Nice tutorial, thanks for sharing practical examples.
@SystemZone5 жыл бұрын
Keeping browsing log is mandatory to any network. Configuring MikroTik Syslog Server with MT Syslog Daemon browsing log can be saved, viewed and searched easily.
@Sd714315 жыл бұрын
Hi, as per DOT guideline for ISP which outgoing and incoming traffic ( i.e. HTTP, https, FTP, telnet, Icmp etc) is mandatory?
@ivanpco4 жыл бұрын
will this work on the RB Mikrotik models?
@DiegoSayron4 жыл бұрын
Great! could you type the RegEx used at 7:28 here? Tnx!
@mpls_link5 жыл бұрын
He talked👍👍. Nice tutorial
@guillermoacosta8849 Жыл бұрын
Hi! March 2023, configuring everything as indicated in a Mikrotik with RouterOS 7.8, don't works. Any suggestions on what should be changed? Thanks in advance!
@trafficofcambodia10332 жыл бұрын
In case we had many domains access, how can we get all domains? In MT Syslog it shown only web-public IP instead of domain.
@sohaiblodhi8 ай бұрын
How it shows both url and ip. Is there any other application which is compatible with mikrotik.
@SystemZone8 ай бұрын
Usually it is not possible. It is enough to know the IP for tracking any illegal action. No need URL.
@andicahyono25453 жыл бұрын
is it possible to monitor if he accesses via a mobile application?
@ktownvlogs71743 жыл бұрын
Hello sir Can we get the IP log report from Winbox? For example Broadband and dongle also there and we required separate log report If broadband fails or dongle fails we have to find Is there any possibility to get switch over report?
@servandos.tioiii669826 күн бұрын
Can you send us the backup file pleasee
@dhiaahmed54205 жыл бұрын
please, i need an explanation about jump rule
@SystemZone5 жыл бұрын
When a new packet arrives in any ports, MikroTik firewall starts to compare it with all the lists. If you have a lot of firewall rules, it will consume more CPU time to compare all the lists. Although it will not consume more than 10-15% CPU time. By jump rule, you can create a custom chain for any specific packet and compare it with a few firewall rules rather than whole firewall rules. For example, say you have 10 firewall rules for blocking upd packet and 50 firewalls rules for blocking tcp packet. If a new packet comes, it will be compared with 60 firewall rules. But we can create a firewall rule with jump action to detect udp packets and process them only udp droping rule and we can create another firewall rule with jump action that will detect tcp packets and process them only tcp droping rule. So, less CPU time will be consumed in this case because whole firewall rules will not be compared. With jump-target we can create custom chain and can set allow or deny action for this new chain.
@dhiaahmed54205 жыл бұрын
@@SystemZone thank you so much for your perfect answer . I really appreciate it .
@IAdescoberta3 жыл бұрын
Vaelu muito bom !!!
@fabiocastilho76313 жыл бұрын
Marcelo ,sabe me dizer onde fica os beckup dos loags salvos
@TarcioThandera3 жыл бұрын
@@fabiocastilho7631 pode me aajudar? whatsapp 81 986875660 vlw
@TarcioThandera3 жыл бұрын
pode me aajudar? whatsapp 81 986875660 vlw
@سلطانالجهلاني-ص7ك3 жыл бұрын
How to get app
@tharic4u4 жыл бұрын
Hai bro how to track hotspot user browsing history???