a collection of scripts for MikroTik RouterOS
Find a file
2019-04-03 13:14:09 +02:00
certs update-tunnelbroker: verify certificate 2019-01-02 15:02:42 +01:00
.gitignore ignore all html files 2019-01-02 16:26:32 +01:00
accesslist-duplicates.capsman accesslist-duplicates: Read index from terminal inkey 2019-03-16 23:36:38 +01:00
accesslist-duplicates.local accesslist-duplicates: Read index from terminal inkey 2019-03-16 23:36:38 +01:00
accesslist-duplicates.template accesslist-duplicates: Read index from terminal inkey 2019-03-16 23:36:38 +01:00
bridge-port-to-default global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
bridge-port-toggle global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
capsman-download-packages capsman-download-packages: split off capsman-rolling-upgrade 2019-02-14 20:49:05 +01:00
capsman-rolling-upgrade capsman-download-packages: split off capsman-rolling-upgrade 2019-02-14 20:49:05 +01:00
check-certificates check-certificates: support multiple passphrases 2019-04-01 22:45:38 +02:00
check-lte-firmware-upgrade check-lte-firmware-upgrade: remove workaround 2019-02-11 16:21:28 +01:00
check-routeros-update check-routeros-update: link to changelog in notification 2019-03-29 12:23:16 +01:00
collect-wireless-mac.capsman collect-wireless-mac: use $ScriptLock 2019-02-21 20:16:03 +01:00
collect-wireless-mac.local collect-wireless-mac: use $ScriptLock 2019-02-21 20:16:03 +01:00
collect-wireless-mac.template collect-wireless-mac: use $ScriptLock 2019-02-21 20:16:03 +01:00
daily-psk-schedule daily-psk: prepare for caps-man 2019-03-06 16:12:03 +01:00
daily-psk.capsman daily-psk: prepare for caps-man 2019-03-06 16:12:03 +01:00
daily-psk.local daily-psk: prepare for caps-man 2019-03-06 16:12:03 +01:00
daily-psk.template daily-psk: prepare for caps-man 2019-03-06 16:12:03 +01:00
dhcp-lease-comment.capsman dhcp-lease-comment: simplify array access 2019-01-15 10:34:22 +01:00
dhcp-lease-comment.local dhcp-lease-comment: simplify array access 2019-01-15 10:34:22 +01:00
dhcp-lease-comment.template dhcp-lease-comment: simplify array access 2019-01-15 10:34:22 +01:00
dhcp-to-dns dhcp-to-dns: rework, fix cleanup with mac-address and more 2019-02-08 13:43:00 +01:00
email-backup email-backup: silence unwanted output 2019-01-15 10:58:54 +01:00
global-config script-updates: add option to ignore global-config changes 2019-04-02 08:48:35 +02:00
global-config.changes script-updates: add option to ignore global-config changes 2019-04-02 08:48:35 +02:00
global-functions script-updates: send global-config changes notification just once 2019-04-03 08:30:28 +02:00
gps-track gps-track: replace http-content-type with http-header-field 2019-02-11 22:00:03 +01:00
initial-commands initial-commands: put into blocks 2019-01-12 15:48:48 +01:00
ip-addr-bridge global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
ipv6-update ipv6-update: simplify array access 2019-02-08 14:14:15 +01:00
learn-mac-based-vlan update copyright for 2019 2019-01-02 09:38:34 +01:00
lease-script lease-script: split scripts for de/assign, add debug log 2019-01-15 10:29:12 +01:00
leds-day-mode update copyright for 2019 2019-01-02 09:38:34 +01:00
leds-night-mode update copyright for 2019 2019-01-02 09:38:34 +01:00
leds-toggle-mode update copyright for 2019 2019-01-02 09:38:34 +01:00
Makefile Makefile: update links for generated html 2019-01-02 16:22:14 +01:00
manage-umts global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
mode-button-event global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
mode-button-scheduler global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
netwatch-syslog netwatch-syslog: simplify array access 2019-01-15 10:40:40 +01:00
packages-update add script 'packages-update' 2019-02-19 16:47:41 +01:00
ppp-on-up ppp-on-up: just release ipv6 lease 2019-01-04 20:32:14 +01:00
README.md README: add hint on features for specific scripts 2019-04-01 10:42:57 +02:00
rotate-ntp global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
script-updates script-updates: clear variable after use 2019-04-03 13:14:09 +02:00
sms-action global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
sms-forward global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
ssh-keys-import global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
super-mario-theme super-mario-theme: simplify array access 2019-01-09 12:54:59 +01:00
template.md add template for script documentation 2019-01-02 21:31:59 +01:00
unattended-lte-firmware-upgrade unattended-lte-firmware-upgrade: remove workaround 2019-02-11 22:00:03 +01:00
update-gre-address global: variable names are CamelCase 2019-01-04 12:35:34 +01:00
update-tunnelbroker update-tunnelbroker: fix parsing id 2019-01-15 10:46:54 +01:00

RouterOS Scripts

RouterOS is the operating system developed by MikroTik for networking tasks. This repository holds a number of scripts to manage RouterOS devices or extend their functionality.

Use at your own risk!

Requirements

Latest version of the scripts require at least RouterOS 6.43 to function properly. The changelog lists the corresponding change as follows:

*) fetch - added "as-value" output format;

Specific scripts may require even newer RouterOS version, for example cloud backup was added in 6.44.

Initial setup

Get me ready!

If you know how things work just copy and paste the initial commands. Remember to edit and rerun global-config! First time useres should take the long way below.

Live presentation

Want to see it in action? I've had a presentation Repository based RouterOS script distribution including demonstation recorded live at MUM Europe 2019 in Vienna.

The long way in detail

The update script does server certificate verification, so first step is to download the certificates. If you intend to download the scripts from a different location (for example from github.com) install the corresponding certificate chain.

[admin@MikroTik] > / tool fetch "https://git.eworm.de/cgit.cgi/routeros-scripts/plain/certs/letsencrypt.pem" dst-path="letsencrypt.pem"
      status: finished
  downloaded: 3KiBC-z pause]
       total: 3KiB
    duration: 1s

Note that the commands above do not verify server certificate, so if you want to be safe download with your workstations's browser and transfer the files to your MikroTik device.

Then we import the certificates.

[admin@MikroTik] > / certificate import file-name=letsencrypt.pem passphrase=""
     certificates-imported: 3
     private-keys-imported: 0
            files-imported: 1
       decryption-failures: 0
  keys-with-no-certificate: 0

For basic verification we rename the certifiactes and print their count. Make sure the certificate count is three.

[admin@MikroTik] > / certificate set name="ISRG-Root-X1" [ find where fingerprint="96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6" ]
[admin@MikroTik] > / certificate set name="Let-s-Encrypt-Authority-X3" [ find where fingerprint="731d3d9cfaa061487a1d71445a42f67df0afca2a6c2d2f98ff7b3ce112b1f568" ]
[admin@MikroTik] > / certificate set name="DST-Root-CA-X3" [ find where fingerprint="0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739" ]
[admin@MikroTik] > / certificate print count-only where fingerprint="96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6" or fingerprint="731d3d9cfaa061487a1d71445a42f67df0afca2a6c2d2f98ff7b3ce112b1f568" or fingerprint="0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739"
3

Always make sure there are no certificates installed you do not know or want!

Actually we do not require the certificate named DST Root CA X3, but as it is used by Let's Encrypt to cross-sign we install it anyway - this makes sure things do not go wrong if the intermediate certificate is replaced. The IdenTrust certificate should be available from their download page. The site is crap and a good example how to not do it.

Now let's download the main scripts and add them in configuration on the fly.

[admin@MikroTik] > :foreach Script in={ "global-config"; "global-functions"; "script-updates" } do={ / system script add name=$Script source=([ / tool fetch check-certificate=yes-without-crl ("https://git.eworm.de/cgit.cgi/routeros-scripts/plain/" . $Script) output=user as-value]->"data"); }

The configuration needs to be tweaked for your needs. Make sure not to send your mails to mail@example.com!

[admin@MikroTik] > / system script edit global-config source

And finally load configuration and functions and add the schedulers.

[admin@MikroTik] > / system script run global-config
[admin@MikroTik] > / system script run global-functions
[admin@MikroTik] > / system scheduler add name=global-config start-time=startup on-event=global-config
[admin@MikroTik] > / system scheduler add name=global-functions start-time=startup on-event=global-functions

Updating scripts

To update existing scripts just run script-updates.

[admin@MikroTik] > / system script run script-updates

Adding a script

To add a script from the repository create a configuration item first, then update scripts to fetch the source.

[admin@MikroTik] > / system script add name=check-routeros-update
[admin@MikroTik] > / system script run script-updates

Scheduler and events

Most scripts are designed to run regularly from scheduler. We just added check-routeros-update, so let's run it every hour to make sure not to miss an update.

[admin@MikroTik] > / system scheduler add name=check-routeros-update interval=1h on-event=check-routeros-update

Some events can run a script. If you want your DHCP hostnames to be available in DNS use dhcp-to-dns with the events from dhcp server. For a regular cleanup add a scheduler entry.

[admin@MikroTik] > / system script add name=dhcp-to-dns
[admin@MikroTik] > / system script run script-updates
[admin@MikroTik] > / ip dhcp-server set lease-script=dhcp-to-dns [ find ]
[admin@MikroTik] > / system scheduler add name=dhcp-to-dns interval=5m on-event=dhcp-to-dns

There's much more to explore... Have fun!

Upstream

URL: GitHub.com

Mirror: eworm.de GitLab.com


▲ Go back to top