a collection of scripts for MikroTik RouterOS
Find a file
2020-03-20 09:26:12 +01:00
certs global-functions: $CertificateAvailable: fetch by CommonName 2019-04-30 16:52:53 +02:00
.gitignore ignore all html files 2019-01-02 16:26:32 +01:00
accesslist-duplicates.capsman update copyright for 2020 2020-01-01 17:00:39 +01:00
accesslist-duplicates.local update copyright for 2020 2020-01-01 17:00:39 +01:00
accesslist-duplicates.template update copyright for 2020 2020-01-01 17:00:39 +01:00
bridge-port-to-default bridge-port-to-default: use $LogPrintExit for debug 2020-03-05 09:24:10 +01:00
bridge-port-toggle update copyright for 2020 2020-01-01 17:00:39 +01:00
capsman-download-packages update copyright for 2020 2020-01-01 17:00:39 +01:00
capsman-rolling-upgrade update copyright for 2020 2020-01-01 17:00:39 +01:00
certificate-renew-issued certificate-renew-issued: support auto-export with given passphrases 2020-03-20 09:26:12 +01:00
check-certificates check-certificates: use $LogPrintExit for debug 2020-03-05 09:01:11 +01:00
check-health check-health: add encoded degree sign 2020-03-09 16:23:10 +01:00
check-lte-firmware-upgrade update copyright for 2020 2020-01-01 17:00:39 +01:00
check-routeros-update check-routeros-update: use $LogPrintExit 2020-03-05 09:08:57 +01:00
cloud-backup global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
collect-wireless-mac.capsman always use severity 'warning', not just 'warn' 2020-03-05 09:18:23 +01:00
collect-wireless-mac.local always use severity 'warning', not just 'warn' 2020-03-05 09:18:23 +01:00
collect-wireless-mac.template always use severity 'warning', not just 'warn' 2020-03-05 09:18:23 +01:00
CONTRIBUTIONS.md update list of contributors / donors 2019-09-13 11:45:38 +02:00
daily-psk.capsman daily-psk: use $LogPrintExit 2020-03-05 08:26:05 +01:00
daily-psk.local daily-psk: use $LogPrintExit 2020-03-05 08:26:05 +01:00
daily-psk.template daily-psk: use $LogPrintExit 2020-03-05 08:26:05 +01:00
dhcp-lease-comment.capsman dhcp-lease-comment: use $LogPrintExit 2020-03-05 08:34:33 +01:00
dhcp-lease-comment.local dhcp-lease-comment: use $LogPrintExit 2020-03-05 08:34:33 +01:00
dhcp-lease-comment.template dhcp-lease-comment: use $LogPrintExit 2020-03-05 08:34:33 +01:00
dhcp-to-dns dhcp-to-dns: fix value in message 2020-03-05 08:43:56 +01:00
email-backup global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
global-config certificate-renew-issued: support auto-export with given passphrases 2020-03-20 09:26:12 +01:00
global-config-overlay bridge-port-to-default: use $ParseKeyValueStore... 2020-03-03 13:32:00 +01:00
global-config.changes bridge-port-to-default: use $ParseKeyValueStore... 2020-03-03 13:32:00 +01:00
global-functions global-functions: introduce $MkDir 2020-03-20 09:26:12 +01:00
global-wait add script 'global-wait' 2020-03-12 08:40:29 +01:00
gps-track global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
hotspot-to-wpa hotspot-to-wpa: unbreak options 2020-03-09 13:46:06 +01:00
initial-commands update copyright for 2020 2020-01-01 17:00:39 +01:00
ip-addr-bridge update copyright for 2020 2020-01-01 17:00:39 +01:00
ipv6-update global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
learn-mac-based-vlan update copyright for 2020 2020-01-01 17:00:39 +01:00
lease-script global-functions: merge $LogAnd{Error,Put} to $LogPrintExit ... 2020-02-26 14:19:54 +01:00
leds-day-mode update copyright for 2020 2020-01-01 17:00:39 +01:00
leds-night-mode update copyright for 2020 2020-01-01 17:00:39 +01:00
leds-toggle-mode update copyright for 2020 2020-01-01 17:00:39 +01:00
Makefile Makefile: update links for generated html 2019-01-02 16:22:14 +01:00
manage-umts update copyright for 2020 2020-01-01 17:00:39 +01:00
mode-button-event update copyright for 2020 2020-01-01 17:00:39 +01:00
mode-button-scheduler mode-button-scheduler: give proper message if no action defined 2020-01-06 10:33:27 +01:00
netwatch-notify netwatch-notify: add logging 2020-03-05 12:47:42 +01:00
netwatch-syslog update copyright for 2020 2020-01-01 17:00:39 +01:00
packages-update global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
ppp-on-up global-functions: merge $LogAnd{Error,Put} to $LogPrintExit ... 2020-02-26 14:19:54 +01:00
README.md README: update instructions to use $ScriptInstallUpdate 2020-01-29 22:14:56 +01:00
rotate-ntp rotate-ntp: use $LogPrintExit 2020-03-05 09:42:28 +01:00
script-updates add script 'global-wait' 2020-03-12 08:40:29 +01:00
sms-action global-functions: merge $LogAnd{Error,Put} to $LogPrintExit ... 2020-02-26 14:19:54 +01:00
sms-forward global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
ssh-keys-import update copyright for 2020 2020-01-01 17:00:39 +01:00
super-mario-theme update copyright for 2020 2020-01-01 17:00:39 +01:00
template.md add template for script documentation 2019-01-02 21:31:59 +01:00
unattended-lte-firmware-upgrade update copyright for 2020 2020-01-01 17:00:39 +01:00
update-gre-address update copyright for 2020 2020-01-01 17:00:39 +01:00
update-tunnelbroker global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00
upload-backup global-functions: sort alphabetically 2020-02-28 15:26:26 +01:00

RouterOS Scripts

RouterOS is the operating system developed by MikroTik for networking tasks. This repository holds a number of scripts to manage RouterOS devices or extend their functionality.

Use at your own risk!

Requirements

Latest version of the scripts require at least RouterOS 6.43 to function properly. The changelog lists the corresponding change as follows:

*) fetch - added "as-value" output format;

Specific scripts may require even newer RouterOS version, for example cloud backup was added in 6.44.

Initial setup

Get me ready!

If you know how things work just copy and paste the initial commands. Remember to edit and rerun global-config-overlay! First time users should take the long way below.

Live presentation

Want to see it in action? I've had a presentation Repository based RouterOS script distribution including demonstation recorded live at MUM Europe 2019 in Vienna.

The long way in detail

The update script does server certificate verification, so first step is to download the certificates. If you intend to download the scripts from a different location (for example from github.com) install the corresponding certificate chain.

[admin@MikroTik] > / tool fetch "https://git.eworm.de/cgit/routeros-scripts/plain/certs/Let%27s%20Encrypt%20Authority%20X3.pem" dst-path="letsencrypt.pem"
      status: finished
  downloaded: 3KiBC-z pause]
       total: 3KiB
    duration: 1s

Note that the commands above do not verify server certificate, so if you want to be safe download with your workstations's browser and transfer the files to your MikroTik device.

Then we import the certificates.

[admin@MikroTik] > / certificate import file-name=letsencrypt.pem passphrase=""
     certificates-imported: 3
     private-keys-imported: 0
            files-imported: 1
       decryption-failures: 0
  keys-with-no-certificate: 0

For basic verification we rename the certifiactes and print their count. Make sure the certificate count is three.

[admin@MikroTik] > / certificate set name="ISRG-Root-X1" [ find where fingerprint="96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6" ]
[admin@MikroTik] > / certificate set name="Let-s-Encrypt-Authority-X3" [ find where fingerprint="731d3d9cfaa061487a1d71445a42f67df0afca2a6c2d2f98ff7b3ce112b1f568" ]
[admin@MikroTik] > / certificate set name="DST-Root-CA-X3" [ find where fingerprint="0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739" ]
[admin@MikroTik] > / certificate print count-only where fingerprint="96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6" or fingerprint="731d3d9cfaa061487a1d71445a42f67df0afca2a6c2d2f98ff7b3ce112b1f568" or fingerprint="0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739"
3

Always make sure there are no certificates installed you do not know or want!

Actually we do not require the certificate named DST Root CA X3, but as it is used by Let's Encrypt to cross-sign we install it anyway - this makes sure things do not go wrong if the intermediate certificate is replaced. The IdenTrust certificate should be available from their download page. The site is crap and a good example how to not do it.

Now let's download the main scripts and add them in configuration on the fly.

[admin@MikroTik] > :foreach Script in={ "global-config"; "global-config-overlay"; "global-functions"; "script-updates" } do={ / system script add name=$Script source=([ / tool fetch check-certificate=yes-without-crl ("https://git.eworm.de/cgit/routeros-scripts/plain/" . $Script) output=user as-value]->"data"); }

The configuration needs to be tweaked for your needs. Make sure not to send your mails to mail@example.com! Edit global-config-overlay, copy configuration from global-config.

[admin@MikroTik] > / system script edit global-config-overlay source

And finally load configuration and functions and add the scheduler.

[admin@MikroTik] > / system script { run global-config; run global-config-overlay; run global-functions; }
[admin@MikroTik] > / system scheduler add name="global-scripts" start-time=startup on-event="/ system script { run global-config; run global-config-overlay; run global-functions; }"

Updating scripts

To update existing scripts just run script-updates.

[admin@MikroTik] > / system script run script-updates

Calling function $ScriptInstallUpdate does the same.

[admin@MikroTik] > $ScriptInstallUpdate

Adding a script

To add a script from the repository run function $ScriptInstallUpdate with a comma separated list of script names.

[admin@MikroTik] > $ScriptInstallUpdate check-certificates,check-routeros-update

Scheduler and events

Most scripts are designed to run regularly from scheduler. We just added check-routeros-update, so let's run it every hour to make sure not to miss an update.

[admin@MikroTik] > / system scheduler add name="check-routeros-update" interval=1h on-event="/ system script run check-routeros-update;"

Some events can run a script. If you want your DHCP hostnames to be available in DNS use dhcp-to-dns with the events from dhcp server. For a regular cleanup add a scheduler entry.

[admin@MikroTik] > $ScriptInstallUpdate dhcp-to-dns,lease-script
[admin@MikroTik] > / ip dhcp-server set lease-script=lease-script [ find ]
[admin@MikroTik] > / system scheduler add name="dhcp-to-dns" interval=5m on-event="/ system script run dhcp-to-dns;"

There's much more to explore... Have fun!

Contribute

Thanks a lot for past contributions!

Patches, issues and whishlist

Feel free to contact me via e-mail or open an issue at github.

Donate

This project is developed in private spare time and usage is free of charge for you. If you like the scripts and think this is of value for you or your business please consider to donate with PayPal.

donate with PayPal

Thanks a lot for your support!

Upstream

URL: GitHub.com

Mirror: eworm.de GitLab.com


▲ Go back to top