UniFi Network Application 8.0.7 adds support for Radio Manager, WireGuard VPN Client, and Site Overview, and improves the Port Manager section by adding an overview of all ports and the VLAN Viewer. Radio Manager The new Radios page provides an overview of the Access Point radios and their configuration, statistics, [...] Read More
The webinar is intended for beginners and advanced users. Hands-on demonstration and explanation of how to configure and set up a secure VPN on MikroTik devices using IPsec and Wireguard, as well as how to set up Wireguard on Windows, Android and Linux. IPsec: with certificates Site2Site with certificates "Roadwarrior [...] Read More
The webinar is intended for beginners and advanced users. Hands-on demonstration and explanation of how to configure and set up a secure VPN on MikroTik devices using IPsec and Wireguard, as well as how to set up Wireguard on Windows, Android and Linux. IPsec: with certificates Site2Site with certificates "Roadwarrior [...] Read More
The webinar is intended for beginners and advanced users. Hands-on demonstration and explanation of how to configure and set up a secure VPN on MikroTik devices using IPsec and Wireguard, as well as how to set up Wireguard on Windows, Android and Linux. IPsec: with certificates Site2Site with certificates "Roadwarrior [...] Read More
The webinar is intended for beginners and advanced users. Hands-on demonstration and explanation of how to configure and set up a secure VPN on MikroTik devices using IPsec and Wireguard, as well as how to set up Wireguard on Windows, Android and Linux. IPsec: with certificates Site2Site with certificates "Roadwarrior [...] Read More
The webinar is intended for beginners and advanced users. Hands-on demonstration and explanation of how to configure and set up a secure VPN on MikroTik devices using IPsec and Wireguard, as well as how to set up Wireguard on Windows, Android and Linux. IPsec: with certificates Site2Site with certificates "Roadwarrior [...] Read More
The webinar is intended for beginners and advanced users. Explains how to create a secure VPN on MikroTik devices via: IPsec IKEv2 with certificates Site2Site IPsec IKEv2 with certificates "Roadwarrior" (here also "Split Tunneling" is discussed) Wireguard The structure of the VPNs and the creation of the certificates will be [...] Read More
The webinar is intended for beginners and advanced users. Explains how to create a secure VPN on MikroTik devices via: IPsec IKEv2 with certificates Site2Site IPsec IKEv2 with certificates "Roadwarrior" (here also "Split Tunneling" is discussed) Wireguard The structure of the VPNs and the creation of the certificates will be [...] Read More
The webinar is intended for beginners and advanced users. Explains how to create a secure VPN on MikroTik devices via: IPsec IKEv2 with certificates Site2Site IPsec IKEv2 with certificates "Roadwarrior" (here also "Split Tunneling" is discussed) Wireguard The structure of the VPNs and the creation of the certificates will be [...] Read More
The webinar is intended for beginners and advanced users. Explains how to create a secure VPN on MikroTik devices via: IPsec IKEv2 with certificates Site2Site IPsec IKEv2 with certificates "Roadwarrior" (here also "Split Tunneling" is discussed) Wireguard The structure of the VPNs and the creation of the certificates will be [...] Read More
We use cookies to optimize our website and our service.
Funktional Always active
Die technische Speicherung oder der Zugang ist unbedingt erforderlich für den rechtmäßigen Zweck, die Nutzung eines bestimmten Dienstes zu ermöglichen, der vom Teilnehmer oder Nutzer ausdrücklich gewünscht wird, oder für den alleinigen Zweck, die Übertragung einer Nachricht über ein elektronisches Kommunikationsnetz durchzuführen.
Vorlieben
Die technische Speicherung oder der Zugriff ist für den rechtmäßigen Zweck der Speicherung von Präferenzen erforderlich, die nicht vom Abonnenten oder Benutzer angefordert wurden.
Statistiken
Die technische Speicherung oder der Zugriff, der ausschließlich zu statistischen Zwecken erfolgt.Die technische Speicherung oder der Zugriff, der ausschließlich zu anonymen statistischen Zwecken verwendet wird. Ohne eine Vorladung, die freiwillige Zustimmung deines Internetdienstanbieters oder zusätzliche Aufzeichnungen von Dritten können die zu diesem Zweck gespeicherten oder abgerufenen Informationen allein in der Regel nicht dazu verwendet werden, dich zu identifizieren.
Marketing
Die technische Speicherung oder der Zugriff ist erforderlich, um Nutzerprofile zu erstellen, um Werbung zu versenden oder um den Nutzer auf einer Website oder über mehrere Websites hinweg zu ähnlichen Marketingzwecken zu verfolgen.