DHCP server on Mikrotik, Cisco 7200, and Fortigate in GNS3
First, it is important to understand what a DHCP server is.
DHCP (Dynamic Host Configuration Protocol) is a method where a server automatically assigns IP addresses to clients based on your configuration. There are some basic things you need to understand:
- Network range or IP pool: This is the range of IP addresses that the DHCP server can give to clients.
- Excluded addresses: These are IP addresses within the network range that the server will not assign to clients. They are often reserved for specific devices like printers, routers, or servers.
- Default gateway (or default router): This is the IP address of the router that allows devices to communicate outside the local network. It's important to define it to avoid IP conflicts and to make sure clients know where to send traffic meant for other networks.
- Lease time: This defines how long a client can use an assigned IP address before it must renew the lease or request a new one.
DHCP Server Configuration on FortiGate, Cisco, and MikroTik in GNS3
In this documentation, I walk through configuring DHCP servers on three different network devices — FortiGate, Cisco, and MikroTik — within the GNS3 network simulation environment. Each device has its own method and interface for DHCP setup, making this a great exercise in understanding cross-platform configuration and behavior.
MikroTik DHCP Configuration
MikroTik’s configuration was completed using terminal commands in GNS3, though its graphical interface, Winbox, is also available for those who prefer GUI-based setup. I began by creating an IP address pool, then activated the DHCP server on the chosen interface. I assigned the address pool, default gateway, and DNS settings as part of the setup. MikroTik stands out for its speed and simplicity, offering a flexible DHCP service that's especially well-suited for smaller networks and labs
Config Interface
Config DHCP Server
Show Config
Show Client
Cisco IOS DHCP Configuration
On the Cisco router, DHCP was configured entirely using IOS CLI commands. I created a DHCP pool, assigned a network and subnet, and specified the default gateway and DNS servers. I also excluded certain IP addresses to prevent conflicts with statically assigned devices. Cisco’s CLI approach is highly structured and provides a robust set of features, but it requires familiarity with command syntax. This makes it ideal for those working in enterprise environments or preparing for Cisco certifications.
Config Interface
Config dhcp server
Show Configuration
Show Client
FortiGate DHCP Configuration
FortiGate provides a user-friendly interface through both Web GUI and CLI. In this setup, I connected an internal interface such as port2 to the local network. Using the Web GUI, I enabled DHCP server functionality by defining an IP address range, default gateway, and DNS server. Additionally, I used CLI commands to validate the configuration and make fine-tuned adjustments. The flexibility of managing DHCP services through both graphical and command-line interfaces makes FortiGate a powerful option for both beginners and experienced network administrators.
Config Interface
Config dhcp server
Show Configuration
Show Client
In FortiGate, you can use the get command to retrieve information and the show command to display your configuration.
Now, some of you might understand that the configuration above only shows how to set up a DHCP server on the LAN interface. But what if you want to use it on a WiFi or wired network? In that case, you need to change the interface from ether or fastethernet to either your wlan.
I’ll write the command for you, because we can’t practice this directly in a virtual lab—WiFi interfaces are usually not supported there.
MikroTik
Config Interface
The rest of the setup is the same, just change the interface to wlan1
Cisco
Config Interface DHCP server only WLAN
Config Interface DHCP server mixed WLAN and LAN
Fortigate
Same thing, you can configure in wifi interface but for ssid and key you have to connect fortiAP

Some of you may wonder how the client gets internet access. This is achieved using NAT, which we will configure in the next documentation.
Conclusion
IMO
- MikroTik offers high flexibility and extensive customization at a low cost, making it a powerful choice for advanced users. However, its complexity can be challenging for beginners.
- Cisco provides a robust and well-integrated networking platform. Its CLI allows real-time access to the running configuration, making it highly reliable for network management. While Cisco offers GUI tools, they are often additional products and not universally available, so the CLI remains the primary interface.
- FortiGate prioritizes security as a next-generation firewall, with features such as blocking ping requests by default to reduce attack surfaces. This security-first approach makes it ideal for environments where protection is paramount.
Each platform has strengths tailored to different networking needs: MikroTik excels in affordability and flexibility, Cisco in enterprise-grade stability and control, and FortiGate in advanced security. FortiGate’s GUI is generally more user-friendly and polished compared to MikroTik’s and Cisco’s interfaces.