Skip to main content

Discussion Of The RoMon Mikrotik

Discussion Of The RoMon Mikrotik

RoMON was abbreviated from the Router Management Overlay Network which is a new feature on Mikrotik RouterOS version 6.28. This may still feature RoMON alien to You, because it is available in a new version of RouterOS and WinBox. Well, to find out more what it RoMON Mikrotik, let's discuss in this article.

The Meaning Of The RoMON

What is RoMON? RoMON (Router Management Overlay Network) is a Mikrotik proprietary protocol (the protocol is only supported on devices Mikrotik), which can make the connection secure layer2 (secure) to MikroTik devices either through Physical connection ( Ethernet) or Layer2 Tunnel. 

In addition, RoMON also has the following features:

Discovery and management MikroTik devices via Ping, SSH, Winbox (version 3.0. rc 9 and above).
Able to do discovery (search) the MikroTik devices enable RoMON which has gone through multiple hops.

So with this we can detect RoMON device on WinBox Mikrotik Mikrotik devices even though they are located in a different network segment and passes through some of the other router (multiple hops). This contrasts with the usual Mikrotik WinBox feature, which can only detect the Mikrotik devices is one network only.

How To Enable RoMON

RoMON communication based on parameter RoMON ID taken from the MAC Address of the router. The devices enable RoMON will make a discovery of MAC Address Peer and also data forwarding protocol independently.

This time we will try a simple implementation of this feature by doing the remote router (RoMON Enabled) on a different network to use the winbox. Specifically for this feature as we have alluded to above, we will use the Winbox version 3.0. rc 9 who have supported features RoMON.
Discussion Of The RoMon Mikrotik
Discussion Of The RoMon Mikrotik

RoMON features found on the Tools menu? RoMON. To activate it we just tick the option ' Enabled '. Then we set the parameters of the ' Secrets ' at RoMON Settings. This parameter serves as a device for connection authentication MikroTik connected. For example this time we fill the ' Secrets ' with 12345. According the topology of the example case above, this configuration is also performed on the third router.

When we look at the Settings there is a parameter ID RoMON. This ID is the MAC Address of the router used for communication devices. Can we determine the parameter with any MAC Address in the router's interface, but if we're not the contents by default will use the MAC Address of the router first.

Next after the third router has tersetting such as the above configuration, we will try to do a different network devices remotely by using Winbox.

Comments

Popular posts from this blog

Mikrotik Script for DNSDynamic, DDNS and IP-Change Update

I often use this script to automatically update Dynamic IP on Mikrotik. Condition of dial-up done by Mikrotik, so the modem using Bridge mode, and you've been setting up email on the Tool >> email in your Mikrotik. Download here : And for other dynamic DNS providers please download this script: Script for DDNS and IP-Change DNSDynamic here ______________________________________________________________________________ This article is translated version to English from Bahasa Indonesia by Google. Original post was write by cirebonwifi

Common Computer Errors | What The Meaning of Computer Errors

Computer errors will crop up once least expected, they will cause the complete system to suddenly close up, and that they will unknowingly corrupt information to the purpose wherever it cannot be deciphered. Although they can not continuously be avoided, it is vital to recollect that pc errors are often corrected. The key's to know what pc errors square measure, perceive what they mean after they show up, and understand how to minimize their occurrence in the first place. Computer error Basically, pc errors square measure the results of variety of things which will or might not have something to try and do with the method the pc is employed. They "operate" whenever there's a conflict among commands. Remember that computers primarily flee of a series of commands and it has always a sleek method. But once one command conflicts with another command - or once one command asks for a method or data that may not on the market, the pc returns results th...