Skip to content
Sep 17 / Greg

Build a 5V USB to 24V PoE Booster

I wanted the ability to conveniently PoE power radios out in the field, which to me, means via USB. I started doing some googleing, and couldn’t find anything, so here’s a quick tutorial on how to build one of your own. It takes any USB input(either via your laptop or a booster pack), and spits out 24V power.

Here’s the quick build video:

The STL files for the 3D printed case can be found here: poe-booster-case (12 downloads)

The boost module can be found here on amazon.

The barrel jack can just be one you cut off a wall wart, or you can order some from amazon here.

***I’ve noted that the load should be connected first(hook up the radio first), then plug the USB cable into your power source. I found that some of my boost power packs don’t like it when I do it the other way round.***

Let me know if you have any questions or comments, and thanks for reading!

Sep 16 / thebrotherswisp

TheBrothersWISP 76 – New Mikrotik Kit, UBNT CPE Mystery, S3 Buckets vs Dropbox



This week Greg, Dave, and Mike (Déjà vu) yarn for a bit; stay a while, and listen.

This cast we talk about:
Mikrotik renames release channels
DHCP Snooping
Ubiquiti CPEs with public IPs stop responding to admin access, but pass traffic…why?
Tool to aggregate IPv4/IPv6 routes – thanks Steve!
Mikrotik newsletter 84
RB4011
RB4011 Wireless
Mikrotik 60 GHz SXT
BaseBox 6
WISPApalooza
Amazon S3 bucket vs dropbox or box

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Click the link below to view the article!

Sep 2 / thebrotherswisp

TheBrothersWISP 75 – VoIP Acquisitions, Unifi XG, A Hashing Story



This week Greg, Dave, and Mike do a quick cast to kick off the Labor day weekend…it sure feels like working trying to listen to these things, though…

This cast we talk about:
SECURE YOUR ROUTERS!!!!!!!!!
Ignite net new firmware
TBW IPv6 podcast
Nicks notes on IPv6
All of the pickles
Sangoma acquires Digium Inc
Unifi super high density deployment radios – Arena / Conference Hall
Tracking down TCP resets, a hashing story
Tower training over at ISPSupplies
Issabel Asterisk GUI Dave said is horrible…so why am I linking it?

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Click the link below to view the article!

Aug 30 / thebrotherswisp

TheBrothersWISP – Why Should I Use IPv6?

Nick, John, Miller, Tommy, Mike, and Greg talk about the various reasons to do IPv6 or not, some of the hurdles to implement, and use cases.

We also discuss:
Business case for IPv6
Islands of knowledge
Consumer vs Enterprise
Dual stacking
P2P addressing
Subnet sizes
Subnet sizes to deliver to customers
Prefix delegation via DHCP
AAAA and IPv6 DNS
Hotspots and IPv6
SLAAC
Various address types
Neighbor tables
ICMP in IPv6

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Click the link below to view the article!

Aug 27 / Greg

Protect Your Network From Mikrotik Exploits

Attacks on older versions of Mikrotik have stepped up recently. You can easily protect your network from such attacks in a couple of simple steps.

1. Update your Mikrotik to a new version that isn’t affected

1
system package upgrade

2. Disable any unneeded Mikrotik services

1
2
ip services
dis 0,1,2,3,4,7

3. Add firewall rules to protect those services – be sure to drag it to the top of the list

1
2
3
4
5
6
7
/ip firewall address-list
# create an address-list where management traffic will be sourced from
add address=192.168.5.0/24 list=management
 
/ip firewall filter
# create a firewall drop rule that will block access to the allowed ip services if it's not from the management subnet
add action=drop chain=input dst-port=80,8291 protocol=tcp src-address-list=!management

Create entries in an address list that will specify what your management subnets are.


If you would like to protect Mikrotiks inside of your network, you should apply similar rules to the forward chain of your border routers.

This obviously isn’t a complete security policy, or all of the firewall rules you should have in place, but it will at a minimum stop attacks.

If you have been comprimised, you really should update, then verify no new users, firewall rules, socks, or web proxies are in place.

You then need to change all of your user/password combos as part of the exploits is extraction of the user database!

You should update ASAP. A best strategy would be to reset the configuration, update, and rebuild.

Aug 19 / thebrotherswisp

TheBrothersWISP 74 – Protect your tik, Ciena Metro E, Unresponsive Customers



This week Greg, Dave, Mike, Miller and Andrew Cox totally bro out and talk about manly things…and at the end Greg feels all the feels, so use caution if that’s not your thing 😉

This cast we talk about:
Dragonwav’s annoucement
Bare minimum to protect your Mikrotik
Greg Trains on Ciena Metro E Kit
Ciena 3930
Ciena 8700
Monitoring customers with overlapping subnets?
Working with unresponsive customers

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Click the link below to view the article!

Aug 5 / thebrotherswisp

TheBrothersWISP 73 – Mikrotik 4011, security, MTU, cheap fiber tools



This week Greg, Dave, and Mike trade our favorite recipes.

This cast we talk about:
Mikrotik 4011 first look
Mikrotik 4011 second look
Wireless Wire MTU Issue – regular wireless l2mtu of 1600
Mikrotik selling CWDM muxes and optics
Mikrotik coinhive crytpojacking
More botnets taking advantage of winbox holes up to version 6.42
Mikrotik has a security blog
Locating fiber in the field – VFL
ST to LC adapter for a VFL
Ubiquiti Fiber PoE – tranciever with passive PoE out (McAfee)

Help support us by becoming a patron! <==join our Slack team!
Keep contacting us: contactus (at) thebrotherswisp.com or https://facebook.com/thebrotherswisp

Click the link below to view the article!