mikrotuk unauthorized access prevent
Most Relevant Content
Single IP NAT Strategy in MikroTik RouterOS 7
MikroTik Router has a lot of features which help to customize network as our requirement. Sometimes, it may be our requirement that we need to allow internet access on per IP. Normally, when we apply masquerade NAT rule in our MikroTik Router, all private IPs will be masqueraded or a network block will be masqueraded. If we do normal masqurade and enable a DHCP Server in our network, we may face a lot of unauthorized access in our network. Because when a user will be connected in our network, he/she will get internet information (IP, Subnet mask, Gateway and DNS) by DHCP Server and can access internet through our MikroTik Router. So, an unauthorized user can consume our paid bandwidth. Usually we don’t want that any user can access internet through our MikroTik Router without our permission. If we want to prevent unauthorized access in our network, we have to apply a strategy named Single IP NAT Strategy. Single IP NAT strategy will help us to control unauthorized access to our network. If you apply single IP NAT strategy, no IP device can get internet access through our Router until we allow that IP. Single IP NAT Strategy Single IP [...]
- »
LVM Management in CentOS/Red Hat 7 Linux | March 15, 2019
LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and [...]
- »
MikroTik Site to Site SSTP VPN Setup with RouterOS Client | May 14, 2020
VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]
- »
Create System Restore Point in Windows OS | August 27, 2015
System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect [...]
- »
How to Use Old Router as Range Extender to Boost WiFi Signal | October 7, 2019
WiFi is a technology to turn wired internet into WiFi internet and used in every home and office. Wireless internet gives you the freedom to use the internet without sitting in a single place. It is also true that speed performance drop in Wi-fi due to weak signal or interference. Sometimes laying a physical wired connection in every room is not possible. So Wi-Fi range extender setup helps you to boost signal strength. Instead of buying a new range extender [...]
- »
MikroTik Hotspot with Data Limit and Prepaid Billing System | January 19, 2018
If you are a network administrator and want to establish a network that will have data limitation package with prepaid billing system, MikroTik Hotspot Server with MikroTik User Manager Radius Server will be your best solution. Because, MikroTik User Manager is a poplar Radius application that will give facility to manage user data package as well as prepaid billing system efficiently. On the other hand, MikroTik Hotspot is a popular service that will help to connect your network user without [...]
- »
How to Prevent Simultaneous User Login in MikroTik Hotspot | November 10, 2020
MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]
- »
Free Internet Speed Test Online | August 31, 2015
You are here because you want to check your broadband internet speed. Don’t worry, I will show you how to check your internet speed from online absolutely free and fastest way. I will show you top 4 websites link from which your broadband internet speed can be checked so easily. I will also show you how to check bandwidth usage continuously with windows operating system’s utility and a third party software utility. So, keep reading this article and find how [...]
- »
FreeRADIUS Installation and Basic Configuration on CentOS 7 | November 28, 2018
FreeRADIUS is a modular, high performance and highly customizable open source RADIUS server. Anyone can use FreeRADIUS without any charge and can customize his RADIUS server according to his organizational requirements. In my previous article, I discussed how to install and configure user manager RADIUS server developed by MikroTik. The main disadvantage of user manager RADIUS server is ‘it is not customizable and not suitable for medium or large organization’. On the other hand, FreeRADIUS is giving facility to customize [...]
- »
MikroTik Load Balancing over Multiple Gateways (2 WAN) | October 13, 2016
Load Balancing is a technique used to send network traffic over multiple gateways. If you have multiple ISP connections in your network, you can send your network traffic through those ISP connections and can make a load balancing network. Accidently you may ask me, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? I will say, ask yourself deeply then you will find the reasons why multiple ISP connections is [...]
You May Also Like