block hotspot shield mikrotik
Most Relevant Content
How to Block VPN Access with MikroTik Router
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so easy. You should be expert enough to block VPN application. In this article, I will discuss a simple trick to block VPN applications with MikroTik Firewall. Trick to Block VPN Applications (VPN Servers) When any user installs and enables VPN application, it creates a tunnel between user computer and the VPN server. The user PC is now treated as a PC of the VPN network. So, any firewall rule applied on the user IP, does not work anymore. In a VPN enabled PC, if we find public IP address of our network with any online tools such as whatismyipaddress.com, we will find the VPN server IP instead of our MikroTik public IP. Now if we block that VPN server IP [...]
- »
CentOS 7 Partition Management with fdisk Utility | February 11, 2019
CentOS or Red Hat Linux is a popular server operating system to the system administrators. Almost all the system admins or IT guys who play with mail server, file server, proxy server and so on are so known with CentOS or Red Hat Linux and cannot go a single day without this operating system. The guys who are also wish to be a system admin should be familiar with CentOS or Red Hat operating system. In my previous article, I [...]
- »
MikroTik Backup and Restore Configuration using Winbox | July 31, 2018
Backup and Restore feature in MikroTik Router helps to recover router configuration when running router fails to operation due to hardware failure. If you have a backup copy of your failed router and purchase a new MikroTik Router and then upload and restore that backup file, you will get your running network without any hassle. MikroTik Backup file is also useful when you unfortunately forget your admin privilege user password. You can easily recover your forgotten password with backup file [...]
- »
MikroTik WiFi Frequency Band and Channel Width Explanation | January 10, 2020
MikroTik WiFi frequency, band and channel width tuning is an important task in any wireless network. If we fail to setup WiFi frequency and channel width parameter properly, we will notice a poor performance of wireless network. WiFi is aimed at use within unlicensed spectrum and the unlicensed spectrum that is usually used for WiFi is 2.4 GHz and 5 GHz band. 2.4 GHz and 5 GHz bands have multiple channels and these channels must be setup properly to get [...]
- »
Why ISPs Should Embrace TR-069 ACS to Stay Ahead of Competitors | May 22, 2023
As the telecommunications industry becomes more competitive, local ISPs need to find ways to stay ahead of larger telcos and offer services that meet the changing demands of their customers. One of the solutions to this challenge is to implement TR-069 ACS server to help streamline network management, reduce costs, and increase efficiency. In this article, we’ll explore why the TR-069 ACS server is essential for medium-sized ISPs to stay competitive in today’s market. We’ll examine the challenges these ISPs [...]
- »
Red Hat/CentOS Network Configuration | August 4, 2017
Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]
- »
MikroTik Site to Site VPN Configuration with IPsec | March 8, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. Site to Site VPN technique establishes a secure tunnel between two routers across public network and local networks of these routers can send and receive data through this VPN tunnel. MikroTik RouterOS [...]
- »
MikroTik Load Balancing and Link Redundancy with PBR | March 31, 2019
In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% [...]
- »
Ubuntu Server 20.04 Installation with LVM | May 28, 2021
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Ubuntu is one of the best stable Linux distributions. Ubuntu has both Desktop and Server distribution. Ubuntu Server is a high performance and stable enterprise Linux distribution and it can be easily used in production. Ubuntu Server has both community-support and well documentation. So, IT guys can use Ubuntu [...]
- »
MikroTik Site to Site EoIP Tunnel with IPsec | March 21, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) tunnel that is used to create a site to site VPN. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]
You May Also Like