MikroTik Certified Wireless Engineer (MTCWE)
1 Introduction to MikroTik Wireless
1-1 Overview of MikroTik Wireless Products
1-2 MikroTik Wireless Standards and Technologies
1-3 MikroTik Wireless Network Architecture
1-4 MikroTik Wireless Security Concepts
2 MikroTik Wireless Devices
2-1 MikroTik Wireless Access Points (APs)
2-2 MikroTik Wireless Bridges
2-3 MikroTik Wireless Routers
2-4 MikroTik Wireless Client Devices
3 MikroTik Wireless Configuration
3-1 Basic Wireless Configuration
3-2 Advanced Wireless Configuration
3-3 Wireless Channel and Power Settings
3-4 Wireless Network Profiles
4 MikroTik Wireless Security
4-1 Wireless Encryption Protocols
4-2 Wireless Authentication Methods
4-3 Wireless Access Control
4-4 Wireless Intrusion Detection and Prevention
5 MikroTik Wireless Performance Optimization
5-1 Wireless Signal Strength and Quality
5-2 Wireless Channel Optimization
5-3 Wireless Load Balancing
5-4 Wireless QoS (Quality of Service)
6 MikroTik Wireless Troubleshooting
6-1 Common Wireless Issues
6-2 Wireless Network Diagnostics
6-3 Wireless Performance Monitoring
6-4 Wireless Problem Resolution
7 MikroTik Wireless Deployment Scenarios
7-1 Wireless LAN (WLAN) Deployment
7-2 Wireless Mesh Network Deployment
7-3 Wireless Point-to-Point (PTP) Deployment
7-4 Wireless Point-to-Multipoint (PTMP) Deployment
8 MikroTik Wireless Management
8-1 MikroTik Wireless Device Management
8-2 MikroTik Wireless Network Management
8-3 MikroTik Wireless Monitoring Tools
8-4 MikroTik Wireless Reporting and Analytics
9 MikroTik Wireless Integration
9-1 Integrating MikroTik Wireless with Other Networks
9-2 MikroTik Wireless and VPN Integration
9-3 MikroTik Wireless and SD-WAN Integration
9-4 MikroTik Wireless and IoT Integration
10 MikroTik Wireless Certification Exam Preparation
10-1 Exam Objectives and Structure
10-2 Sample Exam Questions
10-3 Study Resources and Tips
10-4 Certification Exam Registration and Scheduling
MikroTik Wireless Security Concepts

MikroTik Wireless Security Concepts

1. WPA3 (Wi-Fi Protected Access 3)

WPA3 is the latest security protocol for wireless networks, designed to provide stronger encryption and better protection against brute-force attacks. It introduces the Simultaneous Authentication of Equals (SAE) protocol, which ensures secure key exchange even in the presence of offline dictionary attacks. WPA3 also offers individualized data encryption, meaning each device connected to the network has its own encryption key, enhancing security for sensitive data transmission.

Example: Imagine a secure vault where each visitor is given a unique key to access their own compartment. This ensures that even if one key is compromised, others remain secure.

2. RADIUS (Remote Authentication Dial-In User Service)

RADIUS is a network protocol used for centralized authentication, authorization, and accounting management for users who connect and use a network service. In MikroTik, RADIUS can be configured to authenticate wireless users against a centralized database, ensuring that only authorized users can access the network. This is particularly useful in enterprise environments where multiple access points need to authenticate users against a single, secure database.

Example: Think of a security guard at a gated community who checks the identity of every visitor against a master list before granting access. This ensures that only authorized individuals can enter.

3. Captive Portal

A Captive Portal is a web page that users must interact with before gaining full access to the network. In MikroTik, this can be configured to require users to log in, accept terms of service, or provide payment information before accessing the internet. Captive Portals are commonly used in public Wi-Fi networks, hotels, and corporate environments to control access and gather user information.

Example: Consider a hotel lobby where guests must enter their room number and a password on a welcome screen before they can use the free Wi-Fi. This ensures that only hotel guests can access the network.

4. MAC Filtering

MAC Filtering involves restricting network access based on the Media Access Control (MAC) address of a device. In MikroTik, you can create a list of allowed or denied MAC addresses, ensuring that only devices with specific MAC addresses can connect to the wireless network. This is a basic security measure that can help prevent unauthorized devices from accessing the network.

Example: Think of a private club that only allows members with specific membership cards to enter. The bouncer checks each card against a list before granting entry, ensuring that only authorized members can access the club.