Datasheet
Use Metarouter to Implement Tor Anonymity Software
38
Why use Tor?
From the Tor web site [2]
"Using Tor protects you against a common form of Internet surveillance known as "traffic analysis."
Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source
and destination of your Internet traffic allows others to track your behavior and interests. This can
impact your checkbook if, for example, an e-commerce site uses price discrimination based on your
country or institution of origin. It can even threaten your job and physical safety by revealing who and
where you are. For example, if you're traveling abroad and you connect to your employer's computers to
check or send mail, you can inadvertently reveal your national origin and professional affiliation to
anyone observing the network, even if the connection is encrypted."
Tor Web Site
More information about The Tor Project is available at available at The Tor Homepage
[3]
.
Network Description
The network design requires that users be behind a NAT connection. The metarouter runs the Tor service and all
web traffic is routed through it. By design, to protect user privacy, only port 80 tcp, port 53 udp, 8118 tcp (privoxy
proxy) and port 9050 tcp (tor socks proxy) are open to users.
Mikrotik Network Configuration
Set up bridges
/interface bridge
add name=torBridge
add name=natBridge
/interface bridge port
add interface=ether2 bridge=natBridge
add interface=ether3 bridge=natBridge
add interface=wlan1 bridge=natBridge










