traffic flow mikrotik
Most Relevant Content
MikroTik Bandwidth and Resource Monitoring with Graphs
“Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and simple queues as well as for resource usage (CPU, RAM and Disk usage). MikroTik Graphing method first records bandwidth or resource usage information on memory or on the device’s storage with a time basis and then displays this information in an easy to read graph that can be printed or the web link can be given to a client for his or her own inspect ion. But before getting these graphs available in your Winbox or web interface, you must first configure MikroTik Graphing properly. In this article, I will explain how to configure MikroTik Graphing for recording MikroTik bandwidth and resource usage information and displaying recorded information in an easy to read graph through Winbox or the web interface. [...]
- »
MikroTik Firewall Basic Concept | October 6, 2017
MikroTik Firewall functions as a network security tool for preventing unauthorized access to networks as well as provides Network Address Translation functionality. So, a network administrator who is using MikroTik Router in his network cannot go a single day without MikroTik Firewall. Actually, the main duty of a MikroTik administrator is to maintain Firewall properly along with Bandwidth management after completing MikroTik Router basic configuration. So, a MikroTik administrator should have enough knowledge on MikroTik Firewall and so this article [...]
- »
MikroTik Wireless AP Configuration with DHCP using Winbox | October 22, 2019
MikroTik Wireless Router is one of the most popular and stable WiFi Routers. WiFi Zone for an ISP or for an office or for a home can easily be configured with MikroTik WiFi Router. MikroTik has a lot of WiFi Routers that can be used as a WiFi Access Point (AP), a WiFi Station or a WiFi Repeater. MikroTik Wireless Router can also be used as both WiFi Station and WiFi AP simultaneously. The simple usage of MikroTik Wireless Router [...]
- »
NGINX and PHP-FPM: A High-Performance Web Hosting Duo | September 26, 2024
When it comes to hosting high-performance websites or web applications, Nginx and PHP-FPM are often paired together due to their complementary capabilities. NGINX is a highly efficient web server which works seamlessly with PHP-FPM. PHP-FPM is a FastCGI Process Manager for PHP that is used to deliver fast, reliable, and scalable solutions for dynamic content. What is Nginx? Nginx (pronounced as “engine-ex”) is a lightweight, high-performance web server that is widely used for serving static content, load balancing and reverse [...]
- »
MikroTik VPN Configuration with Site-to-Site PPTP | February 19, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik PPTP is a popular client-server VPN service that provides a secure and encrypted link across public network. MikroTik PPTP can be applied in two methods. Connecting remote workstation/client: In this [...]
- »
Restrict Internet Access Based on MAC Address in MikroTik | February 4, 2017
MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]
- »
MikroTik Hotspot with Bandwidth Limitation and Prepaid Billing System | January 14, 2018
Say, you are a network administrator and want to establish a network that will have user bandwidth package management facility with prepaid billing system as well as partner advertisement facility. Then, MikroTik Hotspot Server Configuration with MikroTik User Manager Radius Server will be a wise decision. Because, MikroTik User Manager Radius Server is a user authentication, authorization and accounting application that will give facility to manage user bandwidth package with prepaid billing system. On the other hand, you can easily [...]
- »
MikroTik Site to Site GRE Tunnel Configuration with IPsec | March 26, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was [...]
- »
How to Assign VMware ESXi License Key | December 4, 2021
No doubt VMware is the pioneer in virtualization world. VMware can be used either premium or free based on licensing. In the previous article, I discussed how to install VMware ESXi on a physical server or machine and then I also discussed how to get VMware ESXi free license from VMware website. Getting VMware ESXi license key either premium or free, we may sometimes get confused how to assign the license key in VMware ESXi host. So, in this article [...]
- »
How to Get Free SSL Certificate from ZeroSSL | June 13, 2020
SSL/TLS certificate is an essential part in today internet communication. Online communication cannot imagine without SSL/TLS certificate. SSL/TLS certificate makes online communication secure by encrypting data transmitted over public internet. So, most of the applications (Web, Email and VPN services) those transmit data over public internet use SSL/TLS certificate to secure communication. SSL/TLS certificate requires to be signed by Certificate Authority (CA). It is possible to create self-signed certificate with SSL certificate creation tools such as OpenSSL. Some router venders [...]
More Similar Content
You May Also Like