Skip to content
Latest:
  • 9 Challenges of setting up a projector
  • Determining the right Fortigate firewall for your network
  • Getting Mikrotik 10G devices for less
  • Tagged and untagged vlan ports: what are they?
  • Fortigate IPSEC remote access VPN Configuration
Timigate

Timigate

Technology hub for everyone…

Now trending…

  • Fortigate ping with source IP address
  • Fortigate IPSEC remote access VPN Configuration
  • Fortigate Command line IP address assignment
  • Mikrotik trunk and access port configuration
  • How to stop external attacks on your Mikrotik router.

  • Home
  • Cisco
  • MikroTik
  • Tech Stories
  • Exams
    • CCNP
    • CCNA
  • Contact Us

Security

Fortinet 

Determining the right Fortigate firewall for your network

April 13, 2023April 13, 2023 Timigate 0 Comments Firewall, Security

Establishing your network’s need for a Fortigate firewall and determining the right model for your network can be easy if

Read more
MikroTik Uncategorized 

Mikrotik OpenVPN server setup and ios client connection

April 8, 2021April 8, 2021 Timigate 0 Comments Mikrotik, Security, VPN

Mikrotik Openvpn for remote access dial-in into a corporate network is one of the powerful ways to securely connect to

Read more
MikroTik 

What to do when Mikrotik router displays wrong username or password

October 10, 2018 Timigate 0 Comments Mikrotik, Security

Wrong username or password displayed when trying to access a Mikrotik router could mean your login credentials have been entered

Read more
MikroTik 

How to spot and resolve Mikrotik http and dns redirect attack

October 9, 2018March 25, 2019 Timigate 2 Comments Mikrotik, Security

Recently, Mikrotik routers have come under heavy attacks by cyber criminals. The recent one among these attacks is the Mikrotik

Read more
Cisco 

Cisco ASA firewall initial configuration: IP address assignment, NAT and default routes.

April 10, 2018July 31, 2018 Timigate 2 Comments Cisco, Firewall, Security

The Cisco ASA firewall is a highly sophisticated piece of network gear that is required to provide a shield on

Read more

PLEASE STAY WITH US

Follow @timigate

Tags

Access-list (5) Android (44) Apple iOS (29) Automatic Failover (7) Basic (14) BGP (6) CCNA Exam (6) Cisco (85) Computers (28) Cryptocurrency (8) Data Bundle (4) Dude (5) EIGRP (6) Firewall (19) Fortinet (3) Hotspot (5) IP Address (8) IPv6 (4) life style (71) Load-balancing (6) Mikrotik (134) MPLS (3) nat (5) Network Tools (46) OSPF (4) Pc (18) Phones (97) queue (5) Redistribution (3) Routing (10) Samsung (5) Security (5) Software (10) Spanning-tree protocol (4) SSH (3) Static route (3) Switching (7) Tablets (4) Tech-stories (7) Ubiquiti (3) Ubuntu (4) VLAN (10) VPN (34) WAN (10) Wireless (23)

Like us

Like us

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Pages

  • About us
  • Contact Us
  • Home
  • Privacy Policy

Trending Posts

  • Fortigate ping with source IP address
  • Fortigate IPSEC remote access VPN Configuration
  • Fortigate Command line IP address assignment
  • Mikrotik trunk and access port configuration
  • How to stop external attacks on your Mikrotik router.

Recent Posts

  • 9 Challenges of setting up a projector
  • Determining the right Fortigate firewall for your network
  • Getting Mikrotik 10G devices for less
  • Tagged and untagged vlan ports: what are they?
  • Fortigate IPSEC remote access VPN Configuration
Copyright © 2023 Timigate. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.