Every device connected to a network has a unique MAC address. If a computer has multiple network adapters (for example, an Ethernet adapter and a wireless adapter), each adapter has its own MAC address. Example of a MAC address: 00:00:00:a1:2b:cc Click here to know How to Find Out the MAC Address of Any Device
As per TRAI (an Indian government regulatory body), it is mandatory to authenticate each user logging in to Guest WiFi portal either through bulk login ids generated in advance, retaining a physical copy of identify proof for each login session, or the most convenient way - provisioning of Login-IDs and Passwords through SMS on subscriber's mobile phone at the time of login. In case of SMS-based authentication, a physical copy of identify proof is not required and the reference can be used for that Login-Id for a period of one-year. Read More
This article provides step-by-step guide to configure internet connection on any Mikrotik Routerboard from the ISP (main) router. Read More
If you have set up a device such as a DVR at your location and you wish to access it externally, you will first require a public static IP on your internet connection and secondly, port forwarding needs to be done on your router that will forward all traffic sent on that particular port to the DVR itself. Read More
If in case the ISP has provided a public static IP to be configured on the WAN port on the MikroTik Routerboard, it can be done in Read More
PPPoE (Point-to-Point Protocol over Ethernet) is a network protocol that is configured as a point to point connection between two Ethernet ports that allow data communication between two network entities or points, in this case the ISP server being one entity and the client MikroTik Routerboard being the other. Read More
A Local Network for internet access through Ethernet ports and Wireless LAN can be set up in the following steps: Read More
You must check this setting in your Windows 10 if you are not able to activate your auto-login feature on WiFi hotspots. Read More
Ever had a customer to whom an OTP for authentication via SMS was being delivered pretty late, or not being delivered at all due to mobile network issues? Read more
The biggest advantage of having a UniFi set up configured through a web-hosted controller is that minor changes in configuaration, such as changing SSIDs or passwords, creating & updating guest policies etc. can be done any time, from anywhere on the internet, instead of needing to be at the location where the UniFi set up is in place. You can read the full article here Read more
This process of matching patterns in the incoming data streams is a very resource-intensive task for the MikroTik controller. Multiple L7 matchers and connections will significantly increase memory and CPU usage, ultimately leading to router instability and rebooting in recurring instances. Read more
In this method of “Web Filtering”, specific websites can be blocked on MikroTik using the Content Filter Rules. This filter can be found in the ‘Advanced’ tab while adding new firewall filter rules. Read more
If a website is blocked across all networks, or on a certain network, but certain specific devices need to be given access to these sites, then we will create another filter rule and place it above the existing Website Blocking rule. Read more
There are ways through which one could block certain categories of websites to ensure no one accesses them on a private or a public network. These services are collectively known as content-filtering services. Read more
MikroTik’s Layer7 Protocol can be used to mark and block unwanted traffic, in this case all the p2p (BitTorrent) data. The Layer7 Protocol on MikroTik can be found in the IP > Firewall section. Read more