×

Warning

JUser: :_load: Unable to load user with ID: 43

Security

Here you can set up a simple iptables firewall directly from the web interface of the application. For security reasons, this configuration can be carried out only by the administrator with the Master admin status.

 

You can add individual IP addresses or whole ranges (e.g. 192.168.123.0/24).
For each IP address, you can individually allow or forbid the following services: HTTP, HTTPS, SSH, SMTP, POP3, IMAP, FTP, MySQL, Syslog and PING.
You can change the status to allowed/forbidden by clicking on icon check ko/icon check ok.

In the last line (Global), you can modify the default settings for individual services. For example, it is possible to forbid SSH globally or allow it only from predefined IP addresses.

 

Furthermore, it is possible to allow or forbid a different port from the predefined ones. You may add up to 5 rules of your own in the firewall settings, which you can then allow or forbid. This option is useful especially when ssh uses a different port from the standard one and you want it to be protected by the firewall. 

If you want to edit a particular manually added rule (a column in the firewall), you have to click on a given column in the header and change the rule.

A rule can be removed by entering “0” into the port number field.

 

Activate

If you click on this button, the firewall settings will be updated within 5 minutes. If you do not click on it, no changes will be made to the FW and you can continue setting things up.

If there are no IP addresses in the firewall, the function will not be activated. This option makes it possible for you to disable the FW that is automatically set up by the system and set up an individual FW at the level of the operating system.

You define rules according to your own requirements. At the very least, the following three public IP addresses should be allowed for technical support purposes:

  • 95.173.194.62 (Our office)
  • 95.173.193.40 (VPN server)
  • 95.173.193.60 (Main server)

 

icon info2 More about system security here.

 

Mikrotik guide

This document approximates crucial information necessary for proper understan...

Removing records from ISPadmin

Delete client Deleted client is not deleted from the system, instead its rec...

Download burst

http://wiki.mikrotik.com/wiki/Manual:Queues_-_Burst (http://wiki.mikrotik....

Binary backups of MikroTik routers not working

The most common error messages regarding binary backups are: Mikrotik E...

Add / Edit Router

HardwareRoutersAll, + Add new router or Edit in the details box of a particul...

Limited data consumed / Traffic graphs are high

If you experience one/both of the following problems Limited data gets consum...

Router connection test

Hardware Routers All Click on Update all routers (test connection to all router...

Router monitoring

If router is monitored, the system does not copy any configurations, it barely p...

Service activation on MikroTik routers

An active communication between router and ISPadmin is a prerequisite for its...

Installation Modems

There are two different ways of adding cable TV clients to the system: A new ...

User rights to access MikroTik router

Also, to ensure correct communication between a router and ISPadmin you have ...

Can the system monitor latency and packet loss rate for each device?

Yes, all devices (including client devices, if you want) are monitored and gr...

How to set up a UBNT router

1. Define the IP address range for clients on the router where shaping is don...

Under what conditions does the WiFi Clients at AP section appear in the overview of routers?

Set up a particular device as an access point and specify where shaping is ...

Supported routers and interfaces

Router SNMP SSH API IPv6 Wlan MAC filter Firewall MAC filter Firewa...

Retrieving routing table from MikroTik routers

If there are more than 1,000 rows in the routing table on a Mikrotik router, ...

Creating ACCESS LIST

In a situation where the router Mikrotik is only an AP without any routed networ...

How to mass delete clients' MAC addresses

You can see the following icon - MAC FILTER - in the header of a router with the...

«
»

CONTACT

NET service solution, s.r.o.
Žerotínova 3056/81a
787 01 Šumperk
Czech Republic