proxy server blocking by address

Most Relevant Content

  • How to Block Free Proxy Access with MikroTik Router

    Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this article, I will discuss simple tricks to block free web proxy access with MikroTik Router. Tricks to Block Web Proxy Server The default proxy server port is 3128 but 8080 port is also popularly used for proxy request. So, if we block 3128 and 8080 ports, 80% of free web proxy server can be blocked. As the proxy port can be changed as the system admin wish, some system admins use other free ports also, even 80 port. In this case, system admin can find the IP address of the popular proxy servers by searching online and block them manually. With these two methods, it is possible to block 99% of the free web proxy access. Method 1: Blocking Free [...]

    READ MORE »

  • More Similar Content

  • »

    MikroTik Router Web Proxy Configuration |   August 28, 2016

    A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]

    READ MORE »

  • You May Also Like

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    How to Prevent Simultaneous User Login in MikroTik Hotspot |   November 10, 2020

    MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]

    READ MORE »

  • »

    7 Best WiFi Router Brands For Home Or Apartment |   September 18, 2021

    So, you are deciding to buy a WiFi Router for your home or apartment and finding which brand will be the best WiFi Router for your home. A lot of brands which manufacture WiFi Router for home usage are available nowadays in the market but all brands are not renowned and don’t provide best performance for home usage. So, before going to buy a WiFi Router, you should have better understanding about Best WiFi Router Brand that provides best WiFi [...]

    READ MORE »

  • »

    MikroTik HotSpot One to One NAT/Universal HotSpot NAT |   September 27, 2020

    MikroTik Hotspot is an awesome service that can be customized widely. When MikroTik Hotspot is enabled on an interface, it adds dynamic destination NAT rules which will redirect all HTTP and HTTPS requests from unauthorized users to the Hotspot authentication proxy. So, no user can get internet access in Hotspot network without authentication. MikroTik Hotspot also uses one to one NAT providing an IP address from selected IP Pool and this IP address handles user’s data and limitation. Sometimes we [...]

    READ MORE »

  • »

    MikroTik Site to Site VPN Configuration with IPsec |   March 8, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. Site to Site VPN technique establishes a secure tunnel between two routers across public network and local networks of these routers can send and receive data through this VPN tunnel. MikroTik RouterOS [...]

    READ MORE »

  • »

    FreeRADIUS Installation and Basic Configuration on CentOS 7 |   November 28, 2018

    FreeRADIUS is a modular, high performance and highly customizable open source RADIUS server. Anyone can use FreeRADIUS without any charge and can customize his RADIUS server according to his organizational requirements. In my previous article, I discussed how to install and configure user manager RADIUS server developed by MikroTik. The main disadvantage of user manager RADIUS server is ‘it is not customizable and not suitable for medium or large organization’. On the other hand, FreeRADIUS is giving facility to customize [...]

    READ MORE »

  • »

    MikroTik Hotspot Server Configuration in RouterOS 7 |   April 25, 2023

    MikroTik Hotspot is an awesome service to run a captive portal network. You can run a public Wi-Fi network, Hotel Network, Airport network, CAMP Wi-Fi network, Shopping Mall Network and so on using MikroTik Hotspot and even can monetize your network for earning if you use Hotspot Billing Software like GalaxyRAD which is specially designed for MikroTik Hotspot network. GalaxyRAD helps to monetize your any network providing online payment gateway as well as integrating voucher-based system. It also helps to [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »