blocking vpn access
Most Relevant Content
How to Block VPN Access with MikroTik Router
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so easy. You should be expert enough to block VPN application. In this article, I will discuss a simple trick to block VPN applications with MikroTik Firewall. Trick to Block VPN Applications (VPN Servers) When any user installs and enables VPN application, it creates a tunnel between user computer and the VPN server. The user PC is now treated as a PC of the VPN network. So, any firewall rule applied on the user IP, does not work anymore. In a VPN enabled PC, if we find public IP address of our network with any online tools such as whatismyipaddress.com, we will find the VPN server IP instead of our MikroTik public IP. Now if we block that VPN server IP [...]
- »
How to Block Free Proxy Access with MikroTik Router | May 21, 2019
Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
- »
How to Secure MikroTik RouterOS Login Users | February 19, 2021
MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.
- »
MikroTik OpenVPN Configuration on TCP Port 443 with Windows OS | April 6, 2020
MikroTik OpenVPN is an amazing VPN solution. IT provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which are poorly designed and can easily be blocked, OpenVPN can highly be customized and even can be run on so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN is a site to site [...]
- »
MikroTik Multiple SSID with Separate LAN and DHCP Server | October 30, 2019
One of the most amazing features of MikroTik Wireless Router is creating Multiple SSID (Virtual AP) on a physical wireless interface. So, creating a Guest WiFi AP with separate LAN block, SSID and DHCP Server is so easy using MikroTik WiFi AP Router. In the previous article, I discussed how to configure MikroTik WiFi Access Point on physical wireless interface with DHCP Server using hAP Lite (RB941-2nD) Wireless Router. In this article I will discuss how to configure a Virtual [...]
- »
HTTP vs. HTTPS: The Impact Of Using SSL Certificates | November 29, 2021
Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra “S” at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]
- »
MikroTik DHCP Server Configuration with Radius Server | January 24, 2018
The Dynamic Host Configuration Protocol (DHCP) is a client-server protocol that is used to assign an IP address and other network configuration parameters dynamically to each device on a network so that they can communicate with other IP networks. DHCP Server is popularly used in an Enterprise Office Network because in an office network various types of IP devices such as Laptop, Desktop, Tablet, Smartphone, IP Phone and so on are maintained and almost all IP devices support DHCP. An ISP Network can also be [...]
- »
How to Properly Downgrade MikroTik RouterOS and Firmware | October 2, 2019
MikroTik RouterOS is in constant development and new features or bug fixes are frequently available, sometimes even monthly. So, it is always recommend upgrading MikroTik RouterOS to a latest and stable version before beginning any configuration. But sometimes you may face that the upgraded version is not working properly according to your demand or you may upgrade to a new version that you don’t want. In this case, you should come back to your workable RouterOS version and firmware. Upgrading RouterOS [...]
- »
Enable F8 Menu to Enter Safe Mode in Windows 8 & 10 | August 27, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular operating system, it has a lot of viruses also. But windows provides various tools for removing these viruses. For removing any unwanted program, windows safe mode is a best option. A popular way to open windows safe mode is windows Advanced Boot Options. Advanced Boot Options provides different run levels for windows users so [...]
More Similar Content
You May Also Like