RouterOS default configuration provides a secure, production-ready setup for most networking scenarios, including firewall protection, DHCP services, and basic connectivity suitable for home offices and small businesses.
In WinBox you can apply default configuration in System -> Reset Configuration, or you can use terminal with command /system reset-configuration
The RouterOS default configuration includes essential services, security features, and network connectivity that works out-of-the-box for most common deployment scenarios.
Understanding default configuration
What gets configured automatically
Network setup:
Bridge interface - All ethernet ports bridged together
DHCP server - Automatic IP assignment for LAN clients
DNS resolver - Local DNS forwarding and caching
Default routes - Automatic gateway configuration via DHCP client
Network interfaces - All ports enabled and configured
Security features:
Firewall rules - Basic input and forward filtering
NAT configuration - Internet sharing via masquerade
Service security - Management services restricted to LAN
User accounts - Admin user with no password (initially)
Management services:
WinBox access - Graphical management interface
Web interface - HTTP-based configuration
SSH access - Secure command line access
MAC-Telnet - Discovery and access protocol
Fresh RouterOS installation
Initial setup procedure
After flashing RouterOS or factory reset:
Default network addressing
The default configuration uses these IP ranges:
Complete default configuration script
RouterOS v7 default configuration
This is what RouterOS applies during reset-configuration:
Customizing default configuration
Secure the default setup
Essential security modifications:
Customize network addressing
Change default IP scheme to match your requirements:
WiFi configuration (if supported)
Basic WiFi setup on devices with wireless
Guest WiFi network (optional)
Default configuration variants
Home office configuration
Optimized for home/small office use:
Branch office configuration
For connecting remote office to headquarters:
Monitoring default configuration
Verify configuration status
Monitor system logs
Backup and restore procedures
Export default configuration
Restore configuration
Troubleshooting default configuration
Common issues and solutions
Performance verification
Show complete secure default configuration
Default configuration best practices
Security recommendations
Change default password immediately - Never leave admin account without password
Disable unnecessary services - Only enable services you actually need
Use strong firewall rules - Implement comprehensive filtering
Enable logging - Monitor system activity and security events
Regular updates - Keep RouterOS version current
Network design principles
Plan IP addressing - Use consistent, documented IP schemes
Implement proper segmentation - Separate guest, management, and production networks
Configure redundancy - Plan for backup connectivity when possible
Monitor performance - Establish baseline metrics
Document configuration - Keep records of all customizations
Maintenance procedures
Regular backups - Export configurations and create system backups
Change monitoring - Track all configuration modifications
Performance testing - Verify throughput and latency regularly
Security audits - Review firewall rules and access controls
Capacity planning - Monitor resource usage and plan for growth
# 1. Connect to the device
# Physical: Connect ethernet cable to ether1 (WAN) and ether2+ (LAN)
# Access: Use WinBox, WebFig, or SSH to 192.168.88.1
# 2. Secure the installation immediately
/user set admin password=YourSecurePassword123!
# 3. Configure basic identification
/system identity set name=MyRouter-Office
/system clock set time-zone-name=America/New_York
# 4. Update to latest version
/system package update check-for-updates
/system package update download
# Reboot required after download
/system reboot
# Default LAN configuration
LAN Network: 192.168.88.0/24
Router IP: 192.168.88.1/24
DHCP Pool: 192.168.88.10-192.168.88.254
DNS Server: 192.168.88.1
# WAN configuration (ether1)
DHCP Client: Enabled on ether1
Default Route: Via DHCP gateway
# Check current configuration
/ip address print
/ip dhcp-server print
/ip route print
# RouterOS Default Configuration Script (v7.x)
# 1. System identification and time
/system clock set time-zone-name=auto
/system identity set name=MikroTik
# 2. Create bridge for LAN ports
/interface bridge add name=bridge disabled=no auto-mac=yes protocol-mode=rstp comment="defconf"
# 3. Add LAN ports to bridge (exclude ether1 for WAN)
/interface bridge port
add bridge=bridge interface=ether2 comment="defconf"
add bridge=bridge interface=ether3 comment="defconf"
add bridge=bridge interface=ether4 comment="defconf"
add bridge=bridge interface=ether5 comment="defconf"
# Note: ether1 is typically WAN and not bridged
# 4. Create interface lists for firewall
/interface list add name=WAN comment="defconf"
/interface list add name=LAN comment="defconf"
/interface list member add list=WAN interface=ether1 comment="defconf"
/interface list member add list=LAN interface=bridge comment="defconf"
# 5. Configure IP addressing
/ip address add address=192.168.88.1/24 interface=bridge comment="defconf"
# 6. Configure DHCP client on WAN
/ip dhcp-client add interface=ether1 disabled=no add-default-route=yes use-peer-dns=yes comment="defconf"
# 7. Configure DHCP server for LAN
/ip pool add name=default-dhcp ranges=192.168.88.10-192.168.88.254 comment="defconf"
/ip dhcp-server add name=defconf address-pool=default-dhcp interface=bridge disabled=no
/ip dhcp-server network add address=192.168.88.0/24 gateway=192.168.88.1 dns-server=192.168.88.1 comment="defconf"
# 8. Configure DNS
/ip dns set servers=8.8.8.8,1.1.1.1 allow-remote-requests=yes
# 9. Basic firewall configuration
# Input chain (to router)
/ip firewall filter
add action=accept chain=input connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
add action=drop chain=input connection-state=invalid comment="defconf: drop invalid"
add action=accept chain=input protocol=icmp comment="defconf: accept ICMP"
add action=accept chain=input dst-address=127.0.0.1 comment="defconf: accept to local loopback (for CAPsMAN)"
add action=drop chain=input in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
# Forward chain (through router)
add action=accept chain=forward connection-state=established,related,untracked comment="defconf: accept in ipsec policy"
add action=drop chain=forward connection-state=invalid comment="defconf: drop invalid"
add action=drop chain=forward connection-nat-state=!dstnat connection-state=new in-interface-list=WAN comment="defconf: drop all from WAN not DSTNATed"
# 10. NAT configuration
/ip firewall nat add chain=srcnat action=masquerade out-interface-list=WAN comment="defconf: masquerade"
# 11. Service configuration
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=no address=192.168.88.0/24
set ssh disabled=no address=192.168.88.0/24
set api disabled=yes
set winbox disabled=no address=192.168.88.0/24
set api-ssl disabled=yes
# 12. SNTP time synchronization
/system ntp client set enabled=yes
/system ntp client servers add address=time.cloudflare.com
# 1. Set strong admin password
/user set admin password=ComplexPassword123!
# 2. Create additional admin user
/user add name=netadmin group=full password=AnotherSecurePassword456! comment="Secondary admin account"
# 3. Disable unnecessary services
/ip service disable telnet,ftp,api,api-ssl
# 4. Change default management ports (optional)
/ip service set www port=8080 address=192.168.88.0/24
/ip service set ssh port=2222 address=192.168.88.0/24
/ip service set winbox port=8291 address=192.168.88.0/24
# 5. Enable HTTPS for web management
/certificate add name=https-cert common-name=router.local key-size=2048 days-valid=365 key-usage=digital-signature,key-encipherment
/certificate sign https-cert
/ip service set www-ssl disabled=no port=8443 address=192.168.88.0/24 certificate=https-cert
# 6. Strengthen firewall (add after existing rules)
/ip firewall filter add chain=input action=add-src-to-address-list protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_blacklist address-list-timeout=1d comment="SSH brute force protection"
# Change to 192.168.1.0/24 network
# 1. Remove default configuration
/ip dhcp-server remove [find name=defconf]
/ip dhcp-server network remove [find address=192.168.88.0/24]
/ip pool remove [find name=default-dhcp]
/ip address remove [find address=192.168.88.1/24]
# 2. Configure new addressing
/ip address add address=192.168.1.1/24 interface=bridge comment="LAN network"
/ip pool add name=lan-dhcp ranges=192.168.1.100-192.168.1.200 comment="LAN DHCP pool"
/ip dhcp-server add name=lan-dhcp address-pool=lan-dhcp interface=bridge disabled=no
/ip dhcp-server network add address=192.168.1.0/24 gateway=192.168.1.1 dns-server=192.168.1.1 comment="LAN DHCP network"
# 3. Update service addresses
/ip service set www address=192.168.1.0/24
/ip service set ssh address=192.168.1.0/24
/ip service set winbox address=192.168.1.0/24
/ip service set www-ssl address=192.168.1.0/24
# 4. Update firewall rules if needed
/ip firewall filter set [find comment~"defconf"] in-interface-list=LAN
# 1. Configure WiFi security profile
/interface wireless security-profiles add name=wifi-security mode=wpa2 authentication-types=wpa2-psk \
wpa2-pre-shared-key=YourWiFiPassword123! comment="Main WiFi security"
# 2. Configure wireless interface
/interface wireless set wlan1 disabled=no mode=ap-bridge ssid=MyRouter-WiFi \
security-profile=wifi-security channel=auto wireless-protocol=802.11 country=united-states
# 3. Add WiFi to LAN bridge
/interface bridge port add bridge=bridge interface=wlan1 comment="WiFi to LAN bridge"
# 4. Add WiFi to LAN interface list
/interface list member add list=LAN interface=wlan1 comment="WiFi in LAN list"
# 1. Create guest WiFi security profile
/interface wireless security-profiles add name=guest-wifi mode=wpa2 authentication-types=wpa2-psk \
wpa2-pre-shared-key=GuestPassword123! comment="Guest WiFi security"
# 2. Create virtual access point for guests
/interface wireless set wlan1 wds-mode=dynamic-mesh wds-default-bridge=none
/interface wireless add name=wlan1-guest master-interface=wlan1 disabled=no ssid=MyRouter-Guest \
security-profile=guest-wifi comment="Guest WiFi interface"
# 3. Create separate bridge for guests
/interface bridge add name=bridge-guest disabled=no comment="Guest network bridge"
/interface bridge port add bridge=bridge-guest interface=wlan1-guest
# 4. Configure guest network addressing
/ip address add address=192.168.99.1/24 interface=bridge-guest comment="Guest network"
/ip pool add name=guest-dhcp ranges=192.168.99.10-192.168.99.100
/ip dhcp-server add name=guest-dhcp address-pool=guest-dhcp interface=bridge-guest disabled=no
/ip dhcp-server network add address=192.168.99.0/24 gateway=192.168.99.1 dns-server=192.168.99.1
# 5. Add guest interface to WAN list for internet-only access
/interface list member add list=WAN interface=bridge-guest comment="Guest to internet only"
# Apply default first, then customize
/system reset-configuration default-no-dhcp-client=yes
# Configure static WAN IP (if available)
/ip address add address=203.0.113.10/24 interface=ether1 comment="Static WAN IP"
/ip route add dst-address=0.0.0.0/0 gateway=203.0.113.1 comment="Static default route"
/ip dns set servers=1.1.1.1,8.8.8.8
# Enable UPnP for gaming/media devices
/ip upnp set enabled=yes allow-disable-external-interface=no
/ip upnp interfaces add interface=bridge type=internal
/ip upnp interfaces add interface=ether1 type=external
# Add port forwarding for common services
/ip firewall nat add chain=dstnat action=dst-nat protocol=tcp dst-port=80 \
to-addresses=192.168.88.10 to-ports=80 comment="HTTP server"
/ip firewall nat add chain=dstnat action=dst-nat protocol=tcp dst-port=22 \
to-addresses=192.168.88.5 to-ports=22 comment="SSH server"
# Apply default configuration
/system reset-configuration
# Configure site identification
/system identity set name=BranchOffice-Location
/system clock set time-zone-name=America/New_York
# Change to corporate IP scheme
/ip address set [find interface=bridge] address=192.168.10.1/24
/ip dhcp-server network set [find] address=192.168.10.0/24 gateway=192.168.10.1 dns-server=192.168.10.1
/ip pool set [find] ranges=192.168.10.100-192.168.10.200
# Configure VPN to headquarters (example with IPSec)
/ip ipsec profile add name=hq-profile enc-algorithm=aes-256 auth-algorithm=sha256
/ip ipsec peer add name=hq-peer address=203.0.113.100 profile=hq-profile
/ip ipsec identity add peer=hq-peer secret=SharedSecretKey my-id=address:203.0.113.10 remote-id=address:203.0.113.100
/ip ipsec policy add src-address=192.168.10.0/24 dst-address=192.168.1.0/24 action=encrypt peer=hq-peer
# Add route to headquarters network
/ip route add dst-address=192.168.1.0/24 gateway=hq-peer comment="Route to HQ"
# Update DNS to use HQ DNS servers
/ip dns set servers=192.168.1.10,192.168.1.11
# Check network connectivity
/ping 8.8.8.8
/ping google.com
# Verify DHCP server operation
/ip dhcp-server lease print
/ip dhcp-server binding print
# Check firewall rules
/ip firewall filter print where comment~"defconf"
/ip firewall nat print where comment~"defconf"
# Verify services
/ip service print
/interface print brief
# Check system status
/system health print
/system resource print
/system routerboard print
# View recent system messages
/log print
# Monitor DHCP activity
/log print where topics~"dhcp"
# Monitor firewall activity
/log print where topics~"firewall"
# Check system startup logs
/log print where topics~"system,info"
# Monitor interface changes
/log print where topics~"interface,info"
# Export complete configuration
/export file=default-config-backup
# Export specific sections
/ip firewall export file=firewall-backup
/interface export file=interfaces-backup
/ip dhcp-server export file=dhcp-backup
# Create system backup (binary format)
/system backup save name=default-system-backup
# View exported files
/file print where type=file
# Import configuration file
/import default-config-backup.rsc
# Restore from system backup
/system backup load name=default-system-backup.backup
# Reset to factory defaults
/system reset-configuration keep-users=no no-defaults=no skip-backup=yes
# Reset with custom defaults
/system reset-configuration default-no-dhcp-client=yes keep-users=yes
# Issue: Can't access internet
# Check WAN connectivity
/ping 8.8.8.8 interface=ether1
/ip route print where dst-address=0.0.0.0/0
/ip dhcp-client print
# Issue: Can't access router from LAN
/interface print where disabled=no
/ip address print where interface=bridge
/ip service print where disabled=no
# Issue: DHCP not working
/ip dhcp-server print detail
/ip dhcp-server lease print
/log print where topics~"dhcp"
# Issue: Firewall blocking traffic
/ip firewall filter print stats
/log print where topics~"firewall"