blocking vpn access
Most Relevant Content
How to Block VPN Access with MikroTik Router
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so easy. You should be expert enough to block VPN application. In this article, I will discuss a simple trick to block VPN applications with MikroTik Firewall. Trick to Block VPN Applications (VPN Servers) When any user installs and enables VPN application, it creates a tunnel between user computer and the VPN server. The user PC is now treated as a PC of the VPN network. So, any firewall rule applied on the user IP, does not work anymore. In a VPN enabled PC, if we find public IP address of our network with any online tools such as whatismyipaddress.com, we will find the VPN server IP instead of our MikroTik public IP. Now if we block that VPN server IP [...]
- »
How to Block Free Proxy Access with MikroTik Router | May 21, 2019
Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
- »
6 Best VPN Providers to Consider in 2022 | October 19, 2021
There are many VPN providers on the market. It can be difficult to know which one is best for you, but luckily we have compiled a list of six of the best! Get ready for our top picks. What is a VPN? A VPN, or virtual private network, hides and encodes your internet traffic so that you can surf the web more securely. By doing so, it protects your data from hackers and prying eyes. Think of a VPN as [...]
- »
MikroTik Multiple SSID with Separate LAN and DHCP Server | October 30, 2019
One of the most amazing features of MikroTik Wireless Router is creating Multiple SSID (Virtual AP) on a physical wireless interface. So, creating a Guest WiFi AP with separate LAN block, SSID and DHCP Server is so easy using MikroTik WiFi AP Router. In the previous article, I discussed how to configure MikroTik WiFi Access Point on physical wireless interface with DHCP Server using hAP Lite (RB941-2nD) Wireless Router. In this article I will discuss how to configure a Virtual [...]
- »
MikroTik SSTP VPN Server Configuration with Windows 10 | April 27, 2020
VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]
- »
MikroTik WiFi MAC Authentication with UserMan RADIUS Server | December 23, 2019
MikroTik Wireless Router is popularly used as WiFi AP. MikroTik WiFi AP has a lot of features to tune WiFi network as your requirements. MAC authentication is one the amazing and useful features in MikroTik WiFi. MAC authentication enables filtering MAC address that means no MAC can be able to connect to WiFi AP without authentication. MAC authentication can be done either local database or RADIUS Server. MAC authentication with RADIUS Server provides facility to manage multiple APs from centralized [...]
- »
Ubuntu Server 20.04 Installation with LVM | May 28, 2021
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Ubuntu is one of the best stable Linux distributions. Ubuntu has both Desktop and Server distribution. Ubuntu Server is a high performance and stable enterprise Linux distribution and it can be easily used in production. Ubuntu Server has both community-support and well documentation. So, IT guys can use Ubuntu [...]
- »
MikroTik Configuration with PPPoE WAN Connection | July 18, 2018
MikroTik Router is a popular routing device to any network administrator because of having a lot of network features availability. MikroTik PPPoE Client is a special feature that is used to connect any PPPoE Server. If your ISP provides PPPoE connection, MikroTik Router is able to connect that PPPoE Server using PPPoE Client. In my previous article, I discussed how to configure MikroTik Router with static WAN connection and in this article I will show how to configure MikroTik Router [...]
- »
How to Create Free SSL/TLS Certificate with OpenSSL | July 23, 2021
SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]
More Similar Content
You May Also Like