Documentation
Learn how to use MikroTik Tools safely and effectively. Follow these guidelines to ensure successful network configuration.
What You Should Do
/system backup save name=backup-before-changesWhat You Shouldn't Do
Best Practices
1. Script Execution
- Execute scripts during maintenance windows when possible
- Have physical or out-of-band access to the router
- Keep a copy of the original configuration
- Monitor the router after applying changes
2. Calculator Tools
- Use calculators to plan bandwidth allocation before implementation
- Verify calculations match your actual network requirements
- Consider overhead and burst requirements in your calculations
- Export results for documentation and future reference
3. Security Considerations
- Change default passwords before applying any scripts
- Use strong passwords for API keys and bot tokens
- Review firewall rules generated by tools
- Test security configurations in isolated environments
4. Troubleshooting
- Check RouterOS logs after applying scripts:
/log print - Verify interface names match your router's actual interfaces
- Test connectivity after applying routing or firewall changes
- Use
/exportto compare configurations
Tool-Specific Notes
- Generated scripts are ready to paste into RouterOS Terminal
- Some tools require specific RouterOS packages (e.g., routing, ppp, hotspot)
- Verify all IP addresses and interface names are correct
- Check that required packages are installed before running scripts
- Calculators provide estimates - actual performance may vary
- Consider network overhead and protocol overhead in calculations
- Use calculators to plan capacity, not as absolute guarantees
- Export calculation results for documentation
- Wizards generate complete configuration scripts
- Review all generated settings before applying
- Some wizards may require additional manual configuration
- Test wizard-generated configs in non-production first
Network Outages: Incorrect routing, firewall, or NAT configurations can cause complete network outages. Always have a rollback plan.
Lockout Risk: Firewall rules or access list changes can lock you out of the router. Ensure you have alternative access methods (physical console, out-of-band management).
Security Vulnerabilities: Incorrectly configured scripts can create security holes. Review firewall rules and access controls carefully.
Data Loss: Some scripts may reset or clear existing configurations. Always backup before applying any changes.
These tools are provided as-is for educational and administrative purposes. Always verify and test configurations in non-production environments before applying to live networks.