MikroTik Security Best Practices
MikroTik RouterOS sits between WAN and LAN. As WAN is untrusted, we should follow MikroTik security best practices otherwise network may be compromised.
Most Relevant Content
How to Secure MikroTik RouterOS Login Users
MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.
- »
Hardening MikroTik RouterOS by Limiting Login Services | February 6, 2021
MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]
- »
MikroTik Router Static DHCP Server Configuration | October 25, 2015
DHCP Server assigns IP address and other related IP information (Subnet mask, Gateway and DNS) automatically to network devices. But automatic DHCP Server has some disadvantages too. If any IP device connects to any automatic DHCP network, the device will get an IP address and related IP information automatically by the DHCP Server and the device will start to use resources of this network. In this situation, the network administrator cannot know who is being connected to the network and [...]
- »
Ubuntu Server Set Static IP Address with Netplan | July 1, 2021
Ubuntu Server is one of the most popular open source sever operating systems. Ubuntu Server can be used in production without any hassle. In my previous article, I discussed how to install Ubuntu Server’s latest version (Ubuntu Server 20.04) with LVM. In this article, we are going to see how to assign static IP address in Ubuntu Server with Netplan network management tool. Netplan Since Ubuntu Server 17.10, Netplan is being used as the default network management tool instead of [...]
- »
FreeRADIUS User Group Management with MySQL | January 3, 2019
FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to [...]
- »
How to Separate MikroTik Hotspot and DHCP IP Pool | October 9, 2020
MikroTik default Hotspot Setup comes with a DHCP Server (which uses same IP Pool of Hotspot Server) to provide IP address and other network information to a connected device. Using this automatic IP address connected device can access Hotspot login page. After successfully login, a one to one NAT IP address is also assigned for the device and this process happens internally in Hotspot Server. User device cannot know this one to one NAT IP assigning. However, Hotspot Server actually [...]
- »
Enable F8 Menu to Enter Safe Mode in Windows 8 & 10 | August 27, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular operating system, it has a lot of viruses also. But windows provides various tools for removing these viruses. For removing any unwanted program, windows safe mode is a best option. A popular way to open windows safe mode is windows Advanced Boot Options. Advanced Boot Options provides different run levels for windows users so [...]
- »
Network Bandwidth and Throughput | February 17, 2017
Bandwidth and Throughput are two important basic networking terms in computer network. If you wish to be an expert network administrator, you must have better understanding about these two networking terms. As a network user, you should also have better understanding about network bandwidth and throughput so that you can get maximum output from your network service provider. In this article, I will explain about network bandwidth and throughput from very beginning. I hope, this article will enrich your networking [...]
- »
MikroTik VPN Configuration with Site-to-Site PPTP | February 19, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik PPTP is a popular client-server VPN service that provides a secure and encrypted link across public network. MikroTik PPTP can be applied in two methods. Connecting remote workstation/client: In this [...]
- »
How to Block a Phone from WiFi Router | May 8, 2024
We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]
You May Also Like