Community discussions

MikroTik App

Search found 31 matches

by nazadnan2003
Fri May 23, 2008 9:31 pm
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

Re: Hacking Hotspot

My same idea :lol:
by nazadnan2003
Wed Jul 04, 2007 4:41 pm
Forum: General
Topic: Virtual Things for isolation
Replies: 6
Views: 1865

Re: Virtual Things for isolation

If someone can help us to achieve this scenario
It will be the optimum soluthin for too many problems for example:
- client to client traffic.
- MAC Spoofing.

Thanks
Adnan Ahmed
by nazadnan2003
Sun Jun 10, 2007 12:00 pm
Forum: General
Topic: Bandwidth Management
Replies: 1
Views: 1037

Re: Bandwidth Management

Why don't use Hotspot ??
It has real time monitoring for active user and his usage.
by nazadnan2003
Tue May 29, 2007 10:51 pm
Forum: General
Topic: Auto Upgrade
Replies: 0
Views: 762

Auto Upgrade

how can use /System/Auto Upgrade
by nazadnan2003
Mon May 28, 2007 9:14 am
Forum: General
Topic: RouterOs and Radius Manager on Single Machine
Replies: 10
Views: 2850

Re: RouterOs and Radius Manager on Single Machine

You can do this by using VMware. Just to be careful, pay really close attention on the amount of processor power and ram you have. Matt Can you please be more specific: - What is the mane OS ? Is it Windows ? - What is the VMware you use ? Is it Microsoft VM - What is your recommendation for CPU an...
by nazadnan2003
Sun May 27, 2007 12:24 pm
Forum: General
Topic: RouterOs and Radius Manager on Single Machine
Replies: 10
Views: 2850

Re: RouterOs and Radius Manager on Single Machine

Yes its possible. All the machines i have are way overbuilt. I don't have any issues.

Matt
can you please explain in details how can you achieve this.

Many thanks
by nazadnan2003
Sun May 20, 2007 11:24 pm
Forum: General
Topic: Very dangerous Prog NetCut need help to protect M.T Network
Replies: 2
Views: 1833

You can use Anti Netcut programe from:
http://www.tools4free.net
it should be installed on each PC for your clients.

But :( it can't prevent bad users from using the internet, just prevent them from cutting the real users.
by nazadnan2003
Mon May 14, 2007 9:25 pm
Forum: General
Topic: additional SQUID cache ..
Replies: 13
Views: 2620

but i need help from MT users who are using external cache servers..l
me too, especially with Microsoft ISA server because it has amazing cache engine
by nazadnan2003
Mon May 14, 2007 8:21 am
Forum: General
Topic: additional SQUID cache ..
Replies: 13
Views: 2620

If you use MT as a router all you need is to redirect http to your cache server.
can u pleas explain that
by nazadnan2003
Sun May 13, 2007 9:15 pm
Forum: General
Topic: additional SQUID cache ..
Replies: 13
Views: 2620

Can we use Microsoft ISA Server as cache server withe MT? and how?

Is there a specific configuration in MT to deal with external cache
by nazadnan2003
Sun May 13, 2007 6:10 pm
Forum: General
Topic: Burst Limit
Replies: 8
Views: 2677

If u use Hotspot u can write the Burst formula in: IP/hotspot/users/profiles/your_profile/Rate Limit (tx\rx) as below: 35k/128k 64k/256k 10k/30k 5/20 35k/128k ------> max-limit 64k/256k ------> burst 10k/30k ------> burst-threshold 5/20 ------> burst-time u can customize these numbers as your needs
by nazadnan2003
Fri May 11, 2007 1:34 pm
Forum: General
Topic: Multiple IP addresses on one interface
Replies: 7
Views: 2430

I have given 25 IP Addresses on Single Ether.

IT IS WORKING NICE...!!!!

What is the benefit of giving 25 IP Addresses for single Ethernet :roll: :!:
by nazadnan2003
Sat Apr 28, 2007 10:56 am
Forum: General
Topic: hotspot client to client isolation
Replies: 7
Views: 9368

Re: hotspot client to client isolation

is this possible without the built-in wireless AP device/?
Hi:
I have the same situation in my network it is very important to me to isolate my clients from each other because I think it is the suitable solution for my nightmare (MAC Spoofing) (MAC Cloning)
by nazadnan2003
Mon Apr 23, 2007 9:27 am
Forum: General
Topic: Maximum Speed from Cache (Web Proxy)
Replies: 3
Views: 1864

Maximum Speed from Cache (Web Proxy)

I have RO 2.9.29 with Hotspot and Web Proxy enabled.
Can any one help me to bypass (TX/RX) limitation in Hotspot User Profile when the request can be served from the cache (web Proxy).


Regards
Adnan
by nazadnan2003
Tue Apr 10, 2007 10:20 am
Forum: General
Topic: (Profile - Servers - Hotspot) eating bandwidth
Replies: 6
Views: 1849

well skillfull, I already closed my router from being a relay through web proxy rules ... and I will check this probobility again ..thanx
Dear infozone / skillfull:
Can you please explain how to do this? because I have the same problem in my router.


Regards
by nazadnan2003
Sat Feb 10, 2007 4:19 pm
Forum: Wireless Networking
Topic: Suggest a solution for MAC cloning problem
Replies: 11
Views: 2969

There is an old scenario named DHCP-Pool Method describe in Hotspot chapter in Reference Manual for RouterOS 2.8 , which is show the possibility of making tow different address pools, the first address pool (Temporary address pool) for unauthorized customers, and the other address pool (Real address...
by nazadnan2003
Mon Jan 15, 2007 5:32 am
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

Re: zuf

hi my sir if u remove cookies from hotspot it made bad user cant login in your hotspot if he stolen mac for good user thanx
Dear friend ZUF I think you'd better if you read the Reference Manual carefully before you make any suggestion.
Cookies did not work as you think
by nazadnan2003
Fri Jan 12, 2007 7:37 pm
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

There is an old scenario named DHCP-Pool Method describe in Hotspot chapter in Reference Manual for RouterOS 2.8 , which is show the possibility of making tow different address pools, the first address pool (Temporary address pool) for unauthorized customers, and the other address pool (Real address...
by nazadnan2003
Wed Jan 03, 2007 11:57 pm
Forum: General
Topic: schedule user logins
Replies: 7
Views: 2146

schedule user logins on Hotspot

You mean that I can identify my users (username and password) and leave the Server parameter set to (all) to insure that the user can login from any Hotspot server. this will solve first half of the problem and the other half is when a user is connected to a Hotspot and somehow he disconnect and rec...
by nazadnan2003
Wed Jan 03, 2007 10:34 pm
Forum: General
Topic: schedule user logins
Replies: 7
Views: 2146

What if I have a Hotspot on Ethernet Interface and 3 AP's connected to it through switch and each AP connected to Sector Panel covering 120 degrees. Maybe someone well advice me to use 3 wireless Interfaces instead of Ethernet Interface, my answer is no, it is not suitable to my situation because I ...
by nazadnan2003
Mon Dec 25, 2006 11:56 am
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

sergejs It is not very easy to understand why MT team can not confess that they couldn’t till now prevent this kind of penetration. Many reasons make wireless encryption protocols are not suitable for me, these reasons are shortly describe below: - My Hotspot is covering a small city with 5 Km diam...
by nazadnan2003
Sun Dec 17, 2006 12:04 pm
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

Ahmedramze wrote I'm sure your problem it from your bad configuration of hotspot... Dear Ahmedramze: I'm sure that I follow the right steps described in the PDF Manual to configure the Hotspot, is there any possible that MikroTik make some mistake in their configurations??? !!!! Ahmedramze wrote and...
by nazadnan2003
Fri Dec 08, 2006 11:05 pm
Forum: General
Topic: Feature request for service interruption or announcement
Replies: 8
Views: 3833

I think you are right , MT will go on one more step to be a complete router OS if this feature can be added .
by nazadnan2003
Fri Dec 08, 2006 9:21 pm
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

Dear ahmedramze can I have your Yahoo ID
for more explenation.
by nazadnan2003
Thu Dec 07, 2006 2:52 pm
Forum: General
Topic: Suggestion for the new version
Replies: 4
Views: 2733

that will be nice
by nazadnan2003
Wed Dec 06, 2006 5:31 pm
Forum: General
Topic: Feature request: Status Bar
Replies: 0
Views: 1440

Feature request: Status Bar

I think it will be helpful to see a Status Bar in the bottom of each window in WinBox like the one in - Firewall / Connections - Interface and else For example it will be nice if there is a Status Bar in Hotspot / Active displaying the number of active users, and we can filtering them to show the us...
by nazadnan2003
Wed Dec 06, 2006 9:58 am
Forum: General
Topic: WINBOX - cosmetik updates
Replies: 2
Views: 2230

Me too
by nazadnan2003
Thu Nov 16, 2006 4:45 pm
Forum: General
Topic: Problems with Hostpot users staying connected & reconnec
Replies: 3
Views: 2126

Just check the idel timeout for the Hotspot server and the idel timeout for user profile, you can reduce it to be 15 <-----> 30 minuets to kikout the user (logout) after this period of inactivity You can enable the cookie to help the user to auto login next time he reconnect to the hotspot, you can ...
by nazadnan2003
Sat Nov 04, 2006 5:24 pm
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

I have external Access Points connected to the MT Router. I don’t use encryption WPA or WPA2, and I do not want to do so. In my case both (Good and Bad users) use the Internet in the same time by using the same IP/MAC-address. Theoretically this is impossible, and internet will not work correctly fo...
by nazadnan2003
Wed Nov 01, 2006 10:01 am
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

Dear sergejs: I alrady use "shared-users=1" , and use login/password for the HotSpot authentication. The "bad users" stole IP/MAC-address by using scanning programs, and chose one of the active IP/MAC-address. If the stolen address is alrady autherized in the hotspot, then the &q...
by nazadnan2003
Tue Oct 31, 2006 8:43 am
Forum: General
Topic: Hacking Hotspot
Replies: 116
Views: 82529

Hacking Hotspot

I Have a Hotspot with web proxy enabled, and some hackers can hack my hotspot by using scanning programs which can scan the active IPs and their MACs and use one of them (by change MAC) to get the same IP of the authorized MAC and then access the Internet without asking to authenticate because its a...