Connecting to MT
RouterOS offers several management interfaces suitable for different scenarios, from initial setup to remote administration and scripting automation.
Default credentials
You can find default credentials, including the MAC address, on the MikroTik device label typically located at the bottom. Here's an example:

Using WinBox
Download & Install WinBox
You can download latest version of WinBox from official website.
First things first you will need snap package manager, you can install it using:
Then you can simply install WinBox using snap:
And you are ready to go
First things first you will need Wine which you can download and install from GitHub:
Then download latest version of WinBox from official website:
And launch WinBox64.exe using Wine64.app
Simply go to Google Play Store and search for Mikrotik Pro.
Connection methods overview
Available connection methods
Graphical interfaces:
WinBox - Native Windows/Linux/Mac management tool
WebFig - Web-based configuration interface
QuickSet - Simplified web setup wizard
Mobile apps - Android/iOS MikroTik applications
Command line interfaces:
SSH - Secure Shell for encrypted terminal access
Telnet - Unencrypted terminal access (not recommended)
Serial console - Direct hardware connection
MAC-Telnet - Layer-2 protocol for initial access
API interfaces:
REST API - HTTP-based programming interface
API - Native MikroTik programming protocol
SNMP - Network monitoring protocol
SSH Connection
Using SSH from different platforms
Built-in SSH client (Windows 10+):
Using PuTTY:
Download PuTTY from putty.org
Enter router IP address and port 22
Set connection type to SSH
Click "Open" and login with credentials
Terminal SSH connection:
Generate SSH keys for key-based authentication:
SSH key authentication setup
Configure SSH keys for passwordless authentication:
SSH security hardening
Secure SSH access configuration:
Web interface access
WebFig configuration interface
Access the web interface for graphical configuration:
QuickSet initial configuration
Use QuickSet for rapid initial setup:
Access QuickSet: Navigate to router IP in web browser
Choose mode: Home AP, Router, Bridge, etc.
Configure basics: WiFi, passwords, internet connection
Apply settings: QuickSet applies comprehensive configuration
MAC-Telnet connection
Using MAC-Telnet for layer-2 access
MAC-Telnet allows connection without IP configuration:
MAC-based discovery
Discover MikroTik devices on the network:
Serial console connection
Physical serial connection
Direct hardware connection for recovery:
Connection parameters:
Baud rate: 115200
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Console cable requirements
RB series devices: DB9 serial cable (null-modem) CCR series: RJ45 console cable USB-to-serial adapters: Use FTDI or similar reliable chips
API access
REST API usage
Modern HTTP-based API access:
Native API protocol
Binary API for custom applications:
Connection troubleshooting
Common connection issues
Reset and recovery procedures
Network discovery tools
Advanced connection scenarios
Connection through VPN
Access router through VPN tunnels:
Jump host connections
SSH through intermediate servers:
Automated connections
Script connections for automation:
Connection best practices
Security recommendations
Use strong passwords - Never use default credentials in production
Enable SSH keys - Disable password authentication when possible
Restrict access - Limit management to trusted networks
Use HTTPS - Enable SSL certificates for web access
Monitor access - Log and review connection attempts
Performance optimization
Choose appropriate method - WinBox for GUI, SSH for scripting
Use local connections - Direct connection when possible
Optimize SSH settings - Configure proper ciphers and timeouts
Limit concurrent sessions - Avoid too many simultaneous connections
Use compression - Enable SSH compression for slow links
Operational procedures
Document access methods - Maintain inventory of connection details
Test backup access - Ensure alternative connection methods work
Plan for recovery - Know reset procedures and recovery options
Automate routine tasks - Use scripts for repetitive operations
Monitor connections - Watch for unauthorized access attempts
Last updated
Was this helpful?


