Professional Documents
Culture Documents
Leadership and Board Engagement
Leadership and Board Engagement
Leadership and Board Engagement
PARTNERSHIPS
AGREE MOSTLY AGREE NEUTRA MOSTLY DISAGRE
L
FINANCIAL MANAGEMENT
AGREE MOSTLY AGREE NEUTRA MOSTLY DISAGRE
L
COMMUNICATION
AGREE MOSTLY AGREE NEUTRA MOSTLY DISAGRE
L
The first step in becoming a NGO is to first register as a company limited by guarantee under the
Companies Act at the Belize Companies and Corporate Affairs Registry, located in Belmopan, Cayo
District.
a statement of its accounts audited in accordance with section 15(2) of this section;
In the hotspot view, we can use the IP Bindings menu, Walled Garden or you can also
use IP Walled Garden.
IP Bindings
technique Bindings IP enables us to log in without passing authentication. The trick is
we must know the MAC address of one of the devices connected to the hotspot so that
we can add it to our device.
1. Select menu IP> Hotspot> IP Bindings. Then add the MAC address of the
user to be bypassed.
2. In the TYPE menu, there are three types of parameters, namely:
Blocked = MAC addresses that are registered automatically will not get
hotspot service.
Bypassed = The registered MAC address will be Bypassed so that you don’t
need to go through the authentication process.
Regular = MAC addresses that are registered through the authentication
process.
So from that we can do IP Bindings to the active host, the method is to select the host
then double-click and select Make Binding.
Users who have not passed the authentication process but can access certain websites,
in this case use the walled garden technique. For example, unauthenticated users can
open the website “www.mikrotik.co.id”.
Select menu IP> Hotspot> Walled Garden. Then in the Dst.Host parameter, fill in *
mikrotik.co.id and in Action, select allow.
IP-Walled Garden
Functions almost the same as Walled Garden but can bypass more specific resources
on certain protocols and ports.
This is done to bypass local servers that do not require authentication. For example, we
will bypass traffic using the TCP protocol and destination ports 20-21 FTP.
Type the first time you log into Mikrotik, of course we have to change the computer’s IP
address to static.
To access Mikrotik when it has just been reset, you can use port 2 on Mikrotik or
Mikrotik hap lite.