You can find the product model name on the case label ID. Or scan the QR code with your mobile phone. MikroTik devices are for professional use. This Device accepts input of 24V DC power adapter, which is provided in the original packaging of this device. First steps:. Open the bottom lid;. Connect an external antenna to the SMA connector;. Connect the device to the power source;. Connect with your device to the MikroTik wireless network;.
The user name: and there is no password by default;. Find your on the label within the product and register it in your Network Server;. LR Gateway ID. Use the check for updates option and update your RouterOS software to the latest version, the device needs to have an active Internet connection;.
After update set your country, to apply country regulation settings;. Set your wireless network password;. Set the router password. Safety Information:.
Before you work on any MikroTik equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing. The installer should be familiar with network structures, terms, and concepts. Direct Access List is managed just like Proxy Access List described in the previous chapter except the action argument. Unlike the access list, the direct proxy access list has default action equal to deny.
It takes place when no rules are specified or a particular request did not match any rule. Cache access list specifies, which requests domains, servers, pages have to be cached locally by web proxy, and which not. This list is implemented exactly the same way as web proxy access list. Default action is to cache object if no matching rule is found.
This method is a request of information about the communication options available on the chain between the client and the server identified by the Request-URI.
The method allows the client to determine the options and or the requirements associated with a resource without initiating any resource retrieval.
This method retrieves whatever information identified by the Request-URI. If the Request-URI refers to a data processing process than the response to the GET method should contain data produced by the process, not the source code of the process procedure -s , unless the source is the result of the process.
The conditional GET method is used to reduce the network traffic specifying that the transfer of the entity should occur only under circumstances described by conditional header field -s. The partial GET method intends to reduce unnecessary network usage by requesting only parts of entities without transferring data already held by client. This method shares all features of GET method except that the server must not return a message-body in the response.
This retrieves the metainformation of the entity implied by the request which leads to a wide usage of it for testing hypertext links for validity, accessibility, and recent modification. The response to a HEAD request may be cacheable in the way that the information contained in the response may be used to update previously cached entity identified by that Request-URI.
This method requests that the origin server accept the entity enclosed in the request as a new subordinate of the resource identified by the Request-URI. This method requests that the enclosed entity be stored under the supplied Request-URI. If another entity exists under specified Request-URI, the enclosed entity should be considered as updated newer version of that residing on the origin server.
If the request passes through a cache and the Request-URI identifies one or more currently cached entities, those entries should be treated as stale. Responses to this method are not cacheable. This method invokes a remote, application-layer loop-back of the request message.
The final recipient of the request should reflect the message received back to the client as the entity-body of a OK response. The final recipient is either the origin server or the first proxy or gateway to receive a Max-Forwards value of 0 in the request. From MikroTik Wiki. Navigation menu Personal tools Log in.
Namespaces Manual Discussion. Views Read View source View history. Main Page Recent changes. Explorer 8. Firefox 3. Opera Click the Connections tab. Select the necessary connection and choose Settings button. Configure proxy address and port. Click the Advanced tab. Open the Network tab.
Click the Proxy servers. Enter proxy address and port. Maximal time to store a cached object. The validity period of an object is is usually defined by the object itself, but in case it is set too high, you can override the maximal value. Maximal number of connections made to servers any further connections from clients will be put on hold until some server connections will terminate.
If set to 0. TCP port the proxy server will be listening on. This port have to be specified on all clients that want to use the server as HTTP proxy.
Do not make multiple connections to server for multiple client connections, if possible i. Clients will be served on FIFO principle; next client is processed when response transfer to the previous one is completed. If a client is idle for too long max 5 seconds by default , it will give up waiting and open another connection to the server. Proxy will use specified address when connecting to parent proxy or web site.
IP address or DNS name used to make connection the target server this is the string user wrote in browser before specifying port and path to a particular web page. Specifies the port of the web proxy via which the packet was received.
0コメント