M
M
mcrack2021-02-27 13:47:44
Mikrotik
mcrack, 2021-02-27 13:47:44

How to prevent other routers from working in Mikrotik?

Hello, we have a Mikrotik router in our organization, switches come from it, and then employees in the field already have points where they connect their computers. To ensure security, I need that if one of the employees connects a router to these points, these routers do not have access to the network and do not distribute the Internet at all.

Can you please tell me how to cut off all routers on the network?

The organization is large and I don’t want to go to all the offices every time to check, so I want to immediately cut off and not bathe

Answer the question

In order to leave comments, you need to log in

4 answer(s)
N
nApoBo3, 2021-02-27
@nApoBo3

802.1x, the rest is done without significant difficulties. But implementing 802.1x on a network is not a trivial task.

V
vreitech, 2021-02-27
@fzfx

Let's say you have managed switches.
then you either organize 802.1X with a radius server (which few people will pull, because it's troublesome), or limit the operation of ports on switches by MAC addresses (which will work until some cunning employee appears who writes on his router MAC of your own computer). this is also troublesome, in the long run even more than the previous option.
if the switches are unmanaged, it is possible to restrict by MACs and most likely on Mikrotik (depending on the model), but access to the local network cannot be blocked in this way.
however, if the organization is large and normal, then it will easily pull the first option.

F
Fenrir89, 2021-02-27
@Fenrir89

The most trivial thing they wrote to you in the comments is to cut all traffic in excess of ttl, only it does not increase in the switch
More complex ad + proxy + internal dns

A
AntHTML, 2021-03-01
@anthtml

Ensuring security is done not only by software and hardware, but also by administrative means.
The Internet should go through a proxy that excludes the possibility of a simple access to it from a mobile phone, and of course with logging who climbs where.
In terms of left routers, it is enough to have a link in the job / contract to the information security policy. Which spells out a ban on the unauthorized connection of any devices and changing key settings.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question