Mikrotik Routeros Jobs

9 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Expert ($$$) - Est. Budget: $1,500 - Posted
Anyone specialised in router design can apply. Following are breif requirements, 1) 2 Sim Cards 2G/3G/4G/LTE 2) Provision for Antennas 6 - 13dbi 3) L3 Ethernet Ports - 5 For software requirements refer the attached file Following are the deliverables 1) Schematic Design 2) Bill of Materials, Component procurement support, Obsolescence Management 3) PCB Design 4) Gerber Manufacturing Details 5) Board Bring Up Support 6) Coding for the hardware 7) All features testing, validation and functional verification 7) 1 year support for any issues Thanks Ajay Tiwari
Skills: Mikrotik RouterOS cisco routers Firewall Juniper Routers
Fixed-Price - Intermediate ($$) - Est. Budget: $100 - Posted
PROJECT TEMPORARILY SUSPENDED - WILL REVISIT IN OCTOBER 2016 RB2011UiAS - OS 6.20 Following tasks to be done whilst maintaining external connectivity: 1. Update RouterOS to latest version 2. Configure load balancing for all outbound traffic via dual ADSL connections on ether1/pppoe1 & ether2/pppoe2 3. Priority must be given to a single remote access user connecting via RDP on ether2/pppoe2 4. Configure staff WLAN with access to local network, guest WLAN for internet-only 5. Retain existing port forward settings Additional details provided on acceptance.
Skills: Mikrotik RouterOS
Fixed-Price - Expert ($$$) - Est. Budget: $50 - Posted
We currently have 2x Mikrotik CCR routers that are connected to a BGP provider each. We are having problems with some VPS' on our platform causing/being targeted by UDP flood attacks, etc. We would like someone to mitigate this problem by integrating a solution that can automatically resolve those issues: 1) Use FastNetMon (or any other open source DDoS protection tool) to monitor traffic from CCR (preferably using traffic flows, flexible on this). 2) Set it up in "watch" only mode to alert via PagerDuty if an issue occurs 3) After a week, if everything is okay, we will switch it into blocking mode, you'll have to configure ExaBGP integration so it can announce /32 prefixes to a BGP peer which will block all incoming traffic at our transit provider AND automatically blackhole in mikrotik 4) Slack notifications once something gets blocked! Thank you.
Skills: Mikrotik RouterOS Linux System Administration Network Security System Administration
Fixed-Price - Expert ($$$) - Est. Budget: $300 - Posted
MileStone 1: Must be able to begin tomorrow Wednesday 24 AUGUST @ 4PM PST. RemoteSite1 has a Mikrotik RB750 connecting with Dual WAN failover VPN to a single WAN RB1100 (MainSite). Remove this RB750 and re-establish IPSEC (or desired VPN) traffic between 192.168.22.0/24 (remote site) and 192.168.1.0/24 (main site). This temporary connection will be for 24 hours or less and should failover over between RemoteSite1WAN1-->MainSite & RemoteSite1WAN2 & MainSite should be the backup. Once complete and failover is tested, MileStone 1 will be released. USG Pro in RemoteSite perform as NAT/Firewall/DHCP/DNS forward etc. These features should be migrated to the USG Pro. MIleStone 2: To be started at 5PM PST 25AUG16 Replacing MainSite RB1100 with Unifi USG Pro firewall. Remove the configuration from MileStone 1 at RemoteSite 1 USGPro, and configure (2) USG Pros to communicate via native VPN connection in controller. Upgrade AWS EC2 controller from current 4.8.20 version to 5.0.7 (only if required). RB1100 does not perform DHCP at MainSite. We utilize ShoreTel Switches at RemoteSite and MainSite and the traffic between these IPs should be prioritized via QoS. USG-USG VPN should failover if one of the connections at RemoteSite1 goes down. Milestone 2 will be released when these items are complete.
Skills: Mikrotik RouterOS IPsec Mikrotik RouterBOARD Ubiquiti