mikrotik traffic monitor
Most Relevant Content
MikroTik Bandwidth and Resource Monitoring with Graphs
“Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and simple queues as well as for resource usage (CPU, RAM and Disk usage). MikroTik Graphing method first records bandwidth or resource usage information on memory or on the device’s storage with a time basis and then displays this information in an easy to read graph that can be printed or the web link can be given to a client for his or her own inspect ion. But before getting these graphs available in your Winbox or web interface, you must first configure MikroTik Graphing properly. In this article, I will explain how to configure MikroTik Graphing for recording MikroTik bandwidth and resource usage information and displaying recorded information in an easy to read graph through Winbox or the web interface. [...]
- »
Troubleshooting Common Issues with Security Cameras in MikroTik Networks | February 7, 2025
30 Seconds Summary When fixing security cameras on MikroTik networks, you might see issues like bad video quality, connections dropping, motion detection not working, and security weaknesses. These problems can happen because of not enough internet speed, network congestion, IP conflicts, old software, or weak security. To fix these, make sure you have enough internet speed, set up the IP settings correctly, give camera traffic priority, and update the software regularly. Also, protect the cameras with strong passwords and encryption. [...]
- »
System Restore in Windows 10 | August 30, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]
- »
MikroTik Hardware Redundancy with VRRP | October 8, 2018
MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high availability internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back [...]
- »
OpenVPN Configuration over Port 443 on Ubuntu Linux | June 20, 2022
OpenVPN provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which can be blocked, OpenVPN can highly be customized and even can be run over so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN Server can easily install on Ubuntu Server. Installing OpenVPN Server on Ubuntu Server, we can connect Windows, [...]
- »
MikroTik User Management (RouterOS User) | October 22, 2017
MikroTik User Management plays an important role in MikroTik system administration as well as MikroTik security. Don’t be confused the title User Management with the MikroTik UserManager. UserManager is an optional and totally separate package distributed by MikroTik. UserManager is an implementation of Radius server that is used to maintain not only RouterOS users but also PPPoE, PPTP, Hotspot, Wireless and DHCP users. In my few future articles, I will discuss how to maintain these users with MikroTik UserManager Radius [...]
- »
MikroTik IPIP Tunnel with IPsec (Site to Site VPN) | March 18, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]
- »
Block Internet Access at a Certain Time in MikroTik RouterOS | August 1, 2024
We often find how to block or allow internet access at a certain time in our LAN network specially in WiFi network. Time based internet access is so useful for controlling Kids internet in any family or managing stuff internet accessibility in any office or other network. MikroTik RouterOS offers a feature named Kid Control to block internet access at a certain time. This feature is so useful for the parents or network engineers who want to block internet access [...]
- »
How to Get Free SSL Certificate from ZeroSSL | June 13, 2020
SSL/TLS certificate is an essential part in today internet communication. Online communication cannot imagine without SSL/TLS certificate. SSL/TLS certificate makes online communication secure by encrypting data transmitted over public internet. So, most of the applications (Web, Email and VPN services) those transmit data over public internet use SSL/TLS certificate to secure communication. SSL/TLS certificate requires to be signed by Certificate Authority (CA). It is possible to create self-signed certificate with SSL certificate creation tools such as OpenSSL. Some router venders [...]
- »
Managing Disk Partition with the parted Tool in CentOS 7 | March 2, 2019
As a system administrator, sometimes you may require to manage partitions of your CentOS/Red Hat Linux Operating System. Partition management is always a risky task. But there are some useful tools those are so helpful to manage CentOS/Red Hat Linux disk partition easily. In my previous article, I discussed how to manage CentOS/Red Hat 7 HDD partitions with the fdisk utility. The fdisk tool is only eligible to manage MBR partition table. But GPT partition table is now becoming more [...]
More Similar Content
You May Also Like