NetworkingSecurity

MikroTik: Setup Brute Force Protection

The following firewall rules will block port scanners and brute force login attempts for SSH, Telnet, and Winbox by creating a dynamically generated MikroTik address list for each respective protocol/port. Furthermore, each of the SSH, ...
NetworkingSecurity

MikroTik: Default Firewall Rules

I’ve included the following rules for my benefit and future reference, but feel free to use them as you please. These are the generic default configuration firewall rules that usually come configured on MikroTik routers. ...
NetworkingSecurity

MikroTik: Setup a Site-to-Site OpenVPN Connection

In this example, we will be using two MikroTik RB951G-2HnD running RouterOS v6.34.3 on firmware v3.24, each using a different subnet. In addition, the OpenVPN tunnel is using a different subnet as well, which means ...
NetworkingSecurity

MikroTik: Setup Guest WiFi

Depending on the setup, there are various ways to configure a MikroTik’s WiFi for guest access. In this example, I’ll be using the MikroTik RB951G-2Hnd router, which has built-in WiFi. I’ll be using MikroTik’s Virtual ...
Scroll to Top