Posts belonging to Category News



Can I use 60GHz for PtP or PtMP links in the UK ?

Wireless Wire Dish

The arrival earlier this year of the MikroTik Wireless Wire and shortly after the MikroTik Wireless Wire Dish caused a large amount of excitement in the WISP industry and sales have proven them to be very popular products.  The use of 60GHz instead of 5GHz for point to point and point to multi-point links opens many new possibilities and challenges.

60GHz offers substantially less interference and much higher throughput speeds. Less interference because the band is almost completely unoccupied, uses very narrow radio antenna beams therefore offers much higher co-located frequency re-use. Also much higher throughput is possible up to as high as 1Gbps Full Duplex.
Continue reading “Can I use 60GHz for PtP or PtMP links in the UK ?” »

The NEW Ubiquiti UniFi UAP AC PRO – What’s the Difference?

Ubiquiti has recently updated one of their most popular WiFi access points – the Unifi AC Pro Wireless Access Point (UAP-AC-PRO) with the UAP-AC-PRO-E. So what’s different about the new version?

The simple answer is, not much! The new Unifi AC Pro Wireless Access Point is essentially the same product as before, except it does not include the PoE injector power supply. This update gives customers an even better price point than the previous model (UAP-AC-PRO) and the option to purchase a Unifi AC Pro Power Supply separately.
Continue reading “The NEW Ubiquiti UniFi UAP AC PRO – What’s the Difference?” »

News: MikroTik and Ubiquiti fix WPA2 Client Vulnerability

For those unfamiliar with this latest WPA2 Security Vulnerability, please bear in mind the problem is on the client device, not the AP. Therefore rushing to patch your APs is not going to solve all the problems in your network from this vulnerability!

Of course, if you’re using WPA-TKIP (or using ‘both’ TKIP and AES), you DO have more problems than this attack. Therefore please ensure that any support for TKIP is disabled!  If you’re using WEP, this vulnerability will not affect you, but then again, you have even bigger problems anyway!
Continue reading “News: MikroTik and Ubiquiti fix WPA2 Client Vulnerability” »

Ubiquiti UAP AC IW in UK Back boxes

Mounting the UAP AC In-Wall

The Ubiquiti UAP AC in wall (UAP-AC-IW) has arrived and unlike the previous In-wall Unifi the AC variant is built to support multiple mounting and back box designs including UK back boxes.

The Unifi AC In-Wall does not mount in wall like the name would suggest, instead it mounts to the surface of the backbox leaving 30mm sticking out. This is better for RF performance as the radio will have less wall to power through improving performance.
Continue reading “Ubiquiti UAP AC IW in UK Back boxes” »

News: LinITX joins UK WISPA

LinITX are pleased to announce that we have joined the UK Wireless ISP association (UKWISPA).

The UK Wireless Internet Service Providers Association (UKWISPA) is the official trade body recognised by UK Authorities. Our mission is to promote the interests of the industry and ensure that services provided by its members are of the highest standards possible.

Continue reading “News: LinITX joins UK WISPA” »

Ubiquiti Amplifi UK

We have been working closely with Ubiquiti over the past few months to get their latest product ready for the UK market. Amplifi UK is the first product from Ubiquiti to come with a UK plug as standard, no adapters needed.

AMPLIFI is available in 3 flavours with UK specific plugs. The AMPLIFI HD Home Router, the AMPLIFI HD Mesh Point and the full AMPLIFI HD Kit.
Continue reading “Ubiquiti Amplifi UK” »

News: MikroTik PowerBox Pro Gigabit Outdoor PoE

We now have stock of the MikroTik PowerBox Pro

The MikroTik PowerBox Pro is an outdoor five Gigabit Ethernet port router with PoE output on four ports. The PowerBox Pro features a sleek outdoor enclosure, making it suitable for various types of installations such as radio towers.

The PowerBox also supports passive or standard 802.3at/af PoE input/output. Ethernet ports 2-5 can power PoE capable devices with the same voltage as the unit is supplied with, making for a cleaner install. It can power 802.3at and af mode B compatible devices, if 48-57V input is used. The MikroTik PowerBox Pro has an SFP port for a fiber connectivity, it is small, affordable and easy to use. But at the same time comes with a powerful 800MHz CPU, capable of all the advanced configurations that RouterOS supports.

News: MikroTik release RouterOS 6.38.7 (bugfix tree)

MikroTik have a new release in the bugfix tree.
https://mikrotik.com/download

What’s new in 6.38.7 (2017-Jun-20 10:55):

!) bridge – fixed BPDU rx/tx when “protocol-mode=none”;
!) bridge – reverted bridge BPDU processing back to pre-v6.38 behaviour (v6.40 will have another separate VLAN-aware bridge implementation);
*) 6to4 – fixed wrong IPv6 “link-local” address generation;
Continue reading “News: MikroTik release RouterOS 6.38.7 (bugfix tree)” »

MikroTik release RouterOS 6.36

MikroTik have released 6.36 in the current release channel. Here is their changelog:

What’s new in 6.36 (2016-Jul-20 14:09):

*) arm – added Dude server support;
*) dude – (changes discussed here: http://forum.mikrotik.com/viewtopic.php?f=8&t=110428);
*) dude – server package is now made smaller. client side content upgrade is now removed from it and is downloaded straight from our cloud. So workstations on which client is used will require access to wan. Alternatively upgrade must be done by reinstalling the client on each new release;
Continue reading “MikroTik release RouterOS 6.36” »

News: Latest Ubiquiti vulnerability info

As many of you are probably aware, a lot of Ubiquiti devices running old firmware are under a new wave of attack taking advantage of an old vulnerability that was fixed a year ago.

In response to this latest wave of problems for some WISPs, Ubiquiti have thoughtfully emailed everyone on their mailing lists with their latest advice, namely:

“In recent days, we’ve seen virus activity taking network devices offline. In most cases, devices are reset to factory defaults. In other cases, devices are still operational, but inaccessible. The virus is using an HTTP/HTTPS exploit that doesn’t require authentication. Simply having a radio with out-of-date firmware and having its HTTP (port 80)/HTTPS (port 443) interface exposed to the Internet is enough to get infected.”
Continue reading “News: Latest Ubiquiti vulnerability info” »