proxy server blocking with mikrotik

Most Relevant Content

  • How to Block Free Proxy Access with MikroTik Router

    Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this article, I will discuss simple tricks to block free web proxy access with MikroTik Router. Tricks to Block Web Proxy Server The default proxy server port is 3128 but 8080 port is also popularly used for proxy request. So, if we block 3128 and 8080 ports, 80% of free web proxy server can be blocked. As the proxy port can be changed as the system admin wish, some system admins use other free ports also, even 80 port. In this case, system admin can find the IP address of the popular proxy servers by searching online and block them manually. With these two methods, it is possible to block 99% of the free web proxy access. Method 1: Blocking Free [...]

    READ MORE »

  • More Similar Content

  • »

    MikroTik Router Web Proxy Configuration |   August 28, 2016

    A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Router Static DHCP Server Configuration |   October 25, 2015

    DHCP Server assigns IP address and other related IP information (Subnet mask, Gateway and DNS) automatically to network devices. But automatic DHCP Server has some disadvantages too. If any IP device connects to any automatic DHCP network, the device will get an IP address and related IP information automatically by the DHCP Server and the device will start to use resources of this network. In this situation, the network administrator cannot know who is being connected to the network and [...]

    READ MORE »

  • »

    MikroTik OpenVPN Configuration on TCP Port 443 with Windows OS |   April 6, 2020

    MikroTik OpenVPN is an amazing VPN solution. IT provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which are poorly designed and can easily be blocked, OpenVPN can highly be customized and even can be run on so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN is a site to site [...]

    READ MORE »

  • »

    MikroTik Hotspot Configuration with ECMP Load Balancing |   September 4, 2021

    MikroTik Hotspot is one of the most popular services in MikroTik RouterOS and day be day the demand of Hotspot service is increasing. MikroTik Hotspot can be used in any Airport, Hotel, Restaurant, Campus, Camp, Office or any ISP network. It is also possible to establish a WiFi Broadband Network with the MikroTik Hotspot service. How to configure MikroTik Hotspot was discussed in one of my previous articles. Although MikroTik Hotspot configuration is not so difficult but sometimes we face [...]

    READ MORE »

  • »

    How to Get Free SSL Certificate from ZeroSSL |   June 13, 2020

    SSL/TLS certificate is an essential part in today internet communication. Online communication cannot imagine without SSL/TLS certificate. SSL/TLS certificate makes online communication secure by encrypting data transmitted over public internet. So, most of the applications (Web, Email and VPN services) those transmit data over public internet use SSL/TLS certificate to secure communication. SSL/TLS certificate requires to be signed by Certificate Authority (CA). It is possible to create self-signed certificate with SSL certificate creation tools such as OpenSSL. Some router venders [...]

    READ MORE »

  • »

    How to Assign Static IP Address in Windows OS |   September 16, 2015

    Communication between one computer to another computer or server is established with IP addresses. Without IP address no communication is possible in computer network. An Internet Protocol (IP) Address is a numerical value or label assigned to each electronic device (e.g., computer, smartphone and printer) which uses Internet Protocol for communication. IP can be assigned both dynamically and statically on a IP devices. Dynamic IP is assigned by a DHCP server. If a DHCP server is present in a network, [...]

    READ MORE »

  • »

    CAPsMAN Channel Planning with Non-Overlapping Frequency |   March 16, 2020

    MikroTik CAPsMAN is an excellent application for managing multiple CAPs (Controlled Access Point) in a Wireless Network. But multiple APs create frequency overlapping issue if channels are not configured properly. Channel overlapping is required for smooth connection while roaming but there should not be frequency overlapping because frequency overlapping makes wireless performance so poor. In my previous article, I discussed MikroTik CAPsMAN basic configuration with default channel configuration. In this article, I will discuss how to configure CAPsMAN channel to [...]

    READ MORE »

  • »

    MikroTik Send Browsing Log to Remote Syslog Server |   August 18, 2019

    MikroTik RouterOS is capable of logging various system events as well as user browsing information. Logs can be saved in router’s memory (RAM), disk, file, sent by email or even sent to remote syslog server. Sometimes it may require saving user browsing log by the law. So, a syslog server is an essential part to any network. In this article, I will discuss how to configure MikroTik Router to keep user browsing log and send that log to remote syslog [...]

    READ MORE »

  • »

    How to Block a Phone from WiFi Router |   May 8, 2024

    We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]

    READ MORE »