the switching power seems to be ok, the connected computers can send and receive with the full bandwith of 1GBit.
Class Swift_SmtpTransport could not be loaded from Swift\SmtpTransport.php, file does not exist
/ip dhcp-server network add address=22.214.171.124/32
IPv4 Address. . . . . . . . . . . : 126.96.36.199(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.255
Hope you aren't running any wireless networks then, since Mikrotik products broadcast the board name, radio name and RouterOS version number in every beacon!It should not be THAT easy to get a ROS version ... without authentication
I just tested this.. it checks for a signature, but not Mikrotik's signature! I sign it myself and winbox blindly runs it*) make winbox self upgrade check .exe signature;
Dropping in input is fine, but I've seen several blacklists use raw table which would obviously affect forwarded traffic too.I know ... but it input chain is not the same as forward one. You can block access to router but not traffic forwarded to/from users.
You should be dropping such packets anyway. If you add them to a blacklist which blocks all communications from that IP, then you block legitimate services if someone spoofs them.Why blocking access to router is bad idea? Should "popular" addresses try to access our router?
Shifting of the blame onto users... what else are we supposed to use for remote management?!) winbox - fixed vulnerability that allowed to gain access to an unsecured router;
No, that's a different vulnerability in the SMB service.So is this it https://www.securityweek.com/remotely-e ... s-routeros ?
As its over month old post..