a collection of scripts for MikroTik RouterOS
Find a file
Christian Hesse 0ecb0749fd capsman-download-packages: do not restart service...
... but disconnect old CAPs and force reconnect with update.
2018-12-27 21:36:31 +01:00
certs global-functions: make $CertificateAvailable work on CommonName 2018-12-20 22:21:00 +01:00
.gitignore ignore patch files 2018-08-24 17:09:40 +02:00
accesslist-duplicates.capsman remove extra dollar sign 2018-12-12 21:57:17 +01:00
accesslist-duplicates.local remove extra dollar sign 2018-12-12 21:57:17 +01:00
accesslist-duplicates.template remove extra dollar sign 2018-12-12 21:57:17 +01:00
bridge-port-to-default bridge-port-to-default: delay only when required 2018-10-25 20:48:48 +02:00
bridge-port-toggle add script 'bridge-port-toggle' 2018-10-04 14:03:09 +02:00
capsman-download-packages capsman-download-packages: do not restart service... 2018-12-27 21:36:31 +01:00
check-certificates check-certificates: support auto-renew of certificates 2018-12-20 15:55:40 +01:00
check-lte-firmware-update check-lte-firmware-update: strip the extra line break 2018-12-17 11:36:41 +01:00
check-routeros-update global-functions: add identity tag in $SendNotification 2018-11-28 21:19:39 +01:00
collect-wireless-mac.capsman global-functions: add $GetMacVendor 2018-12-27 00:48:56 +01:00
collect-wireless-mac.local global-functions: add $GetMacVendor 2018-12-27 00:48:56 +01:00
collect-wireless-mac.template global-functions: add $GetMacVendor 2018-12-27 00:48:56 +01:00
daily-psk remove extra dollar sign 2018-12-12 21:57:17 +01:00
daily-psk-schedule add script 'daily-psk-schedule' 2018-10-12 13:39:40 +02:00
dhcp-lease-comment.capsman start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
dhcp-lease-comment.local start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
dhcp-lease-comment.template start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
dhcp-to-dns dhcp-to-dns: use 'print count-only' 2018-11-09 21:32:01 +01:00
email-backup email-backup: support cloud backup 2018-12-18 22:48:28 +01:00
global-config check-certificates: support auto-renew of certificates 2018-12-20 15:55:40 +01:00
global-functions global-functions: add $GetMacVendor 2018-12-27 00:48:56 +01:00
gps-track start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
initial-commands global-functions: make $CertificateAvailable work on CommonName 2018-12-20 22:21:00 +01:00
ip-addr-bridge ip-addr-bridge: ignore bridges without ports 2018-11-26 11:12:24 +01:00
ipv6-update ipv6-update: remove settings from global-config 2018-12-19 16:48:34 +01:00
learn-mac-based-vlan learn-mac-based-vlan: move log inside condition 2018-11-09 21:35:56 +01:00
lease-script lease-script: use 'print count-only' 2018-11-09 21:28:35 +01:00
leds-day-mode start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
leds-night-mode start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
leds-toggle-mode start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
Makefile add script 'accesslist-duplicates' 2018-09-03 16:22:14 +02:00
manage-umts start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
mode-button-event mode-button-event: decrease interval, but update start time 2018-10-11 22:39:25 +02:00
mode-button-scheduler start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
netwatch-syslog netwatch-syslog: set dont-require-permissions=yes 2018-10-12 11:17:39 +02:00
ppp-on-up start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
README.md global-functions: make $CertificateAvailable work on CommonName 2018-12-20 22:21:00 +01:00
remove-packages remove-packages: delay if uptime less than one minute 2018-12-21 11:38:04 +01:00
rotate-ntp start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
script-updates script-updates: run global-functions on update 2018-10-16 21:22:47 +02:00
sms-action start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
sms-forward global-functions: add identity tag in $SendNotification 2018-11-28 21:19:39 +01:00
ssh-keys-import start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
super-mario-theme start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00
update-gre-address update-gre-address: remove settings from global-config 2018-12-19 17:22:36 +01:00
update-tunnelbroker start scripts with a magic token / shebang 2018-09-27 00:18:43 +02:00

RouterOS Scripts

RouterOS is the operating system developed by MikroTik for networking tasks. This repository holds a number of scripts to manage RouterOS devices or extend their functionality.

Use at your own risk!

Requirements

Latest version of the scripts require at least RouterOS 6.43 to function properly. The changelog lists the corresponding change as follows:

*) fetch - added "as-value" output format;

See branch pre-6-43 if you want to use the scripts on devices with older RouterOS version.

Initial setup

Get me ready!

If you know how things work just copy and paste the initial commands. Remember to edit and rerun global-config! First time useres should take the long way below.

The long way in detail

The update script does server certificate verification, so first step is to download the certificates. If you intend to download the scripts from a different location (for example from github.com) install the corresponding certificate chain.

[admin@MikroTik] > / tool fetch "https://git.eworm.de/cgit.cgi/routeros-scripts/plain/certs/letsencrypt.pem" dst-path="letsencrypt.pem"
      status: finished
  downloaded: 3KiBC-z pause]
       total: 3KiB
    duration: 1s

Note that the commands above do not verify server certificate, so if you want to be safe download with your workstations's browser and transfer the files to your MikroTik device.

Then we import the certificates.

[admin@MikroTik] > / certificate import file-name=letsencrypt.pem passphrase=""
     certificates-imported: 3
     private-keys-imported: 0
            files-imported: 1
       decryption-failures: 0
  keys-with-no-certificate: 0

For basic verification we rename the certifiactes and print their count. Make sure the certificate count is three.

[admin@MikroTik] > / certificate set name="ISRG-Root-X1" [ find where fingerprint="96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6" ]
[admin@MikroTik] > / certificate set name="Let-s-Encrypt-Authority-X3" [ find where fingerprint="731d3d9cfaa061487a1d71445a42f67df0afca2a6c2d2f98ff7b3ce112b1f568" ]
[admin@MikroTik] > / certificate set name="DST-Root-CA-X3" [ find where fingerprint="0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739" ]
[admin@MikroTik] > / certificate print count-only where fingerprint="96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6" or fingerprint="731d3d9cfaa061487a1d71445a42f67df0afca2a6c2d2f98ff7b3ce112b1f568" or fingerprint="0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739"
3

Always make sure there are no certificates installed you do not know or want!

Actually we do not require the certificate named DST Root CA X3, but as it is used by Let's Encrypt to cross-sign we install it anyway - this makes sure things do not go wrong if the intermediate certificate is replaced. The IdenTrust certificate should be available from their download page. The site is crap and a good example how to not do it.

Now let's download the main scripts and add them in configuration on the fly.

[admin@MikroTik] > :foreach script in={ "global-config"; "global-functions"; "script-updates" } do={ / system script add name=$script source=([ / tool fetch check-certificate=yes-without-crl ("https://git.eworm.de/cgit.cgi/routeros-scripts/plain/" . $script) output=user as-value]->"data"); }

The configuration needs to be tweaked for your needs. Make sure not to send your mails to mail@example.com!

[admin@MikroTik] > / system script edit global-config source

And finally load the configuration and add a scheduler.

[admin@MikroTik] > / system script run global-config
[admin@MikroTik] > / system scheduler add name=global-config start-time=startup on-event=global-config

Updating scripts

To update existing scripts just run script-updates.

[admin@MikroTik] > / system script run script-updates

Adding a script

To add a script from the repository create a configuration item first, then update scripts to fetch the source.

[admin@MikroTik] > / system script add name=check-routeros-update
[admin@MikroTik] > / system script run script-updates

Scheduler and events

Most scripts are designed to run regularly from scheduler. We just added check-routeros-update, so let's run it every hour to make sure not to miss an update.

[admin@MikroTik] > / system scheduler add name=check-routeros-update interval=1h on-event=check-routeros-update

Some events can run a script. If you want your DHCP hostnames to be available in DNS use dhcp-to-dns with the events from dhcp server. For a regular cleanup add a scheduler entry.

[admin@MikroTik] > / system script add name=dhcp-to-dns
[admin@MikroTik] > / system script run script-updates
[admin@MikroTik] > / ip dhcp-server set lease-script=dhcp-to-dns [ find ]
[admin@MikroTik] > / system scheduler add name=dhcp-to-dns interval=5m on-event=dhcp-to-dns

There's much more to explore... Have fun!

Upstream

URL: GitHub.com

Mirror: eworm.de GitLab.com