The MikroCloud Blog

Stay up to date with the latest posts and updates from the MikroCloud team.

Setting Up CAPsMAN on MikroTik RouterOS: A Step-by-Step Guide

Setting Up CAPsMAN on MikroTik RouterOS: A Step-by-Step Guide

MikroTik's CAPsMAN (Controlled Access Point system Manager) offers a powerful solution, allowing you to centrally manage your APs from a single interface. This guide will walk you through setting up CAPsMAN on MikroTik RouterOS, using four access points and a Cloud Hosted Router (CHR) as the controller. Whether you're setting up a network for a small office or a large event, this setup will provide you with the control and flexibility you need.

Host Uptime Kuma on MikroTik RouterOS with Docker 🧐

Host Uptime Kuma on MikroTik RouterOS with Docker 🧐

Uptime Kuma, a self-hosted monitoring tool, offers an intuitive and feature-rich platform for tracking and alerting on the uptime of various network services. Deploying Uptime Kuma on a MikroTik router with an ARM CPU, through Docker containers, can enhance your network management toolkit directly from your routing device. This post will guide you through setting up Uptime Kuma on MikroTik RouterOS, leveraging the power of Docker technology.

The Essential 8: Australia's Proactive Approach to Cybersecurity

The Essential 8: Australia's Proactive Approach to Cybersecurity

With cyber threats becoming more sophisticated, the need for robust and adaptive security measures has never been more critical. In response to this growing challenge, the Australian Cyber Security Centre (ACSC) introduced the Essential Eight Maturity Model — a comprehensive framework designed to guide organizations in enhancing their cybersecurity defenses.

Understanding CVE-2023-30799 - Permission Elevation Vulnerability in RouterOS

Understanding CVE-2023-30799 - Permission Elevation Vulnerability in RouterOS

Recently, a significant vulnerability in MikroTik's RouterOS has been identified, documented as CVE-2023-30799. This vulnerability sheds light on a policy elevation issue that poses potential risks to network security. This blog post aims to dissect the nature of this vulnerability, its implications for MikroTik RouterOS users, and the recommended actions to mitigate the risks associated with it.

CVE-2023-32154: A MikroTik IPv6 Vulnerability

CVE-2023-32154: A MikroTik IPv6 Vulnerability

Last month saw the discovery of CVE-2023-32154, a vulnerability affecting MikroTik RouterOS devices. This article looks into the specifics of this vulnerability, its implications for MikroTik users, and the steps that can be taken to mitigate potential risks.

123 ... 7

Deploy in minutes.

Deploy multiple MikroTik devices in minutes using MikroCloud's express onboarding.