<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mikrotik &#8211; Farlock.org</title>
	<atom:link href="https://www.farlock.org/tag/mikrotik/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.farlock.org</link>
	<description>What you want to hack today?</description>
	<lastBuildDate>Thu, 07 Jan 2016 07:08:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.3</generator>
	<item>
		<title>Check-MK Mikrotik Plugin for Voltage &#8211; Temperature &#8211; Memory</title>
		<link>https://www.farlock.org/mikrotik/check-mk-mikrotik-voltage-temperature-memory/</link>
					<comments>https://www.farlock.org/mikrotik/check-mk-mikrotik-voltage-temperature-memory/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 07 Jan 2016 07:04:40 +0000</pubDate>
				<category><![CDATA[Check-mk]]></category>
		<category><![CDATA[Mikrotik]]></category>
		<category><![CDATA[Nagios]]></category>
		<category><![CDATA[check-mk]]></category>
		<category><![CDATA[check-mk plugin]]></category>
		<category><![CDATA[checkmk]]></category>
		<category><![CDATA[mikrotik temperature]]></category>
		<category><![CDATA[mikrotik votlage]]></category>
		<category><![CDATA[mirkotik memory]]></category>
		<category><![CDATA[nagios]]></category>
		<category><![CDATA[routeros]]></category>
		<guid isPermaLink="false">http://www.farlock.org/?p=246</guid>

					<description><![CDATA[I just finished to write my first SNMP check for check_mk 🙂 These checks are for query mikrotik routerboard device and check status of voltage (power supply), temperature and memory. For memory I simly edit the hr_mem check, I don&#8217;t know why but mikrotik use hrOtherDisk instead of hrRamDisk for internal ram. I&#8217;ve also add [...]]]></description>
										<content:encoded><![CDATA[<div>I just finished to write my first SNMP <span class="il">check</span> for check_mk <img src="https://s.w.org/images/core/emoji/13.1.0/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></div>
<div>These checks are for query mikrotik routerboard device and <span class="il">check</span> status of voltage (power supply), temperature and memory.</div>
<div>For memory I simly edit the hr_mem <span class="il">check</span>, I don&#8217;t know why but mikrotik use hrOtherDisk instead of hrRamDisk for internal ram.</div>
<div>I&#8217;ve also add itcm_parameters.py, it should be copied in /usr/share/check_mk/web/<wbr />plugins/wato to add the possibility to edit ruleset with web interface.</div>
<div></div>
<div>I&#8217;m not expert at all of python and check_mk scripts, so I hope that this would be helpful for someone and someone else can <span class="il">check</span> and improve it <img src="https://s.w.org/images/core/emoji/13.1.0/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></div>
<div></div>
<div><a href="http://www.farlock.org/mikrotik/check-mk-mikrotik-voltage-temperature-memory/attachment/check_mk_mikrotik/" rel="attachment wp-att-249">check_mk_mikrotik</a></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.farlock.org/mikrotik/check-mk-mikrotik-voltage-temperature-memory/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>OpenVPN Linux Server &#8211; Router OS Client</title>
		<link>https://www.farlock.org/linux/openvpn-linux-server-router-os-client/</link>
					<comments>https://www.farlock.org/linux/openvpn-linux-server-router-os-client/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 10 Jul 2012 14:36:08 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Mikrotik]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[openvpn]]></category>
		<category><![CDATA[routeros]]></category>
		<guid isPermaLink="false">http://www.farlock.org/?p=195</guid>

					<description><![CDATA[<p>Launch this commands:</p> <p>CATOP=./personalCA</p> <p>CAKEY=./cakey.pem</p> <p>CAREQ=./careq.pem</p> <p>CACERT=./cacert.pem</p> <p>cd /etc/ssl</p> <p>mkdir $CATOP</p> <p>mkdir $CATOP/certs</p> <p>mkdir $CATOP/crl</p> <p>mkdir $CATOP/newcerts</p> <p>mkdir $CATOP/private</p> <p>echo &#8220;00&#8221; &#62; $CATOP/serial</p> <p>echo &#8220;00&#8221; &#62; $CATOP/crlnumber</p> <p>touch $CATOP/index.txt</p> <p>export OPENSSL_CONF=/etc/ssl/essetigiCA.cnf</p> <p>copy /etc/ssl/openssl.cnf to personalCA.cnf and edit OrganizationName, Country, State, ecc fields.</p> <p>Then execute:</p> <p>openssl req -new -keyout $CATOP/private/$CAKEY -out $CATOP/$CAREQ</p> <p>write a complex passhprase [...]]]></description>
										<content:encoded><![CDATA[<p>Launch this commands:</p>
<blockquote><p>CATOP=./personalCA</p>
<p>CAKEY=./cakey.pem</p>
<p>CAREQ=./careq.pem</p>
<p>CACERT=./cacert.pem</p>
<p>cd /etc/ssl</p>
<p>mkdir $CATOP</p>
<p>mkdir $CATOP/certs</p>
<p>mkdir $CATOP/crl</p>
<p>mkdir $CATOP/newcerts</p>
<p>mkdir $CATOP/private</p>
<p>echo &#8220;00&#8221; &gt; $CATOP/serial</p>
<p>echo &#8220;00&#8221; &gt; $CATOP/crlnumber</p>
<p>touch $CATOP/index.txt</p>
<p>export OPENSSL_CONF=/etc/ssl/essetigiCA.cnf</p></blockquote>
<p>copy /etc/ssl/openssl.cnf to personalCA.cnf and edit OrganizationName, Country, State, ecc fields.</p>
<p>Then execute:</p>
<blockquote><p>openssl req -new -keyout $CATOP/private/$CAKEY -out $CATOP/$CAREQ</p></blockquote>
<p>write a complex passhprase and remember it! Without it the CA is completely useless. It asks also for information about the CA.</p>
<p>Now we create our CA, it asks for the passphrase:</p>
<blockquote><p>openssl ca -out $CATOP/$CACERT $CADAYS -extensions v3_ca -days 36500 -keyfile $CATOP/private/$CAKEY -selfsign -infiles $CATOP/$CAREQ</p></blockquote>
<p>Server certificate:</p>
<blockquote><p>openssl req -new -nodes -keyout $CATOP/private/server_key.pem -out $CATOP/certs/server_req.pem</p>
<p>openssl ca -out $CATOP/certs/server_cert.pem -days 13000 -extensions server_cert -infiles $CATOP/certs/server_req.pem</p></blockquote>
<p>client certificate:</p>
<blockquote><p>openssl req -new -nodes -keyout $CATOP/private/client01_key.pem -out $CATOP/certs/client01_req.pem</p>
<div>openssl ca -out $CATOP/certs/client01_cert.pem -days 10000  -infiles $CATOP/certs/client01_req.pem</div>
</blockquote>
<p>That&#8217;s all.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.farlock.org/linux/openvpn-linux-server-router-os-client/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
