ABSTRACT
We have been asked for our end of academic curriculum's
project to work on a technology for network infrastructures management and
administration namely «THE Mikrotik Technology». The study and the
deployment of the various modules, which are part of this technology, should
allow us to solve some issues faced by some users of that technology such as
networks administrators, ISP and private. Indeed, among those major
difficulties, we have:
· Bandwidth test and management.
· Security rules implementation on the router.
· Users managements.
· Saving and backup of data inside the router in case of
crash.
· The implementation of wireless network and its
securing.
We had to overcome those difficulties, while emphasing on the
WIFI part, which was the part of the work we had to cope with. We have first
installed Mikrotik with the installation CD. Then, we have configured the
basics elements for an access to internet such the NAT and DHCP functions.
Finally, we have implemented the adopted operating mode which was the
infrastructure mode and have deployed and emphasized on the different security
modes of our wireless network as defined in the specification of the
project.
.
RACT
SOMMAIRE
DEDICACES
i
AVANT PROPOS
iii
ABREVIATIONS
iv
RESUME
vi
ABSTRACT
vii
SOMMAIRE
viii
LISTE DES FIGURES
xi
LISTE DES TABLEAUX
xiii
INTROD
UCTION GENERALE
1
Ière PARTIE : PRESENTATION
GENERALE DE LA TECHNOLOGIE MIKROTIK
2
CHAPITRE I : GENERALITES SUR
MIKROTIK.
3
I-1) PRESENTATION DE MIKROTIK
3
I-1-1) L'ENTREPRISE MIKROTIK
3
I-1-2) LOCALISATION DE L'ENTREPRISE MIKROTIK ET
FICHE TECHNIQUE
4
I-1-3) QUELQUES REALISATIONS DE MIKROTIK
4
I-2) GAMME DE ROUTERBOARD
5
I-2-1) La gamme RB411
5
I-2-2) La gamme RB750G
7
I-2-3) La gamme RB1100
8
I-3) LES DIFFERENTS NIVEAUX DE LICENCE
9
CHAPITRE II : FONCTIONNALITES DE
MIKROTIK.
12
II-1) LA FONCTION NAT (Network Adress
Translation)
12
II-2) LA FONCTION DHCP
14
II-2-1) DEFINITION :
14
II-2-2) SPECIFICATION :
14
II-2-3) CONFIGURATION DU SERVEUR :
15
II-3) LA FONCTION FTP
17
II-3-1) SPECIFICATION
17
II-3-2) DEFINITION :
17
II-4) LA FONCTION DE SAUVEGARDE ET RESTAURATION
DU ROUTEUR
18
II-4-1) DESCRIPTION
18
II-4-2) EXEMPLES DE CONFIGURATION EN MODE
CONSOLE
18
CHAPITRE III : LES OUTILS
D'ADMINISTRATION.
20
III-1) WINBOX
20
III-1-1) PRESENTATION DE WINBOX
20
III-1-2) PRESENTATION DE L'INTERFACE
21
III-2) DUDE
22
III-2-1)
PRESENTATION
22
III-2-2) LES OUTILS DE DUDE
23
II ème PARTIE: LE WIFI
26
CHAPITRE IV : PRESENTATION DU
WIFI.
27
IV-1) LES RESEAUX SANS FILS
27
IV-1-1) LES CATEGORIES DE RESEUAX SANS FIL
28
IV-1-2) LES DIFFERENTES NORMES WIFI
28
IV-2) LES EQUIPEMENTS DE RESEAUX SANS FILS
29
IV-2-1) LA CARTE MINI PCI Mikrotik R52
802.11a/b/g
29
IV-2-2) LE POINT D'ACCES SANS FIL
31
IV-2-3) LES ANTENNES
32
IV-3) LA REGLEMENTATION CAMEROUNAISE
33
CHAPITRE V : MISE EN OEUVRE.
34
V-1) LIAISON POINT A POINT
34
V-2) SYSTEME DE DISTRIBUTION
35
V-3) LIAISON POINT A MULTIPOINT
36
V-3-1) DESCRIPTION DE QUELQUES OPTIONS DU MENU
WIRELESS
42
V-3-2) OUTILS OFFERTS PAR LE MODE SANS FIL DE
MIKROTIK
43
CHAPITRE VI : LA SECURITE.
48
VI-1) LE CHIFFREMENT
48
VI-1-1) WEP (Wired Equivalent Privacy)
48
VI-1-2) WPA (WI-FI Protected Access)
49
VI-1-3) VERROUILLAGE DU RESEAU
49
VI-2) LES SOLUTIONS AUX PROBLEMES DE SECURITE
50
VI-2-1) UNE INFRASTRUCTURE ADAPTEE
50
VI-2-2) EVITER LES VALEURS PAR DEFAUTS
50
VI-2-3) ACTIVATION DU CRYPTAGE WEP
51
VI-2-4) ACTIVATION DU CRYPTAGE WPA
55
VI-2-5) LISTE D'ACCES OU FILTRAGE PAR ADRESSE
MAC
56
CONCLUSION GENERALE
60
BIBLIOGRPAHIE
a
SOMMAIRE
LISTE DES FIGURES
|