A comprehensive dashboard offers system administrator an overview of their device farm.
A set of graphics shows insights on:
- How many devices are “alive”
- How many devices have up and outdated configurations
- Distribution of devices per CPU usage
- Distribution of devices per Uptime
- Distribution of firmware versions
- Distribution of device models
All the graphics allows you to click and get access to a list of filtered devices.
Manage all rules for the ip firewall feature, group them into profiles, and associated with Device Shapes. Keep the rules updated at all your devices by applying configuration to the outdated ones.
Manage web proxy rules (allow/deny) using Proxy Profiles. If you use that feature, you’ll also have access to web navigation report that is available to use when you connect using the VPN mode, and have syslogging enabled.
Manage static routes delivered to your devices using Route Profiles.
Create different queues (simple queues) using TikManager. Control your traffic shape, and get out-of-the-box graphics on the queues traffic information.
Firmare Version Control
Create Firmware Profiles in order to define the firmware versions that will be used by your devices at given Device Shape.
For example: create a CURRENT VERSION profile, so the only two things you need to do to upgrade firmware version on your devices is change the firmware version at the profile and them apply the configuration to your devices.
Firmware Image Upload
Upload the firmware images (NPK) that you’d like to user (must be a root user).
These imagens will be available to create new Firmware Profiles, as well as edit existing ones.
Configure the NTP servers that will be used by your Mikrotik devices.
Backup profiles allows you to set a time in the day in which backups are performed inside your devices using RouterOS backup tool, and then are sent to TikManager backend.
It’s possible to choose wether the storage of backup files will be file system based, or AWS S3 Buckets based.
Monitor device’s connectivity with heartbeat monitoring and alerting. If your device stop sending statistics to TikManager’s backend you’ll get notified via e-mail.
Monitoring also includes reboot alerts and CPU usage alerts as well.
Audited Terminal Window
A terminal window inside TikManager for each managed device. This means that you don’t have to hand over passwords anymore. It’s safer than connecting directly to device’s terminal through SSH/Winbox because all commands sent to the device are logged for audit purposes.
Terminal Commands Preset
Create a set of commands that can be reused form the web interface, so you and your staff doesn’t need to type them every time.
Create your scripts and deliver to the devices you choose, just associate a Script Profile to one or more Device Shapes and TikManager will send them when you apply the configurations.
Address List Management
Create address lists, just like you do today, only once, and get them delivered to the devices you want. Keep them easily updated.
Device DNS Management
Configure DNS service of your devices. Create static entries, set the DNS server parameters. Configure DNS servers that will be used by the RouterOS in order to resolve names.
Create Wireless SSIDs just like you do using Winbox, get them easily applied to the devices you want.
Wireless Virtual AP Management
Create VirtualAP for Wireless networks, just like you do using Winbox, get them easily applied to the devices you want.
Wireless Security Profiles Management
Create security profiles for Wireless networks, just like you do using Winbox, make them available to use on Wireless Profiles, get them easily applied to the devices you want.
Command Queue (Configuration delivery control)
Ny default, TikManager deliver configurations for up to 20 devices at a same time. You are able to follow up the status of each scheduled delivery to know when the work is finished.
Input the geo coordinates for each device and get a geo-location based network map of your devices.
Multi-Factor Authentication (MFA)
TikManager supports integration with Google Authenticator to increase security by using MFA.
Security – Permissions and Sharing
Create groups, assign permissions, share your devices with other users, with a fine grained control over operations users can perform on each devices or set of devices.
Centralized and Indexed Syslog
TikManager offers a backend infrastructure for syslog messages collection and indexing. Search syslog messages from the web interface for all of your devices from a single location.
In order to use that feature, devices must be connected using VPN mode.
Company Logo Customization
Set your own logo URL so you can have it shown at the TOP left screeen all the times.