block all websites except a few
Most Relevant Content
MikroTik Blocking All Websites Except a Few Websites
A few days ago, someone asked me how to block all websites except one with MikroTik Firewall. For this, I have decided to discuss about blocking all websites except someone’s whitelist. Unlike firewall devices, MikroTik Firewall by default allows all websites. So, if you need to block any website, you have to create a firewall rule that will block the specific website. Now if we want to block all websites and want to allow a few websites, we have to do reverse work that means we have to create a firewall rule that will block all websites and we have to create another firewall rule that will allow a group of websites through MikroTik Firewall. In this article, I will discuss how to block all websites except a few websites using MikroTik Firewall. MikroTik Firewall Rule to Block All Websites HTTP and HTTPS are responsible to view websites. HTTP works on TCP port 80 and HTTPS works on TCP port 443. So, to block all websites, we have to drop all requests on TCP port 80 and 443 trough MikroTik Firewall. The following steps will show how to drop all requests on TCP port 80 and 443 in MikroTik Firewall. [...]
- »
MikroTik Hotspot HTTPS Redirect and HTTPS Login Setup | May 24, 2020
MikroTik Hotspot is one of the most popular services in MikroTik Router. It is a policy to authorize network clients before to access local network resources as well as public network resources through MikroTik Router. In my previous article I discussed MikroTik Hotspot Configuration using Winbox. But default MikroTik Hotspot configuration faces HTTPS Redirect and HTTPS Login issues. To solve these issues, MikroTik Hotspot HTTPS configuration is required. So, in this article I will discuss how to configure MikroTik Hotspot [...]
- »
MikroTik Load Balancing over Multiple Gateways (2 WAN) | October 13, 2016
Load Balancing is a technique used to send network traffic over multiple gateways. If you have multiple ISP connections in your network, you can send your network traffic through those ISP connections and can make a load balancing network. Accidently you may ask me, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? I will say, ask yourself deeply then you will find the reasons why multiple ISP connections is [...]
- »
MikroTik Load Balancing with 2 PPPoE and 1 Static WAN using ECMP | September 24, 2019
ECMP provides almost 100% reliable load balancing and link redundancy solution. ECMP is a per connection load balancing where connection is marked with source and destination IP pair. In my previous article I discussed how to configure DUAL WAN load balancing with failover using ECMP method where WAN connections were static IP Addresses. But some ISP companies use PPPoE service for their client connection. So, some network administrators become confused to configure load balancing with PPPoE WAN connection because PPPoE [...]
- »
MikroTik DNS Client and Caching DNS Server Configuration | April 7, 2019
Domain Name Server (DNS) is an essential part in a computer network. Today web communication cannot imagine without DNS. DNS is a client server protocol where DNS Client requests for the domain name resolution and DNS Server response on it. MikroTik Router has both DNS Client and DNS Server features. The DNS Client is used to resolve domain name to IP address from a DNS Server. On the other hand, the DNS Server feature provides domain name resolution for the [...]
- »
MikroTik HotSpot One to One NAT/Universal HotSpot NAT | September 27, 2020
MikroTik Hotspot is an awesome service that can be customized widely. When MikroTik Hotspot is enabled on an interface, it adds dynamic destination NAT rules which will redirect all HTTP and HTTPS requests from unauthorized users to the Hotspot authentication proxy. So, no user can get internet access in Hotspot network without authentication. MikroTik Hotspot also uses one to one NAT providing an IP address from selected IP Pool and this IP address handles user’s data and limitation. Sometimes we [...]
- »
How to Recover MikroTik User Password | August 9, 2018
MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]
- »
Firewalld Installation and Configuration in Ubuntu Server | May 5, 2022
Firewalld is an awesome host based firewall management tool for Linux Operating System. Firewalld has developed on Fedora but it is now available for almost all Linux distributions. So, Firewalld can be installed in Ubuntu Server although Ubuntu Server has UFW as the default firewall system. Firewalld is more robust and easy to maintain than UFW, I think. So, I am going to discuss how to install and configure Firewalld in Ubuntu Server. Installing Firewalld in Ubuntu Server By default [...]
- »
How to Block WiFi Access although Password is Known | April 23, 2024
We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]
- »
Getting Started with Red Hat Linux | May 20, 2017
Red Hat Linux is an open source server operating system. Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]
More Similar Content
You May Also Like