First Time Configuration RouterOS
First Time Configuration RouterOS
More information about the current default configuration can be found in the Quick Guide document that came with your device. The quick guide document
will include information about which ports should be used to connect for the first time and how to plug in your devices.
This document describes how to set up the device from the ground up, so we will ask you to clear away all defaults.
When connecting the first time to the router with the default username admin and no password (for some models, check the user password on the sticker),
you will be asked to reset or keep the default configuration (even if the default config has only an IP address). Since this article assumes that there is no
configuration on the router you should remove it by pressing "r" on the keyboard when prompted or click on the "Remove configuration" button in WinBox.
Connect the Routers ether1 port to the WAN cable and connect your PC to ether2. Now open WinBox and look for your router in Neighbor Discovery. See
detailed example in Winbox article.
If you see the router in the list, click on the MAC address and click Connect.
The simplest way to make sure you have clean router, with no configuration, is to run:
Configuring IP Access
Since the MAC connection is not very stable, the first thing we need to do is to set up a router so that IP connectivity is available:
The next step is to set up a DHCP server. We will run the setup command for easy and fast configuration:
[admin@MikroTik] /ip dhcp-server setup [enter]
Select interface to run DHCP server on
Now connected PC should be able to get a dynamic IP address. Close the Winbox and reconnect to the router using the IP address (192.168.88.1)
Dynamic Public IP
Dynamic address configuration is the simplest one. You just need to set up a DHCP client on the public interface. DHCP client will receive information from
an internet service provider (ISP) and set up an IP address, DNS, NTP servers, and default route for you.
/ip dhcp-client add disabled=no interface=ether1
After adding
the client you
should see
the assigned
address and
the status
should be
bound
Static
Public IP
In the case of static address configuration, your ISP gives you parameters, for example:
IP: 1.2.3.100/24
Gateway: 1.2.3.1
DNS: 8.8.8.8
These are three basic parameters that you need to get the internet connection working
To set this in RouterOS we will manually add an IP address, add a default route with a provided gateway, and set up a DNS server
PPPoE Connection
PPPoE connection also gives you a dynamic IP address and can configure dynamically DNS and default gateway. Typically service provider (ISP) gives
you a username and password for the connection
/interface pppoe-client
add disabled=no interface=ether1 user=me password=123 add-default-route=yes use-peer-dns=yes
Winbox/Webfig actions:
Now in configuration WAN interface is pppoe-out interface, not ether1, make sure to adjust "/interface/list/member" to reflect these changes, if
you are referencing interface lists in your configuration.
Verify Connectivity
After successful configuration, you should be able to access the internet from the router.
Verify IP connectivity by pinging a known IP address (google DNS server for example)
[admin@MikroTik] > /ping 8.8.8.8
HOST SIZE TTL TIME STATUS
8.8.8.8 56 47 21ms
8.8.8.8 56 47 21ms
Minimum 12 characters;
Include numbers, Symbols, Capital and lowercase letters;
Is not a Dictionary Word or a combination of Dictionary Words;
/password
We strongly suggest using a second method or Winbox interface to apply a new password for your router, just to keep it safe from other unauthorized
access.
Make sure you remember the password! If you forget it, there is no recovery. You will need to reinstall the router!
You can also add more users with full or limited router access in /user menu
The best practice is to add a new user with a strong password and disable or remove the default admin user.
Note: login to the router with new credentials to check that the username/password is working.
Then, add your previously created bridge named "local" to the interface list:
Winbox/Webfig actions:
Open Interfaces → Interface List → Lists window and add a new list by clicking "+";
Input the interface list name "listBridge" into the Name field and click OK;
Go back to the Interfaces → Interface List section and click "+";
Select "listBridge" from the dropdown List options and select "local" from the dropdown Interf
ace options and click OK;
Open Tools -> Mac Server window;
Click on the "MAC Telnet Server" button, a new dialog will open;
Select the newly created list "listBridge" from the dropdown list and click on the OK button to
apply settings.
Do the same in the MAC Winbox Server tab to block Mac Winbox connections from the internet.
Neighbor Discovery
MikroTik Neighbor discovery protocol is used to show and recognize other MikroTik routers in the network. Disable neighbor discovery on public interfaces:
IP Connectivity Access
Besides the fact that the firewall protects your router from unauthorized access from outer networks, it is possible to restrict username access for the
specific IP address
IP connectivity on the public interface must be limited in the firewall. We will accept only ICMP(ping/traceroute), IP Winbox, and SSH access.
/ip firewall filter
add chain=input connection-state=established,related action=accept comment="accept established,related";
add chain=input connection-state=invalid action=drop;
add chain=input in-interface=ether1 protocol=icmp action=accept comment="allow ICMP";
add chain=input in-interface=ether1 protocol=tcp port=8291 action=accept comment="allow Winbox";
add chain=input in-interface=ether1 protocol=tcp port=22 action=accept comment="allow SSH";
add chain=input in-interface=ether1 action=drop comment="block everything else";
In case the public interface is PPPoE, then the in-interface should be set to "pppoe-out".
The first two rules accept packets from already established connections, so we assume those are OK to not overload the CPU. The third rule drops any
packet that connection tracking thinks is invalid. After that, we set up typical accept rules for specific protocols.
If you are using Winbox/Webfig for configuration, here is an example of how to add an established/related rule:
Administrative Services
Although the firewall protects the router from the public interface, you may still want to disable RouterOS services.
Most of RouterOS administrative tools are configured at the /ip service menu
Change default service ports, this will immediately stop most of the random SSH brute force login attempts:
Additionally, each service can be secured by the allowed IP address or address range(the address service will reply to), although the preferred method is
to block unwanted access in the firewall filter,because the firewall will not even allow to open socket
Other Services
A bandwidth server is used to test throughput between two MikroTik routers. Disable it in the production environment.
A router might have DNS cache enabled, which decreases the resolving time for DNS requests from clients to remote servers. In case DNS cache is not
required on your router or another router is used for such purposes, disable it.
Some RouterBOARDs have an LCD module for informational purposes, set a pin or disable it.
/interface print
/interface set x disabled=yes
You can enable stronger crypto for SSH, most newer programs use it, to turn on SSH strong crypto:
The following services are disabled by default, nevertheless, it is better to make sure that none of them were enabled accidentally:
NAT Configuration
At this point, the PC is not yet able to access the Internet, because locally used addresses are not routable over the Internet. Remote hosts simply do not
know how to correctly reply to your local address.
The solution for this problem is to change the source address for outgoing packets to the router's public IP. This can be done with the NAT rule:
In case if a public interface is a pppoe, then the out-interface should be set to "pppoe-out".
Another benefit of such a setup is that NATed clients behind the router are not directly connected to the Internet, that way additional protection against
attacks from outside mostly is not required.
Port Forwarding
Some client devices may need direct access to the internet over specific ports. For example, a client with an IP address 192.168.88.254 must be
accessible by Remote desktop protocol (RDP).
After a quick search on Google, we can find out that RDP runs on TCP port 3389. Now we can add a destination NAT rule to redirect RDP to the client's
PC.
/ip firewall nat
add chain=dstnat protocol=tcp port=3389 in-interface=ether1 action=dst-nat to-address=192.168.88.254
If you have set up strict firewall rules then RDP protocol must be allowed in the firewall filter forward chain.
Setting up Wireless
For ease of use bridged wireless setup will be made so that your wired hosts are in the same Ethernet broadcast domain as wireless clients.
The important part is to make sure that our wireless is protected, so the first step is the security profile.
Security profiles are configured from /interface wireless security-profiles menu in a terminal.
in Winbox/Webfig click on Wireless to open wireless windows and choose the Security Profile tab.
If there are legacy devices that do not support WPA2 (like Windows XP), you may also want to allow WPA protocol.
Now when the security profile is ready we can enable the wireless interface and set the desired parameters
/interface wireless
enable wlan1;
set wlan1 band=2ghz-b/g/n channel-width=20/40mhz-Ce distance=indoors mode=ap-bridge ssid=MikroTik-006360
wireless-protocol=802.11 security-profile=myProfile frequency-mode=regulatory-domain set country=latvia
The last step is to add a wireless interface to a local bridge, otherwise, connected clients will not get an IP address:
Now wireless should be able to connect to your access point, get an IP address, and access the internet.
A ruleset is similar to input chain rules (accept established/related and drop invalid), except the first rule with action=fasttrack-connection. This
rule allows established and related connections to bypass the firewall and significantly reduce CPU usage.
Another difference is the last rule which drops all new connection attempts from the WAN port to our LAN network (unless DstNat is used). Without this
rule, if an attacker knows or guesses your local subnet, he/she can establish connections directly to local hosts and cause a security threat.
For more detailed examples on how to build firewalls will be discussed in the firewall section, or check directly Building Your First Firewall article.
Blocking Unwanted Websites
Sometimes you may want to block certain websites, for example, deny access to entertainment sites for employees, deny access to porn, and so on. This
can be achieved by redirecting HTTP traffic to a proxy server and using an access-list to allow or deny certain websites.
First, we need to add a NAT rule to redirect HTTP to our proxy. We will use RouterOS built-in proxy server running on port 8080.
Using Winbox:
In the "Web Proxy Access" dialog click on "+" to add a new Web-proxy rule
Enter the Dst hostname that you want to block, in this case, "www.facebook.com", and
choose the action "deny"
Then click on the "Ok" button to apply changes.
Repeat the same to add other rules.
Troubleshooting
RouterOS has built-in various troubleshooting tools, like ping, traceroute, torch, packet sniffer, bandwidth test, etc.
We already used the ping tool in this article to verify internet connectivity.
You cannot reach www.google.com from your computer which is connected to a MikroTik device:
If you are not sure how exactly to configure your gateway device, please reach out to MikroTik's official consultants for configuration support.