Parmi Notes Random short any article

ParmiBMKG


Berdasarkan data terbaru yang sangat detail ini, saya melihat ada beberapa perubahan signifikan dalam jaringan. Mari kita diskusikan dan buat konfigurasi yang tepat.

ANALISIS DATA TERBARU

Perubahan Penting:

  1. Subnet yang berbeda: Sekarang menggunakan /29 (bukan /30)
  2. Network HA terintegrasi dengan network VPN
  3. IP management terpisah
  4. Jakarta memiliki 2 SFP (1 public, 1 private)

Diagram Jaringan yang Diperbarui:

Diagram Jaringan yang Diperbaru

graph TB
    subgraph "VSAT JAKARTA"
        A[Peplink Jakarta] --> B[ETH1: 10.20.30.10/29]
        A --> C[SFP2: 192.168.111.1/28]
        A --> D[HA: 10.20.30.11-12/29]
        A --> E[Management: 192.168.123.3-4/29]
        A --> F[SFP1: 202.90.198.83/28]
    end

    subgraph "VSAT BALI"
        G[Peplink Bali] --> H[ETH1: 10.20.30.18/29]
        G --> I[WAN2: 192.168.222.1/28]
        G --> J[HA: 10.20.30.19-20/29]
        G --> K[SFP: Aaa.bbb.ccc.ddd]
        G --> L[WAN1: Eee.fff.ggg.hhh]
    end

    subgraph "MIKROTIK VPN SERVER"
        M[Mikrotik] --> N[ETH1: 10.20.30.9/29]
        M --> O[ETH2: 10.20.30.17/29]
        M --> P[Services Network]
    end

    B --> N
    H --> O

KONFIGURASI MIKROTIK VPN SERVER

1. Interface Configuration

# Interface ke Peplink Jakarta
/interface ethernet set ether1 name=to-jakarta
/ip address add address=10.20.30.9/29 interface=to-jakarta

# Interface ke Peplink Bali  
/interface ethernet set ether2 name=to-bali
/ip address add address=10.20.30.17/29 interface=to-bali

# Interface LAN services
/interface ethernet set ether3 name=lan-services
/ip address add address=192.168.200.1/24 interface=lan-services

2. PPTP Server Setup

# Enable PPTP Server
/interface pptp-server server set enabled=yes default-profile=vsat-profile

# IP Pool untuk masing-masing site
/ip pool add name=pool-jakarta ranges=10.255.255.10-10.255.255.20
/ip pool add name=pool-bali ranges=10.255.255.30-10.255.255.40

# PPP Profile khusus VSAT
/ppp profile add name=vsat-profile local-address=10.255.255.1 remote-address=pool-jakarta \
    use-encryption=yes use-compression=yes change-tcp-mss=yes only-one=yes

/ppp profile add name=vsat-profile-bali local-address=10.255.255.2 remote-address=pool-bali \
    use-encryption=yes use-compression=yes change-tcp-mss=yes only-one=yes

3. User Accounts

# User untuk Jakarta
/ppp secret add name=jakarta-vsat password=JakartaVSAT123! service=pptp \
    profile=vsat-profile local-address=10.255.255.1 remote-address=pool-jakarta

# User untuk Bali
/ppp secret add name=bali-vsat password=BaliVSAT456! service=pptp \
    profile=vsat-profile-bali local-address=10.255.255.2 remote-address=pool-bali

4. Bridge Configuration

# Bridge untuk L2 connectivity
/interface bridge add name=bridge-vsat

# Port untuk VPN connections
/interface bridge port add bridge=bridge-vsat interface=pptp-in1
/interface bridge port add bridge=bridge-vsat interface=pptp-in2
/interface bridge port add bridge=bridge-vsat interface=lan-services

# IP Address untuk bridge
/ip address add address=172.16.255.1/24 interface=bridge-vsat

5. Routing & Firewall

# Static routes ke network masing-masing site
/ip route add dst-address=192.168.111.0/28 gateway=10.20.30.10
/ip route add dst-address=192.168.222.0/28 gateway=10.20.30.18
/ip route add dst-address=192.168.123.0/29 gateway=10.20.30.10

# Firewall rules
/ip firewall filter add chain=input protocol=tcp dst-port=1723 action=accept comment="PPTP VPN"
/ip firewall filter add chain=input protocol=gre action=accept comment="GRE Protocol"

# Allow cross-site traffic
/ip firewall filter add chain=forward src-address=192.168.111.0/28 dst-address=192.168.222.0/28 action=accept comment="Jakarta-Bali Traffic"
/ip firewall filter add chain=forward src-address=192.168.222.0/28 dst-address=192.168.111.0/28 action=accept comment="Bali-Jakarta Traffic"

KONFIGURASI PEPLINK JAKARTA

1. Network Interfaces

Network → WAN → WAN1 (SFP1)
- Connection Type: Static
- IP Address: 202.90.198.83
- Netmask: 255.255.255.240 (28)
- Gateway: 202.90.198.81

Network → WAN → WAN2 (SFP2)
- Connection Type: Static
- IP Address: 192.168.111.1
- Netmask: 255.255.255.240 (28)
- Gateway: 192.168.111.2

Network → LAN → ETH1
- IP Address: 10.20.30.10
- Netmask: 255.255.255.248 (29)
- Gateway: 10.20.30.9

2. HA Configuration

System → High Availability
- HA Mode: Active-Active or Active-Standby
- HA Interface: ETH1 (10.20.30.10/29)
- Peer IP: 10.20.30.11 (untuk peplink 1) atau 10.20.30.12 (untuk peplink 2)

3. VPN Client Configuration

Network → VPN → Add VPN

Basic Settings:
- VPN Type: PPTP
- Name: Jakarta-to-Mikrotik
- Interface: ETH1 (10.20.30.10/29)

Connection Settings:
- Server Address: 10.20.30.9
- Username: jakarta-vsat
- Password: JakartaVSAT123!
- Authentication: MS-CHAP v2
- Encryption: Required

Advanced Settings:
- MTU: 1400
- MRU: 1400
- Send PPP Echo: Enabled
- PPP Echo Interval: 30

4. Outbound Policy

Network → Outbound Policy → Add Policy

Policy 1: HUB Network to VPN Services
- Source IP: 192.168.111.0/28
- Destination IP: 172.16.255.0/24
- Service: VPN (Jakarta-to-Mikrotik)
- Priority: 1

Policy 2: HUB Network to Bali HUB
- Source IP: 192.168.111.0/28
- Destination IP: 192.168.222.0/28
- Service: VPN (Jakarta-to-Mikrotik)
- Priority: 1

Policy 3: Management Network to Services
- Source IP: 192.168.123.0/29
- Destination IP: 172.16.255.0/24
- Service: VPN (Jakarta-to-Mikrotik)
- Priority: 2

KONFIGURASI PEPLINK BALI

1. Network Interfaces

Network → WAN → WAN1 (SFP)
- Connection Type: Static
- IP Address: Aaa.bbb.ccc.ddd
- Gateway: Aaa.bbb.ccc.ddX

Network → WAN → WAN2 (ETH1)
- Connection Type: Static  
- IP Address: Eee.fff.ggg.hhh
- Gateway: Eee.fff.ggg.hhX

Network → WAN → WAN3 (ETH2)
- Connection Type: Static
- IP Address: 192.168.222.1
- Netmask: 255.255.255.240 (28)
- Gateway: 192.168.222.2

Network → LAN → ETH1
- IP Address: 10.20.30.18
- Netmask: 255.255.255.248 (29)
- Gateway: 10.20.30.17

2. VPN Client Configuration

Network → VPN → Add VPN

Basic Settings:
- VPN Type: PPTP
- Name: Bali-to-Mikrotik
- Interface: ETH1 (10.20.30.18/29)

Connection Settings:
- Server Address: 10.20.30.17
- Username: bali-vsat
- Password: BaliVSAT456!
- Authentication: MS-CHAP v2
- Encryption: Required

Advanced Settings:
- MTU: 1400
- MRU: 1400
- Send PPP Echo: Enabled
- PPP Echo Interval: 30

3. Outbound Policy

Network → Outbound Policy → Add Policy

Policy 1: HUB Network to VPN Services
- Source IP: 192.168.222.0/28
- Destination IP: 172.16.255.0/24
- Service: VPN (Bali-to-Mikrotik)
- Priority: 1

Policy 2: HUB Network to Jakarta HUB
- Source IP: 192.168.222.0/28
- Destination IP: 192.168.111.0/28
- Service: VPN (Bali-to-Mikrotik)
- Priority: 1

SUMMARY IP ADDRESSING

MIKROTIK VPN SERVER:
- to-jakarta: 10.20.30.9/29
- to-bali: 10.20.30.17/29
- lan-services: 192.168.200.1/24
- bridge-vsat: 172.16.255.1/24

PEPLINK JAKARTA:
- SFP1 (Public): 202.90.198.83/28
- SFP2 (HUB): 192.168.111.1/28
- ETH1 (to Mikrotik): 10.20.30.10/29
- HA Peplink1: 10.20.30.11/29
- HA Peplink2: 10.20.30.12/29
- Management: 192.168.123.3-4/29

PEPLINK BALI:
- SFP (Public): Aaa.bbb.ccc.ddd
- WAN1 (Public): Eee.fff.ggg.hhh
- WAN2 (HUB): 192.168.222.1/28
- ETH1 (to Mikrotik): 10.20.30.18/29
- HA: 10.20.30.19-20/29

NETWORK SEGMENTS:
- Jakarta HUB: 192.168.111.0/28
- Bali HUB: 192.168.222.0/28
- Shared Services: 172.16.255.0/24
- Management: 192.168.123.0/29
- VPN Network: 10.20.30.8/29

PERTANYAAN UNTUK DISKUSI:

  1. Apakah Mikrotik memiliki 2 interface fisik terpisah untuk koneksi ke Jakarta dan Bali?
  2. Apakah ada perangkat lawan untuk koneksi Bali yang belum ada datanya?
  3. Apakah HA configuration sudah aktif atau masih planning?
  4. Apakah ada kebutuhan khusus untuk traffic antara site yang perlu dipertimbangkan?

Konfigurasi ini sudah mengakomodasi semua data terbaru Anda. Yang perlu dikonfirmasi adalah topologi fisik dan kebutuhan traffic spesifik antara Jakarta-Bali.


Sangat menarik! Ini adalah project yang sangat kompleks dan mission-critical. Berdasarkan informasi yang Anda berikan, saya akan memberikan analisis dan rekomendasi yang komprehensif.

ANALISIS PROJECT SCALE & REQUIREMENTS

Karakteristik Khusus Project Ini:

  • Mission Critical: Data seismik gunung berapi
  • Large Scale: Ratusan remote sites (BR1 Mini)
  • Challenging Environment: Area rawan bencana
  • High Reliability: VSAT redundant + SpeedFusion
  • Security: Data sensitif seismik

ARsitektur yang Direkomendasikan

ARsitektur yang Direkomendasikan

graph TB
    subgraph "CORE NETWORK"
        A[Mikrotik VPN Cluster] --> B[VSAT Provider 1]
        A --> C[VSAT Provider 2]
        A --> D[Internet Fiber Backup]
    end

    subgraph "AGGREGATOR SITES"
        E[Jakarta Aggregator] --> A
        F[Bali Aggregator] --> A
    end

    subgraph "REMOTE SITES - 100+ BR1 Mini"
        G[Remote Site 1] --> E
        G --> F
        H[Remote Site 2] --> E
        H --> F
        I[...Site 3-100] --> E
        I --> F
    end

    subgraph "DATA CENTER"
        J[Seismic Data Server] --> A
        K[Monitoring System] --> A
    end

KONFIGURASI SPEEDFUSION YANG DISARANKAN

1. SpeedFusion Cloud Configuration

Di Peplink InControl2:

Create SD-WAN Profile: "Seismic-Monitoring"

SpeedFusion Settings:
- Encryption: AES-256-GCM
- Hashing: SHA-256
- Key Exchange: Diffie-Hellman 2048
- Compression: Enabled
- WAN Bonding: Enabled
- Deep Packet Inspection: Enabled

QoS Settings:
- Priority: Seismic Data (Highest)
- Bandwidth Reservation: 30% for seismic data
- Traffic Shaping: Enabled

2. Konfigurasi untuk BR1 Mini Remote Sites

WAN Configuration:

WAN1: VSAT Provider 1
- Connection Type: Static/DHCP
- MTU: 1400
- Traffic Shaping: Enabled

WAN2: VSAT Provider 2 (Redundant)
- Connection Type: Static/DHCP  
- MTU: 1400
- Traffic Shaping: Enabled

WAN3: Cellular 4G/5G Backup
- USB Modem: Enabled
- Failover: Automatic

SpeedFusion VPN Configuration:

Network → VPN → SpeedFusion

Connection Type: SD-WAN Cloud
SD-WAN Profile: Seismic-Monitoring

Target Devices:
- Jakarta Aggregator: Priority 1
- Bali Aggregator: Priority 2

Advanced:
- Heartbeat Interval: 10 seconds
- Dead Peer Detection: 5 seconds
- Tunnel Recovery: Aggressive

3. Outbound Policy untuk Seismic Data

Policy 1: Seismic Data to Jakarta
- Source: Seismic Device IPs
- Destination: Data Center IPs
- Service: SpeedFusion (Jakarta)
- Priority: Highest
- Bandwidth: Guaranteed

Policy 2: Seismic Data to Bali
- Source: Seismic Device IPs  
- Destination: Data Center IPs
- Service: SpeedFusion (Bali)
- Priority: High
- Failover: Enabled

KONFIGURASI MIKROTIK UNTUK SCALE BESAR

1. Mikrotik Cluster Configuration

# Untuk handle 100+ concurrent VPN connections
/system resource
set max-neighbor-entries=5000

/ip firewall filter
add chain=forward connection-state=established,related action=accept
add chain=forward connection-state=invalid action=drop

# Increase VPN capacity
/ip ipsec policy
set 0 disabled=no

/ip pool
add name=remote-pool ranges=10.255.0.0-10.255.255.255

2. Load Balancing & Failover

# ECMP Load Balancing untuk multiple WAN
/ip route
add dst-address=0.0.0.0/0 gateway=vsat1-gateway,vsat2-gateway,internet-gateway \
    check-gateway=ping routing-mark=load-balance

/ip firewall mangle
add chain=prerouting action=mark-connection new-connection-mark=conn1 \
    per-connection-classifier=both-addresses:3/0
add chain=prerouting action=mark-connection new-connection-mark=conn2 \
    per-connection-classifier=both-addresses:3/1  
add chain=prerouting action=mark-connection new-connection-mark=conn3 \
    per-connection-classifier=both-addresses:3/2

OPTIMASI UNTUK VSAT REDUNDANT

1. VSAT Provider Diversity

Provider 1: TelkomSat (Existing)
- Frequency: C-band/Ku-band
- Coverage: Nasional
- Reliability: High

Provider 2: [New Provider - Recommended]
- Options: PSN, MNC, atau provider internasional
- Technology: High-throughput satellite
- Diversity: Different satellite position

2. Link Optimization untuk VSAT

# TCP Optimization untuk high latency
/ip firewall mangle
add chain=forward protocol=tcp tcp-flags=syn action=change-mss new-mss=1360
add chain=forward protocol=tcp connection-state=established action=accept

# QoS untuk prioritization
/queue tree
add name=seismic-data parent=global packet-mark=seismic limit-at=10M max-limit=100M priority=1
add name=management parent=global packet-mark=management limit-at=2M max-limit=10M priority=3

SECURITY CONFIGURATION

1. Zero Trust Security Model

# Firewall rules untuk seismic network
/ip firewall filter
add chain=input src-address=10.255.0.0/16 protocol=tcp dst-port=22 action=accept comment="SSH from remotes"
add chain=input src-address=10.255.0.0/16 protocol=tcp dst-port=443 action=accept comment="HTTPS from remotes"
add chain=input src-address=10.255.0.0/16 protocol=udp dst-port=500,4500 action=accept comment="IPSec from remotes"

# Drop everything else
add chain=input action=drop comment="Block unauthorized access"

2. VPN Security Hardening

# IPsec Configuration
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256 enc-algorithms=aes-256-cbc

/ip ipsec peer
add address=0.0.0.0/0 auth-method=pre-shared-key secret="StrongPassword123!" \
    exchange-mode=ike2 send-initial-contact=yes nat-traversal=yes

MONITORING & MANAGEMENT

1. Peplink InControl2 Setup

Dashboard Configuration:
- Group: "Seismic-Monitoring-Remotes"
- Alerts: Connection loss, High latency, Failover events
- Reports: Bandwidth usage, Uptime, Quality metrics

Automation:
- Auto-configuration untuk new remotes
- Firmware management terpusat
- Configuration templates

2. Mikrotik Monitoring

# Health monitoring script
/system script add name=health-check source={
    :local cpu [/system resource get cpu-load]
    :local memory [/system resource get free-memory]
    :local vpnCount [:len [/ip ipsec active-peer find]]

    :if ($cpu > 80) do={ /log warning "High CPU usage: $cpu%" }
    :if ($memory < 100000000) do={ /log warning "Low memory: $memory" }
    :log info "VPN Connections: $vpnCount"
}

/system scheduler add name=health-monitor interval=5m on-event=health-check

DEPLOYMENT STRATEGY

Phase 1: Core Infrastructure (Minggu ini)

Tasks:
- Setup Mikrotik cluster dengan VSAT redundant
- Configure Jakarta & Bali aggregators
- Test SpeedFusion dengan 5-10 remote sites
- Validate seismic data transmission

Phase 2: Scale Deployment (Desember 2024)

Tasks:
- Deploy 50-100 BR1 Mini remotes
- Implement auto-configuration via InControl2
- Setup monitoring dan alerting
- Performance optimization

Phase 3: Optimization (Januari 2025)

Tasks:
- Fine-tuning QoS policies
- Security hardening
- Disaster recovery testing
- Documentation & training

BANDWIDTH PLANNING

Per Remote Site (BR1 Mini):
- Seismic Data: 1-2 Mbps (continuous)
- Management: 0.5 Mbps
- Voice/Video: 1 Mbps (if needed)
- Total: 2.5-3.5 Mbps

Aggregator Capacity:
- 100 sites × 3 Mbps = 300 Mbps
- Plus 50% overhead = 450 Mbps
- VSAT redundant: 2× 250 Mbps links

REKOMENDASI FINAL

Untuk VSAT Redundant:

  1. Provider Diversity: Pilih provider dengan satellite berbeda
  2. Technology: High-throughput satellites untuk better bandwidth
  3. Business Continuity: Pastikan SLA 99.9%+

Untuk SpeedFusion:

  1. WAN Bonding: Combine both VSAT links untuk throughput maksimal
  2. Traffic Steering: Otomatis route via best-performing link
  3. Zero-Touch Deployment: Gunakan InControl2 untuk mass deployment

Security Considerations:

  1. Data Encryption: AES-256 untuk seismic data
  2. Network Segmentation: Pisahkan seismic data dari management traffic
  3. Access Control: Strict firewall rules

Pertanyaan kritis untuk deployment: - Apakah semua remote sites sudah memiliki akses VSAT? - Berapa besar data seismik yang ditransmisikan per site? - Apakah ada kebutuhan real-time video monitoring?

Dengan arsitektur ini, Anda akan memiliki sistem yang sangat reliable, secure, dan scalable untuk monitoring seismik di area rawan bencana.

Sangat jelas! Fokus utama adalah hot failover dan reliable data transmission untuk data seismik yang periodik. Berikut konfigurasi optimal untuk kebutuhan ini:

STRATEGI HOT FAILOVER UNTUK DATA SEISMIK

diagram

1. Arsitektur Failover yang Direkomendasikan

graph TB
    subgraph "REMOTE SITE - BR1 Mini"
        A[Seismic Sensor] --> B[Peplink BR1 Mini]
        B --> C[WAN1: VSAT Primary]
        B --> D[WAN2: Cellular Backup]
        B --> E[SpeedFusion Tunnel]
    end

    subgraph "AGGREGATOR SITE"
        E --> F[Jakarta Aggregator]
        E --> G[Bali Aggregator]
        F --> H[Data Center]
        G --> H
    end

    C -.->|Failover| D
    F -.->|Failover| G

2. Konfigurasi WAN Failover di BR1 Mini

WAN Priority Configuration:

Network → WAN → WAN1 (VSAT Primary)
- Connection Type: Static/DHCP
- Weight: 100
- Health Check: Enabled
- Check Method: Ping + HTTP
- Check Target: 8.8.8.8 + aggregator IP

Network → WAN → WAN2 (Cellular Backup)  
- Connection Type: DHCP
- Weight: 10
- Health Check: Enabled
- Check Interval: 10 seconds
- Failover Trigger: 2 consecutive failures

Network → WAN → WAN3 (Optional: Second VSAT)
- Connection Type: Static/DHCP
- Weight: 80
- Health Check: Enabled

3. SpeedFusion dengan Persistent Connection

VPN Configuration:

Network → VPN → SpeedFusion

Basic Settings:
- Connection Name: Seismic-Data-Tunnel
- Type: Peer-to-Peer (P2P)
- Encryption: AES-256
- Hashing: SHA-256

Target Peers:
- Primary: Jakarta Aggregator (Priority 1)
- Backup: Bali Aggregator (Priority 2)

Advanced Settings:
- Heartbeat Interval: 5 seconds
- Dead Peer Detection: 3 failures
- Tunnel Persistence: Aggressive
- Auto Reconnect: Immediate

4. Outbound Policy untuk Data Seismik

Policy 1: Seismic Data Transmission

Network → Outbound Policy → Add Policy

General:
- Policy Name: Seismic-Data-Primary
- Enable: Yes
- Priority: 1

Source:
- IP: [IP Seismic Device]/32
- Port: Any

Destination:  
- IP: [Data Center IP]/32
- Port: [Seismic Data Port]

Service:
- WAN Connection: WAN1 (VSAT)
- VPN: Seismic-Data-Tunnel
- Bandwidth: Guaranteed 2Mbps

Failover:
- Backup WAN: WAN2 (Cellular)
- Backup VPN: Secondary Tunnel

Policy 2: Backup Path

Network → Outbound Policy → Add Policy

General:  
- Policy Name: Seismic-Data-Backup
- Enable: Yes
- Priority: 2

Source:
- IP: [IP Seismic Device]/32

Destination:
- IP: [Data Center IP]/32

Service:
- WAN Connection: WAN2 (Cellular)
- VPN: Seismic-Data-Tunnel
- Trigger: When Primary Fails

OPTIMISASI UNTUK DATA PERIODIK

1. Connection Persistence Settings

Untuk menjaga tunnel tetap aktif:

Network → VPN → SpeedFusion → Advanced

Keep-Alive Settings:
- Send Keep-Alive: Enabled
- Keep-Alive Interval: 10 seconds
- Keep-Alive Timeout: 30 seconds

TCP Optimization:
- TCP Acceleration: Enabled
- MSS Clamping: 1360
- Window Scaling: Enabled

Session Persistence:
- Idle Timeout: 300 seconds
- Force UDP: Enabled
- NAT Traversal: Aggressive

2. Quality of Service (QoS) Configuration

Prioritasi data seismik:

Network → QoS → Add Rule

Rule 1: Seismic Data Priority
- Service: Seismic-Data-Tunnel
- Priority: Highest (7)
- Guaranteed Bandwidth: 2Mbps
- Maximum Bandwidth: 5Mbps
- DSCP Marking: EF (Expedited Forwarding)

Rule 2: Management Traffic  
- Service: HTTP/HTTPS
- Priority: Low (2)
- Maximum Bandwidth: 1Mbps

3. Data Transmission Optimization

Untuk memastikan data sampai:

Network → Advanced → TCP Settings

- TCP Timeout: 300 seconds
- TCP Retransmission: Aggressive
- Buffer Bloat Control: Enabled
- Latency Optimization: Enabled

MONITORING & ALERTING

1. Health Monitoring Setup

Di Peplink InControl2:

Alerts Configuration:

Alert 1: WAN Failover Event
- Trigger: WAN switch occurred
- Action: Email + SMS notification
- Threshold: Immediate

Alert 2: VPN Disconnection
- Trigger: SpeedFusion tunnel down
- Action: Email notification
- Timeout: 30 seconds

Alert 3: Data Transmission Failure
- Trigger: No data from seismic device for 10 minutes
- Action: Critical alert

2. Connection Quality Monitoring

Custom health checks:

Status → Connections → Health Check

Check 1: VSAT Latency
- Target: aggregator IP
- Method: Ping
- Interval: 30 seconds
- Threshold: 500ms

Check 2: Data Path Validation
- Target: data center service port
- Method: TCP Connect
- Interval: 60 seconds
- Timeout: 10 seconds

KONFIGURASI DATA AGGREGATOR

1. Mikrotik sebagai Data Receiver

# Persistent connection handling
/ip firewall connection tracking
set tcp-timeout=1h udp-timeout=5m

# QoS untuk incoming seismic data
/queue tree
add name=seismic-in parent=global flow=ether1 packet-mark=seismic-data \
    limit-at=5M max-limit=10M priority=1

# Monitoring connections
/tool graphing
add interface=ether1
add interface=pptp-server1

2. Data Persistence Configuration

Untuk menangani data selama failover:

# Buffer data jika aggregator unreachable
/system scheduler
add name=seismic-buffer-check interval=1m on-event={
    :if ([/ping data-center-ip count=3] = 0) do={
        /log warning "Data center unreachable - buffering data"
        /system script run buffer-seismic-data
    }
}

FAILOVER TESTING PROCEDURE

1. Manual Testing Script

Di BR1 Mini web interface:

Testing Steps:
1. Status → Connections → Force disconnect WAN1
2. Monitor failover time (should be < 5 seconds)
3. Verify seismic data continues flowing
4. Restore WAN1, verify fallback
5. Check data integrity post-failover

2. Automated Failover Testing

Schedule regular tests:

System → Schedules → Add Schedule

Test 1: Weekly Failover Test
- Schedule: Every Sunday 02:00
- Action: Disconnect WAN1 for 2 minutes
- Monitor: Automated health check

Test 2: Monthly Disaster Recovery
- Schedule: First Monday monthly
- Action: Simulate complete site failure
- Monitor: End-to-end data flow

DATA INTEGRITY VERIFICATION

1. End-to-End Monitoring

Custom monitoring untuk data seismik:

# Script untuk verifikasi data receipt
/system script add name=verify-seismic-data source={
    :local lastData [/file get seismic-latest.txt contents]
    :local currentTime [/system clock get time]
    :local timeDiff ([:pick $currentTime 0 2] * 3600 + [:pick $currentTime 3 5] * 60)

    :if ($lastData < ($timeDiff - 300)) do={
        /log error "No seismic data received for 5+ minutes"
        /tool e-mail send to="admin@seismic.org" subject="Data Gap Alert" \
            body="Possible data loss detected"
    }
}

2. Data Gap Detection

Configuration untuk menangkap missing data:

Network → Advanced → Logging

- Enable Connection Logging: Yes
- Log Failover Events: Yes
- Data Transmission Log: Enabled
- Buffer Size: 1000 entries

PERFORMANCE EXPECTATIONS

Failover Performance:

WAN Failover: < 5 seconds
VPN Reconnection: < 10 seconds  
Data Loss During Failover: Minimal to zero
Recovery Time: < 30 seconds

Data Transmission Reliability:

Uptime: 99.99%+
Data Completeness: > 99.9%
Latency: < 500ms (VSAT), < 200ms (Cellular)
Jitter: < 50ms

IMPLEMENTATION CHECKLIST

  • [ ] Konfigurasi WAN failover dengan health check
  • [ ] SpeedFusion tunnel dengan multiple targets
  • [ ] Outbound policy dengan backup path
  • [ ] QoS untuk prioritasi data seismik
  • [ ] Monitoring dan alerting setup
  • [ ] Failover testing procedure
  • [ ] Data integrity verification
  • [ ] Documentation dan training

Dengan konfigurasi ini, setiap remote site akan memiliki hot failover yang sangat reliable, memastikan data seismik terus mengalir bahkan selama gangguan jaringan. SpeedFusion akan menjaga tunnel tetap aktif dan secara otomatis meroute traffic melalui path terbaik available.


Sangat jelas! Saya memahami sepenuhnya arsitektur dan constraint yang dihadapi. Berikut summary dan persiapan untuk diskusi teknis lebih lanjut:

ARsitektur yang Dipahami:

ARsitektur yang Dipahami

graph TB
    subgraph "JAKARTA SITE"
        A[SDX 1 - Primary] --> D[Backhaul Jakarta]
        B[SDX 2 - HA] --> D
        D --> F[Mikrotik Jakarta]
    end

    subgraph "BALI SITE" 
        C[SDX 1 - Primary] --> E[Backhaul Bali]
        G[SDX 2 - HA] --> E
        E --> H[Mikrotik Bali]
    end

    subgraph "REMOTE SITES"
        I[BR1 Mini 1] --> A
        I --> C
        J[BR1 Mini 2] --> A
        J --> C
        K[BR1 Mini 3...100+] --> A
        K --> C
    end

    F --> L[Data Center Seismik]
    H --> L

POINT-POINT KRITIS YANG SUDAH JELAS:

1. Constraint Business:

  • InControl License Renewal - Biaya berkelanjutan
  • Garansi dan Support - Pertimbangan maintenance
  • Hybrid Solution - Peplink + Mikrotik untuk optimasi biaya

2. Arsitektur Teknis:

  • Dual Backhaul - Jakarta & Bali untuk redundancy
  • HA Cluster - SDX dalam High Availability mode
  • Multi-path Connectivity - Remote sites connect ke kedua aggregator

3. Migration Strategy:

  • Phase Approach - Bali minggu depan, Jakarta monitoring
  • Team Separation - Tim berbeda untuk masing-masing site

UNTUK DISKUSI TEKNIS SELANJUTNYA, SIAPKAN:

Data yang Diperlukan:

Network Details:
- IP Address SDX Jakarta (Primary & HA)
- IP Address SDX Bali (Primary & HA) 
- IP Management Mikrotik Jakarta & Bali
- VLAN Configuration (jika ada)
- Subnet Allocation untuk remote sites

Performance Requirements:
- Jumlah remote sites yang akan di-migrate
- Bandwidth requirements per site
- RTO/RPO requirements untuk data seismik

Security Considerations:
- Firewall policies yang existing
- Access control requirements
- Compliance requirements

Pertanyaan Teknis Kritis:

  1. Apakah ada load balancing antara Jakarta-Bali atau active-standby?
  2. Bagaimana data replication antara kedua site?
  3. Apakah ada database synchronization requirements?
  4. Bagaimana disaster recovery scenario jika satu site down?

STRATEGI MIGRATION YANG DISARANKAN:

Phase 1: Preparation (Minggu ini)

  • Finalize network documentation
  • Prepare configuration templates
  • Setup monitoring baseline

Phase 2: Bali Deployment (Minggu depan)

  • Deploy SDX Bali cluster
  • Establish SpeedFusion tunnels
  • Test dengan limited remote sites

Phase 3: Jakarta Optimization

  • Fine-tune berdasarkan lessons learned dari Bali
  • Implement advanced QoS dan traffic engineering

Phase 4: Scale & Monitor

  • Mass deployment ke semua remote sites
  • Implement comprehensive monitoring

KEUNTUNGAN SOLUSI HYBRID INI:

  1. Cost Optimization - Mengurangi dependency InControl license
  2. Flexibility - Bisa customize dengan Mikrotik
  3. Reliability - Dual backhaul + HA clusters
  4. Scalability - Support ratusan remote sites
  5. Maintainability - Tim terpisah untuk masing-masing region

Saya siap membantu dengan detail teknis lebih lanjut ketika Anda sudah memiliki data real dan requirements yang lebih spesifik. Yang penting kita sudah memiliki framework yang solid untuk diskusi teknis mendetail!

Silakan lanjutkan diskusi ketika tim Bali sudah mulai deployment atau ketika ada data teknis lebih detail dari Jakarta. 🚀

=== 20251211 additional note===

Berdasarkan Excel konfigurasi BMKG yang Anda berikan, saya analisis dan menemukan beberapa poin kritis yang kemungkinan menjadi penyebab masalah SD-WAN diagnostik sebelumnya. Berikut analisis detail:

ANALISIS KONFIGURASI BMKG SD-WAN

✅ STRUKTUR JARINGAN YANG BAIK:

  1. Dua Aggregator (Hub) - Bali dan Jakarta
  2. Multiple Remote Sites - MAX_BR1_DF2C, MIJI, SPSJM, TAGJI
  3. Redundancy - VSAT + Cellular + ISP di setiap lokasi

⚠️ MASALAH POTENSIAL YANG TERIDENTIFIKASI:

1. MASALAH IP ADDRESS & SUBNET (KRITIS)

  • IP Duplikat/Overlap ditemukan:
    • 172.17.108.x digunakan di multiple remote sites (MIJI, SPSJM, TAGJI)
    • Ini akan menyebabkan routing conflict di sisi aggregator

2. KONFIGURASI GATEWAY YANG TIDAK KONSISTEN

  • Remote Site MAX_BR1_DF2C:

    • LAN1: DHCP gateway (seharusnya SDWAN/VRRP IP)
    • VSAT1 & VSAT2: "tida terhubung" (typo, maksudnya tidak terhubung)
  • Beberapa site memiliki gateway yang tidak jelas:

    • Contoh: BMKG-MIJI LAN1 gateway DHCP, tapi network 172.18.1.66/29

3. MASALAH KONEKTIVITAS VSAT

  • MAX_BR1_DF2C: Kedua port VSAT tidak terhubung (status: "tida terhubung")
  • Ini menjelaskan mengapa SD-WAN tunnel FAIL dalam diagnostik

4. KONFIGURASI SD-WAN IP YANG TIDAK JELAS

  • Dari tabel, tidak terlihat SD-WAN Tunnel IP yang spesifik
  • Hanya disebut "SDWAN HA", "SDWAN master", "SDWAN slave" tanpa IP tunnel

🔍 CROSS-CHECK DENGAN HASIL DIAGNOSTIK:

Diagnostic Test Penyebab Berdasarkan Konfigurasi Excel
SD-WAN Primary Tunnel [FAIL] VSAT tidak terhubung di remote site
SD-WAN Backup Tunnel [FAIL] Cellular mungkin tidak failover otomatis
Internet Connectivity [WARN] Gateway tidak konsisten
DNS Resolution [WARN] DNS tidak dikonfigurasi di tabel
HTTP/HTTPS Service [WARN] Routing masalah ke internet

❓ PERTANYAAN KLARIFIKASI YANG PENTING:

  1. Remote site mana yang sedang mengalami masalah diagnostik? (MAX_BR1_DF2C/MIJI/SPSJM/TAGJI?)

  2. Apakah ada konfigurasi routing table terpisah? Karena tidak ada di excel ini

  3. Bagaimana skema IP SD-WAN tunnel?

    • IP Public atau Private?
    • Overlay network menggunakan subnet apa?
  4. Untuk site MAX_BR1_DF2C:

    • Mengapa kedua VSAT "tida terhubung"?
    • Apakah kabel/port bermasalah?
  5. DNS Configuration: Server DNS mana yang digunakan?

🎯 REKOMENDASI SEGERA:

PRIORITAS 1: Perbaiki VSAT MAX_BR1_DF2C

1. Cek kabel/port fisik VSAT
2. Restart modem VSAT
3. Verifikasi IP 172.19.237.34 & 172.30.10.2 bisa ping ke gateway

PRIORITAS 2: Standardisasi Konfigurasi

  1. Hindari IP overlap di subnet 172.17.108.x
  2. Tetapkan gateway yang konsisten:
    • LAN interface: arahkan ke SD-WAN virtual IP
    • WAN interface: arahkan ke upstream gateway

PRIORITAS 3: Verifikasi SD-WAN Tunnel

# Di remote device, cek:
1. Status SD-WAN tunnel ke aggregator
2. Routing table - apakah ada route ke 10.20.30.x (aggregator)?
3. Firewall - apakah port SD-WAN (biasanya UDP 11700-11750) terbuka?

📋 CHECKLIST VERIFIKASI:

  • [ ] VSAT semua site terkoneksi
  • [ ] IP tidak overlap antar site
  • [ ] Gateway terkonsfigurasi benar
  • [ ] SD-WAN tunnel status UP
  • [ ] DNS server reachable
  • [ ] Default route ada ke internet

Mohon konfirmasi: Site mana yang sedang Anda troubleshoot? Dan apakah ada routing table atau konfigurasi SD-WAN tunnel detail yang bisa dibagikan?

===========

Terima kasih untuk klarifikasinya! Sekarang saya paham arsitektur yang sebenarnya. Ini sangat membantu untuk analisis yang lebih akurat.

ANALISIS KONFIGURASI YANG DIPERBARUI

📊 ARSITEKTUR YANG SUDAH JELAS:

  1. BR1 Mini Port Mapping:

    • LAN1: Management/Local LAN
    • LAN2: VWAN (VSAT via VLAN) - WAN Virtual
    • LAN3: WAN1 GbE (VSAT utama) - WAN Fisik
    • Cellular: Backup LTE
    • WiFi: Disabled
  2. Dual VSAT Path:

    • VSAT Jakarta (via WAN1/LAN3)
    • VSAT Bali (via VWAN/LAN2)
    • Cellular (backup otomatis)
  3. Segment IP VSAT Sama: Memang dirancang menggunakan 172.17.108.xx untuk semua site ke VSAT hub.

🔍 DIAGNOSIS MASALAH SD-WAN TUNNEL [FAIL]:

Berdasarkan konfigurasi dan hasil diagnostik, kemungkinan besar masalahnya di sisi VSAT connectivity, bukan di konfigurasi SD-WAN itu sendiri.

KENAPA SD-WAN TUNNEL FAIL?

Kemungkinan 1: Kedua VSAT Path Down di Remote Site - Jika WAN1 (VSAT Jakarta) DAN VWAN (VSAT Bali) tidak terkoneksi - SD-WAN tidak punya WAN interface yang UP untuk membangun tunnel

Kemungkinan 2: SD-WAN Aggregator Down - Jika aggregator Jakarta/Bali offline, semua tunnel ke site tersebut akan down

Kemungkinan 3: Routing Problem di VSAT Network - VSAT terkoneksi fisik, tapi routing ke IP aggregator tidak ada

📍 PRIORITAS TROUBLESHOOTING:

STEP 1: Cek Status WAN di Remote Site

# Di BR1 Mini (remote), cek:
1. Status interface WAN1 (LAN3) - VSAT Jakarta
2. Status interface VWAN (LAN2) - VSAT Bali  
3. Status Cellular
4. Default gateway yang aktif

STEP 2: Test Koneksi ke Aggregator

# Ping dari remote ke aggregator:
- Jakarta Aggregator: 10.20.30.10/11/12 (SDWAN IP)
- Bali Aggregator: 10.20.30.18/19/20 (SDWAN IP)

# Jika tidak bisa ping:
1. Cek routing table di remote
2. Cek firewall di VSAT modem
3. Cek MTU/MSS settings (penting untuk tunnel)

STEP 3: Verifikasi SD-WAN Tunnel Configuration

# Parameter yang harus dicek:
1. Aggregator IP/Hostname: benar?
2. Pre-shared Key/authentication: match?
3. Port SD-WAN: 11700-11750 (biasanya)
4. Health check settings

📋 CHECKLIST SPESIFIK UNTUK BR1 MINI:

Untuk Site MAX_BR1_DF2C (yang VSAT-nya "tida terhubung"):

1. LAN3 (WAN1): 172.19.237.34/?? → Gateway: 172.19.237.33
2. LAN2 (VWAN): 172.30.10.2/?? → Gateway: 172.30.10.1
3. Cellular: 10.8.123.169 → Gateway: 10.8.123.168

Pertanyaan kritis: 1. Apakah IP gateway VSAT (172.19.237.33 & 172.30.10.1) reachable? 2. Apakah ada akses dari VSAT network ke internet? 3. Apakan aggregator Jakarta/Bali reachable dari VSAT network?

🎯 REKOMENDASI PERBAIKAN:

A. Untuk Site MAX_BR1_DF2C (VSAT tidak terhubung):

  1. Cek Layer 1: Kabel LAN2 & LAN3, port switch, power modem VSAT
  2. Cek Layer 2: VLAN tagging di port LAN2 (VWAN)
  3. Cek Layer 3:
    • IP configuration di BR1 Mini
    • Default route via VSAT
    • Ping test ke gateway VSAT

B. Untuk SD-WAN Tunnel Recovery:

  1. Force Cellular sebagai Primary sementara:

    • Prioritize Cellular di SpeedFusion settings
    • Test tunnel via Cellular
  2. Review SD-WAN Health Check:

    • Target: aggregator IP atau public IP
    • Interval: 5-10 detik
    • Timeout: 3-5 detik

C. Monitoring Setelah Perbaikan:

# Test yang harus berhasil:
1. ping 8.8.8.8 (via VSAT)
2. ping 10.20.30.10 (aggregator JKT)
3. ping 10.20.30.18 (aggregator BALI)
4. SD-WAN tunnel status: UP
5. SpeedFusion connectivity: Connected

❓ PERTANYAAN LANJUTAN:

  1. Site mana yang mengalami masalah diagnostik? MAX_BR1_DF2C atau yang lain?

  2. Apakan Anda punya akses ke web interface BR1 Mini? Bisa cek:

    • Status → WAN Interfaces
    • Status → SpeedFusion VPN
    • Network → Routes
  3. Bagaimana topologi VSAT?

    • Apakah VSAT modem langsung ke BR1 Mini?
    • Atau via switch/router lain?
  4. MTU Settings? VSAT biasanya MTU rendah (~1400). SD-WAN butuh adjustment.

Dengan arsitektur yang sekarang sudah jelas, masalahnya kemungkinan besar di konektivitas VSAT menuju aggregator. Setelah VSAT UP, SD-WAN tunnel seharusnya bisa establish.

======