Тёмный

Mikrotik Firewall - Protecting the Router (Ep 2) 

Wilmer Almazan / The Network Trip
Подписаться 7 тыс.
Просмотров 5 тыс.
50% 1

#mikrotik #firewall #mikrotiksecurity
🔒 In today's interconnected world, safeguarding your routers, is crucial. Join us in this deep dive into MikroTik Firewall as we explore the "input chain" and learn how to improve your router's defenses.
🔔 Stay updated with more in-depth tutorials and network security insights. Hit that "Subscribe" button, turn on notifications, and join our community of network defenders!
👍 If you find this video helpful, please give it a thumbs up and share it with your network-savvy friends.
💬 Got questions or want to share your own router protection tips? Drop your thoughts in the comments below. We love hearing from you!
#MikroTik #Firewall #NetworkSecurity #RouterProtection #InputChain #Cybersecurity #techtutorials
Check more videos on my channel
/ @thenetworktrip
Connect with Wilmer Almazan
LinkedIN: / wilmeralmazan
Facebook: / nsswilmeralmazan
Twitter: / wilmer_almazan
Instagram: / wilmer_almazan
Personal Blog: thenetworktrip.blog
mikrotik
routeros 7
ospf
mtcna
mtcre
cybersecurity
routing
cloud computing
virtualization
switching
network automation

Наука

Опубликовано:

 

4 ноя 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 26   
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Have you encountered any specific challenges or interesting use cases while configuring MikroTik firewalls? Share your experiences and insights with the community! 👇 Additionally, if you have any specific firewall topics you'd like us to cover in future videos, feel free to suggest them. We're here to help you learn and master MikroTik firewall configurations. Your input and questions are valuable to us! 🔥💻"
@remixedMind
@remixedMind Месяц назад
thanks for all the videos, do you plan on making one for CAPsMAN
@mikkio5371
@mikkio5371 8 месяцев назад
The order of processing looks like ACL or route map in cisco . Proccesing will continue until a satisfactory condition has been met . Thank you Mr Wilmar
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
You got it! Same logic than ACLs in Cisco.
@srh_btk
@srh_btk 8 месяцев назад
Really useful lessons for refreshing my knowledge. Thank you, Wilmer.
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Glad to hear that!
@chris2pple1
@chris2pple1 8 месяцев назад
Very good explanation of the default MikrotikRouter firewall
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Thank you!
@JasonsLabVideos
@JasonsLabVideos 8 месяцев назад
Good video sir !! thanks !!
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Thank you Jason!
@aperson1181
@aperson1181 3 месяца назад
which router would you recommend for home use? What is a good authorized seller in the USA?
@rodneymoore465
@rodneymoore465 5 месяцев назад
This is very properly explained thank you, I have a problem with the (drop everything else firewall) if you have customers with PPPoE connections and your routers goes off and on again it will block your PPPoE connections
@TheNetworkTrip
@TheNetworkTrip 5 месяцев назад
Hi! The PPPoE connections will be established without any problem.
@tallyharry3704
@tallyharry3704 5 месяцев назад
I love you sir... Thank you so much..
@TheNetworkTrip
@TheNetworkTrip 4 месяца назад
All the best
@sergioantoniohernandezestr7728
@sergioantoniohernandezestr7728 8 месяцев назад
Hola @Wilmer Almazan hay alguna forma de implementar OSPF con PBR. Ahorita me funciona con ruteo estático. Pero me gustaría cambiarme a ruteo donamico.
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Hola! Sin problema. Solo coloque arriba de las reglas del PBR en el mangle una regla aceptando el trágico OSPF. Saludos!
@sebastiendeliedekerke5251
@sebastiendeliedekerke5251 8 месяцев назад
Similar to what you recommend for DNS, if the router acts as DHCP server, should an accept rule also be added for DHCP requests received from the LAN?
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Hello! DHCP traffic won’t be affected by the rules under Filter.
@user-ic1gt7vi2y
@user-ic1gt7vi2y 8 месяцев назад
great video... could you allow also dhcp requests from the clients or not needed?
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Hello! That’s not required. That traffic won’t be affected by the rules under filter.
@Smoothy0911
@Smoothy0911 8 месяцев назад
Hi and many thanks for this very interesting video series. I already had the point you mentioned at the end of the video in my head and was wondering how we can allow external access as "trusted"....? Because we cannot create a “trusted mac list”, similar to the “trusted IP list”, since the mac addresses cannot be recognized from outside access. I'm looking forward to the solution in the next video :)
@TheNetworkTrip
@TheNetworkTrip 8 месяцев назад
Thanks! It’s interesting how we can deal with that. The video is coming tomorrow 😀
@TheNetworkTrip
@TheNetworkTrip 7 месяцев назад
Video ready 😃: Port Knocking & Scanner Detection - Mikrotik Firewall Ep 3 ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-TtEXnqTsI-U.html
@mrraulmeneses
@mrraulmeneses 3 месяца назад
Can I please get your opinion on these rules: /ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp add action=accept chain=input src-address-list=Local-LAN comment="Config Access" add action=accept chain=input comment=L2TP dst-port=500,1701,4500 \ in-interface-list=WAN protocol=udp add action=accept chain=input comment="IKE IPSec" in-interface-list=WAN \ protocol=ipsec-esp add action=drop chain=input comment="drop all else" add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid add action=accept chain=forward comment="Access Internet From LAN" \ in-interface-list=LAN out-interface-list=WAN add action=accept chain=forward comment="Access Internet From LAN2" \ in-interface-list=LAN2 out-interface-list=WAN add action=accept chain=forward comment=VPN dst-address-list=Local-LAN \ src-address-list=VPN add action=accept chain=forward dst-port=25 protocol=tcp src-address-list=\ BarracudaIP-SMTP add action=accept chain=forward dst-port=25 out-interface=WAN protocol=tcp add action=accept chain=forward comment="allow dst-nat from both WAN and LAN (including port forwarding)" connection-nat-state=dstnat add action=drop chain=forward comment="drop all else" Thanks!
@hotforex4435
@hotforex4435 4 месяца назад
how we can block andriod app
Далее
Layer 3 Hardware Offloading Mikrotik - Deep Dive
30:45
🤘РОК или ПОП?💖
3:20:26
Просмотров 1,7 млн
MLAG With Mikrotik - High Availability  (Full Lab)
35:53
DHCP Relay - Mikrotik
21:08
Просмотров 5 тыс.
IS-IS Mikrotik - The Basics (Ep 1)
16:32
Просмотров 2,9 тыс.
Controller Bridge / Switch - Mikrotik  (Full Lab)
23:22
(1) Why We're Featuring MikroTik Routers
11:38
Просмотров 58 тыс.
Recursive Routing + Failover - Mikrotik RouterOS v7
20:35
Is your MikroTik vulnerable...?
19:43
Просмотров 14 тыс.
IS-IS Mikrotik Full Lab (Step by Step) - Ep 2
26:19
Просмотров 1,8 тыс.
When you have 32GB RAM in your PC
0:12
Просмотров 386 тыс.