Skip to content
This repository has been archived by the owner on Oct 18, 2024. It is now read-only.

Secure and Harden your MikroTik RouterBoard / RouterOS.

License

Notifications You must be signed in to change notification settings

MikeHorn-git/RouterOS-Hardening

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 

Repository files navigation

image

Warning

Read a script before running it.

Description

This script is designed to harden your RouterOS device by disabling unnecessary services, enhancing security settings, and configuring logging. The script follow best practices from the Securing your router section of MikroTik documentation and a Manito Networks blog post.

Installation

/tool fetch url="https://raw.githubusercontent.com/MikeHorn-git/RouterOS-Hardening/main/hardening.rsc" mode=https
/import file-name=hardened.rsc

Features

  • Update System Packages [Optional] (Need a valid license)
  • Create new user hardened (Need to change password, the temporary password is hardened)
  • Disable admin user
  • Disable Unnecessary Services (API, FTP, IP Cloud, Telnet, Proxy, SOCKS, UPNP, WWW, WWW-SSL)
  • Disable MAC Server (Ping, Server, Winbox)
  • Disable Bandwidth Server
  • Disable DNS Cache
  • Disable Neighbor Discovery
  • Disable IPv6 Neighbor Discovery
  • Disable Router Management Overlay Network (ROMON)
  • Enable Reverse Path Filtering (RPF)
  • Enable Stronger SSH Crypto
  • Configure Logging to Disk
  • Configure NTP
  • Change SSH Port (2200)
  • Disable LCD Module [Optional] (Need a compatible RouterBoard)
  • Build a Firewall [Partially]
  • Create Configuration Backup

Recommendations

This part cannot be done automatically.

  • Firewall Configuration [Partially]
  • Backup Strategy
  • Change credentials
  • Monitor Log File Size