-interface=pppoe-out2 new-connection-mark=ISP2_conn
add action=mark-connection chain=prerouting connection-mark=no-mark \
in-interface=pppoe-out3 new-connection-mark=ISP3_conn
add action=mark-routing chain=output connection-mark=ISP1_conn \
new-routing-mark=to_ISP1 passthrough=no
add action=mark-routing chain=output connection-mark=ISP2_conn \
new-routing-mark=to_ISP2 passthrough=no
add action=mark-routing chain=output connection-mark=ISP3_conn \
new-routing-mark=to_ISP3 passthrough=no

BALANCEO DE PETICIONES NTH


/ip firewall mangle
add action=mark-connection chain=prerouting connection-mark=no-mark \
dst-address-type=!local new-connection-mark=ISP1_conn nth=3,1 \
src-address-list=RED
add action=mark-routing chain=prerouting connection-mark=ISP1_conn \
new-routing-mark=to_ISP1 passthrough=no src-address-list=RED
add action=mark-connection chain=prerouting connection-mark=no-mark \
dst-address-type=!local new-connection-mark=ISP2_conn nth=2,1 \
src-address-list=RED
add action=mark-routing chain=prerouting connection-mark=ISP2_conn \
new-routing-mark=to_ISP2 passthrough=no src-address-list=RED
add action=mark-connection chain=prerouting connection-mark=no-mark \
dst-address-type=!local new-connection-mark=ISP3_conn nth=1,1 \
src-address-list=RED
add action=mark-routing chain=prerouting connection-mark=ISP3_conn \
new-routing-mark=to_ISP3 passthrough=no src-address-list=RED

Agregamos el enmascarado NAT


/ip firewall nat
add action=masquerade chain=srcnat out-interface=pppoe-out1
add action=masquerade chain=srcnat out-interface=pppoe-out2
add action=masquerade chain=srcnat out-interface=pppoe-out3

Agregamos el Gateway Y FAILOVER


/ip route
add check-gateway=ping distance=1 gateway=pppoe-out1 routing-mark=to_ISP1
add check-gateway=ping distance=1 gateway=pppoe-out2 routing-mark=to_ISP2
add check-gateway=ping distance=1 gateway=pppoe-out3 routing-mark=to_ISP3
add check-gateway=ping distance=1 gateway=pppoe-out1
add check-gateway=ping distance=2 gateway=pppoe-out2
add check-gateway=ping distance=3 gateway=pppoe-out3

prohib� algunos puertos de conexi�n para acceder al mikrotik por razones


personales...
/ip service
set telnet disabled=yes
set ftp disabled=yes

zona horaria
/system clock
set time-zone-name=America/Santo_Domingo

You might also like