Securing MikroTik Routers with SSH Keys
This blog post walks you through the steps to configure SSH key-based authentication on MikroTik routers with practical examples.
Some common network protocols
Common network protocols and their port numbers