Project Description

MikroTik Certified Network Associate (MTCNA)


Course Overview

MTCNA stands for “MikroTik Certified Network Associate,” and it is a certification offered by MikroTik, a company that specializes in networking and wireless products. The MTCNA certification is designed to validate your knowledge and skills in configuring, managing, and troubleshooting MikroTik routers and networking devices.

Course Objectives:

The primary objectives of the MTCNA course are to provide participants with the knowledge and skills required to:

  1. Understand the basic principles of computer networks and routing.
  2. Configure MikroTik RouterOS software on MikroTik routers.
  3. Perform basic network configurations such as setting up IP addresses, DHCP, and NAT.
  4. Implement security measures on MikroTik routers.
  5. Monitor and troubleshoot network issues using MikroTik tools and utilities.
  6. Gain a fundamental understanding of wireless networking concepts and MikroTik wireless devices.
  7. Configure and secure wireless networks using MikroTik equipment.
  8. Prepare for the MTCNA certification exam.

By the end of this training session, the student will be familiar with RouterOS software and RouterBoard products. He will also be able to configure, manage, do basic troubleshooting of a MikroTik router and provide basic services to clients.

Who Should Attend?

Network engineers and technicians wanting to deploy and support:

Corporate networks Client CPEs (WISPs and ISPs)
Pre-requisites: The student must have a good understanding of TCP/IP and sub netting

  • About MikroTik, RouterOS, RouterBoard
  • First time accessing the router
  • Winbox and MAC-Winbox
  • Webfig and Quickset
  • RouterOS command line interface (CLI)
  • Null Modem cable
  • SSH and Telnet
  • New terminal in Winbox/Webfig
  • RouterOS CLI principles
  • , double , “?”, navigation
  • Command history and its benefits
  • Initial configuration (Internet access)
  • WAN DHCP-client
  • LAN IP address and default gateway
  • Basic Firewall – NAT masquerade
  • Upgrading RouterOS
  • Package types
  • Ways of upgrading
  • RouterBOOT firmware upgrade
  • Manage RouterOS logins
  • Manage RouterOS services
  • Managing configuration backups
  • Saving and reload backup
  • Editing export file
  • RouterOS license
  • Levels
  • Updating a license
  • Netinstall
  • Reinstall RouterOS
  • Reset RouterOS
  • Routing overview
  • Routing concepts
  • Route flags
  • Static routing
  • Creating routes
  • Setting default route
  • Manage dynamic routes
  • Implementing static routing on simple network
  • Bridging overview
  • Bridge concepts
  • Creating bridges
  • Adding ports to bridges
  • 802.11n Concepts
  • Frequencies (bands, channels, advanced channels)
  • datarates /HT chains (Tx power, rx sensitivity, country regulations)
  • Legacy 802.11a/b/g stuff
  • Setup simple wireless link
  • Access Point configuration
  • Station configuration
  • MAC-address filtering
  • Default-authentication
  • Access-list
  • Connect-list
  • Default-forwardingWireless Security and Encryption
  • MikroTik wireless protocols
  • NV2 (TDMA) configuration
  • Monitoring Tools
  • Wireless scan
  • Snooper
  • Registration table
  • Bridge wireless networks
  • Station-bridge
  • ARP
  • ARP modes
  • RouterOS ARP table
  • DHCP server and client
  • DHCP client
  • Server setup
  • Leases management
  • DHCP-server network configuration
  • RouterOS tools
  • E-mail
  • Netwatch
  • Ping, Traceroute
  • Profiler (CPU load)
  • Contacting
  • supout.rif, autosupout.rif and viewer
  • /system logging and debug logs
  • readable configuration (item comments and names)
  • network diagrams
  • Firewall principles
  • Connection tracking and states
  • Structure, chains and actions
  • Firewall Filter in action
  • Filter actions
  • Protecting your router (input)
  • Protection your customers (forward)
  • Basic Address-List
  • Source NAT
  • Masquerade and src-nat action
  • Destination NAT
  • dst-nat and redirect action
  • Simple Queue
  • Target
  • Destinations
  • Max-limit and limit-at
  • Bursting
  • One Simple queue for whole network (PCQ)
  • pcq-rate configuration
  • pcq-limit configuration
  • Monitoring
  • Interface traffic monitor
  • Torch
  • Graphs
  • SNMP
  • PPP settings
  • ppp profile
  • ppp secret
  • ppp status
  • IP pool
  • Creating pool
  • Managing ranges
  • Assigning to service
  • Secure local network
  • PPPoE service-name
  • Create PPPoE server
  • Point-to-point addresses
  • Creating PPPoE clients on RouterOS
  • Secure remote networks communication
  • PPTP client and PPTP server
  • SSTP client and SSTP server without certificates
  • Setup routes between networks


Total Course Duration: 36 Hours
Per Class Duration: 3 Hours




View Profile
register now