proxy server blocking by address

Most Relevant Content

  • How to Block Free Proxy Access with MikroTik Router

    Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this article, I will discuss simple tricks to block free web proxy access with MikroTik Router. Tricks to Block Web Proxy Server The default proxy server port is 3128 but 8080 port is also popularly used for proxy request. So, if we block 3128 and 8080 ports, 80% of free web proxy server can be blocked. As the proxy port can be changed as the system admin wish, some system admins use other free ports also, even 80 port. In this case, system admin can find the IP address of the popular proxy servers by searching online and block them manually. With these two methods, it is possible to block 99% of the free web proxy access. Method 1: Blocking Free [...]

    READ MORE »

  • More Similar Content

  • »

    MikroTik Router Web Proxy Configuration |   August 28, 2016

    A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]

    READ MORE »

  • You May Also Like

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    Block Internet Access at a Certain Time in MikroTik RouterOS |   August 1, 2024

    We often find how to block or allow internet access at a certain time in our LAN network specially in WiFi network. Time based internet access is so useful for controlling Kids internet in any family or managing stuff internet accessibility in any office or other network. MikroTik RouterOS offers a feature named Kid Control to block internet access at a certain time. This feature is so useful for the parents or network engineers who want to block internet access [...]

    READ MORE »

  • »

    MikroTik Hotspot Customized Login Template |   April 14, 2022

    MikroTik Hotspot is a popular service which is used to manage ISP, Hotel, Restaurant, Airport, and Public WiFi. Using billing application like GalaxyRAD with MikroTik Hotspot, a WiFi network can manage professionally. MikroTik Hotspot loads a login page for new user authentication. So, this login page is a vital source for promoting your brands. The default login template provided by MikroTik Hotspot is a simple template which cannot fulfill branding requirements. But it is possible to customize the login template [...]

    READ MORE »

  • »

    MikroTik SSTP VPN Server Configuration with Windows 10 |   April 27, 2020

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »

  • »

    MikroTik Load Balancing over Multiple Gateways (2 WAN) |   October 13, 2016

    Load Balancing is a technique used to send network traffic over multiple gateways. If you have multiple ISP connections in your network, you can send your network traffic through those ISP connections and can make a load balancing network. Accidently you may ask me, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? I will say, ask yourself deeply then you will find the reasons why multiple ISP connections is [...]

    READ MORE »

  • »

    Virtual Web Hosting with Apache on CentOS 7 (Name Based) |   July 15, 2019

    Virtual Hosting is a method of hosting multiple domains on single server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on a webserver, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based [...]

    READ MORE »

  • »

    How to Customize MikroTik Hotspot Login Page |   September 12, 2020

    MikroTik Hotspot is an awesome service that can be customized according to any organization need. MikroTik Hotspot is able to authenticate and authorize network users so easily. Besides premium Hotspot service, it can also be used as a public Hotspot network. Although public network is a free network service, it can be a better source of income by serving ads. As no user can get internet access without visiting Hotspot login page, the login page is main space for serving [...]

    READ MORE »