block all websites except some

Most Relevant Content

  • MikroTik Blocking All Websites Except a Few Websites

    A few days ago, someone asked me how to block all websites except one with MikroTik Firewall. For this, I have decided to discuss about blocking all websites except someone’s whitelist. Unlike firewall devices, MikroTik Firewall by default allows all websites. So, if you need to block any website, you have to create a firewall rule that will block the specific website. Now if we want to block all websites and want to allow a few websites, we have to do reverse work that means we have to create a firewall rule that will block all websites and we have to create another firewall rule that will allow a group of websites through MikroTik Firewall. In this article, I will discuss how to block all websites except a few websites using MikroTik Firewall. MikroTik Firewall Rule to Block All Websites HTTP and HTTPS are responsible to view websites. HTTP works on TCP port 80 and HTTPS works on TCP port 443. So, to block all websites, we have to drop all requests on TCP port 80 and 443 trough MikroTik Firewall. The following steps will show how to drop all requests on TCP port 80 and 443 in MikroTik Firewall. [...]

    READ MORE »

  • More Similar Content

  • »

    MikroTik Hotspot HTTPS Redirect and HTTPS Login Setup |   May 24, 2020

    MikroTik Hotspot is one of the most popular services in MikroTik Router. It is a policy to authorize network clients before to access local network resources as well as public network resources through MikroTik Router. In my previous article I discussed MikroTik Hotspot Configuration using Winbox. But default MikroTik Hotspot configuration faces HTTPS Redirect and HTTPS Login issues. To solve these issues, MikroTik Hotspot HTTPS configuration is required. So, in this article I will discuss how to configure MikroTik Hotspot [...]

    READ MORE »

  • You May Also Like

  • »

    The Role of Computer Networking in Modern Surveillance and Security |   October 17, 2023

    In the present computerized age, computer networking is significant in ensuring modern surveillance and security frameworks are viable and productive. The progressions in innovation have prompted the improvement of innovative arrangements, for example, solar power cameras, that depend on computer networks to upgrade surveillance capacities. This article investigates the role of computer networking in modern surveillance and security frameworks, with a particular spotlight on integrating solar-powered cameras. What is Computer Networking? A computer network gathers interconnected hubs or computing gadgets that [...]

    READ MORE »

  • »

    CentOS 7 Network Configuration Using nmtui Tool |   August 27, 2018

    After completing CentOS 7 fresh installation, the first task to a system administrator is to configure its network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7.5 GUI (GNOME Desktop) step by step. If you are a new CentOS 7 user and yet you have not installed CentOS 7.5 on your server machine, feel free to study my previous article and install CentOS 7.5 GNOME Desktop according to that [...]

    READ MORE »

  • »

    Red Hat/CentOS Network Configuration |   August 4, 2017

    Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]

    READ MORE »

  • »

    LVM Management in CentOS/Red Hat 7 Linux |   March 15, 2019

    LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and [...]

    READ MORE »

  • »

    MikroTik SSTP VPN Server Configuration with Windows 10 |   April 27, 2020

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]

    READ MORE »

  • »

    Reset Mozilla Firefox to Default Settings |   August 26, 2015

    Mozilla Firefox is a free and open source web browser developed Mozilla Corporation. Mozilla Firefox is available for most of the popular operating system like Windows, macOS and Linux operating system. It is also a default web browser in Linux operating system. Mozilla Firefox is a popular web browser to any online user. It is said that no online user can go a single day without this Browser. I am also a fan of Mozilla Firefox browser and using this [...]

    READ MORE »

  • »

    MikroTik Site to Site VPN Configuration with IPsec |   March 8, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. Site to Site VPN technique establishes a secure tunnel between two routers across public network and local networks of these routers can send and receive data through this VPN tunnel. MikroTik RouterOS [...]

    READ MORE »

  • »

    Restrict Internet Access Based on MAC Address in MikroTik |   February 4, 2017

    MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]

    READ MORE »