This version of the RB5009UPR+S+IN has all the bells and whistles of the previous model: Gigabit Ethernet, 2.5 Gigabit Ethernet, and a 10 Gigabit SFP+ cage for fiber connectivity. It has the speed, the power, and the durability. But this time, MikroTik have added PoE-in & PoE-out on all eight [...] Read More
The webinar is aimed at MikroTik beginners as well as advanced users. The creation of a secure VPN via OpenVPN with certificates and L2T / IPsec on MikroTik devices is explained. The implementation of VPNs in Site2Site and “Roadwarrior” use is explained and demonstrated in practice. This applies to L2TP [...] Read More
The webinar is intended for beginners and advanced users. Explains how to create a secure VPN on MikroTik devices via: IPsec IKEv2 with certificates Site2Site IPsec IKEv2 with certificates "Roadwarrior" (here also "Split Tunneling" is discussed) Wireguard The structure of the VPNs and the creation of the certificates will be [...] Read More
The webinar is aimed at MikroTik beginners as well as advanced users. The creation of a secure VPN via OpenVPN with certificates and L2T / IPsec on MikroTik devices is explained. The implementation of VPNs in Site2Site and “Roadwarrior” use is explained and demonstrated in practice. This applies to L2TP [...] Read More
The Mikrotik Training Academy offers interested parties from all over the world the opportunity to gain experience and to find out more about MikroTik products and technologies. The MikroTik training program consists of courses that are held worldwide by official MikroTik certified trainers. Participation in these courses therefore also offers [...] Read More
This webinar is aimed at all interested parties who want to set up an internal or public WLAN that is very scalable, high-performance, built with durable hardware and central management. With the MikroTik CAPsMAN HotSpot-System you also have the perfect introduction to voucher printing. Regardless of whether you want to [...] Read More
The webinar is intended for beginners and advanced users. Explains how to create a secure VPN on MikroTik devices via: IPsec IKEv2 with certificates Site2Site IPsec IKEv2 with certificates "Roadwarrior" (here also "Split Tunneling" is discussed) Wireguard The structure of the VPNs and the creation of the certificates will be [...] Read More
Your most affordable, compact, energy-efficient doorway to the world of 100 Gigabit networking with the CRS504-4XQ-IN from MikroTik. The next step in upgrading existing 10 or 25 Gigabit networks. Our 100 Gigabit family keeps expanding – you’ve already seen the incredible CCR2216 100 Gigabit router. Now it’s time for a [...] Read More
Long gone are the days when you had to rely on cables for speed and stability. 60 GHz solutions offer fiber-like speed and stability - while saving you plenty of time and money on installation and maintenance. MikroTiks latest Cube product line is taking the advantages of sixty GHz networking [...] Read More
The most unusual opportunity presented itself when Mikrotiks colleagues from Airpath Wirelessnet Solutions were contacted by The National Technology Centre for Ports, Waterways & Coasts of India. They needed a link between two sites in the ocean: Tsunami alert and tide reading buoy stations. Here’s the challenge: all high-speed wireless [...] Read More
We use cookies to optimize our website and our service.
Funktional Always active
Die technische Speicherung oder der Zugang ist unbedingt erforderlich für den rechtmäßigen Zweck, die Nutzung eines bestimmten Dienstes zu ermöglichen, der vom Teilnehmer oder Nutzer ausdrücklich gewünscht wird, oder für den alleinigen Zweck, die Übertragung einer Nachricht über ein elektronisches Kommunikationsnetz durchzuführen.
Vorlieben
Die technische Speicherung oder der Zugriff ist für den rechtmäßigen Zweck der Speicherung von Präferenzen erforderlich, die nicht vom Abonnenten oder Benutzer angefordert wurden.
Statistiken
Die technische Speicherung oder der Zugriff, der ausschließlich zu statistischen Zwecken erfolgt.Die technische Speicherung oder der Zugriff, der ausschließlich zu anonymen statistischen Zwecken verwendet wird. Ohne eine Vorladung, die freiwillige Zustimmung deines Internetdienstanbieters oder zusätzliche Aufzeichnungen von Dritten können die zu diesem Zweck gespeicherten oder abgerufenen Informationen allein in der Regel nicht dazu verwendet werden, dich zu identifizieren.
Marketing
Die technische Speicherung oder der Zugriff ist erforderlich, um Nutzerprofile zu erstellen, um Werbung zu versenden oder um den Nutzer auf einer Website oder über mehrere Websites hinweg zu ähnlichen Marketingzwecken zu verfolgen.