🚀 Power your network with unstoppable speed and reliability!
The MikroTik Cloud Core Router 1016-12S-1S+ is a high-performance, industrial-grade router featuring a 16-core 1.2GHz Tilera CPU, 12 SFP ports plus a 10G SFP+ port, and dual redundant power supplies. Designed for professional network environments, it includes a touchscreen LCD, temperature monitoring, and runs RouterOS L6, all housed in a compact 1U rackmount chassis.
RAM | 2048 MB |
Brand | MikroTik |
Series | CCR1016-12S-1S+ |
Item model number | CCR1016-12S-1S+ |
Operating System | RouterOS |
Item Weight | 2 pounds |
Product Dimensions | 18.5 x 10.63 x 2.76 inches |
Item Dimensions LxWxH | 18.5 x 10.63 x 2.76 inches |
Number of Processors | 16 |
Flash Memory Size | 128 |
Voltage | 1.1E+2 Volts (AC) |
Manufacturer | Mikrotik |
ASIN | B00KVFQCOC |
Is Discontinued By Manufacturer | No |
Date First Available | August 29, 2014 |
H**L
Great product. You can't find anything better for the price.
I utilize these routers at various locations and have had no problems with them. I utilized the Mikrotik SFP and SFP+ transceivers with them. We utilize OSPF routing between them as well as BGP routing to the internet. The BGP routing when having full routing tables can take a while to get synchronized as it currently only utilized 1 of the CPUs for that process. We solved this by having routing rules that drops routes longer than 3 or 4 hops and then utilize the default route for any longer routes. I knew the limitations on BGP when purchasing. We have used these now for about a year and a half with no downtime. We utilize these in pairs for redundancy. I really like that these ones have the redundant power.
E**T
Wait for Mikrotik's software update - This is one of the known "VPNFilter" malware affected devices
If this Mikrotik was on your shortlist of routers to purchase, you should wait for a firmware/software update on the MikroTik RouterOS before purchasing. VPNFilter is a multistage malware where it is able to infect a router and have the malware persist even after a reboot. The additional stages of the malware allow it to do data collection and other botnet related activities. And as a last countermeasure, it is able to overwrite firmware to "brick" the device if desired.Other known devices affected include:Linksys E1200Linksys E2500Linksys WRVS4400NMikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072Netgear DGN2200Netgear R6400Netgear R7000Netgear R8000Netgear WNR1000Netgear WNR2000QNAP TS251QNAP TS439 ProOther QNAP NAS devices running QTS softwareTP-Link R600VPN
Trustpilot
1 week ago
1 week ago