Skip to content
MikroTik RouterOS Docs

IP Cloud (DDNS) in RouterOS: A Complete Guide

IP Cloud (DDNS) in RouterOS: A Complete Guide

Section titled “IP Cloud (DDNS) in RouterOS: A Complete Guide”

RouterOS Version: 7.x+ Difficulty: Beginner Estimated Time: 15 minutes

MikroTik IP Cloud provides free Dynamic DNS (DDNS) service that automatically updates DNS records with your router’s public IP address. This enables remote access via a persistent hostname even when your ISP assigns dynamic IPs.

Key Features:

  • DDNS Service - Automatic DNS A and AAAA record updates
  • Time Synchronization - Clock sync without NTP configuration
  • Cloud Backup - Encrypted backup storage (1 free slot, 15MB max)
  • Back to Home VPN - Easy WireGuard VPN via mobile app (v7.12+)

Your router receives a permanent DNS name in the format: <serial>.sn.mynetname.net

Limitations:

  • CHR requires paid license (P1 or higher)
  • NOT supported on x86 systems
  • No SLA - free service with occasional outages
┌──────────────────────┐
│ Your Router │
│ (Dynamic WAN IP) │
└──────────┬───────────┘
│ UDP/15252 (encrypted)
│ Every 60 seconds
┌──────────────────────┐
│ cloud2.mikrotik.com │
│ (MikroTik Cloud) │
└──────────┬───────────┘
│ Updates DNS
┌──────────────────────┐
│ DNS Servers │
│ (mynetname.net) │
│ TTL: 60 seconds │
└──────────────────────┘

When your WAN IP changes, the router detects it within 60 seconds and updates the DNS record.

MenuPurpose
/ip cloudDDNS and time sync configuration
/ip cloud advancedAdvanced settings (local address)
/system backup cloudCloud backup management
PropertyTypeDefaultDescription
ddns-enabledyes/auto/noauto (v7.17+)Enable DDNS service
ddns-update-intervaltimenoneForce update interval (min 60s)
update-timeyes/noyesSync clock with cloud server

Read-only status:

PropertyDescription
dns-nameYour assigned hostname
public-addressIPv4 address sent to cloud
public-address-ipv6IPv6 address sent to cloud
statusCurrent state (updated, updating, error)
warningNAT warning if behind another router
# Enable DDNS
/ip cloud set ddns-enabled=yes
# Verify status
/ip cloud print

Expected output:

ddns-enabled: yes
ddns-update-interval: none
update-time: yes
public-address: 203.0.113.50
public-address-ipv6: 2001:db8::1
dns-name: 529c0491d41c.sn.mynetname.net
status: updated

Example 2: Allow Remote Access (Required!)

Section titled “Example 2: Allow Remote Access (Required!)”

Critical: Default firewall blocks WAN access. You must add rules to allow remote access.

Option A: Allow specific service from WAN (less secure)

# Allow WinBox from any IP (use with caution!)
/ip firewall filter add chain=input protocol=tcp dst-port=8291 \
action=accept place-before=0 comment="Allow WinBox from WAN"

Option B: Restrict to specific IPs (recommended)

# Create address list for trusted IPs
/ip firewall address-list add address=198.51.100.10 list=trusted-remote
# Allow only from trusted IPs
/ip firewall filter add chain=input protocol=tcp dst-port=8291 \
src-address-list=trusted-remote action=accept place-before=0 \
comment="WinBox from trusted IPs only"

Option C: Use VPN instead (most secure) Use Back to Home VPN or configure WireGuard/OpenVPN for secure access.

Sync router clock without configuring NTP:

# Enable time sync
/ip cloud set update-time=yes
# Enable automatic timezone detection
/system clock set time-zone-autodetect=yes
# Verify
/system clock print

Note: This provides approximate time (accuracy within seconds). For precise time, use NTP instead.

Create and upload encrypted backup:

/system backup cloud upload-file action=create-and-upload password=MyStrongPass123!

View uploaded backups:

/system backup cloud print

Output shows the secret-download-key - save this securely!

Download backup (same device):

/system backup cloud download-file action=download number=0

Download backup (different device using secret key):

/system backup cloud download-file action=download secret-download-key=AbCdEfGhIjKlM1234567890

Delete cloud backup:

/system backup cloud remove-file number=0

Manually trigger an update:

/ip cloud force-update

If your router is behind another NAT device and you want DNS to point to the local IP:

/ip cloud advanced set use-local-address=yes

Enable easy VPN access via mobile app:

# Enable DDNS (required for Back to Home)
/ip cloud set ddns-enabled=yes
# Enable Back to Home
/ip cloud set back-to-home-vpn=enabled
# View QR code for mobile app
/ip cloud print

Scan the vpn-wireguard-client-config-qrcode with the MikroTik Back to Home app.

Requirements:

  • RouterOS 7.12+
  • ARM, ARM64, or TILE architecture (not MIPS or x86)

Understanding ddns-enabled Values (v7.17+)

Section titled “Understanding ddns-enabled Values (v7.17+)”
ValueBehavior
yesAlways enabled
autoOnly enabled if Back to Home is active
noAlways disabled

Note: Default changed from no to auto in v7.17. After upgrading, DDNS may appear disabled unless Back to Home is active.

Problem 1: DNS Name Resolves but Cannot Connect

Section titled “Problem 1: DNS Name Resolves but Cannot Connect”

Cause: Default firewall blocks WAN access to management services.

Solution: Add firewall rules (see Example 2) or use VPN.

Symptom: warning: DDNS server received request from IP X but your local IP was Y

Cause: Router is behind another NAT device (ISP modem/router).

Solutions:

  1. Put upstream device in bridge mode
  2. Configure port forwarding on upstream device
  3. Use use-local-address=yes if internal DNS is acceptable

Problem 3: Status Stuck on “Updating…”

Section titled “Problem 3: Status Stuck on “Updating…””

Causes:

  • Firewall blocking UDP 15252 outbound
  • MikroTik cloud service outage
  • Time/date incorrect on router

Solutions:

# Check connectivity
/ping cloud2.mikrotik.com
# Check logs
/log print where topics~"cloud"
# Try disable/enable cycle
/ip cloud set ddns-enabled=no
/ip cloud set ddns-enabled=yes

Cause: CHR requires paid perpetual license (P1 or higher).

Solution: Upgrade CHR license or use third-party DDNS.

Cause: IP Cloud is NOT supported on x86 systems.

Solution: Use third-party DDNS (Cloudflare, DuckDNS) with scripting.

Cause: Back to Home feature is enabled (requires DDNS).

Solution:

# First disable Back to Home
/ip cloud set back-to-home-vpn=revoked-and-disabled
# Then set DDNS to auto
/ip cloud set ddns-enabled=auto

Causes:

  • Backup not AES encrypted
  • Backup exceeds 15MB
  • Only 1 free slot available

Solution:

# Create properly encrypted backup first
/system backup save encryption=aes-sha256 name=mybackup password=MyPass123!
# Upload existing backup
/system backup cloud upload-file action=upload src-file=mybackup.backup
# Check file size
/file print where name~"backup"

Problem: Cannot download cloud backup without secret-download-key.

Solution: Contact MikroTik support with device serial number and proof of ownership.

Prevention: Save the key immediately after uploading:

/system backup cloud print
ProtocolPortDestinationPurpose
UDP15252cloud2.mikrotik.comDDNS updates
TCP15252cloud2.mikrotik.comCloud backup
ServiceProtocolPort
WinBoxTCP8291
SSHTCP22
WebFigTCP80/443
APITCP8728/8729
# Check DDNS status
/ip cloud print
# Force update
/ip cloud force-update
# Check logs
/log print where topics~"cloud"
# Test DNS resolution (from external network)
# nslookup <serial>.sn.mynetname.net
# Check firewall rules
/ip firewall filter print where chain=input
# Check cloud backup
/system backup cloud print

If IP Cloud doesn’t meet your needs, consider:

ServiceReliabilityCostNotes
CloudflareHighFreeRequires script, full DNS control
DuckDNSMediumFreeSimple API, requires script
No-IPHighFree tierWeb interface, limited free domains

Community Recommendation: For production/business use, implement redundant DDNS (IP Cloud + Cloudflare/DuckDNS).

  1. Use VPN instead of exposing services - Back to Home or manual WireGuard
  2. Restrict firewall rules - Use address lists for trusted IPs
  3. Store secret-download-key securely - Required for backup recovery
  4. Strong backup passwords - AES encryption is only as good as the password
  5. Monitor access attempts - Check logs for unauthorized access
  • Back to Home (/ip cloud back-to-home-vpn) - Mobile VPN access
  • NTP Client (/system ntp client) - More accurate time sync
  • System Backup (/system backup) - Local backup management
  • Firewall (/ip firewall filter) - WAN access control
  • WireGuard (/interface wireguard) - Manual VPN configuration
VersionChange
6.43IPv6 AAAA record support
6.44Server changed to cloud2.mikrotik.com
7.12Back to Home VPN introduced
7.17ddns-enabled default changed to auto

IP Cloud provides convenient DDNS for MikroTik routers:

  1. Enable DDNS with /ip cloud set ddns-enabled=yes
  2. Configure firewall to allow remote access (or use VPN)
  3. Access router via <serial>.sn.mynetname.net
  4. Optional: Enable cloud backup and time sync

Key points:

  • Default firewall blocks WAN access - add rules or use VPN
  • CHR requires paid license; x86 not supported
  • Store secret-download-key securely for backup recovery
  • v7.17+ changed ddns-enabled default to auto
  • No SLA - consider redundant DDNS for critical use