mikrotik traffic monitoring tools
Most Relevant Content
MikroTik Bandwidth and Resource Monitoring with Graphs
“Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and simple queues as well as for resource usage (CPU, RAM and Disk usage). MikroTik Graphing method first records bandwidth or resource usage information on memory or on the device’s storage with a time basis and then displays this information in an easy to read graph that can be printed or the web link can be given to a client for his or her own inspect ion. But before getting these graphs available in your Winbox or web interface, you must first configure MikroTik Graphing properly. In this article, I will explain how to configure MikroTik Graphing for recording MikroTik bandwidth and resource usage information and displaying recorded information in an easy to read graph through Winbox or the web interface. [...]
- »
Troubleshooting Common Issues with Security Cameras in MikroTik Networks | February 7, 2025
30 Seconds Summary When fixing security cameras on MikroTik networks, you might see issues like bad video quality, connections dropping, motion detection not working, and security weaknesses. These problems can happen because of not enough internet speed, network congestion, IP conflicts, old software, or weak security. To fix these, make sure you have enough internet speed, set up the IP settings correctly, give camera traffic priority, and update the software regularly. Also, protect the cameras with strong passwords and encryption. [...]
- »
HTTP vs. HTTPS: The Impact Of Using SSL Certificates | November 29, 2021
Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra “S” at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]
- »
MikroTik Blocking Websites with TLS Host Firewall Matcher | April 29, 2019
Most of the websites now use https and blocking https websites is so much harder with the MikroTik RouterOS version less than 6.41. But from RouterOS v6.41, MikroTik Firewall introduces a new property named TLS Host that is capable to match https websites so easily. So, blocking https websites like Facebook, YouTube etc. can be easily done with MikroTik Router if RouterOS version is greater than 6.41. In my previous article, I discussed how to block websites with MikroTik Router [...]
- »
MikroTik Router Auto Backup via Email | August 23, 2016
MikroTik Router is popularly used not only in ISP network but also in enterprise office network. So, MikroTik is a popular item to network administrator. A regular task of a network administrator is to keep and store router configuration file backup. Almost every network administrator takes configuration file backup manually. But MikroTik Router has an E-mail tool by which network administrators can automate configuration file backup regularly via email and can reduce his daily manual task easily. E-mail tool is [...]
- »
CAPsMAN Channel Planning with Non-Overlapping Frequency | March 16, 2020
MikroTik CAPsMAN is an excellent application for managing multiple CAPs (Controlled Access Point) in a Wireless Network. But multiple APs create frequency overlapping issue if channels are not configured properly. Channel overlapping is required for smooth connection while roaming but there should not be frequency overlapping because frequency overlapping makes wireless performance so poor. In my previous article, I discussed MikroTik CAPsMAN basic configuration with default channel configuration. In this article, I will discuss how to configure CAPsMAN channel to [...]
- »
Create System Restore Point in Windows OS | August 27, 2015
System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect [...]
- »
Hard Disk Partitioning in Windows 7, 8 & 10 | August 26, 2015
Windows is the most popular operating system in the world. Any computer user cannot go a single day without windows operating system. Even, I am writing this article on a windows operating system and you are also reading this article on any windows operating system, I think. Windows provides a lot of features or utilities for its user so that they can maintain their operating system so easily. Disk Management is such a built-in powerful utility in windows operating system which [...]
- »
MikroTik Hotspot Configuration with ECMP Load Balancing | September 4, 2021
MikroTik Hotspot is one of the most popular services in MikroTik RouterOS and day be day the demand of Hotspot service is increasing. MikroTik Hotspot can be used in any Airport, Hotel, Restaurant, Campus, Camp, Office or any ISP network. It is also possible to establish a WiFi Broadband Network with the MikroTik Hotspot service. How to configure MikroTik Hotspot was discussed in one of my previous articles. Although MikroTik Hotspot configuration is not so difficult but sometimes we face [...]
- »
Single IP NAT Strategy in MikroTik RouterOS 7 | September 29, 2015
MikroTik Router has a lot of features which help to customize network as our requirement. Sometimes, it may be our requirement that we need to allow internet access on per IP. Normally, when we apply masquerade NAT rule in our MikroTik Router, all private IPs will be masqueraded or a network block will be masqueraded. If we do normal masqurade and enable a DHCP Server in our network, we may face a lot of unauthorized access in our network. Because [...]
More Similar Content
You May Also Like