Mikrotik Setup
Remote Logging
Send MikroTik logs to WiZone Cloud for regulatory compliance under Thailand's Computer Crime Act.
Sending logs to WiZone Cloud keeps your deployment compliant with Thailand's Computer Crime Act (พ.ร.บ. คอมพิวเตอร์). All hotspot, firewall, and DHCP events are stored securely in WiZone.
Step 1 – Create Remote Syslog Action
Go to System → Logging → Actions tab → Add (+) and configure:
| Field | Value |
|---|---|
| Name | wizone-syslog |
| Type | remote |
| Remote Address | 10.1.10.8 |
| Remote Port | 5140 |
| BSD Syslog | ❌ Unchecked (uses RFC 5424 format) |
Click Apply → OK.

Step 2 – Add Logging Rules
Go to System → Logging → Rules tab and add each rule:
Rule 1 — Hotspot events:
| Field | Value |
|---|---|
| Topics | hotspot |
| Action | wizone-syslog |
Rule 2 — Firewall events:
| Field | Value |
|---|---|
| Topics | firewall |
| Action | wizone-syslog |
Rule 3 — DHCP events:
| Field | Value |
|---|---|
| Topics | dhcp |
| Action | wizone-syslog |

Verify
Go to WiZone Portal → Firewall Logs — you should see log entries arriving.
| Problem | Check |
|---|---|
| No logs appearing | Verify route to 10.1.10.0/24 (Stage 3) and WireGuard handshake (Stage 2) |