MikroTik Security Best Practices
MikroTik RouterOS sits between WAN and LAN. As WAN is untrusted, we should follow MikroTik security best practices otherwise network may be compromised.
Most Relevant Content
How to Secure MikroTik RouterOS Login Users
MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.
- »
Hardening MikroTik RouterOS by Limiting Login Services | February 6, 2021
MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]
- »
MikroTik RADIUS Server Setup with User Manager – RouterOS7 | August 4, 2022
MikroTik User Manager RADIUS Server is an awesome service for user Authentication, Authorization and Accounting (AAA) for a small or medium business. User Manager RADIUS Server can be used to maintain Hotspot, PPP, DHCP, IPsec, Wireless and System User authentication. In RouterOS 7, User Manager has come with new features and looking, specially, maintaining from Winbox. As User Mange package does not come with the default system package in RouterOS 7, we have to install User Manger package manually before [...]
- »
MikroTik Site to Site EoIP Tunnel with IPsec | March 21, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) tunnel that is used to create a site to site VPN. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]
- »
CentOS 8 Networking Configuration Using Cockpit Web Console | January 11, 2021
The first task after completing CentOS 8 fresh installation is to configure its networking so that it can be accessed from other network devices. In my previous article, I discussed how to install CentOS 8 Graphical User Interface (GNOME Desktop) with step by step screenshots. If you are a new CentOS 8 user and have not yet installed CentOS 8 on your server machine, feel free to follow that article and install CentOS 8 GNOME Desktop according to the article. [...]
- »
Computer Network Topology Outline | September 12, 2017
The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]
- »
MikroTik RouterOS User Authentication via RADIUS Server | November 19, 2017
MikroTik RouterOS has a strong local user database that is enough to manage a single MikroTik RouterOS user. But if your network has more than one MikroTik Routers, it is always better to use a RADIUS server to manage RouterOS user centrally. MikroTik User Manager RADIUS Server is a centralized user authentication and accounting application that gives the ISP Company or network administrator ability to manage not only RouterOS users but also PPP, Hotspot, DHCP and Wireless users. How to [...]
- »
MikroTik Hotspot with Data Limit and Prepaid Billing System | January 19, 2018
If you are a network administrator and want to establish a network that will have data limitation package with prepaid billing system, MikroTik Hotspot Server with MikroTik User Manager Radius Server will be your best solution. Because, MikroTik User Manager is a poplar Radius application that will give facility to manage user data package as well as prepaid billing system efficiently. On the other hand, MikroTik Hotspot is a popular service that will help to connect your network user without [...]
- »
MikroTik Block Website (Facebook, YouTube and Other Sites) | October 12, 2017
MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]
- »
MikroTik Multiple SSID with Separate LAN and DHCP Server | October 30, 2019
One of the most amazing features of MikroTik Wireless Router is creating Multiple SSID (Virtual AP) on a physical wireless interface. So, creating a Guest WiFi AP with separate LAN block, SSID and DHCP Server is so easy using MikroTik WiFi AP Router. In the previous article, I discussed how to configure MikroTik WiFi Access Point on physical wireless interface with DHCP Server using hAP Lite (RB941-2nD) Wireless Router. In this article I will discuss how to configure a Virtual [...]
You May Also Like