Understand the Host Table in the MikroTik Switch

Another feature of Layer2 security is to make the entries on the bridge as static ones. If we look to the bridge, we can see the following entries in its Host table which are learned dynamically: If you want to make them static for security reason, you can do so. Just...

Secure the MikroTik by securing the ARP

Also, another Layer2 Security feature is on the ARP level. As you know, every network device needs the source and destination MAC/IP to be able to send the data. In case the device doesn’t have the destination MAC address, he will issue an ARP request using broadcast,...

Configure Layer 2 Firewall on the MikroTik Switch

We are still speaking about the Layer2 security features, there is a nice feature which is Layer 2 Firewall. As on Layer3, Layer2 has also firewall possibility. That’s something we can see under the bridge filter. Most engineers like to use this feature to disallow...

Configure DHCP Snooping on the MikroTik Switch

Another topic that may be relevant is on Layer 2 security is DHCP Snooping. This is a feature that is available on MikroTik CRS3xx switches as well as all other MikroTik switches. DHCP snooping works as hardware-offload on MikroTik CRS3xx switches. Once you enable the...