The Mikrotik Training Academy offers interested parties from all over the world the opportunity to gain experience and to find out more about MikroTik products and technologies. The MikroTik training program consists of courses that are held worldwide by official MikroTik certified trainers. Participation in these courses therefore also offers [...] Read More
The Mikrotik Training Academy offers interested parties from all over the world the opportunity to gain experience and to find out more about MikroTik products and technologies. The MikroTik training program consists of courses that are held worldwide by official MikroTik certified trainers. Participation in these courses therefore also offers [...] Read More
RouterOS - the beating heart of MikroTik that rewards curiosity and ignites creativity. No matter how many Ethernet ports you have, what CPU you are running. Also the smallest routers can achieve great things with this software. With any MikroTik device, You get all the features. No paywalls. And now [...] Read More
Since its construction in 1900, the famous Russian cruiser “Aurora” managed to survive the Battle of Tsushima, start the October Revolution, take part in World War II and finally retreat. While this ship is said to still be fully operational, it’s not actually leaving port.
Ubiquiti UniFi Protect G4 Doorbell is a Wi-Fi video doorbell with a built-in display and real-time two-way audio communication. The camera features a high-quality 5 MP sensor with enhanced night vision. Image streams can be viewed in up to 1600×1200 (2 MP) HD at 30 FPS.
This webinar teaches the basics of static and dynamic routing (OSPF) (IPv4). This also includes the implementation and maintenance / operation of networks with OSPF, a dynamic routing protocol that is "loop-free". In addition, the extended routing with several routing tables is shown and explained. The "simple routing" and other [...] Read More
The webinar is aimed at MikroTik beginners as well as advanced users. The creation of a secure VPN via OpenVPN with certificates and L2T / IPsec on MikroTik devices is explained. The implementation of VPNs in Site2Site and “Roadwarrior” use is explained and demonstrated in practice. This applies to L2TP [...] Read More
This webinar is aimed at all interested parties who want to set up an internal or public WLAN that is very scalable, high-performance, built with durable hardware and central management. With the MikroTik CAPsMAN HotSpot-System you also have the perfect introduction to voucher printing. Regardless of whether you want to [...] Read More
This webinar teaches the basics of static and dynamic routing (OSPF) (IPv4). This also includes the implementation and maintenance / operation of networks with OSPF, a dynamic routing protocol that is "loop-free". In addition, the extended routing with several routing tables is shown and explained. The "simple routing" and other [...] Read More
This webinar is aimed at all interested parties who want to set up an internal or public WLAN that is very scalable, high-performance, built with durable hardware and central management. With the MikroTik CAPsMAN HotSpot-System you also have the perfect introduction to voucher printing. Regardless of whether you want to [...] Read More
We use cookies to optimize our website and our service.
Funktional Always active
Die technische Speicherung oder der Zugang ist unbedingt erforderlich für den rechtmäßigen Zweck, die Nutzung eines bestimmten Dienstes zu ermöglichen, der vom Teilnehmer oder Nutzer ausdrücklich gewünscht wird, oder für den alleinigen Zweck, die Übertragung einer Nachricht über ein elektronisches Kommunikationsnetz durchzuführen.
Vorlieben
Die technische Speicherung oder der Zugriff ist für den rechtmäßigen Zweck der Speicherung von Präferenzen erforderlich, die nicht vom Abonnenten oder Benutzer angefordert wurden.
Statistiken
Die technische Speicherung oder der Zugriff, der ausschließlich zu statistischen Zwecken erfolgt.Die technische Speicherung oder der Zugriff, der ausschließlich zu anonymen statistischen Zwecken verwendet wird. Ohne eine Vorladung, die freiwillige Zustimmung deines Internetdienstanbieters oder zusätzliche Aufzeichnungen von Dritten können die zu diesem Zweck gespeicherten oder abgerufenen Informationen allein in der Regel nicht dazu verwendet werden, dich zu identifizieren.
Marketing
Die technische Speicherung oder der Zugriff ist erforderlich, um Nutzerprofile zu erstellen, um Werbung zu versenden oder um den Nutzer auf einer Website oder über mehrere Websites hinweg zu ähnlichen Marketingzwecken zu verfolgen.