Skip to main content

Usability Of Wireless Tools Mikrotik

Usability Of Wireless Tools Mikrotik

Explanation of the use of Wireless Tools-Mikrotik Mikrotik Router has Wireless functionality and features that we can take advantage of for communication between devices with Mikrotik wireless communication using the media. But not all Mikrotik Wireless feature can use this, because not all types of Mikrotik is no Wireless Card.
Usability Of Wireless Tools Mikrotik
Usability Of Wireless Tools Mikrotik

Call it Mikrotik RB 750 who only got 5 ethernet interface and without the wireless interface because there is no wireless card. Specific to Mikrotik Pool, most could use Wireless because it features a Mini PCI slot is available for the wireless card.

OK, this time we will learn wireless wireless usage i.e. Mikrotik tools standard Mikrotik. Wireless tools is very important in building wireless networks with mikrotik, to monitor and monitor the condition of the wireless network around the US.

To use the wireless tools, you can use the winbox and into the Wireless menu.

There are several tools on mikrotik Wireless with different function, namely: scanners, Frequency Usage Snooper, Align, and Sniffer. Here's an explanation of each wireless tool:

Scanner Tool Mikrotik

True to its name, the scanner function to perform a scan with shows which Access point active around the device. The scanner will display information from the AP about the Mikrotik in detail starting from Mac Address, SSID, Band, Defined, SNR, signal, the Radio Name, until his version of RouterOS (Mikrotik devices if). The following is an example of the use of the scanners.

Frequency Usage Tool Mikrotik

This tool serves to do the scanning frequency of the use of the immediate vicinity of the device your mikrotik. Frequency Usage will display a load of each usage frequency are used a lot what lonely users. So that we can determine which frequencies are not too many users to reduce interference.

Snooper Tool Mikrotik

By using the Snooper tool then reveals a huge traffic load and each is defined by a more detailed information. Snooper can display info Access Point, the number of Station and his Client, signals, as well as each of its bandwidth.

Sniffer Tool Mikrotik

A Packet Sniffer is a tool provided in the Arabian Ranches to catch and tap packages running on the network. This tool is very useful for analyzing network traffic.

Comments

Popular posts from this blog

Discussion Of The RoMon Mikrotik

Discussion Of The RoMon Mikrotik RoMON was abbreviated from the Router Management Overlay Network which is a new feature on Mikrotik RouterOS version 6.28. This may still feature RoMON alien to You, because it is available in a new version of RouterOS and WinBox. Well, to find out more what it RoMON Mikrotik, let's discuss in this article. The Meaning Of The RoMON What is RoMON? RoMON (Router Management Overlay Network) is a Mikrotik proprietary protocol (the protocol is only supported on devices Mikrotik), which can make the connection secure layer2 (secure) to MikroTik devices either through Physical connection ( Ethernet) or Layer2 Tunnel.  In addition, RoMON also has the following features: Discovery and management MikroTik devices via Ping, SSH, Winbox (version 3.0. rc 9 and above). Able to do discovery (search) the MikroTik devices enable RoMON which has gone through multiple hops. So with this we can detect RoMON device on WinBox Mikrotik Mikrotik dev...

Common Computer Errors | What The Meaning of Computer Errors

Computer errors will crop up once least expected, they will cause the complete system to suddenly close up, and that they will unknowingly corrupt information to the purpose wherever it cannot be deciphered. Although they can not continuously be avoided, it is vital to recollect that pc errors are often corrected. The key's to know what pc errors square measure, perceive what they mean after they show up, and understand how to minimize their occurrence in the first place. Computer error Basically, pc errors square measure the results of variety of things which will or might not have something to try and do with the method the pc is employed. They "operate" whenever there's a conflict among commands. Remember that computers primarily flee of a series of commands and it has always a sleek method. But once one command conflicts with another command - or once one command asks for a method or data that may not on the market, the pc returns results th...