Introduction
  • Introduction
  • Get your Mikrotik router connected to the internet
  • Fix the bugs by updating the packages
Protect MikroTik from Physical threats
  • Basic security against physical threats
  • More security against the physical threats
More protection from Physical Threats???
  • So what should protect more????
  • Securing the LCD screen touch and disable the console port
Get the right people to login into your MikroTik Router
  • Introduction to User Management on the MikroTik Router
  • Working with users, groups and privileges
  • Allowing users' login on a time interval
Protecing MikroTik Logins with Port Knocking
  • Introduction to Port Knocking on MikroTik Routers
  • Configuring MikroTik Port Knocking - Part1
  • Configuring MikroTik Port Knocking - Part2
Disable unnecessary protocols on the MikroTik Router
  • What are the unnecessary protocols?
  • Turn off unnecessary packages, scan for open protocols and disable them
  • Protect the access on the Mikrotik Router using SSH and Winbox
LockDown the Mikrotik Router - Disable unnecessary tools
  • Disable MAC Winbox, MAC Ping & neighbor discovery
  • Disable Bandwith Test and Romon tools
Enabling Firewall on the Mikrotik Router
  • Introduction to MikroTik Firewall
  • What are the Firewall Chains?
  • Understand the different rules actions and connection types
  • Configuring firewall filter rules on Mikrotik