how to restrict all websites except one
Most Relevant Content
MikroTik Blocking All Websites Except a Few Websites
A few days ago, someone asked me how to block all websites except one with MikroTik Firewall. For this, I have decided to discuss about blocking all websites except someone’s whitelist. Unlike firewall devices, MikroTik Firewall by default allows all websites. So, if you need to block any website, you have to create a firewall rule that will block the specific website. Now if we want to block all websites and want to allow a few websites, we have to do reverse work that means we have to create a firewall rule that will block all websites and we have to create another firewall rule that will allow a group of websites through MikroTik Firewall. In this article, I will discuss how to block all websites except a few websites using MikroTik Firewall. MikroTik Firewall Rule to Block All Websites HTTP and HTTPS are responsible to view websites. HTTP works on TCP port 80 and HTTPS works on TCP port 443. So, to block all websites, we have to drop all requests on TCP port 80 and 443 trough MikroTik Firewall. The following steps will show how to drop all requests on TCP port 80 and 443 in MikroTik Firewall. [...]
- »
What Are the 7 Layers of OSI Model and How Do They Work | October 5, 2021
The OSI Model stands for Open Systems Interconnection Model, a conceptualized framework used to describe the seven layers of a telecommunication system or network. It was established as an international standard in the year 1984 by the International Organization for Standardization. This model helps visualize how networks operate and is still used today to figure out and solve network problems, such as by a web development company. In this article, we will talk about the 7 layers of the OSI [...]
- »
6 Best VPN Providers to Consider in 2022 | October 19, 2021
There are many VPN providers on the market. It can be difficult to know which one is best for you, but luckily we have compiled a list of six of the best! Get ready for our top picks. What is a VPN? A VPN, or virtual private network, hides and encodes your internet traffic so that you can surf the web more securely. By doing so, it protects your data from hackers and prying eyes. Think of a VPN as [...]
- »
The Role of Computer Networking in Modern Surveillance and Security | October 17, 2023
In the present computerized age, computer networking is significant in ensuring modern surveillance and security frameworks are viable and productive. The progressions in innovation have prompted the improvement of innovative arrangements, for example, solar power cameras, that depend on computer networks to upgrade surveillance capacities. This article investigates the role of computer networking in modern surveillance and security frameworks, with a particular spotlight on integrating solar-powered cameras. What is Computer Networking? A computer network gathers interconnected hubs or computing gadgets that [...]
- »
Linux Text Editor | September 7, 2017
Everything is file in Linux operating system. So, anyone who wants to work with Linux operating system (specially, Red Hat or CentOS) must learn how to edit files in Linux operating system. Because, it is always prefer to avoid graphical user interface (GUI) for changing system configuration parameters in Linux operating system unlike Windows operating system. You should be expert enough to edit any file in Red hat Linux operating system otherwise you will face a lot of difficulty to [...]
- »
MikroTik VRRP Configuration with DHCP Server | October 22, 2018
MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high available internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back [...]
- »
Install MikroTik RouterOS on PC | June 13, 2016
MikroTik is a popular and mostly used router worldwide because of having a lot of networking functionalities and its cheap price. If we buy a MikroTik Routerboard (like MikroTik Routerboard 450G, MikroTik Routerboard 1100 AH etc.), we will find a machine where MikroTik RouterOS is prebuilt but the machine contains limited processing resources such as limited RAM and limited processor core. So, our network could be slow if you use a MikroTik RouterBoard for maintaining a large network. On the [...]
- »
CentOS 8 Networking Configuration Using Cockpit Web Console | January 11, 2021
The first task after completing CentOS 8 fresh installation is to configure its networking so that it can be accessed from other network devices. In my previous article, I discussed how to install CentOS 8 Graphical User Interface (GNOME Desktop) with step by step screenshots. If you are a new CentOS 8 user and have not yet installed CentOS 8 on your server machine, feel free to follow that article and install CentOS 8 GNOME Desktop according to the article. [...]
- »
How to Use Old Router as Range Extender to Boost WiFi Signal | October 7, 2019
WiFi is a technology to turn wired internet into WiFi internet and used in every home and office. Wireless internet gives you the freedom to use the internet without sitting in a single place. It is also true that speed performance drop in Wi-fi due to weak signal or interference. Sometimes laying a physical wired connection in every room is not possible. So Wi-Fi range extender setup helps you to boost signal strength. Instead of buying a new range extender [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
You May Also Like