MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Training Centre, Toronto, Canada MikroTik Value Added Distributor

T (647) 477-0163
Email: support@wirelessnetware.ca

Wireless Netware Technology LTD.
550 Alden Road, Unti# 210A, Markham, Ontario L3R6A8

Open in Google Maps
  • Home
  • Solutions
  • Services
  • Become a Canadian ISP
    • Business Internet
  • Partners
  • Hardware
  • Training
  • Blog
  • About
  • Contacts
MikroTikSupport
  • Home
  • Blog
  • Blog
  • MikroTik Newsletter #2018-10
Wednesday, 29 August 2018 / Published in Blog, MikroTik products, RouterBOARDs

MikroTik Newsletter #2018-10

Hello,

In this newsletter:

– new RB4011 series!
– new SFP 1.25 Gbps modules for 80km links
– new 60 GHz CPE SXTsq Lite60
– new 6 GHz AP Base Box 6
– Some products are discontinued (EOL). Here is replacement table:
EOL             Suggested replacement
RB411AH     => RB411U “Replaced with M11”
RB433UL        => RB433AH “Replaced with M33”
R52n-M        => R52HnD
R2SHPn         => R52HnD
R52-350     => R52HnD
5VUSB
RB14eU
ACSWI
ACMMCX
CA800
CAOTU
=================

Announcing RB4011 series – amazingly powerful routers with ten Gigabit ports, SFP+ 10Gbps interface and IPSec hardware acceleration for a great price!

The RB4011 uses a quad core Cortex A15 CPU, same as in our carrier grade RB1100AHx4 unit. Unit is equipped with 1GB of RAM, can provide PoE output on port #10 and comes with a compact and professional looking solid metal enclosure in matte black.

We will have two models available:

– RB4011iGS+RM (Ethernet model) includes two rack-mount ears that will securely fasten the unit in standard 1U rack space. List price is $199USD

– RB4011iGS+5HacQ2HnD-IN (WiFi model) is dual band, four chain unit with a supported data rate of up to 1733 Mbps in 5GHz. For legacy devices, the unit also has a dual chain 2GHz wireless card installed in miniPCI-e slot. List price is $249.
More information:
https://mikrotik.com/download/share/RB4011iGS_RM.pdf
https://mikrotik.com/download/share/RB4011iGS_5HacQ2HnD_IN.pdf

=================

We are now offering industrial grade SFP modules for distances up to 80km with operating temperature -40C..+85C! Two long range models are available now:

– S-55DLC80D is 1.25Gbps SM 1550nm 80km module with Dual LC connector, list price $39.
– S-4554LC80D is a pair of modules, that includes one S-45LC80D (1.25G SM 80km TX 1490nm/ RX 1550nm, Single LC connector) module and one S-54LC80D (1.25G SM 80km TX 1550nm / RX 1490nm,Single LC connector) module. List price $89USD.

More information here:
https://mikrotik.com/download/share/sfp_modules2.pdf

 

 

=================

SXTsq Lite60 is an ultra-low cost 60GHz CPE unit. Connect up to eight of these CPE units to a 60 GHz access point (for distances up to 200m), such as our wAP 60G AP, or create low-cost 60GHz point-to-point link. This is the best alternative for short distance wireless connections in clean spectrum where 2 and 5 GHz wireless space is crowded and unreliable.

Unit comes with 10/100Mbps Ethernet port and is available for only $69! Small, lightweight, compact and very affordable, this is a 60GHz device like no other before.

More information here:
https://mikrotik.com/download/share/SXTsq_Lite60.pdf

=================

Base Box 6 is a new model in our 6 GHz frequency line-up. It’s an outdoor wireless device, based on our popular RB912 model, fitted with two SMA connectors for external antennas. Unit comes with RouterOS L4 as perfect Base Station to accompany our 6 GHz CPE – RBDynaDishG-6HnD and RBSXTG-6HPnD.

More information here:
https://mikrotik.com/download/share/BaseBox_6.pdf

We will start shipping in a couple of weeks. IMPORTANT! Product is available for 5.9-6.4GHz license holders only, it is NOT for unlicensed ISM bands! If you would like to get access to ordering 6GHz products only, please contact your MikroTik sales representative for more information.


=================

Tagged under: RB4011, RB411, SFP 1.25Gbps, SXT sq

What you can read next

How to upgrade 24 MikroTik RouterBOARDs less than an hour!
The First MikroTik product with 10G RJ45 Ethernet ports, CRS312-4C+8XG-RM
MikroTik RouterOS and AWS Site-to-Site VPN

Recent Posts

  • Load-balance using PCC in MikroTik RouterOS v 6.xx

    Introduction PCC “Per Connection Classifi...
  • Audience – a router for those who value both beauty and functionality

    Audience is a tri-band (2.4 GHz & high + lo...
  • DO NOT let the cables limit you, More Throughput over Power!

    PWR-LINE PRO PWR-LINE PRO (PL7510Gi) is a smart...
  • The First MikroTik product with 10G RJ45 Ethernet ports, CRS312-4C+8XG-RM

    CRS312-4C+8XG-RM Switch of the future: the firs...
  • Netflix has identified vulnerabilities in RouterOS.

    Netflix has identified several TCP networking v...

RSS MikroTik Blog

  • CVE-2024-54772
    Issue Summary A vulnerability has been identified in the WinBox service, where a discrepancy in response size between connection attempts with valid and invalid usernames allows attackers to confirm if user accounts exists via brute forcing the login process. In other words, when attacker tries to log into the device, by examining the response, the […]
  • CVE-2023-30799
    A new CVE has been published, which describes a policy elevation issue, where a logged in administrator with “policy” permissions (able to grant additional permissions to any user on the router), is also able to send crafted configuration commands, that are exchanged internally by the router software components and normally are rejected when sent by […]
  • CVE-2023-32154
    On 10/05/2023 (May 10th, 2023) MikroTik received information about a new vulnerability, which is assigned the ID CVE-2023-32154. The report stated, that vendor (MikroTik) was contacted in December, but we did not find record of such communication. The original report also says, that vendor was informed in person in an event in Toronto, where MikroTik […]
  • Mēris botnet
    In early September 2021 QRATOR labs published an article about a new wave of DDoS attacks, which are originating from a botnet involving MikroTik devices. As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that was quickly patched. There is no […]
  • Fragattacks
    In beginning of May 2021, a security research group from Belgium published a set of vulnerabilities they call “Frag Attacks” (from Fragmentation Attack), which affect all modern security protocols of Wi-Fi. Not all the published issues affect MikroTik products, but those that were found to be potentially affecting RouterOS, have been fixed in all currently released […]
  • Upgraded package signatures
    The RouterOS package signing procedure has been upgraded, to use new algorithms and utilize state of the art security hardware. It will also add a possibility to verify the integrity of existing installations. The new updated package signing procedure provides additional security to prevent installation of malicious software. Best security practices: Keep RouterOS updated to the […]
  • CVE-2019-3981
    Summary Tenable has published a potential vulnerability in older RouterOS versions where an attacker can retrieve the password hash of a RouterOS username via a complex man-in-the-middle attack over port 8291. The attacker must be able to intercept a valid RouterOS user login attempt, so he must be located in the same network as the […]
  • DNS cache poisoning vulnerability
    Tenable has identified a vulnerability in RouterOS DNS implementation. RouterOS 6.45.6 and below is vulnerable to unauthenticated remote DNS cache poisoning via Winbox. The router is impacted even when DNS is not enabled. One possible attack vector is via Winbox on port 8291 if this port is open to untrusted networks. The resolver can be […]
  • Package validation and upgrade vulnerability
    Tenable has identified a couple of issues with RouterOS packaging and upgrade systems. The upgrade system used by RouterOS 6.45.5 and below is vulnerable to man in the middle attacks and insufficient package validation. An attacker can abuse these vulnerabilities to downgrade a router’s installed RouterOS version, possibly lock the user out of the system, […]
  • CVE-2019-11477, CVE-2019-11478, CVE-2019-11479
    Summary Netflix has identified several TCP networking vulnerabilities in the Linux kernel that is used in RouterOS. The vulnerabilities can trigger denial of service if the RouterOS system is attacked from an insufficiently protected network interface (port). Firewall can protect against the issue. MikroTik has already applied the necessary patches: fix included in RouterOS 6.45.1 and […]

General information

MikroTik Training Schedules
My Certificate Validation
Who is my local MikroTik Consultant
How to become a MikroTik Consultant
How to become a MikroTik Certified Trainer

Useful URLs

MikroTik Distributor
MikroTik WiKi "Documentation"
MikroTik useful Articles and Examples
The Dude "Monitoring, Notification, Syslog"
User Manager "Free Radius Server"

Legal

  • Privacy Policy
  • General Term
  • Training terms
  • Managed Services Terms
  • Partner term
  • GET SOCIAL
MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

Copyright © 2015 WirelessNetware. All rights reserved.

TOP