The MikroCloud Blog

Stay up to date with the latest posts and updates from the MikroCloud team.

12 Steps to Effective Cyber Security

12 Steps to Effective Cyber Security

The "12 Steps to Cyber Security" Report, issued by the National Cyber Security Centre, breaks down and outlines the steps needed for companies to implement an effective cybersecurity system. The report recognizes that with an increased reliance on technology comes an increased need for preparation in the event of an attack.

Enhancing MikroTik Security with Ubuntu RADIUS Server

Enhancing MikroTik Security with Ubuntu RADIUS Server

For WISPs and network administrators, managing access to MikroTik routers at various high sites can be a significant challenge, especially when employees leave an organization. Traditional practices of managing individual login credentials for each device not only become cumbersome but also pose a security risk when employees leave the organization. A practical and efficient solution to this problem is the implementation of a RADIUS server. This centralized approach to managing authentication for network devices streamlines access control and enhances security.

Navigating Queue Types in MikroTik RouterOS 7

Navigating Queue Types in MikroTik RouterOS 7

MikroTik RouterOS 7 brings a plethora of features designed to enhance network performance, manage bandwidth, and improve data packet delivery efficiency. Among these, the variety of supported queue types stands out as a crucial tool for network administrators aiming to optimize network traffic. Each queue type employs a distinct mechanism for managing data packets, offering unique advantages and potential drawbacks. This article explores the supported queue types in MikroTik RouterOS 7, delving into how each works and discussing their pros and cons.

Building the World's Largest MikroTik API

Building the World's Largest MikroTik API

In our quest to enhance our product, we relentlessly refine our code, explore new technologies, and critically assess our decisions. The foundation of our APIs is built upon three essential pillars:

Revolutionizing Network Management with TCP BBR: A Comparative Analysis with CUBIC and Reno

Revolutionizing Network Management with TCP BBR: A Comparative Analysis with CUBIC and Reno

TCP BBR (Bottleneck Bandwidth and Round-trip propagation time) has emerged as a groundbreaking congestion control algorithm, offering substantial improvements over its predecessors, such as CUBIC and Reno. This blog post delves into the workings of TCP BBR, its comparative advantages, and its application in enhancing the manageability of MikroTik routers, particularly within environments such as those deployed by MikroCloud.

Mastering Traffic Prioritization in MikroTik: A Deep Dive into TOS and DSCP Standards

Mastering Traffic Prioritization in MikroTik: A Deep Dive into TOS and DSCP Standards

Implementing Type of Service (TOS) and Differentiated Services Code Point (DSCP) based QoS become invaluable when trying to prioritize important traffic. These mechanisms allow network administrators to classify and prioritize network traffic, ensuring that critical services like Voice over IP (VoIP) and streaming are given precedence over less time-sensitive data. This blog post explores the technical intricacies of TOS and DSCP, their application within MikroTik RouterOS, and provides practical examples of how to utilize these standards to optimize network performance.

1 ... 345 ... 7

Deploy in minutes.

Deploy multiple MikroTik devices in minutes using MikroCloud's express onboarding.