Mikrotik: Static IPs with API

Some of the network topologies of WISPs do not have centralized authentication of customers based on PPPoE or DHCP. Instead, each customer's device is connected using a static IP address. But what will happen if the customer gets access and then changes the static IP address to a different one? Possibilities are that their speed limitations will become inactive, because that is also based on IP address of the customer.

In Splynx you can setup authentication for statically configured IP addresses. It is also possible to match IP addresses of CPE's with MAC addresses, to achieve static IP + MAC address authentication.

This setup only works for Mikrotik RouterOS devices, because authentication rules are pushed to router via API.

The first step is to configure the Router, IP address and MAC (if needed) of the customer's internet service:

Edit service

In the router settings within Splynx (NAS-SPLYNX) it is necessary to select the correct authentication type, which is "Firewall IP/MAC filter". Accounting will be grabbed by Splynx every 5 minutes via API:

Firewall IP-MAC filter / API accounting

The API should be enabled on the Mikrotik router and in the router settings within Splynx:

API settings

API port

Splynx connects to the router and creates entries in IP → Firewall → Filter, allowing access for the IP/MAC combination of the customer.

Firewall

If a MAC address is added to the customer's internet service, then the Firewall rule will also contain the MAC address:

Firewall rule

As you can see, Splynx does not create any DENY rule. If you do have any other rules in your Firewall, Splynx will not touch or change them. The system only adds allow rules to the beginning of the Filter chain "Forward". To prevent all non-authenticated customers from accessing the network, you can create a manual DENY rule on Forward chain:

Drop rule


Blocking of customers with static IP address authentication

Blocking behavior depends on the settings of the Router. There are 2 options:

Customer's entry is removed from the IP Firewall - Filter.

If the router doesn't have the option of adding disabled customers to an Address list, then Splynx will remove the authentication entry from the firewall:

Disabled customers to Address-List

Firewall

Customer's IP is added to a Blocking address list.

In the router settings within Splynx, the Disabled customers to address list option should be enabled. In this case, blocked customers in Splynx is not removed from IP firewall, but the IP address is added to the blocked Address-list.

Disabled customers to Address-List

SpLBL_Blocked address list is used for blocking customers:

Firewall

For more information on blocking customers using Splynx, please read the Blocking customers in Splynx tutorial page .