Mikrotik hotspot setup

Mikrotik hotspot setup

copy and paste line by line

/ip address
add address=172.16.1.1/24 comment=LAN disabled=no interface=LAN network=172.16.1.0
add address=192.168.137.100/24 comment=WAN disabled=no interface=WAN network=192.168.137.0
———————————————————————————————
/ip pool
add name=hs-pool-1 ranges=172.16.1.10-172.16.1.255
———————————————————————————————
/ip dns
set allow-remote-requests=yes cache-max-ttl=1w cache-size=10000KiB max-udp-packet-size=512 servers=192.168.137.1
———————————————————————————————
/ip dhcp-server
add address-pool=hs-pool-1 authoritative=after-2sec-delay bootp-support=static disabled=no interface=LAN lease-time=1h name=dhcp1
/ip dhcp-server config set store-leases-disk=5m
/ip dhcp-server network add address=172.16.1.0/24 comment=”hotspot network” gateway=172.16.1.1
———————————————————————————————
/ip hotspot profile
set default dns-name=”” hotspot-address=0.0.0.0 html-directory=hotspot http-cookie-lifetime=3d http-proxy=0.0.0.0:0 login-by=cookie,http-chap name=default rate-limit=”” smtp-server=0.0.0.0 split-user-domain=no use-radius=no
add dns-name=login.aacable.net hotspot-address=172.16.1.1 html-directory=hotspot http-cookie-lifetime=1d http-proxy=0.0.0.0:0 login-by=cookie,http-chap name=hsprof1 rate-limit=”” smtp-server=0.0.0.0 split-user-domain=no use-radius=no
/ip hotspot
add address-pool=hs-pool-1 addresses-per-mac=2 disabled=no idle-timeout=5m interface=LAN keepalive-timeout=none name=hotspot1 profile=hsprof1
/ip hotspot user profile
set default idle-timeout=none keepalive-timeout=2m name=default shared-users=1 status-autorefresh=1m transparent-proxy=no
add address-pool=hs-pool-1 advertise=no idle-timeout=none keepalive-timeout=2m name=”512k Limit” open-status-page=always rate-limit=512k/512k shared-users=1 status-autorefresh=1m transparent-proxy=yes
add address-pool=hs-pool-1 advertise=no idle-timeout=none keepalive-timeout=2m name=”256k Limit” open-status-page=always rate-limit=256k/256k shared-users=1 status-autorefresh=1m transparent-proxy=yes
/ip hotspot service-port set ftp disabled=yes ports=21
/ip hotspot walled-garden ip add action=accept disabled=no dst-address=172.16.1.1
/ip hotspot set numbers=hotspot1 address-pool=none
/ip firewall nat add action=masquerade chain=srcnat disabled=no
/ip hotspot user
add disabled=no name=admin password=123 profile=default
add disabled=no name=zaib password=test profile=”512k Limit” server=hotspot1
add disabled=no name=test-256k password=test profile=”256k Limit” server=hotspot1
———————————————————————————————
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.137.1 scope=30 target-scope=10

Sorce Link click here

Posted in Mikrotik | Tagged | Leave a comment

How to limit upload and download to all users in network using mikrotik RouterOS

How to limit upload and download to all users in network using mikrotik RouterOS

There are two ways how to make this: using mangle and queue trees, or, using simple queues.

1. Mark all packets with packet-marks upload/download: (lets constider that ether1-LAN is public interface to the Internet and ether2-LAN is local interface where clients are connected

/ip firewall mangle add chain=prerouting action=mark-packet in-interface=ether1-LAN new-packet-mark=client_upload

/ip firewall mangle add chain=prerouting action=mark-packet in-interface=ether2-WAN new-packet-mark=client_download

2. Setup two PCQ queue types – one for download and one for upload. dst-address is classifier for user’s download traffic, src-address for upload traffic:

/queue type add name=”PCQ_download” kind=pcq pcq-rate=64000 pcq-classifier=dst-address

/queue type add name=”PCQ_upload” kind=pcq pcq-rate=32000 pcq-classifier=src-address

3. Finally, two queue rules are required, one for download and one for upload:

/queue tree add parent=global-in queue=PCQ_download packet-mark=client_download

/queue tree add parent=global-out queue=PCQ_upload packet-mark=client_upload

If you don’t like using mangle and queue trees, you can skip step 1, do step 2, and step 3 would be to create one simple queue as shown here:

/queue simple add target-addresses=192.168.0.0/24 queue=PCQ_upload/PCQ_download packet-marks=client_download,client_upload

Sorce link:- Click here

 

Posted in Mikrotik | Tagged | Leave a comment

VMware ESX Command line

VMware ESX Command line Management

This documentation describes the concepts, tasks, and commands that you use to administer your virtual environment through the command line. vSphere provides several command-line interfaces that you can use to automate common tasks that you perform to deploy and support your virtual datacenter. For example, you can use vSphere command-line actions to configure and manage storage for the ESXi hosts in your datacenter, set up networking for virtual machines, perform virtual machine power operations, monitor hosts, and many other activities

http://pubs.vmware.com/vsphere-51/index.jsp

 

Posted in VMware | Tagged | Leave a comment

Security tools

I am  very impressed by the collective smarts of the security community and I highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy!

a good website for internet security tools information http://sectools.org/

Posted in Uncategorized | Tagged | Leave a comment

how to know who is accessing your files

how to know who is accessing your files

ShareWatch allows you to see who is connected to a computer and what files they are accessing. Have you ever wondered why your hard drive or modem is active, but you aren’t doing anything to cause it to be active?  It is possible a remoteuser is accessing your computer.  Have you ever had a file locked but you don’t know why? ShareWatch can tell you if a network user is using the file and allows you to disconnect them so that you can edit/delete the file.  Have you ever wanted to shutdown a computer, but don’t want to drop people using the
computer.  ShareWatch will show you all resources in use by remote users.

download share watch

Posted in Uncategorized | Tagged | Leave a comment

Free Personal PC Audit Tool

Free Personal PC Audit  Tool

The Belarc Advisor
builds a detailed profile of your installed software and hardware, network
inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks,
and displays the results in your Web browser. All of your PC profile information
is kept private on your PC and is not sent to any web server.

http://www.belarc.com/free_download.html

Posted in Uncategorized | Tagged | Leave a comment

Intel Tools and Utilities

Intel Tools and Utilities

+Compatibility Tools

Tool Description Internet application Desktop application
Intel Product Information Find and compare Intel product specifications. Run n/a
Desktop Boards and Processors
Intel® Processors and Boards Compatibility Tool Find compatible Intel® Processors and Intel® Desktop Boards. Run n/a
Servers
Server Configurator Tool Select compatible components to design a complete server system. After configuring, the tool provides a parts list you can print or export to send to your Intel® Authorized Distributor. Run n/a
Memory Configuration Checker Find optimal memory configurations for Intel® Xeon® 5500, 5600 and 3400 Processor series platforms. Includes a diagnostic utility for checking memory configuration on Windows Server Systems, and features for building/ordering new systems. Run Download

+Identification Tools
Tool Description Internet application Desktop application
Intel System Identification Utility Know what computer components, operating system, and driver versions you have on your computer. Run n/a
Chipsets
Intel® Chipset Identification Utility Identify the Intel® chipset on your motherboard. Download
Processors
Intel® Processor Identification Utility download for Windows* Identify characteristics of the processor inside your computer. Download
Desktop
Intel® Board ID Tool Know if an Intel desktop board is installed on your computer. If an Intel desktop board is found, the tool identified board model and version, BIOS version, and operating system. Run Download
Network Adapter
Yottamark* Authentication Labels Yottamark* sticker is an authentication label that allows anyone to verify the authenticity of Intel® Network Adapter. Run

+Update Tools
Tool Description Internet application Desktop application
Intel Driver Update Utility Know if you have the latest Intel drivers for your computer components. Run
Chipsets
Intel® Chipset Software Installation Utility Automatically detect chipset component and find a driver download. Run Download
Network Adaptor
Intel® Ethernet Connections Boot Utility Program the PCI option ROM on the flash memory of supported Intel PCI and PCI-Express-based network adapters and to update configurations. Download
Solid-State Drives
Intel SATA Solid-State Drive Firmware Update Tool Get the latest firmware. Download

+Diagnostic Tools
Tool Description Internet application Desktop application
Processors
Intel® Processor Diagnostic Tool Know what processor is in your computer and verify the processor operating frequency. The tool also tests specific processor features and performs a stress test on the processor. Download
Solid-State Drives
Intel Solid-State Drive Toolbox Access Intel SSD management features, and run diagnostic scans on Intel Solid-State Drive. Download

+Monitoring Tools
Monitoring Tools

Tool Description Internet application Desktop application
Turbo Boost Monitor Monitors processor frequency activity. Download (Windows 7 only)
Intel® Desktop Utilities Intel® Desktop Utilities provides you with the means to monitor system temperatures, voltages, fan speeds, and hard drive health; view detailed system information, and test your system hardware for common errors. Intel Desktop Utilities will display and log alerts if system parameters deviate from optimal setting to let users take preventative action. Download
Intel® Extreme Tuning Utility The Intel® Extreme Tuning Utility helps you overclock (processor, memory and system clocks) and monitor temperatures, voltages and fan speeds. Download
Posted in Uncategorized | Tagged | Leave a comment

how to edit Alarm in VMware VCenter

how to edit Alarm in VMware VCenter

Change Alarm Attributes   You can rename alarms and change alarm triggers, reporting, and actions.

Required privilege: Alarm.Modify Alarm   Procedure

1 Display the object in the inventory on which the alarm is defined.

2 Select the object and click the Alarms tab.

3 Click Definitions.

The Defined in column lists the object on which the alarm is defined. If the value is not This object, click the object name. The alarms list for the object opens in the Alarms tab.

4 Double-click the alarm to open the Alarm Settings dialog box.

5 Edit the alarm general settings, triggers, reporting, or actions, as needed.

For help on how to configure the values on each tab, click Help.

6 Click OK.

vCenter Server verifies the configuration of the alarm and updates the alarm for the selected object.

Posted in VMware | Tagged | Leave a comment

How to check Cisco Certification

How to check  Cisco Certification .
The Certification Tracking System is now part of the Cisco network and can be accessed by your Cisco.com login. In order to access the Certification Tracking system you must have a Cisco.com or an existing Cisco.com profile. Once this is done you will be able to access the Cisco network and the Certification tracking system with the same Login ID.

Use this website to:

  • View your certification progress and exam history *
  • Update your demographics
  • Request logos for certifications you have achieved
  • Sign the Cisco Career Certifications Agreement
  • Provide access to third parties or employers to verify your certifications
  • Find out when your certificate was mailed
Click on the below link
Posted in Uncategorized | Tagged | Leave a comment

Windows can not access the specified device,path or file. windows 2003

Windows can not access the specified device,path or file. windows 2003

Some time you copied a file on windows 2003 server and want to execute you got an error “Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item.”

Right Click on file go to properties >

On General Tab you will find “This file came from another computer and might be blocked to help protect this computer”

Click on unblock button you should be able to execute the file.

 

Posted in Uncategorized | Tagged | Leave a comment