Our Products & Services
Getting Started
First Time Setup
Getting Started With Jobs
Getting Started with Accounts
Getting Started with Inventory
Getting Started with Ticketing
Setting Sonar up for Billing
Baseline Configuration
How To: Using Sonar's Customer Portal
User Specific Resources
Accounts
Account Groups: Overview & Example Use Cases
Account List View: Overview
Account Management View: Overview
Account Overview Customization
Account Statuses: Overview & Example Use Cases
Account Types: Overview & Example Use Cases
Anchor & Linked Serviceable Addresses: Overview and Best Practices
CPUC Fixed Broadband Deployment by Address
Child Accounts: Best Practices & How Tos
Creating a New Account
Disconnecting an Account
FCC Broadband Data Collection (BDC) Filings: How Sonar Can Help
FCC Data Exports: General Overview and Usage
Future Serviceable Addresses: Overview
Lead Intake Form Processing
Notes & Tasks: Best Practices & Use Cases
Scheduled Events: Overview & Use Cases
Serviceable Addresses: Overview and Usage
Specify Account ID upon Creation
Using Sonar's FCC Broadband Label Generation Tool
Billing
ACH Batching: Overview
Accounts in Vacation Mode
Avalara: Overview & Setup
Batch Payments & Deposit Slips: Overview
Billing Calculator
Billing Defaults
Billing Settings
Building Packages
Building a Data Service
Canadian ACH tool
Changing Service Pricing in Sonar: Best Practices
Considerations When Using Avalara with Voice Services
Creating Discounts for Services and Packages
Delinquency Billing Best Practices
Delinquency Exclusions: Overview and Use Cases
Email Invoice Batch: Overview
General Ledger Codes: Overview
General Transactions: Best Practices
How Sonar Prorates Billing
How to Take Bank Account Payments
How to: Adding a Service to an Account
Invoice Templates: Overview
Leveraging PayPal as a Payment Method in Sonar
Manual Transactions
Multi-Month Billing & Multi-Month Services
Print to Mail
Printed Invoice Batches: Overview
Services: Overview
Setting Up Payment Methods and Taking Payments
Setting up Bank Account & Credit Card Processors
Taxes Setup
Usage Based Billing Policies: Overview and Usage
Usage Based Billing Policy Free Periods: Overview and Usage
Using Tax Exemptions - How To
Communication
Call Logs: General Best Practices
Communication Tools: Overview
Email Variables & Conditions
Message Categories: Overview & Use Cases
Phone Number Types: Overview and Use Cases
Saved Messages: Overview
Setting up an Outbound Email Domain
Trigger Explanations
Triggered Messages: Setup
Using Outbound SMS
Using the Mass Message Tool
Companies
How to: Setting Up a Company in Sonar
Managing Multiple Companies in Sonar: Best Practices
Rebranding your Sonar Instance
Financial
Contract Templates
Invoice Attachment Use Cases & PDF Examples
Invoice Messages: Overview & Use Cases
Invoices in Sonar: Examples, Creation & Contents
Integrations
Calix SMx Integration: Overview
CrowdFiber Integration
External Marketing Providers
GPS Tracking Providers: Overview
GoCardless Integration: Overview & Setup
How to Connect Cambium to your Sonar Instance
How to Connect Preseem to your Sonar System
How to: Using Webhooks in Sonar
RemoteWinBox - Integration with Sonar
The Sonar Field Tech App
Tower Coverage Integration: Overview
Vetro FiberMap Integration: Overview
Webhooks in Sonar: Basic PHP Example
iCalendar Integration
Inventory
Inventory List View: Overview
Inventory Model Management: General Overview
Setup of Inventory: Manufacturers, Categories, and Assignees
Tracking and Using Consumable Inventory
Jobs
Applying Task Templates to Jobs
Edit Job Options
Example Jobs & Templates
Geofences: Overview
Job Types: Best Practices
Jobs and Scheduling: Overview
Scheduling How-to: Creating and Booking a Job
Scheduling Week View: Overview
Setting Up Schedules General Overview
Mapping
Misc.
Combining Custom Fields & Task Templates for Information Storage
Custom Fields Overview & Use Cases
Custom Links: Overview
Task Templates Overview & Use Cases
Monitoring
Building Alerting Rotations
Building a Monitoring Template
Poller Troubleshooting
Pollers: General Overview, Deployment Strategy, Build Out & Setup
Networking
Assigning RADIUS Addresses
Assigning an IP Address Using Sonar's IPAM: How to
Automating IP Assignments, Data Rates, and Network Access in Sonar
Building Address Lists
Building RADIUS Groups
Building a Device Mapper
Cable Modem Provisioning
Controlling Customer Speeds with Sonar: General Overview
DHCP Delivery
Data Usage Available Methods
Finding your OIDs
How Sonar Communicates - Egress IPs Explained
IP Assignments & Sonar
IPAM: Basic Setup
IPAM: Overview
LTE Integration
MikroTik as an Inline Device: Integration With Sonar
MikroTik: Controlling Access
MikroTik: Controlling Speeds
MikroTik: Setting Up a Sonar Controlled DHCP Server
Netflow Integration: Overview
Network Dashboard: Overview
Network Sites: Management View Overview
PacketLogic: Integration With Sonar
Pulse, Polling, and PHP
RADIUS: Build-Out & Integration with Sonar
RADIUS: Building Reply Attributes
Setting Up CoA Proxy
Sonar Flow
Sonar IP Addressing
Using Multiple Network Devices in Sonar
Purchase Orders
Release Notes
Reporting
Enhanced Business Intelligence - Tips & Tricks for Advanced Users
How To Enhance Your Reporting With Custom Field Data
Report Licenses
Sonar's Business Intelligence: Overview
Understanding Sonar Reports
Security
Application Firewall: General Overview and Best Practices
Auth0: Overview
Multi-Factor Authentication: Overview
Password Policy In Depth
Removing a Terminated Employee In Sonar
Role Creation using GraphiQL
User Role Creation & Best Practices
Users: Overview
Sonar Billing
sonarPay
sonarPay Chargebacks & Disputes: Overview
sonarPay Disbursements: Overview
sonarPay Overview
sonarPay Reversals, Voids, & Refunds: Overview
sonarPay: Token Migration Process
System
A Deeper Dive into the New Sonar API
API Calls Using Third Party Applications: Personal Access Tokens
Browser Compatibility and Minimum Hardware Requirements for Sonar
Consuming the Sonar API
Controlling Your Landing Page: Personal Preferences
Customizing Your Customer Portal
Date/Time Picker: Overview
Dynamic Time Zones in Sonar
Filtering: Overview
Frequently Used Terms
Getting Your Data into Sonar
How To Use GraphiQL to Understand the Sonar API
How Your Data is Backed Up
How to Best Use Global Search
Interacting with Files via the API
Introducing the New Sidebar
Mutations in the Sonar API
Notification Preferences
REST API Wrappers for V1 Compatibility
SMS Notifications
Sonar's Rich Text Editor
System Settings: Overview
The New Sonar API
Troubleshooting the Customer Portal
Upgrading your Ubuntu OS - Customer Portal Upgrades
User Profile: Your Personal User Settings
Ticketing
Advanced Ticketing Features
Canned Replies Examples & Templates
Canned Reply Categories
Exploring Ticket Groups
How to Integrate Inbound Mailboxes with Slack
Inbound Mailboxes Example Build
Ticket Categories Best Practices & Example Build
Ticketing: Overview
Using Parent Tickets
Voice
API Changes for Voice Billing
Best Practices to Remain CPNI Compliant
Billing Voice Services in Sonar
Deploying Voice Services in Sonar
Working With the Sonar Team & Additional Resources
Sonar's Security Practices & Certifications
CyberSecure Canada Certification
Sonar and General Data Protection Regulation (GDPR)
Sonar's Security Strategies
Technical Security Overview
Best Practices for Fast Tracking a Support Request
Feedback Portal / Suggest a Feature
Learning with Sonar: Tools and Resources
New Client Training Overview
Sonar Casts Table of Contents
Submitting Bugs vs. Feature Requests
The Sonar Community Forum
The Sonar Status Page
Third Party Customer Support Referrals
Table of Contents
- All Categories
- Networking
- MikroTik: Controlling Access
MikroTik: Controlling Access
Read Time: 4 mins
Prerequisites
Before you can use Sonar to control access in a MikroTik, you need to build address lists and add the MikroTik as an inline device in Sonar. Once both of these prerequisites are met, follow the steps below to start controlling access based on account attributes in Sonar. For the purposes of this guide, we will talk about how to drop and redirect traffic.
Dropping Traffic
- Winbox into the MikroTik you would like to setup rules in and go to IP > Firewall > Filter Rules, then hit the blue "+" button to create a new filter rule.
- In the Advanced tab, set the Src. Address List to the address list for which you would like to drop traffic. In this article we will use the "Delinquent" list.
- Under the Action tab, set the Action to Drop. It is also best practice to set a Comment here saying what this rule does, for example "Drop all Delinquent Traffic". Once this is set, press OK on the comment and OK on the rule.
If you have built these rules on a live network, you should see both the Bytes and Packets tables climbing for each filter rule.
Redirecting Traffic
Using your Inline Device to redirect traffic allows you to take non-paying customers' network traffic and redirect and HTTP request to a domain of your choosing. For example, in many cases you would opt to redirect traffic to the customer portal which will remove the customer's ability to hit any other HTTP website.
- Winbox into the MikroTik you would like to setup rules in and navigate to IP > Web Proxy
- Check the Enabled box and add a high non-standard port as the port that you would like to trigger the web proxy in the Port field. In this example we will use port 16099.
- Click on the Access button, then click the blue "+" button to create a new Web Proxy Rule. For the first rule, set the Dst. Host to the URL of your customer portal. If you have not yet built your customer portal you can follow these articles to do so. Set the Action to "allow" and click OK.
- Click on the blue "+" button again to create a new Web Proxy Rule. This time set the Action to "deny" and add the URL of your customer portal to the Redirect To line, then click OK.
- Next we will build a firewall rule to allow access to the web proxy. Navigate to IP > Firewall, then click the blue "+" button to create a new firewall rule. Under the General tab, set the Chain to "input", the Protocol to "6 (tcp)" and the Dst. Port to 16099. Under the Action tab, set the Action to "accept". Click the Comment button and call this rule "Allow to Web Proxy" then click OK on the comment and OK on the rule. Lastly, drag this rule above the drop rules you built to Drop Traffic.
- Now we can build the firewall rule that does the redirect. Once again, create a new firewall rule. Under Advanced, set the Src. Address List to "Delinquent". Under the Action tab, set the Action to "jump" and the Jump Target to "delinquent". Click the Comment button and call this rule "Delinquent Forward to Web Proxy"
- Now we will build rules to allow Delinquent traffic DNS access and https access. Once again, click the blue "+" button to create a new firewall rule. Under the General tab, set the Chain to "delinquent", the Protocol to "udp", and the Dst. Port to "53". Under the Advanced tab, set the Src. Address List to "Delinquent". Under the Action tab, set the Action to "accept". Finally, click the Comment button and call this rule "Allow DNS to Delinquent" and click OK on the comment and OK on the rule. Again, drag this rule above the drop rules created earlier.
- Again, create a new firewall rule. Under General, set the Chain to "delinquent", the Protocol to "6 (tcp)", and the Dst. Port to 443. Under the Advanced tab, set the Src. Address List to "Delinquent". Under the Action tab, set the Action to "accept". Click the Comment button and call this rule "Allow HTTPS to Delinquent" and click OK on the comment and OK on the rule. Again, drag this rule above the drop rules created earlier. The order of new rules created from top to bottom should now be Allow to Web Proxy, Delinquent Forward to Web Proxy, Allow DNS to Delinquent, Allow HTTPS to Delinquent, Drop all Delinquent Traffic.
- Finally, we need to configure NAT to redirect an incoming port 80 connection attempt to our web proxy.
- General
- Set the chain to dstnat
- Set Protocol to 6 (tcp)
- Dst. Port to 80
- Advanced > Src. Address List: Delinquent
- Action
- Action: Redirect
- To Ports: 16099 (or whatever you chose when setting up the web proxy)
- General