Skip to content

IP Cloud (DDNS) in RouterOS: A Complete Guide

IP Cloud (DDNS) in RouterOS: A Complete Guide

Section titled “IP Cloud (DDNS) in RouterOS: A Complete Guide”

RouterOS Version: 7.x+ Difficulty: Beginner Estimated Time: 15 minutes

MikroTik IP Cloud provides free Dynamic DNS (DDNS) service that automatically updates DNS records with your router’s public IP address. This enables remote access via a persistent hostname even when your ISP assigns dynamic IPs.

Key Features:

  • DDNS Service - Automatic DNS A and AAAA record updates
  • Time Synchronization - Clock sync without NTP configuration
  • Cloud Backup - Encrypted backup storage (1 free slot, 15MB max)
  • Back to Home VPN - Easy WireGuard VPN via mobile app (v7.12+)

Your router receives a permanent DNS name in the format: <serial>.sn.mynetname.net

Limitations:

  • CHR requires paid license (P1 or higher)
  • NOT supported on x86 systems
  • No SLA - free service with occasional outages
IP Cloud DDNS flow diagram showing router sending encrypted updates to MikroTik Cloud every 60 seconds, which then updates DNS servers

When your WAN IP changes, the router detects it within 60 seconds and updates the DNS record.

MenuPurpose
/ip cloudDDNS and time sync configuration
/ip cloud advancedAdvanced settings (local address)
/system backup cloudCloud backup management
PropertyTypeDefaultDescription
ddns-enabledyes/auto/noauto (v7.17+)Enable DDNS service
ddns-update-intervaltimenoneForce update interval (min 60s)
update-timeyes/noyesSync clock with cloud server

Read-only status:

PropertyDescription
dns-nameYour assigned hostname
public-addressIPv4 address sent to cloud
public-address-ipv6IPv6 address sent to cloud
statusCurrent state (updated, updating, error)
warningNAT warning if behind another router
# Enable DDNS
/ip cloud set ddns-enabled=yes
# Verify status
/ip cloud print

Expected output:

ddns-enabled: yes
ddns-update-interval: none
update-time: yes
public-address: 203.0.113.50
public-address-ipv6: 2001:db8::1
dns-name: 529c0491d41c.sn.mynetname.net
status: updated

Example 2: Allow Remote Access (Required!)

Section titled “Example 2: Allow Remote Access (Required!)”
Example 2: Allow Remote Access (Required!) diagram

Critical: Default firewall blocks WAN access. You must add rules to allow remote access.

Option A: Allow specific service from WAN (less secure)

# Allow WinBox from any IP (use with caution!)
/ip firewall filter add chain=input protocol=tcp dst-port=8291 \
action=accept place-before=0 comment="Allow WinBox from WAN"

Option B: Restrict to specific IPs (recommended)

# Create address list for trusted IPs
/ip firewall address-list add address=198.51.100.10 list=trusted-remote
# Allow only from trusted IPs
/ip firewall filter add chain=input protocol=tcp dst-port=8291 \
src-address-list=trusted-remote action=accept place-before=0 \
comment="WinBox from trusted IPs only"

Option C: Use VPN instead (most secure) Use Back to Home VPN or configure WireGuard/OpenVPN for secure access.

Sync router clock without configuring NTP:

# Enable time sync
/ip cloud set update-time=yes
# Enable automatic timezone detection
/system clock set time-zone-autodetect=yes
# Verify
/system clock print

Note: This provides approximate time (accuracy within seconds). For precise time, use NTP instead.

Example 4: Cloud Backup diagram

Create and upload encrypted backup:

/system backup cloud upload-file action=create-and-upload password=MyStrongPass123!

View uploaded backups:

/system backup cloud print

Output shows the secret-download-key - save this securely!

Download backup (same device):

/system backup cloud download-file action=download number=0

Download backup (different device using secret key):

/system backup cloud download-file action=download secret-download-key=AbCdEfGhIjKlM1234567890

Delete cloud backup:

/system backup cloud remove-file number=0

Manually trigger an update:

/ip cloud force-update

If your router is behind another NAT device and you want DNS to point to the local IP:

/ip cloud advanced set use-local-address=yes

Enable easy VPN access via mobile app:

# Enable DDNS (required for Back to Home)
/ip cloud set ddns-enabled=yes
# Enable Back to Home
/ip cloud set back-to-home-vpn=enabled
# View QR code for mobile app
/ip cloud print

Scan the vpn-wireguard-client-config-qrcode with the MikroTik Back to Home app.

Requirements:

  • RouterOS 7.12+
  • ARM, ARM64, or TILE architecture (not MIPS or x86)

Understanding ddns-enabled Values (v7.17+)

Section titled “Understanding ddns-enabled Values (v7.17+)”
ValueBehavior
yesAlways enabled
autoOnly enabled if Back to Home is active
noAlways disabled

Note: Default changed from no to auto in v7.17. After upgrading, DDNS may appear disabled unless Back to Home is active.

Problem 1: DNS Name Resolves but Cannot Connect

Section titled “Problem 1: DNS Name Resolves but Cannot Connect”

Cause: Default firewall blocks WAN access to management services.

Solution: Add firewall rules (see Example 2) or use VPN.

Problem 2: Warning About NAT/IP Mismatch diagram

Symptom: warning: DDNS server received request from IP X but your local IP was Y

Cause: Router is behind another NAT device (ISP modem/router).

Solutions:

  1. Put upstream device in bridge mode
  2. Configure port forwarding on upstream device
  3. Use use-local-address=yes if internal DNS is acceptable

Problem 3: Status Stuck on “Updating…”

Section titled “Problem 3: Status Stuck on “Updating…””

Causes:

  • Firewall blocking UDP 15252 outbound
  • MikroTik cloud service outage
  • Time/date incorrect on router

Solutions:

# Check connectivity
/ping cloud2.mikrotik.com
# Check logs
/log print where topics~"cloud"
# Try disable/enable cycle
/ip cloud set ddns-enabled=no
/ip cloud set ddns-enabled=yes

Cause: CHR requires paid perpetual license (P1 or higher).

Solution: Upgrade CHR license or use third-party DDNS.

Cause: IP Cloud is NOT supported on x86 systems.

Solution: Use third-party DDNS (Cloudflare, DuckDNS) with scripting.

Cause: Back to Home feature is enabled (requires DDNS).

Solution:

# First disable Back to Home
/ip cloud set back-to-home-vpn=revoked-and-disabled
# Then set DDNS to auto
/ip cloud set ddns-enabled=auto

Causes:

  • Backup not AES encrypted
  • Backup exceeds 15MB
  • Only 1 free slot available

Solution:

# Create properly encrypted backup first
/system backup save encryption=aes-sha256 name=mybackup password=MyPass123!
# Upload existing backup
/system backup cloud upload-file action=upload src-file=mybackup.backup
# Check file size
/file print where name~"backup"

Problem: Cannot download cloud backup without secret-download-key.

Solution: Contact MikroTik support with device serial number and proof of ownership.

Prevention: Save the key immediately after uploading:

/system backup cloud print
ProtocolPortDestinationPurpose
UDP15252cloud2.mikrotik.comDDNS updates
TCP15252cloud2.mikrotik.comCloud backup
ServiceProtocolPort
WinBoxTCP8291
SSHTCP22
WebFigTCP80/443
APITCP8728/8729
# Check DDNS status
/ip cloud print
# Force update
/ip cloud force-update
# Check logs
/log print where topics~"cloud"
# Test DNS resolution (from external network)
# nslookup <serial>.sn.mynetname.net
# Check firewall rules
/ip firewall filter print where chain=input
# Check cloud backup
/system backup cloud print

If IP Cloud doesn’t meet your needs, consider:

ServiceReliabilityCostNotes
CloudflareHighFreeRequires script, full DNS control
DuckDNSMediumFreeSimple API, requires script
No-IPHighFree tierWeb interface, limited free domains

Community Recommendation: For production/business use, implement redundant DDNS (IP Cloud + Cloudflare/DuckDNS).

  1. Use VPN instead of exposing services - Back to Home or manual WireGuard
  2. Restrict firewall rules - Use address lists for trusted IPs
  3. Store secret-download-key securely - Required for backup recovery
  4. Strong backup passwords - AES encryption is only as good as the password
  5. Monitor access attempts - Check logs for unauthorized access
  • Back to Home (/ip cloud back-to-home-vpn) - Mobile VPN access
  • NTP Client (/system ntp client) - More accurate time sync
  • System Backup (/system backup) - Local backup management
  • Firewall (/ip firewall filter) - WAN access control
  • WireGuard (/interface wireguard) - Manual VPN configuration
VersionChange
6.43IPv6 AAAA record support
6.44Server changed to cloud2.mikrotik.com
7.12Back to Home VPN introduced
7.17ddns-enabled default changed to auto

IP Cloud provides convenient DDNS for MikroTik routers:

  1. Enable DDNS with /ip cloud set ddns-enabled=yes
  2. Configure firewall to allow remote access (or use VPN)
  3. Access router via <serial>.sn.mynetname.net
  4. Optional: Enable cloud backup and time sync

Key points:

  • Default firewall blocks WAN access - add rules or use VPN
  • CHR requires paid license; x86 not supported
  • Store secret-download-key securely for backup recovery
  • v7.17+ changed ddns-enabled default to auto
  • No SLA - consider redundant DDNS for critical use