Mikrotik Security
Mikrotik Security
Mikrotik Security
power of RouterOS
2
Why this presentation?
4
What is security?
5
Security is the consequence of
the following situation:
7
Defining the goal:
10
General principles - OSI
11
General principles - OSI
12
General principles - OSI
TCP/IP security
192.168.88.250/24
192.168.88.1/24
ether2
ether1
14
RouterOS security mechanisms
Physical security
TCP/IP security
17
Physical security
18
Physical security
19
Physical security
20
Physical security
21
Physical security
22
MAC authentication security
23
MAC authentication security
24
MAC authentication security
25
MAC authentication security
26
MAC authentication security
27
MAC authentication security
28
TCP/IP Security
31
TCP/IP Security
34
Application layer security
35
Reiterating the goal:
37
Are there any improvements we
can make?
38
The most important security layer
39
How can this 8-th layer actually
come into play ?
40
Steganography is the practice of
concealing a file, message, image, or
video within another file, message,
image, or video.
01021983
42
To express the same idea into a different
format we could say: “At 01 hours and
02 minutes you should ping the
equipment 47 times in order to access it
and then 111 times.”
01021983
44
Protocol 1: ICMP, echo request (ping)
48
PPTP user and password
49
Firewall rules
50
Firewall rules
applied
51
Working demo
192.168.88.3
192.168.88.250/24
192.168.88.2 192.168.88.1/24
ether2
ether1
52
Final conclusions
Questions?
53