RouterBoard MikroTik
De Linuxmemo.
(Différences entre les versions)
(→root menu) |
|||
Ligne 2 : | Ligne 2 : | ||
==Manuel== | ==Manuel== | ||
http://wiki.mikrotik.com/wiki/Manual:TOC | http://wiki.mikrotik.com/wiki/Manual:TOC | ||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
==root menu== | ==root menu== | ||
Ligne 77 : | Ligne 60 : | ||
==IP== | ==IP== | ||
==Tools== | ==Tools== | ||
+ | |||
+ | ==how to generate SSL certificate and enable HTTPS== | ||
+ | https://blog.a2o.si/2015/08/11/mikrotik-how-to-generate-ssl-certificate-and-enable-https/ | ||
+ | |||
+ | 1. Create CA certificate first: | ||
+ | /certificate add name=my-rtr-ca common-name=my-rtr-ca key-usage=key-cert-sign,crl-sign | ||
+ | 2. Sign the CA certificate: | ||
+ | /certificate sign my-rtr-ca | ||
+ | 3. Now create a regular certificate for HTTPS access: | ||
+ | /certificate add name=my-rtr common-name=my-rtr | ||
+ | 4. Sign it with CA from steps 1&2: | ||
+ | /certificate sign ca=my-rtr-ca my-rtr | ||
+ | OPTIONAL: Mark it as trusted (I did not need to do this, but internets beg to differ:): | ||
+ | /certificate set trusted=yes my-rtr-ca | ||
+ | /certificate set trusted=yes my-rtr | ||
+ | 5. And finally, assign the new certificate to HTTPS service: | ||
+ | /ip service set www-ssl certificate=my-rtr | ||
+ | |||
+ | ==Astuces== | ||
+ | *lister les utilisateurs actuellement logger sur le RouterBoard | ||
+ | /user active print |
Version du 21 novembre 2016 à 21:18
Sommaire |
Manuel
http://wiki.mikrotik.com/wiki/Manual:TOC
certificate -- Certificate management disk -- list all attached storage devices (non disponible pour RS450 car aucun usb/sd slot) driver -- Driver management (non disponible pour RS450 car tous les drivers sont déjà chargés) file -- Local router file storage. interface -- Interface configuration ip -- IP options ipv6 -- log -- System logs metarouter -- virtualisation de routeurs (non disponible pour RS450) mpls -- partitions -- (non pertinent pour RS450 car 1 seule partition est disponible) port -- Serial ports queue -- Bandwidth management radius -- Radius client settings routing -- snmp -- SNMP settings system -- tool -- Diagnostics tools user --
Commands and Scripting
http://wiki.mikrotik.com/wiki/Manual:Scripting
System
backup -- Makes a full system backup check-installation -- Check installed packages clock -- Print/change system date and time console -- Connection over serial port default-configuration -- health -- Router health history -- Command history identity -- System identity leds -- license -- Licensing information logging -- Global logging configuration note -- Login note ntp -- package -- Software packages reboot -- Restart the router reset-configuration -- resource -- System resources routerboard -- Routerboard options scheduler -- Schedule scripts to be run at times script -- Scripting management serial-terminal -- Serial Terminal shutdown -- Shut the router down ssh -- SSH client sup-output -- Create support output file telnet -- Run Telnet upgrade -- Router upgrading watchdog -- Watchdog export -- Print or save an export script that can be used to restore configuration
IP
Tools
how to generate SSL certificate and enable HTTPS
https://blog.a2o.si/2015/08/11/mikrotik-how-to-generate-ssl-certificate-and-enable-https/
1. Create CA certificate first: /certificate add name=my-rtr-ca common-name=my-rtr-ca key-usage=key-cert-sign,crl-sign 2. Sign the CA certificate: /certificate sign my-rtr-ca 3. Now create a regular certificate for HTTPS access: /certificate add name=my-rtr common-name=my-rtr 4. Sign it with CA from steps 1&2: /certificate sign ca=my-rtr-ca my-rtr OPTIONAL: Mark it as trusted (I did not need to do this, but internets beg to differ:): /certificate set trusted=yes my-rtr-ca /certificate set trusted=yes my-rtr 5. And finally, assign the new certificate to HTTPS service: /ip service set www-ssl certificate=my-rtr
Astuces
- lister les utilisateurs actuellement logger sur le RouterBoard
/user active print