The following steps are a recommendation on how to additionally protect your device with already configured strong firewall rules.
Start by upgrading your RouterOS version. Some older releases have had certain weaknesses or vulnerabilities, that have been fixed. Keep your device up to date, to be sure it is secure. Click "check for updates" in Winbox or Webfig, to upgrade. We suggest you follow announcements on our security announcement blog to be informed about any new security issues.
Change default username admin to a different name. A custom name helps to protect access to your router if anybody got direct access to your router:
MikroTik routers require password configuration, we suggest using a password generator tool to create secure and non-repeating passwords. With secure password we mean:
RouterOS has built-in options for easy management access to network devices. The particular services should be shut down on production networks: MAC-Telnet, MAC-Winbox, and MAC-Ping:
MikroTik Neighbor discovery protocol is used to show and recognize other MikroTik routers in the network, disable neighbor discovery on all interfaces:
A bandwidth server is used to test throughput between two MikroTik routers. Disable it in the production environment:
A router might have DNS cache enabled, which decreases resolving time for DNS requests from clients to remote servers. In case DNS cache is not required on your router or another router is used for such purposes, disable it:
RouterOS might have other services enabled (they are disabled by default RouterOS configuration). MikroTik caching proxy, socks, UPnP, and cloud services:
More Secure SSH access
RouterOS utilizes stronger crypto for SSH, most newer programs use it, to turn on SSH strong crypto:
It is good practice to disable all unused interfaces on your router, in order to decrease unauthorized access to your router:
Where X numbers of unused interfaces.
Some RouterBOARDs have an LCD module for informational purposes, set a pin:
or disable it: