I just sent you a supout file from one of remaining infected SXTs to Mikrotik support email.Nathan, RIF and if possible remote access is possible? RC on these or not?
What was the distance between the AP and SXTs?band=5ghz-a/n channel-width=20/40mhz-Ce un TDMA - 2mIn BAND - N? Channel width? 40Mhz? TDMA = 2ms or AUTO? More info about config please...In the setup we had a R11e-5HnD as AP and Clients was SXTsq Lite5
True, that's why we're using almost exclusively 802.11n APs and CPEs.Installiert AC Access-Points and Sell AN CPEs Makes no sence for me
Exactly.That will make it more expensive, but the whole point of this LHG5 device is that it's cheap.But im still wait for new LGH5 with 802.11ac, gigabit ethernet and industrial grade aluminium.
For those willing to pay more there's a DynaDish 5 available already.
There is no known "remote hack" for Mikrotik RouterOS.Hi ;
Is there a right way to stop the hack by Backtrack on Mikrotik ?? ... I need a script or any solution. Because my networks infiltrated . pls
Dear Normis,DynaDish is for you then. 400mm diameter, 25dBi gain.
Oh, and I forgot this one:-Expensive and non-802.11xx based full duplex radio unit for carrier-grade backhaul links
-Cheaper QRT-5 with L3 license for CPE
-8,16,24-ports gigabit PoE switch series (CRS based)
There is nothing wrong with 3rd chain, you simply can't use it to aggregate more throughput because of aI can switch on or off one chain (any chain) without loosing any throughput, so obviously something is wrong...
how wide beamwidth of QRT-2 ? 60 deg or 90deg ?
100% TRUEBloat-ware ?
Are you kidding me ?
We have LCD, SMB etc which are completely useless to %99 of the people and the most useful tool after PING will make it a bloatware ?
If MT is smart enough, they would listen their customers and implement it right away.