MikroTik Block Website (Facebook, YouTube and Other Sites)
MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how to implement MikroTik Firewall Rule etc. was discussed in my previous article. If you feel that you need the basic concept of MikroTik Firewall, feel free to spend time to study that article. In this article, I am only going to show how to block unwanted websites using MikroTik Firewall Rules. How MikroTik Firewall Blocks Websites MikroTik Firewall blocks website using Filter Rule. A MikroTik Filter Rule has two parts. Conditional part which takes various conditional properties such as Chain, Source Address, Destination Address, Protocol, Source Port, Destination Port, Layer7 Protocol etc. to match conditions. Action part which takes only drop action to block any website. If conditional part of a Filter Rule is matched, MikroTik Firewall will drop that [...]
- »
MikroTik Firewall Basic Concept | October 6, 2017
MikroTik Firewall functions as a network security tool for preventing unauthorized access to networks as well as provides Network Address Translation functionality. So, a network administrator who is using MikroTik Router in his network cannot go a single day without MikroTik Firewall. Actually, the main duty of a MikroTik administrator is to maintain Firewall properly along with Bandwidth management after completing MikroTik Router basic configuration. So, a MikroTik administrator should have enough knowledge on MikroTik Firewall and so this article [...]
- »
- »
User Management in Linux (Red Hat/CentOS) | September 28, 2017
User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]
- »
MikroTik VLAN and Bridge Configuration | September 19, 2017
VLAN and Bridge are two useful features in MikroTik Router. These two features are frequently used in any MikroTik network configuration. VLAN divides a physical interface into multiple logical interfaces. So, you can isolate your network into multiple logical networks on a physical interface. On other hand, MikroTik Bridge integrates multiple physical interfaces in a logical interface. So, you can extend your broadcast domain on multiple physical interfaces and can extend your popular services such as PPPoE or DHCP on [...]
- »
Computer Network Topology Outline | September 12, 2017
The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]
- »
Linux Text Editor | September 7, 2017
Everything is file in Linux operating system. So, anyone who wants to work with Linux operating system (specially, Red Hat or CentOS) must learn how to edit files in Linux operating system. Because, it is always prefer to avoid graphical user interface (GUI) for changing system configuration parameters in Linux operating system unlike Windows operating system. You should be expert enough to edit any file in Red hat Linux operating system otherwise you will face a lot of difficulty to [...]
- »
Red Hat/CentOS Network Configuration | August 4, 2017
Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]
- »
Getting Started with Red Hat Linux | May 20, 2017
Red Hat Linux is an open source server operating system. Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]
- »
Red Hat/CentOS 7 Linux Installation (Minimal Packages) | April 18, 2017
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally [...]
- »
MikroTik Hotspot Customization | April 5, 2017
Hotspot is one of the most popular services in MikroTik router. MikroTik Hotspot Gateway is a policy to authorize network clients before to access local network resources as well as public network resources through MikroTik router. In a Hotspot network, the user can login or authenticate using almost any web browser, so there is no need to install any additional software to client end. As Hotspot login prompt is a webpage, Hotspot service can effectively be used as an advertising medium of [...]