single IP internet strategy

Most Relevant Content

  • Single IP NAT Strategy in MikroTik RouterOS 7

    MikroTik Router has a lot of features which help to customize network as our requirement. Sometimes, it may be our requirement that we need to allow internet access on per IP. Normally, when we apply masquerade NAT rule in our MikroTik Router, all private IPs will be masqueraded or a network block will be masqueraded. If we do normal masqurade and enable a DHCP Server in our network, we may face a lot of unauthorized access in our network. Because when a user will be connected in our network, he/she will get internet information (IP, Subnet mask, Gateway and DNS) by DHCP Server and can access internet through our MikroTik Router. So, an unauthorized user can consume our paid bandwidth. Usually we don’t want that any user can access internet through our MikroTik Router without our permission. If we want to prevent unauthorized access in our network, we have to apply a strategy named Single IP NAT Strategy. Single IP NAT strategy will help us to control unauthorized access to our network. If you apply single IP NAT strategy, no IP device can get internet access through our Router until we allow that IP. Single IP NAT Strategy Single IP [...]

    READ MORE »

  • More Similar Content

  • »

    Restrict Internet Access Based on MAC Address in MikroTik |   February 4, 2017

    MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]

    READ MORE »

  • You May Also Like

  • »

    How to Prevent Simultaneous User Login in MikroTik Hotspot |   November 10, 2020

    MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]

    READ MORE »

  • »

    MikroTik Configuration with PPPoE WAN Connection |   July 18, 2018

    MikroTik Router is a popular routing device to any network administrator because of having a lot of network features availability. MikroTik PPPoE Client is a special feature that is used to connect any PPPoE Server. If your ISP provides PPPoE connection, MikroTik Router is able to connect that PPPoE Server using PPPoE Client. In my previous article, I discussed how to configure MikroTik Router with static WAN connection and in this article I will show how to configure MikroTik Router [...]

    READ MORE »

  • »

    DHCP Server Configuration in MikroTik RouterOS 7 |   October 14, 2015

    Dynamic Host Configuration Protocol (DHCP) is a client/server protocol. DHCP server automatically provides an Internet Protocol (IP) address and other related information such as subnet mask, default gateway and DNS to DHCP clients. DHCP server and client use UDP port 67 and 68 for communication. In a network, a DHCP client (IP devices such as Desktop, Laptop, Smartphone etc.) requests for an IP lease to DHCP servers and a DHCP server responses allocating IP address and other related IP information [...]

    READ MORE »

  • »

    How to Assign VMware ESXi License Key |   December 4, 2021

    No doubt VMware is the pioneer in virtualization world. VMware can be used either premium or free based on licensing. In the previous article, I discussed how to install VMware ESXi on a physical server or machine and then I also discussed how to get VMware ESXi free license from VMware website. Getting VMware ESXi license key either premium or free, we may sometimes get confused how to assign the license key in VMware ESXi host. So, in this article [...]

    READ MORE »

  • »

    MikroTik CAPsMAN and CAP Basic Configuration using Winbox |   February 20, 2020

    MikroTik CAPsMAN (Controlled Access Point system Manager) is a centralized Access Point management application provided by MikroTik.  MikroTik introduces CAPsMAN from RouterOS v6.11 with CAPsMAN v1 and from RouterOS v6.22rc7 CAPsMAN v2 is running. If you have multiple MikroTik CAPs (Controlled Access Point) in your organization, CAPsMAN provides an easy way to maintain client data as well as CAPs configuration centrally. In my previous article, I discussed how to configure MikroTik Wireless Router as an Access Point. In this article, [...]

    READ MORE »

  • »

    The Role of Computer Networking in Modern Surveillance and Security |   October 17, 2023

    In the present computerized age, computer networking is significant in ensuring modern surveillance and security frameworks are viable and productive. The progressions in innovation have prompted the improvement of innovative arrangements, for example, solar power cameras, that depend on computer networks to upgrade surveillance capacities. This article investigates the role of computer networking in modern surveillance and security frameworks, with a particular spotlight on integrating solar-powered cameras. What is Computer Networking? A computer network gathers interconnected hubs or computing gadgets that [...]

    READ MORE »

  • »

    MikroTik Backup and Restore Configuration using Winbox |   July 31, 2018

    Backup and Restore feature in MikroTik Router helps to recover router configuration when running router fails to operation due to hardware failure. If you have a backup copy of your failed router and purchase a new MikroTik Router and then upload and restore that backup file, you will get your running network without any hassle. MikroTik Backup file is also useful when you unfortunately forget your admin privilege user password. You can easily recover your forgotten password with backup file [...]

    READ MORE »

  • »

    How to Clear Google Chrome History |   August 20, 2015

    Google Chrome is one of the most popular web browsers to online users. It provides a lot of features which help to use this browser smoothly and securely. Google Chrome history is one of the useful features in Google Chrome which helpfully caches or remembers a lot of browsing information specially username and password or login credential of your important web account when you visit various websites in internet. If you are the only user of your desktop or laptop, [...]

    READ MORE »