snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

363
aktive brukere

#mikrotik

3 innlegg3 deltakere0 innlegg i dag
Stefano Marinelli<p>Ever since I hung the Ruckus on the wall, all peripheral coverage issues disappeared. At that point, I decided to try re-hanging the old MikroTik cAP AC (with the wave2 drivers) in the same spot to compare. <br>All in all, it performs well there too, and all devices remain stably connected, albeit with a lower signal level. I imagine, however, that if there were 40 devices, I'd already see some differences.</p><p>Now I'm curious to test a cAP AX...🤣</p><p><a href="https://mastodon.bsd.cafe/tags/Ruckus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ruckus</span></a> <a href="https://mastodon.bsd.cafe/tags/Mikrotik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mikrotik</span></a> <a href="https://mastodon.bsd.cafe/tags/Homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Homelab</span></a></p>
T_X<p>Hab' bei <a href="https://chaos.social/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> nach dem Chipsatz für einen 19" <a href="https://chaos.social/tags/Switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switch</span></a> mit 16x SFP+ gefragt (weil ich da gerne evtl. später mal <a href="https://chaos.social/tags/OpenWrt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenWrt</span></a> drauf hätte, insbesondere bei/mit <a href="https://chaos.social/tags/Realtek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Realtek</span></a> / <a href="https://chaos.social/tags/rtl93xx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rtl93xx</span></a>). Antwort:</p><p>"Aufgrund von Sicherheitsbedenken bieten wir unsere Chipsatzlösung nicht öffentlich an."</p><p>Okay, wenn DAS das Sicherheitskonzept ist, weiß ich dann ja jetzt, welchen Switch ich schonmal nicht haben will :D.</p><p>Bei <a href="https://chaos.social/tags/MikroTik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MikroTik</span></a> hingegen habe ich in &lt; 3h eine Antwort mit dem Chipsatz bekommen (<a href="https://chaos.social/tags/Marvell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Marvell</span></a> <a href="https://chaos.social/tags/98DX8216" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>98DX8216</span></a>).</p>
Jody Lemoine 🇨🇦<p>New madness: DNS Bypass Mitigation on RouterOS</p><p><a href="https://hachyderm.io/tags/NetEng" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetEng</span></a> <a href="https://hachyderm.io/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://hachyderm.io/tags/RouterOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterOS</span></a> <a href="https://hachyderm.io/tags/MikroTik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MikroTik</span></a></p><p><a href="https://ghostinthenet.info/preventing-dns-bypass/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ghostinthenet.info/preventing-</span><span class="invisible">dns-bypass/</span></a></p>
Theo Baschak :verified:<p>I've been experimenting with the container support in MikroTik RouterOS 7.x. Over the past week I've deployed my own binary in a container on a RB5009 router. A simple webserver which compiles down to a single static binary, which I build on a raspberry pi4 and then save/export and move to the router. <a href="https://infosec.exchange/tags/mikrotik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mikrotik</span></a> <a href="https://infosec.exchange/tags/routeros" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>routeros</span></a> <a href="https://infosec.exchange/tags/containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>containers</span></a> <a href="https://infosec.exchange/tags/golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>golang</span></a> <a href="https://bgp.guru/2025/07/16/routeros-7-container-test/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bgp.guru/2025/07/16/routeros-7</span><span class="invisible">-container-test/</span></a></p>
stfn<p>Tiktube, the official PeerTube instance of Mikrotik, a Latvian producer of networking equipment (in English)<br><br><a href="https://fedi.stfn.pl/tags/mikrotik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mikrotik</span></a> <a href="https://fedi.stfn.pl/tags/peertube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>peertube</span></a><br><br><a href="https://tiktube.com/a/mikrotik/videos" rel="nofollow noopener" target="_blank">https://tiktube.com/a/mikrotik/videos</a></p>

#Mikrotik is a gr8 networking platform.
Today I went full user and took the web-based configuration wizard to change from the router to bridge mode.

Apparently this action wiped out the "LAN" and "WAN" interface lists as they are no longer applicable.

It's also good because it disables DHCP and a few other things that a bridge shouldn't do.

But it leaves a functioning firewall rule "deny all traffic from !LAN".

I did this on a clean router with 7.19 on it.

What the actual fuck, Mikrotik?

Fortsettelse av samtale

#Mikrotik Wish-List:

* Updated RB5009 with 1x SFP+, 1x 10gbaseT PoE, 7x 2.5GB PoE, higher speeds, multigig uplink port with PoE
* PoE version of the crs310-8G+2S+IN, ideally with the power on the back, but keeping the same size
* Maybe just a smaller version of the CRS309-1G-8S+IN, with half of the ports as 10gbaseT/PoE(?) for new generation access points, a little deeper but narrow enough to stack with other half-rack devices

@mikrotik@mikrotik.social 🥺👉👈

Fortsettelse av samtale

Turns out: Yes, that #Microsoft network just seems to have absolutely broken IPv6.

I can get it to work again by enabling MSS-Clamping on my end using `/ipv6 firewall mangle add chain=forward action=change-mss new-mss=clamp-to-pmtu passthrough=yes tcp-flags=syn protocol=tcp dst-address=2603:1000::/25` on my #Mikrotik router. Kind of embarrassing, but eh.

Send a bunch more debugging data to my ISP after a nice telephone chat with a technical support person. Good impression so far. Let's see.

🔒 How do YOU secure your self-hosted services?

The best defense is layers: firewalls, IDS/IPS, and smart blocklists. CrowdSec Community Member @_guyevans shows you how to integrate CrowdSec’s threat intelligence with a MikroTik router to lock down your homelab at the network edge.

- Layer 1: MikroTik firewall
- Layer 2: CrowdSec’s crowdsourced blocklists
- Result: Automated protection against malicious traffic

See the full guide 👉 guy-evans.com/posts/2025-04-24

Guy Evans · Crowdsec Blocklists and Mikrotik FirewallOne question you always get when selfhosting is: How do you secure your public facing services ? The answer usually is in layers. One layer I use is the firewall on my Mikrotik router that sits in front of all my selfhosted services. Another layer I use is Crowdsec which is an IDS/IPS that you can selfhost.

I'm wondering if I understand routing correctly?

The context is that I have a Mikrotik AP with a USB LTE modem plugged in. I'm looking at the routing section in the router settings. It's all default configuration. The router has an external IP address of 192.168.1.106, and an internal IP address of 192.168.50.1.

The first route is that everything destined for 0.0.0.0, so the wider internet, has to go through 192.168.1.1, so the internet gateway.

The last route is for internal traffic, everything destined for an address in the .50 subnet goes through bridge.

But what is the difference between the first sand second route?

#networkingtools #mikrotik

The final parts needed for my QRP Labs Ultimate3S QRSS/WSPR kit has arrived. The PCB and components came fast from Turkey in a few days but the case has taken three weeks from China. I blame @bloor for starting this new #WSPR project! Sadly it’s all now here just as I’m preparing to travel to Rīga for our ninth #MikroTik BootCamp Training. 😢 I’ll have to wait until I return before attacking this with a soldering iron as some of this build like the bifolar wound transmformeds cannot be rushed!

Apparently, #MikroTik is hosting their own #PeerTube instance!

@mikrotik@tiktube.com
tiktube.com

Don't confuse it with any other #TikTube, though. One is a completely unrelated video platform, another is a more unrelated project on GitHub. (It is probably late to name your instance more uniquely, @mikrotik@mikrotik.social, but I hope this post helps clear things up.)

TikTubeTikTubeThe TikTube is back, this time, powered by PeerTube, an ActivityPub-federated video streaming platform using P2P directly in your web browser.