RouterBoard MikroTik
De Linuxmemo.
(Différences entre les versions)
(→how to generate SSL certificate and enable HTTPS) |
(→System) |
||
| Ligne 18 : | Ligne 18 : | ||
==System== | ==System== | ||
| + | backup -- Makes a full system backup | ||
| + | check-installation -- Check installed packages | ||
| + | clock -- Print/change system date and time | ||
| + | console -- Connection over serial port | ||
| + | default-configuration -- | ||
| + | health -- Router health | ||
| + | history -- Command history | ||
| + | identity -- System identity | ||
| + | leds -- | ||
| + | license -- Licensing information | ||
| + | logging -- Global logging configuration | ||
| + | note -- Login note | ||
| + | ntp -- | ||
| + | package -- Software packages | ||
| + | reboot -- Restart the router | ||
| + | reset-configuration -- | ||
| + | resource -- System resources | ||
| + | routerboard -- Routerboard options | ||
| + | scheduler -- Schedule scripts to be run at times | ||
| + | script -- Scripting management | ||
| + | serial-terminal -- Serial Terminal | ||
| + | shutdown -- Shut the router down | ||
| + | ssh -- SSH client | ||
| + | sup-output -- Create support output file | ||
| + | telnet -- Run Telnet | ||
| + | upgrade -- Router upgrading | ||
| + | watchdog -- Watchdog | ||
| + | export -- Print or save an export script that can be used to restore configuration | ||
| + | |||
==IP== | ==IP== | ||
==Tools== | ==Tools== | ||
Version du 21 novembre 2016 à 15:06
Sommaire |
how to generate SSL certificate and enable HTTPS
https://blog.a2o.si/2015/08/11/mikrotik-how-to-generate-ssl-certificate-and-enable-https/
1. Create CA certificate first: /certificate add name=my-rtr-ca common-name=my-rtr-ca key-usage=key-cert-sign,crl-sign 2. Sign the CA certificate: /certificate sign my-rtr-ca 3. Now create a regular certificate for HTTPS access: /certificate add name=my-rtr common-name=my-rtr 4. Sign it with CA from steps 1&2: /certificate sign ca=my-rtr-ca my-rtr OPTIONAL: Mark it as trusted (I did not need to do this, but internets beg to differ:): /certificate set trusted=yes my-rtr-ca /certificate set trusted=yes my-rtr 5. And finally, assign the new certificate to HTTPS service: /ip service set www-ssl certificate=my-rtr
System
backup -- Makes a full system backup check-installation -- Check installed packages clock -- Print/change system date and time console -- Connection over serial port default-configuration -- health -- Router health history -- Command history identity -- System identity leds -- license -- Licensing information logging -- Global logging configuration note -- Login note ntp -- package -- Software packages reboot -- Restart the router reset-configuration -- resource -- System resources routerboard -- Routerboard options scheduler -- Schedule scripts to be run at times script -- Scripting management serial-terminal -- Serial Terminal shutdown -- Shut the router down ssh -- SSH client sup-output -- Create support output file telnet -- Run Telnet upgrade -- Router upgrading watchdog -- Watchdog export -- Print or save an export script that can be used to restore configuration