Yahoo Search Busca da Web

Resultado da Busca

  1. Há 4 dias · Kanzler wrote: ↑ Thu May 30, 2024 8:28 pm Vulnerabilities exist almost everywhere. At the moment, I am not aware of any vulnerabilities in Mikrotik products. But we must not forget about the human factor and the correct configuration of equipment. You can also look towards pfsense, for example. That's very true my friend. andrearruda. just ...

  2. Há 1 dia · MikroTik Neighbor Discovery Protocol: 5683: Yes: Constrained Application Protocol (CoAP) 5684: Yes: Constrained Application Protocol Secure (CoAPs) 5693: Unofficial: Nagios Cross Platform Agent (NCPA) 5701: Unofficial: Hazelcast default communication port: 5718: Unofficial: Microsoft DPM Data Channel (with the agent coordinator) 5719 ...

  3. Hey all I recently got a Mikrotik from my company. The client it was being used closed down a few years ago, and it hasn't been used since. I was only assisting to manage back then, and nothing since so I've become very rusty.

  4. Há 3 dias · Create new Firewall rule to allow traffic from your network to IP addresses in list “qualcomm-afc”: /ip firewall filter add chain=forward action=accept protocol=tcp dst-port=443 dst-address-list=qualcomm-afc comment="Allow traffic to AFC IPs"

  5. Há 3 dias · This document describes RouterOS, the operating system of MikroTik devices. Documentation applies for the latest stable RouterOS version. Also available in the documentation in PDF format for offline use (updated monthly).

  6. Há 5 dias · Particularly when new rules pop up at the bottom of a firewall config which is several hundred items, it is extremely time consuming to position them where they need to be. Would be good if there could be additional options (and hotkeys) for items in ordered lists such as: send to top, send to bottom, up one, down one, up page & down page