Using Mikrotik MPLS with VPLS to connect two offices
In this demonstration, I will share with us on how to connect two offices together using Mikrotik MPLS with VPLS. This demonstration … Read more
In this demonstration, I will share with us on how to connect two offices together using Mikrotik MPLS with VPLS. This demonstration … Read more
Adding devices on the Mikrotik dude can be challenging especially for devices whose service port numbers have been changed for security reasons. … Read more
Mikrotik kid control allows network administrators to implement system configurations that control internet access through the router. Users can leverage on the … Read more
This tutorial will show you all you need to know to successfully copy contents from one Mikrotik dude to another. The dude … Read more
Mikrotik profile tool allows you to manage cpu utilization and avoid an overhead on your router’s processor. With hundreds of routerOS features … Read more
If you manage an enterprise network with at least one guest network, you need a system that provides centralized management of all … Read more
Timigate monthly giveaway is here again and as we usually do it, it comes with a technical problem that you are required … Read more
Mikrotik ipsec l2tp vpn allows routeros network administrators to provide remote access login to internal networks for roaming users. The feature can … Read more
In this post, I will explain five common configuration mistakes that every Mikrotik routeros user should avoid. These mistakes are so common … Read more
Mikrotik CAPSMAN with multiple ssid for connected controlled access points (CAPs) can be configured in an environment where roaming is not allowed, … Read more
You can use the Mikrotik capsman to manage multiple access points and enable roaming between them. This will ensure that users can … Read more
Wrong username or password displayed when trying to access a Mikrotik router could mean your login credentials have been entered wrongly or … Read more
Recently, Mikrotik routers have come under heavy attacks by cyber criminals. The recent one among these attacks is the Mikrotik http and … Read more
Bandwidth and throughput are not the same, even though most people erroneously think otherwise and use then interchangeably. In this post, we … Read more
Wireless connectivity has become the most popular medium for delivering internet services to users, thanks to its ease of deployment. Establishing wireless … Read more