we will discuss about the Mikrotik Hotspot Login bypass. Bypass means for access to hotspots no longer need to enter a username and password at the login hotspot. Be sure to enter the RouterOS Mikrotik through WinBox. Once able to get into RouterOS Mikrotik, select the IP >> Hotspot.
On the screen there are a lot of menu hotspot. To bypass the hotspot login, we can use the IP Bindings, Walled Garden or can also use IP–Walled Garden.
What if a user is privileged so as to connect does not pass the authentication process of the hotspot login, this can be done by using the IP bindings. How to use it is that we must know the Mac Address of the device to be connected so that we could add a rule in the IP bindings.
Suppose the “Mac Address 1C: C1: DE: 91: AA: BE” will be bypassed, so that users who have the mac address if you want to connect to the internet will not pass the authentication process of the hotspot login.
Select IP >> >> Hotspot >>>> IP Bindings. Then add the Mac Address of the user who will be bypassed.
>> Blocked = Mac address registered with this type will not get any automatic hotspot service.
>> Bypassed = Mac address registered with this type will be bypassed so no need to go through the authentication process.
>> Regular = Mac address registered with this type will pass the authentication process as a normal user, for example used only to allocate a specific IP address to a specific host.
We can also do IP–Bindings on the active hosts. The way is easy that select the host that will be IP–bindings, then double-click and select “Make Binding“
Users who do not pass the authentication process but can access a particular website, in this case can use the walled garden. For example, the user can open the website has not been authenticated “http://www.microcontrols.org“.
Select IP >> Hotspot >> Wallaed Garden. Then in the parameter input Dst.Host * microcontrols.org and the Action, select allow.
Its function is almost the same as the Walled Garden but can bypass more specific resource at a certain protocol and port. Usually used to bypass local server that does not require authentication. For example we will bypass the traffic by protocol and destination port tcp 20-21 (FTP)