Secure Remote Management Guide

RouterOS v7+ secure remote access via VPN, allowed interfaces, and firewall filtering.

Prerequisite: Ensure you have completed VPN Tunnels and Firewall Best Practices before proceeding.

Prerequisites

Lockout Prevention (Required)

Before restricting services or firewall rules, establish a lockout-proof management path. If you lose access, recovery requires Netinstall.

Configuration Flow

Allowed Interface

Restrict WinBox, SSH, and API to specific interfaces. Default allows all. Use interface lists (e.g., LAN, VPN) to limit management access.

/ip service set winbox address=192.168.88.0/24,10.0.0.0/24
/ip service set ssh address=192.168.88.0/24,10.0.0.0/24
/ip service set www-ssl address=""

Firewall Filter

Input chain must allow management traffic from allowed interfaces before the final drop. Place VPN interface or LAN in an interface list and allow that list.

/ip firewall filter add chain=input in-interface-list=LAN action=accept place-before=0
/ip firewall filter add chain=input in-interface-list=VPN action=accept place-before=1

RouterOS Services

Disable unused services. Enable only WinBox, SSH, or API as required. Use /ip service print to verify.

/ip service disable telnet,ftp,www,api,api-ssl

Related

VPN Tunnels — required for remote VPN-based management. Firewall Best Practices — Input chain order and established/related rules.

Common Pitfalls