What is our primary use case?
The solution is primarily for routing and switching.
What is most valuable?
They work nice, and they're easy to set up, and everything.
The routing is nice and straightforward. I run all the MikroTiks and we connect to our office. Therefore, the routing is so easy and the firewall's easy to set up. The queues obviously throttle certain users if they're abusing it.
Everything just works easy and fine. To block websites is easy. It just works fine for me.
The stability is great.
The product makes scaling very simple.
In terms of the initial setup, it's very straightforward.
What needs improvement?
If they can improve the OpenVPN, to make that a bit more straightforward, that would be ideal. Obviously, it's got a built-in OpenVPN server that you can do. I've played around with it a bit, however, normally, if people want OpenVPN, they just use a virtual machine with Ubuntu, as it's just easier to set up.
When you block a website, so what I normally have to do is create a script with the domain name in it. And then it auto-updates the IP list. If they can maybe implement something where you can block websites using this domain name rather than the IP address, that'll be great. You can also obviously block it via the certificate, however, the problem is, a lot of the websites use a generic certificate from, Certbot or something like that. And then you block that, and it blocks a whole other list of websites. If they can do something like that, it will be great as well. I know it's not so easy as everything's encrypted, however, that'll be a great thing to improve.
If they can implement something for the hotspot, where you can actually filter out, that would be ideal. With the hotspot, you've got your counters. If they can implement something that if you use local data, it doesn't go towards your hotspot. I've got a client and they've set up the hotspot. They use it so they don't use the internet. If they copy something from the server, it goes towards their quota. Now, if you copy a big file from the server, and it uses your quota, then you have to obviously first call them and say, "Listen here, I've copied this thing. Please increase my quota, or reset it," or whatever. That's the only struggle that I found. Other than that, I can't really think of anything else.
For how long have I used the solution?
I've been using the solution for the last three years.
What do I think about the stability of the solution?
It's super stable. I've never had any issues. There were obviously a couple of years back, maybe a year or two back, where there was a vulnerability version 6.3 or 5.8 or something, where the people were able to just run a script, and then it would give them the MikroTik username and password. They could obviously just log in and deploy whatever viruses or grab whatever they needed. That's long since fixed. Other than that, I've never had any issues.
What do I think about the scalability of the solution?
The solution is super-easy to scale.
How are customer service and support?
I've never had to deal with technical support.
If I do need information or whatever, I'm on the Reddit forums everywhere. The community is super helpful. For that reason, I've never had to contact support.
Which solution did I use previously and why did I switch?
I've got a client that had a Palo Alto, however, the licensing fees were too expensive for them. Eventually, we just got them over on a MikroTik.
Before I started using MikroTik, I was using open source firewalls such as pfSense and OPNsense, which also obviously worked 100%. The problem is it works out to be expensive due to the fact that if you're running that, you basically have to buy a whole computer. Whereas with the MikroTik, you buy the router and you've got everything, and that's it. I've never really looked at anything else other than that. For example, RB2011, you buy it for R3,000 or R4,000, and that's it. There are no licensing fees, there's nothing. That's what I like. I don't like products where there's obviously recurring cost. Obviously there are required antiviruses and stuff like that. However, that's not that expensive. The bigger firewalls, however, such as Palo Alto or FortiGate have all these licensing fees. The services are very nice, however, for my clients, it's not needed.
How was the initial setup?
The initial setup is easy. That said, for our junior techs, it's not that easy. I normally have to come in, do the firewall, stuff like that. For me, as a seasoned tech, it's pretty straightforward.
Which other solutions did I evaluate?
I've got quite a lot of experience with firewalls. However, I'm more likely to look at the open-source stuff like pfSense, OPNsense, and MikroTik. That type of stuff. I try and get protection for my clients as cheap as possible, rather than letting them pay R200,000 a year licensing fee they obviously can't afford. That's why I normally just use the MikroTik.
What other advice do I have?
We normally just buy the solution from the vendors, and then obviously we're just a reseller of IT companies.
I only use the routers. I've never used the switches or the APs. Usually, the switches we use, they're Ubiquiti. Same for the APs. And then obviously for the firewall, router, we use the MikroTik.
With most of my clients, including home users and companies, everything MikroTik. Obviously, the home users will use the RG750. For businesses, they'll use 2011, the bigger switches that have a bit more beef.
In terms of which version we're using, they auto-update. We're always on the latest stable version.
I'd rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: