The MikroCloud Blog

Stay up to date with the latest posts and updates from the MikroCloud team.

Packet Analysis on MikroTik: Sniffing and SIP Tracing with Wireshark

Packet Analysis on MikroTik: Sniffing and SIP Tracing with Wireshark

Packet analysis is an essential skill for network administrators, offering insights into the health and security of a network. MikroTik routers, equipped with the powerful Sniffer tool, provide a robust platform for capturing network traffic. This guide will walk you through the process of dumping packets on a MikroTik router, exporting them to a pcap file, and analyzing them in Wireshark with a focus on SIP (Session Initiation Protocol) tracing. We will also explore how to stream packets in real-time to Wireshark using the TZSP (TaZmen Sniffer Protocol).

Setting Up CAPsMAN on MikroTik RouterOS: A Step-by-Step Guide

Setting Up CAPsMAN on MikroTik RouterOS: A Step-by-Step Guide

MikroTik's CAPsMAN (Controlled Access Point system Manager) offers a powerful solution, allowing you to centrally manage your APs from a single interface. This guide will walk you through setting up CAPsMAN on MikroTik RouterOS, using four access points and a Cloud Hosted Router (CHR) as the controller. Whether you're setting up a network for a small office or a large event, this setup will provide you with the control and flexibility you need.

Host Uptime Kuma on MikroTik RouterOS with Docker 🧐

Host Uptime Kuma on MikroTik RouterOS with Docker 🧐

Uptime Kuma, a self-hosted monitoring tool, offers an intuitive and feature-rich platform for tracking and alerting on the uptime of various network services. Deploying Uptime Kuma on a MikroTik router with an ARM CPU, through Docker containers, can enhance your network management toolkit directly from your routing device. This post will guide you through setting up Uptime Kuma on MikroTik RouterOS, leveraging the power of Docker technology.

The Essential 8: Australia's Proactive Approach to Cybersecurity

The Essential 8: Australia's Proactive Approach to Cybersecurity

With cyber threats becoming more sophisticated, the need for robust and adaptive security measures has never been more critical. In response to this growing challenge, the Australian Cyber Security Centre (ACSC) introduced the Essential Eight Maturity Model — a comprehensive framework designed to guide organizations in enhancing their cybersecurity defenses.

Understanding CVE-2023-30799 - Permission Elevation Vulnerability in RouterOS

Understanding CVE-2023-30799 - Permission Elevation Vulnerability in RouterOS

Recently, a significant vulnerability in MikroTik's RouterOS has been identified, documented as CVE-2023-30799. This vulnerability sheds light on a policy elevation issue that poses potential risks to network security. This blog post aims to dissect the nature of this vulnerability, its implications for MikroTik RouterOS users, and the recommended actions to mitigate the risks associated with it.

123 ... 7

Deploy in minutes.

Deploy multiple MikroTik devices in minutes using MikroCloud's express onboarding.