<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Gadisa Belachew</title>
    <description>The latest articles on DEV Community by Gadisa Belachew (@gadisa_belachew_1a880eb1c).</description>
    <link>https://dev.to/gadisa_belachew_1a880eb1c</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3923241%2Fc5deeae1-eb81-4d8a-a0e6-ba7cd640f871.jpeg</url>
      <title>DEV Community: Gadisa Belachew</title>
      <link>https://dev.to/gadisa_belachew_1a880eb1c</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gadisa_belachew_1a880eb1c"/>
    <language>en</language>
    <item>
      <title>How to Reset Your Password on Windows 11 (Step-by-Step)</title>
      <dc:creator>Gadisa Belachew</dc:creator>
      <pubDate>Sun, 10 May 2026 13:27:57 +0000</pubDate>
      <link>https://dev.to/gadisa_belachew_1a880eb1c/how-to-reset-your-password-on-windows-11-step-by-step-3p4j</link>
      <guid>https://dev.to/gadisa_belachew_1a880eb1c/how-to-reset-your-password-on-windows-11-step-by-step-3p4j</guid>
      <description>&lt;h2&gt;
  
  
  How to Reset Your Password on Windows 11 (Step-by-Step)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Reset Using Windows 11 Installation Media (Advanced)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This method is for situations where you are completely locked out - &lt;strong&gt;no Microsoft account recovery&lt;/strong&gt;, &lt;strong&gt;no security questions&lt;/strong&gt;, &lt;strong&gt;no second admin account.&lt;/strong&gt; It requires a Windows 11 bootable USB drive.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;** Note:**&lt;/em&gt; This method requires physical access to the machine and should only be used on a device you own or are authorized to manage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Create a Bootable Windows 11 USB&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;On another PC, download the Windows 11 Media Creation Tool from:&lt;br&gt;
&lt;a href="https://microsoft.com/software-download/windows11" rel="noopener noreferrer"&gt;https://microsoft.com/software-download/windows11&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Insert a USB drive (8GB minimum) and follow the tool's instructions to create bootable media.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Boot from the USB Drive&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Insert the USB into the locked PC. Restart and press the boot menu key (usually F2, F12, DEL, or ESC depending on your motherboard brand) to select the USB as the boot device.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Open Command Prompt from Recovery&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When the Windows Setup screen appears:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click "Repair your computer" (bottom left)&lt;/li&gt;
&lt;li&gt;Go to Troubleshoot &amp;gt; Advanced Options &amp;gt; Command Prompt&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Replace Utility Manager with CMD (Temporary)&lt;/strong&gt;&lt;br&gt;
In the Command Prompt (cmd), type the following commands one by one:&lt;/p&gt;

&lt;p&gt;move c:\windows\system32\utilman.exe c:\windows\system32\utilman.exe.bak&lt;br&gt;
copy c:\windows\system32\cmd.exe c:\windows\system32\utilman.exe&lt;/p&gt;

&lt;p&gt;** Step 5: Reboot Normally**&lt;/p&gt;

&lt;p&gt;Close Command Prompt and restart the PC without the USB:&lt;/p&gt;

&lt;p&gt;cmd&lt;br&gt;
wpeutil reboot&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6: Open CMD from Login Screen&lt;/strong&gt;&lt;br&gt;
When the Windows 11 login screen appears, click the Accessibility icon (bottom right corner). This will now open a Command Prompt with system-level privileges.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 7: Reset the Password&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Type the following command, replacing the placeholders with your actual username and desired password:&lt;/p&gt;

&lt;p&gt;cmd &lt;br&gt;
net user YourUsername NewPassword123&lt;/p&gt;

&lt;p&gt;press Enter&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 8: Log In and Restore the Original File&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sign in with your new password, then open Command Prompt as administrator and restore the original Utility Manager:&lt;/p&gt;

&lt;p&gt;cmd&lt;br&gt;
copy c:\windows\system32\utilman.exe.bak c:\windows\system32\utilman.exe&lt;/p&gt;

&lt;p&gt;Note: Always restore the original utilman.exe after completing this process. Leaving the modified version in place is a security vulnerability.&lt;/p&gt;

</description>
      <category>opensource</category>
    </item>
    <item>
      <title>MikroTik Router Setup for the Mining Industry</title>
      <dc:creator>Gadisa Belachew</dc:creator>
      <pubDate>Sun, 10 May 2026 12:41:38 +0000</pubDate>
      <link>https://dev.to/gadisa_belachew_1a880eb1c/mikrotik-router-setup-for-the-mining-industry-3d6k</link>
      <guid>https://dev.to/gadisa_belachew_1a880eb1c/mikrotik-router-setup-for-the-mining-industry-3d6k</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8sst85fay7kbx9wo2ld8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8sst85fay7kbx9wo2ld8.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  How I Configured MikroTik for a Cryptocurrency Mining Farm — A Real-World Guide
&lt;/h1&gt;

&lt;p&gt;&lt;em&gt;By Gadisa Belachew — Network and Security Engineer, Addis Ababa, Ethiopia&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;When I was first called in to fix the network at a cryptocurrency mining farm, the situation was already bad. ASIC miners were going offline unpredictably, and nobody could tell why. The assumption was hardware failure. But after a few hours of investigation, the real problem became clear — the monitoring systems had no reliable network connection, so overheating events were going undetected until it was too late.&lt;/p&gt;

&lt;p&gt;That experience taught me something important: in a crypto mining environment, the network is not just infrastructure — it is the nervous system of the entire operation. If it fails, you are not just losing connectivity. You are losing visibility, losing control, and losing money with every minute that passes.&lt;/p&gt;

&lt;p&gt;This guide is based on that real deployment. I will walk you through exactly how I configured MikroTik to solve those problems — from the initial setup through VLANs, firewall hardening, failover, and QoS — so that when I left the site, the network ran perfectly without any further intervention.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Environment
&lt;/h2&gt;

&lt;p&gt;Before diving into configuration, it helps to understand what we were working with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Site type:&lt;/strong&gt; Cryptocurrency mining farm running ASIC miners&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Internet sources:&lt;/strong&gt; Primary fiber optic connection with a microwave/radio link as backup&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Key problem:&lt;/strong&gt; Unstable connectivity during peak hours was causing monitoring systems to lose visibility over miner temperatures — leading to undetected overheating events&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Goal:&lt;/strong&gt; Build a network that was stable, segmented, secure, and fully manageable remotely&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Prerequisites
&lt;/h2&gt;

&lt;p&gt;Before you begin, make sure you have the following ready:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A MikroTik router (I used a CCR series for this deployment)&lt;/li&gt;
&lt;li&gt;A PC or laptop with an ethernet port&lt;/li&gt;
&lt;li&gt;WinBox downloaded from mikrotik.com&lt;/li&gt;
&lt;li&gt;Physical access to the router for initial setup&lt;/li&gt;
&lt;li&gt;Your ISP credentials for the WAN interface&lt;/li&gt;
&lt;li&gt;A clear network diagram of your device layout&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Phase 1 — Initial MikroTik Setup
&lt;/h2&gt;

&lt;p&gt;The first rule I follow on every deployment: never touch configuration before the router is updated and secured. Skipping this step is how you inherit someone else's security problems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1 — First Login
&lt;/h2&gt;

&lt;p&gt;Connect your laptop directly to the MikroTik router using an ethernet cable on &lt;strong&gt;ether1&lt;/strong&gt;. Open WinBox and log in using the default credentials:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IP Address:&lt;/strong&gt; &lt;code&gt;192.168.88.1&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Username:&lt;/strong&gt; &lt;code&gt;admin&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Password:&lt;/strong&gt; &lt;em&gt;(leave blank)&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Step 2 — Update RouterOS Immediately
&lt;/h3&gt;

&lt;p&gt;Before any configuration, update the operating system. I have seen routers in mining environments running RouterOS versions that were years out of date — these carry known vulnerabilities that are actively exploited.&lt;/p&gt;

&lt;p&gt;System &amp;gt; Packages &amp;gt; Check for Updates &amp;gt; Update&lt;/p&gt;

&lt;p&gt;Reboot the router after the update completes before proceeding.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 3 — Change Default Credentials
&lt;/h3&gt;

&lt;p&gt;Default credentials are the number one entry point for unauthorized access. I change these within the first five minutes of every deployment — no exceptions.&lt;/p&gt;

&lt;p&gt;System &amp;gt; Users &amp;gt; admin &amp;gt; Change Password&lt;/p&gt;

&lt;p&gt;Use a strong password of at least 16 characters. I also create a separate read-only account for monitoring purposes so that anyone checking network stats does not need the admin password.&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 2 — Network Design
&lt;/h2&gt;

&lt;p&gt;The biggest mistake I see in mining farm networks is everything running on a flat network — miners, cameras, staff laptops, and monitoring systems all sharing the same broadcast domain. This creates two problems: a security risk if any device is compromised, and a performance problem when staff traffic competes with miner traffic.&lt;/p&gt;

&lt;p&gt;The solution is VLAN segmentation. Here is the structure I used for this deployment:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;VLAN&lt;/th&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;th&gt;Devices&lt;/th&gt;
&lt;th&gt;Subnet&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;VLAN 10&lt;/td&gt;
&lt;td&gt;Miners&lt;/td&gt;
&lt;td&gt;ASIC mining rigs&lt;/td&gt;
&lt;td&gt;10.10.10.0/24&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;VLAN 20&lt;/td&gt;
&lt;td&gt;Management&lt;/td&gt;
&lt;td&gt;Switches, APs, cameras&lt;/td&gt;
&lt;td&gt;10.10.20.0/24&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;VLAN 30&lt;/td&gt;
&lt;td&gt;Operations&lt;/td&gt;
&lt;td&gt;Staff laptops, phones&lt;/td&gt;
&lt;td&gt;10.10.30.0/24&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;VLAN 40&lt;/td&gt;
&lt;td&gt;Monitoring&lt;/td&gt;
&lt;td&gt;Temperature sensors, alerts&lt;/td&gt;
&lt;td&gt;10.10.40.0/24&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Separating the monitoring systems onto their own VLAN was specifically important in this case. Because monitoring had previously shared the network with everything else, congestion during peak hours was causing monitoring packets to drop — which is exactly why the overheating events went undetected. Isolating monitoring traffic on VLAN 40 ensured it always got through regardless of what else was happening on the network.&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 3 — Configuring VLANs on MikroTik
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Create the VLANs
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/interface vlan&lt;br&gt;
add name=vlan10-miners vlan-id=10 interface=ether2&lt;br&gt;
add name=vlan20-mgmt vlan-id=20 interface=ether2&lt;br&gt;
add name=vlan30-ops vlan-id=30 interface=ether2&lt;br&gt;
add name=vlan40-monitoring vlan-id=40 interface=ether2&lt;br&gt;
'''&lt;/p&gt;

&lt;h3&gt;
  
  
  Assign IP Addresses to Each VLAN
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/ip address&lt;br&gt;
add address=10.10.10.1/24 interface=vlan10-miners&lt;br&gt;
add address=10.10.20.1/24 interface=vlan20-mgmt&lt;br&gt;
add address=10.10.30.1/24 interface=vlan30-ops&lt;br&gt;
add address=10.10.40.1/24 interface=vlan40-monitoring&lt;br&gt;
'''&lt;/p&gt;

&lt;h3&gt;
  
  
  Configure DHCP for Each VLAN
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/ip pool&lt;br&gt;
add name=pool-miners ranges=10.10.10.10-10.10.10.254&lt;br&gt;
add name=pool-ops ranges=10.10.30.10-10.10.30.254&lt;br&gt;
add name=pool-monitoring ranges=10.10.40.10-10.10.40.254&lt;/p&gt;

&lt;p&gt;/ip dhcp-server&lt;br&gt;
add name=dhcp-miners interface=vlan10-miners address-pool=pool-miners&lt;br&gt;
add name=dhcp-ops interface=vlan30-ops address-pool=pool-ops&lt;br&gt;
add name=dhcp-monitoring interface=vlan40-monitoring address-pool=pool-monitoring&lt;br&gt;
'''&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 4 — WAN Setup and Failover
&lt;/h2&gt;

&lt;p&gt;This was one of the most critical parts of the deployment. The farm had two internet connections available — a primary fiber optic link and a microwave/radio link as backup. The problem before I arrived was that failover was not configured, so when the fiber dropped during peak hours, the entire operation lost connectivity manually until someone noticed and switched cables by hand.&lt;/p&gt;

&lt;p&gt;MikroTik makes automatic failover straightforward using route distance values:&lt;/p&gt;

&lt;p&gt;'''bash&lt;br&gt;
/ip route&lt;br&gt;
add dst-address=0.0.0.0/0 gateway=fiber-gateway distance=1&lt;br&gt;
add dst-address=0.0.0.0/0 gateway=microwave-gateway distance=2&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;A lower distance value means higher priority. MikroTik automatically switches to the microwave link the moment it detects the fiber gateway is unreachable — with no manual intervention required. When fiber recovers, it switches back automatically.&lt;/p&gt;

&lt;p&gt;I also configured a netwatch script to actively monitor the WAN and trigger failover faster than the default route checking interval:&lt;/p&gt;

&lt;p&gt;'''bash&lt;br&gt;
/tool netwatch&lt;br&gt;
add host=8.8.8.8 interval=10s \&lt;br&gt;
    down-script="/ip route set [find gateway=fiber-gateway] distance=3" \&lt;br&gt;
    up-script="/ip route set [find gateway=fiber-gateway] distance=1"&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;This checks connectivity every 10 seconds and adjusts route distances dynamically — significantly faster than waiting for the default routing protocol to detect a failure.&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 5 — Firewall and Security Hardening
&lt;/h2&gt;

&lt;p&gt;A cryptocurrency mining farm is a high-value target. The equipment alone is worth significant money, and unauthorized access to the network could mean someone else controlling your miners or stealing your hash power. I applied the following firewall rules as a baseline:&lt;/p&gt;

&lt;h3&gt;
  
  
  Core Firewall Rules
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/ip firewall filter&lt;/p&gt;

&lt;h1&gt;
  
  
  Drop all invalid connections immediately
&lt;/h1&gt;

&lt;p&gt;add chain=input connection-state=invalid action=drop comment="Drop invalid"&lt;/p&gt;

&lt;h1&gt;
  
  
  Allow established and related connections
&lt;/h1&gt;

&lt;p&gt;add chain=input connection-state=established,related action=accept \&lt;br&gt;
    comment="Allow established"&lt;/p&gt;

&lt;h1&gt;
  
  
  Isolate monitoring VLAN — only allows outbound alerts, no inbound
&lt;/h1&gt;

&lt;p&gt;add chain=forward src-address=10.10.40.0/24 \&lt;br&gt;
    dst-address=!10.10.10.0/24 action=accept \&lt;br&gt;
    comment="Monitoring can reach miners only"&lt;/p&gt;

&lt;h1&gt;
  
  
  Prevent operations VLAN from reaching miners directly
&lt;/h1&gt;

&lt;p&gt;add chain=forward src-address=10.10.30.0/24 \&lt;br&gt;
    dst-address=10.10.10.0/24 action=drop \&lt;br&gt;
    comment="Staff cannot access miner VLAN"&lt;/p&gt;

&lt;h1&gt;
  
  
  Restrict router management to management VLAN only
&lt;/h1&gt;

&lt;p&gt;add chain=input src-address=10.10.20.0/24 action=accept \&lt;br&gt;
    comment="Management VLAN can access router"&lt;br&gt;
add chain=input action=drop comment="Drop everything else"&lt;br&gt;
'''&lt;/p&gt;

&lt;h3&gt;
  
  
  Disable All Unused Services
&lt;/h3&gt;

&lt;p&gt;Every open service is a potential attack surface. I disable everything that is not actively needed:&lt;/p&gt;

&lt;p&gt;'''bash&lt;br&gt;
/ip service&lt;br&gt;
set telnet disabled=yes&lt;br&gt;
set ftp disabled=yes&lt;br&gt;
set www disabled=yes&lt;br&gt;
set api disabled=yes&lt;br&gt;
set api-ssl disabled=yes&lt;br&gt;
set ssh port=2222&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;Only SSH on a non-standard port and WinBox remain active for remote management.&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 6 — QoS and Bandwidth Management
&lt;/h2&gt;

&lt;p&gt;Before I configured QoS, staff devices on the operations VLAN were consuming significant bandwidth during shift changes — people streaming, downloading, and browsing — which caused noticeable latency on the miner traffic. In a crypto mining context, even small amounts of additional latency on pool communication can affect mining efficiency.&lt;/p&gt;

&lt;h3&gt;
  
  
  Prioritize ASIC Miner Traffic
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/ip firewall mangle&lt;br&gt;
add chain=prerouting src-address=10.10.10.0/24 \&lt;br&gt;
    action=mark-packet new-packet-mark=miners-traffic \&lt;br&gt;
    comment="Mark all miner traffic"&lt;/p&gt;

&lt;p&gt;/queue tree&lt;br&gt;
add name=miners-priority packet-mark=miners-traffic \&lt;br&gt;
    priority=1 max-limit=100M \&lt;br&gt;
    comment="Miners get highest priority"&lt;br&gt;
'''&lt;/p&gt;

&lt;h3&gt;
  
  
  Limit Staff Bandwidth
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/queue simple&lt;br&gt;
add name=ops-limit target=10.10.30.0/24 \&lt;br&gt;
    max-limit=20M/20M \&lt;br&gt;
    comment="Cap staff VLAN at 20Mbps"&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;This ensures that regardless of how many staff devices are active, the ASIC miners always have the bandwidth they need for pool communication and monitoring.&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 7 — Monitoring and Alerts
&lt;/h2&gt;

&lt;p&gt;Given that the original problem was undetected overheating due to poor monitoring visibility, setting up reliable network-level alerts was a priority.&lt;/p&gt;

&lt;h3&gt;
  
  
  Enable SNMP
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/snmp&lt;br&gt;
set enabled=yes \&lt;br&gt;
    contact="&lt;a href="mailto:gadisa@miningfarm.com"&gt;gadisa@miningfarm.com&lt;/a&gt;" \&lt;br&gt;
    location="Crypto Farm — Server Room A"&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;I connected SNMP to The Dude (MikroTik's free monitoring tool) running on a local server. This gave real-time visibility into interface utilization, link status, and device availability across all VLANs.&lt;/p&gt;

&lt;h3&gt;
  
  
  Configure Automatic Email Alerts
&lt;/h3&gt;

&lt;p&gt;'''bash&lt;br&gt;
/tool e-mail&lt;br&gt;
set server=smtp.gmail.com port=587 \&lt;br&gt;
    from=&lt;a href="mailto:alerts@miningfarm.com"&gt;alerts@miningfarm.com&lt;/a&gt; \&lt;br&gt;
    user=&lt;a href="mailto:alerts@miningfarm.com"&gt;alerts@miningfarm.com&lt;/a&gt; \&lt;br&gt;
    password=yourpassword&lt;/p&gt;

&lt;p&gt;/system script&lt;br&gt;
add name=wan-failover-alert source={&lt;br&gt;
  :local msg "PRIMARY WAN DOWN — Switched to Microwave Backup"&lt;br&gt;
  /tool e-mail send to="&lt;a href="mailto:admin@miningfarm.com"&gt;admin@miningfarm.com&lt;/a&gt;" \&lt;br&gt;
  subject="NETWORK ALERT — Mining Farm" body=$msg&lt;br&gt;
}&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;With this in place, the network administrator receives an immediate email the moment the primary fiber link goes down — even at 3am when no one is physically on site.&lt;/p&gt;

&lt;h2&gt;
  
  
  Phase 8 — Backup and Remote Management
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Schedule Automatic Configuration Backups
&lt;/h3&gt;

&lt;p&gt;Losing your router configuration at a remote site without a backup is a serious problem. I scheduled weekly automatic backups as a baseline:&lt;/p&gt;

&lt;p&gt;'''bash&lt;br&gt;
/system backup save name=("crypto-farm-backup-" . \&lt;br&gt;
    [/system clock get date])&lt;br&gt;
/export file=("crypto-farm-config-" . \&lt;br&gt;
    [/system clock get date])&lt;br&gt;
'''&lt;/p&gt;

&lt;p&gt;Store these backups off-site — either on a cloud storage service or a remote server.&lt;/p&gt;

&lt;h3&gt;
  
  
  Remote Access via VPN Only
&lt;/h3&gt;

&lt;p&gt;Never expose WinBox or SSH directly to the public internet. For this deployment I configured an IPsec VPN tunnel so that all remote management traffic passes through an encrypted tunnel before reaching the router. This means even if someone intercepts the traffic, they cannot read or manipulate it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Results After Deployment
&lt;/h2&gt;

&lt;p&gt;Once the configuration was complete and tested, the results were immediate and measurable:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Zero undetected overheating events&lt;/strong&gt; — monitoring traffic on its dedicated VLAN reached the alert system reliably&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automatic failover working&lt;/strong&gt; — when fiber experienced drops during peak hours, the microwave link took over within 10 seconds with no manual intervention&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Miner uptime improved significantly&lt;/strong&gt; — stable connectivity meant ASIC miners stayed connected to mining pools without interruption&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Staff bandwidth no longer competed&lt;/strong&gt; with miner traffic thanks to QoS rules&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The configuration has been running without issues since deployment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Deployment Checklist
&lt;/h2&gt;

&lt;p&gt;Use this checklist for your own mining farm deployment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; RouterOS updated to latest stable version&lt;/li&gt;
&lt;li&gt; Default credentials changed on first login&lt;/li&gt;
&lt;li&gt; VLANs created and tested for isolation&lt;/li&gt;
&lt;li&gt; Monitoring systems on dedicated VLAN&lt;/li&gt;
&lt;li&gt; Dual WAN failover configured and tested&lt;/li&gt;
&lt;li&gt; Netwatch active monitoring configured&lt;/li&gt;
&lt;li&gt; Firewall rules applied and verified&lt;/li&gt;
&lt;li&gt; All unused services disabled&lt;/li&gt;
&lt;li&gt; QoS rules prioritizing miner traffic&lt;/li&gt;
&lt;li&gt; Staff bandwidth capped&lt;/li&gt;
&lt;li&gt; SNMP monitoring enabled&lt;/li&gt;
&lt;li&gt; Email alerts configured and tested&lt;/li&gt;
&lt;li&gt; Automatic config backups scheduled&lt;/li&gt;
&lt;li&gt; Remote access via VPN only&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Configuring a network for a cryptocurrency mining farm is different from a typical office or data center deployment. The stakes are higher, the environment is more demanding, and the consequences of downtime are immediate and financial.&lt;/p&gt;

&lt;p&gt;The most important lesson from this deployment was that monitoring systems must be treated as critical infrastructure — not an afterthought. By isolating monitoring traffic onto its own VLAN and ensuring it always had priority network access, we solved the root cause of the overheating problem that had been affecting the farm for months before I arrived.&lt;/p&gt;

&lt;p&gt;MikroTik proved to be an excellent fit for this environment. The combination of flexible VLAN support, reliable failover routing, granular firewall rules, and built-in QoS made it possible to solve every challenge this deployment presented — at a fraction of the cost of enterprise alternatives.&lt;/p&gt;

&lt;p&gt;If you are planning a similar deployment, start with the checklist above and adapt the configurations to your specific hardware layout and internet sources. Every mining farm is different, but the core principles covered in this guide apply universally.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gadisa Belachew is a Network and Security Engineer based in Addis Ababa, Ethiopia, with over 8 years of experience in networking, security, and infrastructure deployment.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Tags: #networking #mikrotik #security #devops #cryptocurrency&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Author's Note:&lt;/strong&gt; This article is written from my direct hands-on experience configuring MikroTik in a real cryptocurrency mining environment. All configurations have been tested in production.&lt;/p&gt;

</description>
      <category>computerscience</category>
      <category>ai</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
