TheBrothersWISP 82 – Mikrotik news 87, Ubiquiti DoS Vector, CRS’ Future



This week Greg, Dave, Nick, and Andrew Thrift along with his hair, do the thing with the mics. Cox also teases us…we don’t deserve two Andrews in one cast.

This cast we talk about:
Mikrotik newsletter 87
Intel may be purchasing Mellanox (as per Thrift) Tilera–>EzChip–>Mellanox–>Intel
DNS Flag Day anyone?
John Osmon’s 5 tips, send me yours
Ubiquiti Discover Service DoS attack(thanks Chris A)
Polar Vortex is cold
Slack Updates
CRS3xx switches will act as port expanders for CCRs in the near future.
Email Mikrotik to add MC-LAG support to the CRS3XX
Tomas found a smoking deal on hosted servers from Scaleway 22X 2.4 GHz CPUs, 42GB RAM, 400GB SSD ~$75
Tomas still hates nginx webservers
Josh started a #code channel, which is him volunteering to do all ofyour scripting
#conferences channel is getting ready for MUM in Austin
What’s your EDC pocket tool?
BoĊĦtjan doesn’t know what console to get his kid.
Thrift hates Mazda “come at me bro” -haha I would say I hate them, just 1 bad experience
http://exomotive.com/exocet/
https://www.eliomotors.com/gallery/

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Here’s the video:(if you don’t see it, hit refresh)

TheBrothersWISP Top 5 Tips John Osmon



This week Greg talks to John Osmon about his top 6 tips.

The Tips:

1) *BE* the packet (Know how the network works)
2) pcap or it didn’t happen (get proof)
3) don’t confuse network and physical diagrams
4) give back to the community
5) vocabulary — learn others, teach yours. Necessary for communication
6) lab it / break it — you don’t know it until you see how it behaves when broken

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Here’s the video:(if you don’t see it, hit refresh)

RouterOS Bridge and Vlan Configuration for CRS devices on v6.43.X

I’ve seen a few posts recently in the MikroTik forums and MikroTik Subreddit about the confusing nature of creating native (wirespeed) vlans on the CRS range of hardware and wanted to put together a template that gives you a good idea of how these work, and what the configuration of a few different port types looks like.

While I will go into more detail on this soon – the following (designed for a CRS328-24P-4S+RM) has:

  • PC Connected ports
  • PC Connected ports with support for an inline VoIP Phone
  • Tagged/Untagged ports for Access Point administration and wireless network passthrough
  • Untagged port for a server
  • Tagged Trunk ports for passing vlans between switches
  • Adding an IP address to an Admin vlan for access to the configured switch
Continue reading RouterOS Bridge and Vlan Configuration for CRS devices on v6.43.X

TheBrothersWISP 81 – CEPH/ZFS, Charging for RFO, Dynamic SIP Servers



This week Greg, Mike, Dave, and the coolest kid I know in VA, Miller, take it to the mat.

This cast we talk about:
CEPH and ZFS
Open media vault
Dynamic SIP server location
DNS SRV
“Tubes” book PDF?
AT&T charges for RFO
Certifications?
DNS Flag day
What bandwidth bursting be used for other than online video streaming services in effort to improve end user experience in a practical sense.

Slack Updates
Austin MUM – record a little brothers wisp podcast?
Andrew Thrift is now prepared to answer all of your Fortinet questions.
Jeremy has found success with receiving and processing is abuse notifications at abuse.io
NV2 for 802.11ac is broken on Mikrotik ARM kit, so avoid it.
Thrift is pushing for a standardized API with Mikrotik.
802.11 beaconing with additional SSIDs
When you think an optic may be running too hot, you can try wrapping fiber around a pencil
Tomas wants unimus feedback “If you aren’t using it, what are your reasons?”

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Here’s the video:(if you don’t see it, hit refresh)

Automatic bypass of hotspot devices based on MAC Address

Recently I was doing some work for a hotel that supplies a ‘Smart TV’ device with Netflix and other functions in every room. These rooms are in turn all connected to a hotspot network and the TV’s all needed to be given internet access.

As this was (as sometimes occurs) an unexpected addition to the known requirements of the installation, it fell to me to come up with a way to add these – preferably without having to have someone walk around manually collect details for 300+ TV’s.

Continue reading Automatic bypass of hotspot devices based on MAC Address