User ManualTable of ContentsIntroduction121.1 Features131.2 Software License13Configuring RouterOS142.1 Logging in the AT-WR4500 Router142.2 Accessing the WR4500 through WinBox142.3 Accessing the CLI15Configuration and Software Management183.1 General Information18System Backup18The Export Command19The Import Command19Configuration Reset203.2 Software Version Management20General Information20System Upgrade21Adding Package Source223.3 Software Package Management22General Information22Installation (Upgrade)23Uninstallation23Downgrading24Disabling and Enabling25Unscheduling25System Upgrade26Adding Package Source27Software Package List27Configuring Interfaces304.1 General Interface Settings30General Information30Interface Status30Traffic Monitoring304.2 Ethernet Interfaces31General Information31Ethernet Interface Configuration31Monitoring the Interface Status32Troubleshooting334.3 Wireless Interfaces33General Information33Wireless Interface Configuration35Nstreme Settings40Nstreme2 Group Settings41Registration Table43Connect List45Access List45Info command46Virtual Access Point Interface50WDS Interface Configuration51Align52Align Monitor53Frequency Monitor54Manual Transmit Power Table54Network Scan55Security Profiles56Sniffer58Sniffer Sniff58Sniffer Packets59Snooper59Application Examples60Troubleshooting744.4 VLAN Interfaces75General Information75VLAN Setup75Application Example764.5 Bridge Interfaces77General Information77Bridge Interface Setup78Port Settings79Bridge Monitoring80Bridge Port Monitoring80Bridge Host Monitoring81Bridge Firewall General Description81Bridge Packet Filter84Bridge NAT84Bridge Brouting Facility85Troubleshooting86IP and Routing875.1 IP Addresses and ARP87General Information87IP Addressing87Address Resolution Protocol88Proxy-ARP feature89Unnumbered Interfaces91Troubleshooting925.2 RIP: Routing Information Protocol92General Information92General Setup93Interfaces94Networks95Neighbors95Routes95Application Examples965.3 OSPF98General Information98General Setup99OSPF Areas100Networks101Interfaces102Virtual Links102Neighbors103Application Examples1045.4 Routes, Equal Cost Multipath Routing, Policy Routing110General Information110Routes111Policy Rules112Application Examples113DHCP and DNS1166.1 DHCP Client and Server116General Information116DHCP Client Setup117DHCP Server Setup118Store Leases on Disk120DHCP Networks121DHCP Server Leases121DHCP Alert123DHCP Option123DHCP Relay124Questions & Answers125Application Examples126DNS Client and Cache129General Information129DNS Cache Setup129Cache Monitoring130Static DNS Entries130All DNS Entries130Static DNS Entries130Flushing DNS cache131AAA Configuration1327.1 RADIUS client132General Information132RADIUS Client Setup132Connection Terminating from RADIUS133Suggested RADIUS Servers134Supported RADIUS Attributes134Troubleshooting1407.2 PPP User AAA141General Information141Local PPP User Profiles141Local PPP User Database143Monitoring Active PPP Users144PPP User Remote AAA1457.3 Router User AAA145General Information145Router User Groups146Router Users147Monitoring Active Router Users148Router User Remote AAA148SSH keys149VPNs and Tunneling1508.1 EoIP150General Information150EoIP Setup151EoIP Application Example152Troubleshooting1538.2 Interface Bonding1548.3 General Information154Summary154Quick Setup Guide154Related Documents1548.4 IPIP Tunnel Interfaces158General Information158IPIP Setup159Application Examples1608.5 L2TP Interface161General Information161L2TP Client Setup162Monitoring L2TP Client163L2TP Server Setup164L2TP Server Users164L2TP Application Examples166Troubleshooting1708.6 PPPoE170General Information170PPPoE Client Setup172Monitoring PPPoE Client173PPPoE Server Setup (Access Concentrator)173PPPoE Users175PPPoE Server User Interfaces175Application Examples176Troubleshooting1788.7 PPTP178General Information178PPTP Client Setup180Monitoring PPTP Client181PPTP Server Setup181PPTP Users182PPTP Tunnel Interfaces182PPTP Application Examples183Troubleshooting1878.8 IP Security187General Information187Policy Settings189Peers191Remote Peer Statistics192Installed SAs193Flushing Installed SA Table194Application Examples195Firewall and QoS1989.1 Filter198General Information198Firewall Filter198Filter Applications2039.2 Mangle204General Information204Mangle205Application Examples2099.3 Packet Flow210General Information210Packet Flow210Connection Tracking212Connection Timeouts213Service Ports214General Firewall Information2159.4 NAT216General Information216NAT217NAT Applications221Hot Spot Service22210.1 HotSpot Gateway222General Information222Question&Answer-Based Setup226HotSpot Interface Setup227HotSpot Server Profiles228HotSpot User Profiles22910.2 HotSpot Users229Description22910.3 HotSpot Active Users229Description229HotSpot Cookies229HTTP-level Walled Garden230IP-level Walled Garden231One-to-one NAT static address bindings231Active Host List232Command Description232Service Port232Customizing HotSpot: Firewall Section23310.3.10 Customizing HotSpot: HTTP Servlet Pages23610.3.11 Possible Error Messages24210.3.12 HotSpot How-to's24310.4 HotSpot User AAA244General Information244HotSpot User Profiles244HotSpot Users246HotSpot Active Users247High Availability protocols and techniques24911.1 VRRP249General Information249VRRP Routers249Virtual IP addresses251A simple example of VRRP fail over25111.2 System Watchdog253General Information253Hardware Watchdog Management25312 Monitoring and Management25512.1 Log Management255General Information255General Settings255Actions256Log Messages25612.2 SNMP Service257General Information25712.3 Traffic Flow258General Information258Related Documents258General Configuration258Traffic-Flow Target259Application Examples25912.4 Graphing262General Information262General Options262Health Graphing263Interface Graphing263Simple Queue Graphing263Resource Graphing264Figure 1: AT-WR4500 Series typical application12Figure 2: WinBox Loader discovering14Figure 3: WinBox main window15Figure 4: WinBox with terminal window open15Figure 5: Station and AP mode example60Figure 6: WDS Network example62Figure 7: Nstreme network example66Figure 8: Nstreme dual network example68Figure 9: WEP security example70Figure 10: WPA security example73Figure 11: Proxy ARP90Figure 12: Proxy ARP with PPPoE91Figure 13: OSPF Backup104Figure 14: OSPF Routing tables108Figure 15: OSPF Backup109Figure 16: Static Equal Cost Multi-Path Routing example113Figure 17: Standard Policy-Based Routing with Failover114Figure 18: DHCP Relay126Figure 19: DHCP with RADIUS128Figure 20: EoIP Application Example152Figure 21: Bonding two EoIP tunnels156Figure 22: IPIP Tunnel example network160Figure 23: Router-to-Router Secure Tunnel Example166Figure 24: Secure Remote office connection through L2TP tunnel167Figure 25: Client to Office secure connection via L2TP tunnel169Figure 26: PPPoE Example176Figure 27: Network Setup without PPTP enabled183Figure 28: Network Setup with encrypted PPTP Tunnel184Figure 29: Connecting a Remote Client via and Encrypted PPTP Tunnel186Figure 30: transport mode example using ESP with automatic keying195Figure 31: Add accept and masquerading rules in SRC-NAT196Figure 32: Packet Flow Diagram211Figure 33: Firewall Connection Tracking timeouts213Figure 34: HotSpot example network223Figure 35: Simple VRRP fail over example251Figure 36: Host Information260Figure 37: Network Load Statistics Matrix260Figure 38: Network load profile by time261Figure 39: Traffic Load by protocol261Size: 4.42 MBPages: 264Language: EnglishOpen manual