#setup mikrotik cloud core router
Explore tagged Tumblr posts
techtrickszonedotcom · 30 days ago
Video
youtube
MikroTik Cloud Core router First time Setup | RB2011 |RB3011 | CCR2004 ...
0 notes
digitalwo · 16 days ago
Text
Unlock High-Performance Networking: Your Trusted Mikrotik Distributor in KSA
When it comes to advanced networking solutions, reliability, speed, and support are essential. In the Kingdom of Saudi Arabia (KSA), businesses and individuals alike are increasingly relying on cutting-edge technology to power their connectivity. That’s where we come in. At Mikrotik-Dubai, we’re proud to be your most trusted Mikrotik distributor KSA, delivering top-tier performance and genuine products straight to your doorstep.
Mikrotik: A Global Standard in Networking Excellence
Mikrotik has become synonymous with powerful, flexible, and cost-effective networking gear. From SOHO routers to ISP-grade backbone systems, Mikrotik delivers hardware and software solutions built on years of innovation and engineering. If you’re setting up a wireless ISP, upgrading your company’s LAN, or establishing robust VPN infrastructures, Mikrotik has the tools—and we’re here to deliver them.
As a premium Mikrotik distributor Saudi Arabia, Mikrotik-Dubai provides direct access to an extensive portfolio of Mikrotik products. Whether you need the latest RouterBOARD, high-performance Cloud Core Routers (CCR), or license upgrades for RouterOS, you’ll find everything with us, ready to ship across KSA. Our network ensures seamless product availability, even for large-volume or urgent orders.
Why Mikrotik-Dubai is the Top Mikrotik Distributor in KSA
We understand that KSA is an evolving hub of technological growth, and it needs reliable partners. As your leading Mikrotik distributor KSA, we go beyond basic product sales. We bring trust, guidance, and full after-sales support.
What makes us stand out as the go-to Mikrotik Reseller KSA? Simple: authenticity, availability, and expertise. Our inventory includes the most in-demand Mikrotik models and accessories, sourced directly from the manufacturer. When you work with us, you’re getting genuine gear with full warranty support—never imitations or gray-market imports. We also offer the latest firmware updates and configuration tips to ensure your products perform flawlessly.
Local Reach, Global Standards
Although based in Dubai, our logistical networks and regional presence allow us to seamlessly support clients in Saudi Arabia. As a reliable Mikrotik distributor Saudi Arabia, we’ve shipped to Riyadh, Jeddah, Dammam, Khobar, Mecca, and Medina—on time and with satisfaction guaranteed. We understand the local customs, the market needs, and the urgency of keeping your network running at peak performance.
For IT integrators, resellers, government projects, and end-users looking for a Mikrotik Reseller KSA, we are your trusted partner. No matter the size of your project, we treat every order with the same urgency and precision. From remote site connectivity to secure enterprise LAN environments, Mikrotik-Dubai stands ready to support your digital transformation.
A Product Line That Covers Every Use Case
At Mikrotik-Dubai, our selection covers everything from entry-level routers to high-performance CCR devices used in carrier networks. Need MikroTik SXT LTE devices for remote locations? Looking for scalable switches for data centers? Want long-range antennas for your wireless setup? We’ve got it all.
As a premium Mikrotik distributor KSA, we stock products like:
MikroTik hAP and hEX series for homes and small offices
Cloud Router Switch (CRS) models for Layer 3 switching
Cloud Core Router (CCR) series for data-heavy environments
Audience and wAP solutions for sleek, indoor wireless deployments
RouterOS licensing packages tailored to your software needs
No matter your network architecture or goals, our team ensures you get the right product for the job. Our goal is to make every Mikrotik deployment in Saudi Arabia seamless, secure, and high-performing.
Support That Goes Beyond Sales
We’re more than just a box shipper. When you choose us as your Mikrotik Reseller KSA, you gain a team that offers pre-sales consultation, post-sales support, and even configuration guidance if needed. Our tech team includes certified MikroTik professionals who can assist with product selection, troubleshooting, and performance optimization.
This level of customer care is rare, but we believe it’s essential. That’s why so many businesses in Saudi Arabia rely on us as their long-term Mikrotik distributor Saudi Arabia. We don’t just sell—we partner in your success. If your business relies on connectivity, we make sure it stays fast, secure, and uninterrupted.
Serving All Industries with Custom Networking Solutions
Our client base across KSA is as diverse as it is large. We serve telecom operators, hospitality chains, security firms, hospitals, schools, and even oil & gas companies with mission-critical connectivity needs. Whatever your industry, we tailor our recommendations based on your bandwidth, reliability, and redundancy requirements.
This is what makes us the preferred Mikrotik distributor KSA—we listen, understand, and deliver custom-fit solutions backed by real experience. Your business deserves a network that evolves with your demands, and we’re here to make that happen.
Fast Delivery, Genuine Warranty, and Competitive Pricing
In a competitive landscape, pricing, delivery speed, and product authenticity are key. As a certified Mikrotik Reseller KSA, we offer you:
Authentic Mikrotik products with manufacturer warranty
Affordable pricing with no hidden costs
Fast shipping across KSA with real-time tracking
Bulk order options for resellers and integrators
Our transparent pricing and fast service make it easy to plan your project rollout without delays or budget surprises. Whether it’s a single router or a bulk order of switches, we deliver the same quality every time.
Authorized and Reliable: The Mikrotik-Dubai Promise
We are not just another online store claiming to be a Mikrotik distributor Saudi Arabia. We’re officially authorized by MikroTik, with a proven track record of reliability. Our team is trained, experienced, and committed to excellence.
This credibility is why system integrators, IT solution providers, and public-sector buyers trust us as their go-to Mikrotik Reseller KSA. When your project depends on a solid networking backbone, you can’t afford delays, incompatibility issues, or poor support. That’s why choosing a trusted partner like Mikrotik-Dubai is critical.
Grow with Us, the Trusted Mikrotik KSA Network Enabler
Mikrotik-Dubai is your dedicated mikrotik KSA, ready to support your business in every city of Saudi Arabia. From helping you pick the perfect MikroTik solution to ensuring it’s configured and functioning at its best, we’re with you at every step.
So whether you’re a startup planning your IT infrastructure, a government agency managing secure networks, or an established company upgrading to MikroTik’s latest tech, reach out to us. Let’s build a smarter, more connected future together—one high-performance product at a time.
Explore our catalog today and experience why businesses across the region choose Mikrotik-Dubai as their trusted Mikrotik distributor Saudi Arabia.
Ready to order? Contact our team now and discover how simple, secure, and scalable your networking journey can be with the top Mikrotik Reseller KSA by your side.
0 notes
tenaciouspeanutkingdom · 2 months ago
Text
MIkrotik CCR1036 8G 2S+ and CCR1009 7G 1C 1S+ in Bangladesh: An In-Depth Technical Analysis
MikroTik’s Cloud Core Router (CCR) series stands out, especially the CCR1036 8G 2S+ and CCR1009 7G 1C 1S+. These routers are widely used in enterprise networks due to their robust hardware, efficient routing capabilities, and cost-effectiveness. In this article, we’ll not only look at their features and price in Bangladesh but also dive deeper into their technical aspects to help you make an informed decision.
MikroTik CCR Routers
MikroTik’s Cloud Core Routers (CCR) are engineered to support demanding applications in both small and large-scale networks. The CCR1036 8G 2S+ and CCR1009 7G 1C 1S+ are built with high-performance processors, substantial memory, and multiple ports designed to cater to a variety of networking needs. Whether you're managing a large-scale corporate network or running a small office, these routers can provide the necessary bandwidth and performance to ensure your operations run smoothly.
In-Depth Technical Features of the CCR1036 8G 2S+
The CCR1036 8G 2S+ is one of the flagship routers in MikroTik's portfolio. It’s built for demanding enterprise applications and high-throughput scenarios.
36-Core ARM Processor: The heart of the CCR1036 is a 36-core ARM architecture CPU running at 1.2 GHz. This multi-core processor allows the router to handle heavy routing tasks and multiple services concurrently without breaking a sweat. It’s ideal for complex configurations like MPLS, IPsec VPNs, and advanced firewall setups.
8 GB of RAM: With 8 GB of DDR3 RAM, the CCR1036 can handle large routing tables, multiple simultaneous VPN tunnels, and extensive logging. This large memory capacity ensures the router runs efficiently, even under heavy traffic.
Dual SFP+ Ports: The router features 2 x SFP+ ports that support 10 Gigabit Ethernet (10GbE) for ultra-fast fiber optic connections. These are perfect for high-bandwidth applications such as data center interconnections, backbone networks, or connecting with Internet Service Providers (ISPs) offering gigabit speeds.
8 Gigabit Ethernet Ports: With 8 Gigabit Ethernet ports, the CCR1036 provides ample space for wired connections to servers, workstations, and switches. These high-speed ports are ideal for connecting to local area networks (LANs) and other critical network infrastructure components.
RouterOS: The CCR1036 8G 2S+ comes pre-installed with RouterOS, MikroTik’s proprietary operating system, which offers advanced routing features such as BGP, OSPF, MPLS, and QoS. Additionally, RouterOS supports advanced firewall configurations, NAT, and VPN protocols.
High-Performance Network Stack: The advanced hardware architecture and RouterOS work together to provide optimal performance. The router can handle multi-gigabit throughput with ease, making it ideal for enterprise applications, large-scale VPN setups, and demanding internet traffic management.
Redundant Power Supply: The CCR1036 8G 2S+ offers dual power inputs, allowing you to connect it to two power sources for added redundancy. This feature ensures that your network remains operational even if one power source fails.
Technical Features of the CCR1009 7G 1C 1S+
The CCR1009 7G 1C 1S+ is a more budget-friendly option that still packs a punch in terms of performance. It’s designed for smaller to medium-sized businesses, and offers reliable network management features at a competitive price.
9-Core ARM Processor: The CCR1009 7G 1C 1S+ comes with a 9-core ARM CPU clocked at 1.2 GHz. While fewer cores than the CCR1036, the CCR1009 still offers solid performance, especially for networks that don’t require the high multi-core processing power of its more advanced counterpart.
1 GB of RAM: Equipped with 1 GB of DDR3 RAM, this router is sufficient for managing moderate-sized routing tables, handling small to medium office networks, and supporting routing functions like VPN, BGP, OSPF, and firewall management.
1 Combo SFP Port + 7 Gigabit Ethernet Ports: The CCR1009 includes 1 combo SFP port, which can be used as either a fiber-optic port (SFP) or as a regular Ethernet port. This offers flexibility for users who need fiber connectivity or who are working with Gigabit Ethernet. The additional 7 Gigabit Ethernet ports provide enough connectivity for typical small-to-medium office setups.
RouterOS: Like the CCR1036, the CCR1009 7G 1C 1S+ runs on RouterOS, which provides advanced routing features such as dynamic routing, VPN, and NAT. RouterOS also allows for advanced network monitoring and reporting, making it easier to optimize and manage your network’s traffic flow.
Compact Design: Unlike the larger CCR1036, the CCR1009 is more compact in size, making it easier to install in environments with limited space. It’s still rackmountable, though, making it suitable for smaller data centers or server rooms.
Cost-Effective Solution for Medium Networks: The CCR1009 offers great value for medium-sized businesses or home-office setups that require powerful performance without the need for a high-end, enterprise-class router.
Price of CCR1036 8G 2S+ and CCR1009 7G 1C 1S+ in Bangladesh
ccr1036 8g 2s+ price in Bangladesh
Price Range: BDT 45,000 to BDT 50,000
Given its high-end features, including the 36-core processor, 8 GB RAM, and SFP+ ports, the CCR1036 8G 2S+ falls in the higher price range. It is a solid choice for enterprise-level networks requiring massive throughput, redundancy, and future-proofing.
CCR1009 7G 1C 1S+ Price in Bangladesh
Price Range: BDT 25,000 to BDT 30,000
The CCR1009 offers a more affordable option without compromising on features like advanced routing protocols, 1 SFP port, and 7 Gigabit Ethernet ports. It is ideal for medium-sized networks that need reliable and fast network management but don’t require the full performance capacity of the CCR1036.
Buy CCR1036 8G 2S+ and CCR1009 7G 1C 1S+ in Bangladesh
CCR1036 8G 2S+ and CCR1009 7G 1C 1S+ at leading online and offline tech stores in Bangladesh, including:
Daraz Bangladesh
Ryans Computer
Star Tech
Computer Source Bangladesh
Pickaboo
Best Computer Hub Ltd
Conclusion: 
CCR1036 8G 2S+ and CCR1009 7G 1C 1S+ offer remarkable networking capabilities, but your decision should depend on your specific requirements:
CCR1036 8G 2S+: Choose this model if you need a high-performance router with 10GbE fiber-optic support, large RAM capacity, and advanced routing protocols to handle large-scale enterprise operations.
CCR1009 7G 1C 1S+: Opt for this model if you're looking for a cost-effective router with solid performance for medium-sized businesses or home offices.
With either option, you’ll benefit from MikroTik’s robust RouterOS, offering full control over your network infrastructure.
0 notes
tomgreys · 3 years ago
Text
Download winbox mikrotik for windows 7
Tumblr media
DOWNLOAD WINBOX MIKROTIK FOR WINDOWS 7 MANUAL
Cyclades and LMC DS3 with E1/T1 support.Asynch PPP/RADIUS (up to 32 ports) for modem pools.Network firewall with packet-filtering, masquerading, network address translation, logging and connection monitoring.Remote control with easy real-time Windows application (WinBox).You also may like to download Devolutions Remote Desktop Manager Enterprise 13.īelow are some amazing features you can experience after installation of MikroTik RouterOS 6.42.6 freeload please keep in mind features may vary and totally depends if your system support them. However, this article is more about working with RouterOS 6.X and should be hardware agnostic. This work was done specifically with the MikroTik Cloud Core Router CCR-1016G which is described more on this page. The following sections are included in this Guide. The Guide describes the basic steps of installing and configuring a dedicated PC router running MikroTik RouterOS. Just add standard network PC interfaces to expand the router capabilities. MikroTik RouterOS turns a standard PC computer into a network router. You can also download SeriousBit NetBalancer 9.12.4 Build 1666.
DOWNLOAD WINBOX MIKROTIK FOR WINDOWS 7 MANUAL
It is designed with easy-to-use yet powerful interface allowing network administrators to deploy network structures and functions, that would require long education elsewhere simply by following the Reference Manual (and even without it). It does not require any additional components and has no software pre requirements. MikroTik RouterOS is independent Linux-based Operating System for PC-based routers and thin routers. It is full offline installer standalone setup of MikroTik RouterOS 6.42.6 freeload for supported version of windows. The program and all files are checked and installed manually before uploading, program is working perfectly fine without any problem. MikroTik RouterOS 6.42.6 freeload Latest Version for Windows.
Tumblr media
0 notes
ntrending · 7 years ago
Text
You should reboot and update your router to protect from malware
New Post has been published on https://nexcraft.co/you-should-reboot-and-update-your-router-to-protect-from-malware/
You should reboot and update your router to protect from malware
I typically only reboot my router when my internet starts moving at a crawling pace. The simple act of turning it off, waiting ten seconds, then turning it back on is often enough effort to fix whatever flaw is flummoxing your internet connection. Now, however, the FBI and several high-profile internet security organizations are recommending you reboot in an effort to disable a potentially harmful piece of malware called VPNFilter. Take a minute to do that now, then come back and get the rest of the info about the potential problem. We’ll wait.
What is it?
VPNFilter sets out to do the types of things that many pieces of malicious code aim to accomplish. It can intercept, reroute, or track your data, and even harm your hardware by dishing out harmful code. Unlike a typical virus that you pick up from clicking on a sketchy email attachment or visiting a particularly grimy file sharing site, VPNFilter attacks your network at the router or any network-attached storage (like hard drives with wireless capabilities) you may have on your network.
Cisco’s security group, Talos, has been investigating the spread of VPNFilter and a related piece of malware called BlackEnergy that’s responsible for large scale cyber attacks in the Ukraine. They issued the original statement about the possible effects. “the malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide.”
How does it work?
VPNFilter is a three-stage platform, which makes it more difficult to address than a typical exploit because the first stage (known as a persistent loader) acts as a foundation for other malicious software. Stage two and stage three software act like plug-ins that work with the groundwork laid by stage one. It’s a setup that gives bad actors lots of flexibility when it comes to causing harm.
According to Talos, rebooting your router will wipe away stage two and stage three code, but stage one will remain, which is why it’s also recommended that you update your router with the latest patches from the manufacturer in order to ensure that any security holes are filled.
What kind of equipment is at risk for infection?
Symantec list of possibly infected devices.
Linksys E1200
Linksys E2500
Linksys WRVS4400N
Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
Netgear DGN2200
Netgear R6400
Netgear R7000
Netgear R8000
Netgear WNR1000
Netgear WNR2000
QNAP TS251
QNAP TS439 Pro
Other QNAP NAS devices running QTS software
TP-Link R600VPN
If you have any of these routers, it’s especially important that you reboot and patch your hardware to the most recent version. If you get your router through an ISP, you can also call the provider to see if they have any further instructions, which may include swapping out your gear.
The malware has targeted more than half a million devices across more than 50 countries in recent weeks, with a substantial spike in activity starting around May 8th.
What if it’s not fixed?
The Justice Department has announced that an organization known as the Sofacy Group, which “targets government, military, security organizations, and other targets of perceived intelligence value”
The software can rope the infected devices into botnets—huge clusters of machines working together—capable of causing massive interruptions in internet services and other problems.
In short: go and reboot your router then run an update.
Written By Stan Horaczek
0 notes
nedsvallesny · 7 years ago
Text
FBI: Kindly Reboot Your Router Now, Please
The Federal Bureau of Investigation (FBI) is warning that a new malware threat has rapidly infected more than a half-million consumer devices. To help arrest the spread of the malware, the FBI and security firms are urging home Internet users to reboot routers and network-attached storage devices made by a range of technology manufacturers.
The growing menace — dubbed VPNFilter — targets Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office space, as well as QNAP network-attached storage (NAS) devices, according to researchers at Cisco.
Experts are still trying to learn all that VPNFilter is built to do, but for now they know it can do two things well: Steal Web site credentials; and issue a self-destruct command, effectively rendering infected devices inoperable for most consumers.
Cisco researchers said they’re not yet sure how these 500,000 devices were infected with VPNFilter, but that most of the targeted devices have known public exploits or default credentials that make compromising them relatively straightforward.
“All of this has contributed to the quiet growth of this threat since at least 2016,” the company wrote on its Talos Intelligence blog.
The Justice Department said last week that VPNFilter is the handiwork of “APT28,” the security industry code name for a group of Russian state-sponsored hackers also known as “Fancy Bear” and the “Sofacy Group.” This is the same group accused of conducting election meddling attacks during the 2016 U.S. presidential race.
“Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide,” the FBI said in a warning posted to the Web site of the Internet Crime Complaint Center (IC3). “The actors used VPNFilter malware to target small office and home office routers. The malware is able to perform multiple functions, including possible information collection, device exploitation, and blocking network traffic.”
According to Cisco, here’s a list of the known affected devices:
LINKSYS DEVICES:
E1200 E2500 WRVS4400N
MIKROTIK ROUTEROS VERSIONS FOR CLOUD CORE ROUTERS:
1016 1036 1072
NETGEAR DEVICES:
DGN2200 R6400 R7000 R8000 WNR1000 WNR2000
QNAP DEVICES:
TS251 TS439 Pro
Other QNAP NAS devices running QTS software
TP-LINK DEVICES:
R600VPN
Image: Cisco
Unfortunately, there is no easy way to tell if your device is infected. If you own one of these devices and it is connected to the Internet, you should reboot (or unplug, wait a few seconds, replug) the device now. This should wipe part of the infection, if there is one. But you’re not out of the woods yet.
Cisco said part of the code used by VPNFilter can still persist until the affected device is reset to its factory-default settings. Most modems and DVRs will have a tiny, recessed button that can only be pressed with something small and pointy, such as a paper clip. Hold this button down for at least 10 seconds (some devices require longer) with the device powered on, and that should be enough to reset the device back to its factory-default settings. In some cases, you may need to hold the tiny button down and keep it down while you plug in the power cord, and then hold it for 30 seconds.
After resetting the device, you’ll need to log in to its administrative page using a Web browser. The administrative page of most commercial routers can be accessed by typing 192.168.1.1, or 192.168.0.1 into a Web browser address bar. If neither of those work, try looking up the documentation at the router maker’s site, or checking to see if the address is listed here. If you still can’t find it, open the command prompt (Start > Run/or Search for “cmd”) and then enter ipconfig. The address you need should be next to Default Gateway under your Local Area Connection.
Once you’re there, make sure you’ve changed the factory-default password that allows you to log in to the device (pick something strong that you can remember).
You’ll also want to make sure your device has the latest firmware updates. Most router Web interfaces have a link or button you click to check for newer device firmware. If there are any updates available, install those before doing anything else.
If you’ve reset the router’s settings, you’ll also want to encrypt your connection if you’re using a wireless router (one that broadcasts your modem’s Internet connection so that it can be accessed via wireless devices, like tablets and smart phones). WPA2 is the strongest encryption technology available in most modern routers, followed by WPA and WEP (the latter is fairly trivial to crack with open source tools, so don’t use it unless it’s your only option).
But even users who have a strong router password and have protected their wireless Internet connection with a strong WPA2 passphrase may have the security of their routers undermined by security flaws built into these routers. At issue is a technology called “Wi-Fi Protected Setup” (WPS) that ships with many routers marketed to consumers and small businesses. According to the Wi-Fi Alliance, an industry group, WPS is “designed to ease the task of setting up and configuring security on wireless local area networks. WPS enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security.”
However, WPS also may expose routers to easy compromise. Read more about this vulnerability here. If your router is among those listed as using WPS, see if you can disable WPS from the router’s administration page. If you’re not sure whether it can be, or if you’d like to see whether your router maker has shipped an update to fix the WPS problem on their hardware, check this spreadsheet.
Turning off any remote administration features that may be turned on by default is always a good idea, as is disabling Universal Plug and Play (UPnP), which can easily poke holes in your firewall without you knowing it). However, Cisco researchers say there is no indication that VPNFilter uses UPnP.
For more tips on how to live with your various Internet of Things (IoT) devices without becoming a nuisance to yourself or the Internet at large, please see Some Basic Rules for Securing Your IoT Stuff.
from Technology News https://krebsonsecurity.com/2018/05/fbi-kindly-reboot-your-router-now-please/
0 notes
jennifersnyderca90 · 7 years ago
Text
FBI: Kindly Reboot Your Router Now, Please
The Federal Bureau of Investigation (FBI) is warning that a new malware threat has rapidly infected more than a half-million consumer devices. To help arrest the spread of the malware, the FBI and security firms are urging home Internet users to reboot routers and network-attached storage devices made by a range of technology manufacturers.
The growing menace — dubbed VPNFilter — targets Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office space, as well as QNAP network-attached storage (NAS) devices, according to researchers at Cisco.
Experts are still trying to learn all that VPNFilter is built to do, but for now they know it can do two things well: Steal Web site credentials; and issue a self-destruct command, effectively rendering infected devices inoperable for most consumers.
Cisco researchers said they’re not yet sure how these 500,000 devices were infected with VPNFilter, but that most of the targeted devices have known public exploits or default credentials that make compromising them relatively straightforward.
“All of this has contributed to the quiet growth of this threat since at least 2016,” the company wrote on its Talos Intelligence blog.
The Justice Department said last week that VPNFilter is the handiwork of “APT28,” the security industry code name for a group of Russian state-sponsored hackers also known as “Fancy Bear” and the “Sofacy Group.” This is the same group accused of conducting election meddling attacks during the 2016 U.S. presidential race.
“Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide,” the FBI said in a warning posted to the Web site of the Internet Crime Complaint Center (IC3). “The actors used VPNFilter malware to target small office and home office routers. The malware is able to perform multiple functions, including possible information collection, device exploitation, and blocking network traffic.”
According to Cisco, here’s a list of the known affected devices:
LINKSYS DEVICES:
E1200 E2500 WRVS4400N
MIKROTIK ROUTEROS VERSIONS FOR CLOUD CORE ROUTERS:
1016 1036 1072
NETGEAR DEVICES:
DGN2200 R6400 R7000 R8000 WNR1000 WNR2000
QNAP DEVICES:
TS251 TS439 Pro
Other QNAP NAS devices running QTS software
TP-LINK DEVICES:
R600VPN
Image: Cisco
Unfortunately, there is no easy way to tell if your device is infected. If you own one of these devices and it is connected to the Internet, you should reboot (or unplug, wait a few seconds, replug) the device now. This should wipe part of the infection, if there is one. But you’re not out of the woods yet.
Cisco said part of the code used by VPNFilter can still persist until the affected device is reset to its factory-default settings. Most modems and DVRs will have a tiny, recessed button that can only be pressed with something small and pointy, such as a paper clip. Hold this button down for at least 10 seconds (some devices require longer) with the device powered on, and that should be enough to reset the device back to its factory-default settings. In some cases, you may need to hold the tiny button down and keep it down while you plug in the power cord, and then hold it for 30 seconds.
After resetting the device, you’ll need to log in to its administrative page using a Web browser. The administrative page of most commercial routers can be accessed by typing 192.168.1.1, or 192.168.0.1 into a Web browser address bar. If neither of those work, try looking up the documentation at the router maker’s site, or checking to see if the address is listed here. If you still can’t find it, open the command prompt (Start > Run/or Search for “cmd”) and then enter ipconfig. The address you need should be next to Default Gateway under your Local Area Connection.
Once you’re there, make sure you’ve changed the factory-default password that allows you to log in to the device (pick something strong that you can remember).
You’ll also want to make sure your device has the latest firmware updates. Most router Web interfaces have a link or button you click to check for newer device firmware. If there are any updates available, install those before doing anything else.
If you’ve reset the router’s settings, you’ll also want to encrypt your connection if you’re using a wireless router (one that broadcasts your modem’s Internet connection so that it can be accessed via wireless devices, like tablets and smart phones). WPA2 is the strongest encryption technology available in most modern routers, followed by WPA and WEP (the latter is fairly trivial to crack with open source tools, so don’t use it unless it’s your only option).
But even users who have a strong router password and have protected their wireless Internet connection with a strong WPA2 passphrase may have the security of their routers undermined by security flaws built into these routers. At issue is a technology called “Wi-Fi Protected Setup” (WPS) that ships with many routers marketed to consumers and small businesses. According to the Wi-Fi Alliance, an industry group, WPS is “designed to ease the task of setting up and configuring security on wireless local area networks. WPS enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security.”
However, WPS also may expose routers to easy compromise. Read more about this vulnerability here. If your router is among those listed as using WPS, see if you can disable WPS from the router’s administration page. If you’re not sure whether it can be, or if you’d like to see whether your router maker has shipped an update to fix the WPS problem on their hardware, check this spreadsheet.
Turning off any remote administration features that may be turned on by default is always a good idea, as is disabling Universal Plug and Play (UPnP), which can easily poke holes in your firewall without you knowing it). However, Cisco researchers say there is no indication that VPNFilter uses UPnP.
For more tips on how to live with your various Internet of Things (IoT) devices without becoming a nuisance to yourself or the Internet at large, please see Some Basic Rules for Securing Your IoT Stuff.
from https://krebsonsecurity.com/2018/05/fbi-kindly-reboot-your-router-now-please/
0 notes
techtrickszonedotcom · 6 years ago
Link
0 notes