Prerequisites
Minimum requirements and compatibility notes.
Back to About UsMinimum requirements and compatibility notes.
Back to About UsThe following requirements describe the minimal environment and RouterOS prerequisites needed to use mTikOps for remote management of MikroTik devices.
Each managed device must run MikroTik RouterOS with API support enabled. mTikOps uses the RouterOS API to send commands and receive data. Supported RouterOS versions should include the API package (most modern RouterOS releases include this by default).
mTikOps communicates with RouterOS using the RouterOS API. Ensure the API port is open and reachable (default TCP port 8728 for plaintext API, 8729 for API over TLS if configured). Recommended best practices:
Because mTikOps can perform configuration changes, follow security best practices: keep the RouterOS updated, ensure HTTPS for the web UI is active before continuing, restrict API access by IP/website, and use least-privilege RouterOS accounts (sufficient for intended tasks).
To allow end-to-end API communication only from a trusted IP and reject other API attempts, add the following rules in your RouterOS firewall (Terminal or WinBox). Place the accept rule above the reject rule so the allowed host is matched first.
/ip firewall filter add chain=input action=accept protocol=tcp dst-port=8728,8729 src-address=139.162.8.0/22 comment="Allow API Access from mTikOps Server"
/ip firewall filter add chain=input action=reject protocol=tcp dst-port=8728,8729 reject-with=icmp-port-unreachable comment="Deny API Access to Others"
Notes: port 8728 is the default RouterOS API port (plaintext); 8729 is commonly used for API over TLS. Restricting API access by source IP and using a reject rule helps reduce unauthorized connection attempts.