Manual:IP/Services: Difference between revisions

From MikroTik Wiki
Jump to navigation Jump to search
(Fox SSH)
Line 108: Line 108:
     <td>Secure Shell (SSH) remote Login protocol</td>
     <td>Secure Shell (SSH) remote Login protocol</td>

Revision as of 13:24, 10 February 2011


Applies to RouterOS: v3, v4


Sub-menu: /ip service

This document lists protocols and ports used by various MikroTik RouterOS services. It helps you to determine why your MikroTik router listens to certain ports, and what you need to block/allow in case you want to prevent or grant access to the certain services. Please see the relevant sections of the Manual for more explanations.


Note that it is not possible to add new services, only existing service modifications are allowed.

Property Description
address (IP address/netmask | IPv6/0..128; Default: ) IP address from which the service is accessible.
certificate (name; Default: none) The name of the certificate used by particular service. Applicable only for services that depends on certificates (www-ssl)
name (name; Default: none) Service name
port (integer: 1..65535; Default: ) The port particular service listens on


For example allow telnet only from specific IPv6 address range

[admin@dzeltenais_burkaans] /ip service> set 0 address=2001:fade:leaf:2::/64 
[admin@dzeltenais_burkaans] /ip service> print 
Flags: X - disabled, I - invalid 
 #   NAME     PORT  ADDRESS                                       CERTIFICATE  
 0   telnet   23    2001:fade:leaf:2::/64          

Service Ports

Sub-menu: /ip firewall service-port

Hosts behind a NAT-enabled router do not have true end-to-end connectivity. Therefore some Internet protocols might not work in scenarios with NAT.
To overcome these limitations RouterOS includes a number of NAT helpers, that enable NAT traversal for various protocols.

Helper Description
FTP FTP service helper
h323 H323 service helper
PPTP PPTP tunneling helper.

Protocols and ports

Table below shows the list of protocols and ports used by RouterOS.

Proto/Port Description
20/tcp FTP data connection
21/tcp FTP control connection
22/tcp Secure Shell (SSH) remote Login protocol
23/tcp Telnet protocol
67/udp Bootstrap protocol or DHCP Server
68/udp Bootstrap protocol or DHCP Client
80/tcp World Wide Web HTTP
123/udp Network Time Protocol ( NTP)
161/udp Simple Network Management Protocol (SNMP)
179/tcp Border Gateway Protocol ( BGP)
443/tcp Secure Socket Layer (SSL) encrypted HTTP
500/udp Internet Key Exchange (IKE) protocol
RIP routing protocol
646/tcp LDP transport session
646/udp LDP hello protocol
1080/tcp SOCKS proxy protocol
1701/udp Layer 2 Tunnel Protocol ( L2TP)
1723/tcp Point-To-Point Tunneling Protocol ( PPTP)
Universal Plug and Play ( uPnP)
2000/tcp Bandwidth test server
5678/udp Mikrotik Neighbor Discovery Protocol
8080/tcp HTTP Web Proxy
8291/tcp Winbox
8728/tcp API
20561/udp MAC winbox
/4 IPIP encapsulation
/41 IPv6 (encapsulation)
/47 General Routing Encapsulation (GRE) - used for PPTP and EoIP tunnels
/50 Encapsulating Security Payload for IPv4 (ESP)
/51 Authentication Header for IPv4 (AH)
/89 OSPF routing protocol
/103 Multicast | IGMP
/112 VRRP

[ Top | Back to Content ]