MikroTik RouterOS RoMON: Router Management Overlay Network
MikroTik RouterOS RoMON: Router Management Overlay Network
Section titled âMikroTik RouterOS RoMON: Router Management Overlay NetworkâRouterOS Version: 6.x / 7.x (v7.17+ has improved switch chip handling) Difficulty: Intermediate Estimated Time: 20 minutes
Overview
Section titled âOverviewâRoMON (Router Management Overlay Network) creates an independent Layer 2 management network that operates regardless of your IP configuration. When routing is broken, firewalls are misconfigured, or IP addresses are wrong, RoMON still works - allowing you to access and fix devices that would otherwise be unreachable.
Key benefits:
- Works when IP is broken - Access devices even with misconfigured routes or firewalls
- Hop through devices - Connect to a distant router through intermediate MikroTik devices
- No VPN required - Direct Layer 2 management path
- Discovery - Find all RoMON-enabled devices on the network
How it works: RoMON uses special Layer 2 frames (EtherType 0x88bf, multicast MAC 01:80:c2:00:88:bf) to create a virtual overlay network. Each device gets a RoMON ID (MAC address format), and devices forward RoMON traffic independently of normal switching/routing.
Important: RoMON is MikroTik-proprietary - it only works between MikroTik devices.
Configuration Steps
Section titled âConfiguration StepsâStep 1: Enable RoMON
Section titled âStep 1: Enable RoMONâ/tool romon set enabled=yesStep 2: Set a Secret (Recommended)
Section titled âStep 2: Set a Secret (Recommended)âThe secret authenticates RoMON neighbors and prevents accidental peering with unknown devices:
/tool romon set secrets=YourSecretPasswordImportant: Use the same secret on all devices that should communicate via RoMON.
Step 3: Verify Configuration
Section titled âStep 3: Verify Configurationâ/tool romon printExpected Output:
enabled: yes id: current-id: 6C:3B:6B:48:0E:8A secrets: YourSecretPasswordThe current-id shows the automatically assigned RoMON ID (derived from MAC address).
Step 4: Configure Ports (Optional)
Section titled âStep 4: Configure Ports (Optional)âBy default, RoMON operates on all interfaces. To restrict to specific interfaces:
# Remove the default "all" entry/tool romon port remove [find interface=all]
# Add specific interfaces/tool romon port add interface=ether1 cost=100/tool romon port add interface=ether2 cost=100Using RoMON
Section titled âUsing RoMONâDiscover RoMON Devices
Section titled âDiscover RoMON DevicesâFind all RoMON-enabled devices on the network:
/tool romon discoverExample Output:
# ADDRESS COST HOPS PATH AGE 0 6C:3B:6B:48:0E:8A 0 0 1s 1 6C:3B:6B:48:0E:8B 100 1 6C:3B:6B:48:0E:8A 3s 2 6C:3B:6B:48:0E:8C 200 2 6C:3B:6B:48:0E:8A,6C:3B:6... 5sADDRESS- RoMON ID of discovered deviceCOST- Total path cost to reach deviceHOPS- Number of intermediate devicesPATH- RoMON IDs of intermediate devices
Ping a RoMON Device
Section titled âPing a RoMON DeviceâTest connectivity to a specific device:
/tool romon ping id=6C:3B:6B:48:0E:8B count=5Connect via SSH
Section titled âConnect via SSHâOpen a terminal session through RoMON:
/tool romon ssh 6C:3B:6B:48:0E:8B user=adminConnect via WinBox
Section titled âConnect via WinBoxâIn WinBox, use the RoMON tab at the bottom of the connect window, or from command line:
winbox.exe --romon 192.168.88.1 6C:3B:6B:48:0E:8B admin ""Where:
192.168.88.1- IP of the RoMON âentry pointâ router you can reach6C:3B:6B:48:0E:8B- RoMON ID of the target deviceadmin ""- Username and password
Port Configuration
Section titled âPort ConfigurationâPort Properties
Section titled âPort Propertiesâ| Property | Default | Description |
|---|---|---|
interface | - | Interface name or interface-list |
cost | 100 | Path metric (lower = preferred) |
disabled | no | Disable RoMON on this port |
secrets | - | Port-specific secrets (overrides global) |
View Port Configuration
Section titled âView Port Configurationâ/tool romon port printDefault Output:
Flags: X - disabled # INTERFACE COST SECRETS 0 all 100Adjust Port Cost
Section titled âAdjust Port CostâPrefer certain paths by lowering their cost:
/tool romon port set [find interface=ether1] cost=50Disable RoMON on Specific Interfaces
Section titled âDisable RoMON on Specific Interfacesâ/tool romon port add interface=ether1-wan disabled=yesOr remove from participation entirely:
/tool romon port remove [find interface=ether1-wan]Security with Secrets
Section titled âSecurity with SecretsâHow Secrets Work
Section titled âHow Secrets WorkâSecrets authenticate RoMON messages using MD5 hashing. Devices only become neighbors if they share at least one common secret.
Important: Secrets provide authentication, not encryption. Use SSH or secure WinBox for encrypted management sessions.
Multiple Secrets (Rolling Updates)
Section titled âMultiple Secrets (Rolling Updates)âYou can configure multiple secrets to allow gradual migration:
/tool romon set secrets=OldSecret,NewSecretDevices accept messages hashed with any configured secret, allowing you to:
- Add new secret to all devices
- Remove old secret from all devices
This prevents service interruption during secret rotation.
Per-Port Secrets
Section titled âPer-Port SecretsâOverride global secrets on specific ports:
/tool romon port set [find interface=ether5] secrets=SpecialSecretCommon Configuration Scenarios
Section titled âCommon Configuration ScenariosâScenario 1: Basic RoMON Network
Section titled âScenario 1: Basic RoMON NetworkâEnable RoMON on all devices with a shared secret:
/tool romon set enabled=yes secrets=MyNetworkSecretRepeat on all MikroTik devices.
Scenario 2: Restrict RoMON to Management VLAN
Section titled âScenario 2: Restrict RoMON to Management VLANâOnly allow RoMON on the management VLAN interface:
# Remove default all-interface entry/tool romon port remove [find interface=all]
# Add only management interface/tool romon port add interface=vlan-mgmt cost=100Scenario 3: Hub-and-Spoke Topology
Section titled âScenario 3: Hub-and-Spoke TopologyâConfigure lower costs on backbone links:
# On backbone interfaces/tool romon port set [find interface=sfp1] cost=10
# On access interfaces/tool romon port set [find interface=ether1] cost=100Scenario 4: Exclude WAN from RoMON
Section titled âScenario 4: Exclude WAN from RoMONâPrevent RoMON traffic on internet-facing interfaces:
/tool romon port add interface=ether1-wan disabled=yesVerification
Section titled âVerificationâCheck 1: Verify RoMON is Enabled
Section titled âCheck 1: Verify RoMON is Enabledâ/tool romon printExpected: enabled: yes and current-id populated.
Check 2: Discover Neighbors
Section titled âCheck 2: Discover Neighborsâ/tool romon discoverExpected: List of all RoMON-enabled devices on the network.
Check 3: Test Connectivity
Section titled âCheck 3: Test Connectivityâ/tool romon ping id=TARGET_ROMON_ID count=5Expected: Successful replies.
Check 4: Verify Port Configuration
Section titled âCheck 4: Verify Port Configurationâ/tool romon port printExpected: Correct interfaces enabled with appropriate costs.
Troubleshooting
Section titled âTroubleshootingâProblem: âDevice not appearing in discoverâ
Section titled âProblem: âDevice not appearing in discoverââCauses:
- RoMON not enabled on target device
- Different secrets configured
- No Layer 2 path between devices
- RoMON disabled on intermediate ports
Solution:
- Verify RoMON enabled on target:
/tool romon print - Check secrets match on all devices
- Verify physical connectivity
- Check port configuration on intermediate devices
Problem: âRoMON ping works but SSH/WinBox failsâ
Section titled âProblem: âRoMON ping works but SSH/WinBox failsââCause: RoMON provides connectivity, but authentication fails at the application level.
Solution:
- Verify username and password
- Check if the target device allows the connection (MAC server settings)
- Try different authentication methods
Problem: âRoMON stopped working after upgrade to 7.17+â
Section titled âProblem: âRoMON stopped working after upgrade to 7.17+ââCause: RouterOS 7.17 changed how switch chips handle RoMON packets.
Solution:
- Devices with ACL-capable switch chips should work automatically
- For non-ACL switches, ensure CPU and RoMON traffic are in the same VLAN
- Check bridge configuration for hardware offloading issues
Problem: âIntermittent RoMON connectivityâ
Section titled âProblem: âIntermittent RoMON connectivityââCause: Unstable Layer 2 path or STP topology changes.
Solution:
- Verify physical connections
- Check for STP reconvergence events
- Consider adjusting port costs to prefer stable paths
Problem: âNeighbors appear with wrong costâ
Section titled âProblem: âNeighbors appear with wrong costââCause: Port costs not configured consistently.
Solution:
/tool romon port printVerify costs are set appropriately. Lower cost = preferred path.
Common Pitfalls
Section titled âCommon Pitfallsâ1. Forgetting to Set Secrets
Section titled â1. Forgetting to Set SecretsâWrong:
/tool romon set enabled=yes# No secret - devices may peer with unknown routersRight:
/tool romon set enabled=yes secrets=SecurePassword2. Leaving RoMON Enabled on WAN
Section titled â2. Leaving RoMON Enabled on WANâRisk: RoMON traffic visible to upstream network.
Solution:
/tool romon port add interface=ether1-wan disabled=yes3. Mismatched Secrets
Section titled â3. Mismatched SecretsâProblem: Devices canât discover each other.
Solution: Ensure identical secrets on all devices that should communicate:
/tool romon set secrets=SameSecretEverywhere4. Expecting Encryption from RoMON
Section titled â4. Expecting Encryption from RoMONâWrong assumption: âRoMON secret encrypts my management trafficâ
Reality: Secrets only authenticate neighbors. Use SSH or secure WinBox for encrypted sessions.
5. Not Considering Path Costs
Section titled â5. Not Considering Path CostsâProblem: Traffic takes suboptimal paths.
Solution: Set lower costs on preferred/faster links:
/tool romon port set [find interface=sfp1] cost=10Security Considerations
Section titled âSecurity Considerationsâ- Always use secrets - Prevents unauthorized devices from joining your RoMON network
- Use SSH or secure WinBox - RoMON doesnât encrypt management traffic
- Disable on untrusted interfaces - Donât expose RoMON on WAN or guest networks
- Rotate secrets periodically - Use multiple secrets during transitions
- Limit port participation - Only enable on necessary interfaces
Limitations
Section titled âLimitationsâ- MikroTik only - Wonât work with other vendors
- No encryption - Authentication only; use SSH/secure WinBox
- Layer 2 dependent - Requires physical or L2 tunnel connectivity
- Switch chip behavior - Some chips may require specific configuration (v7.17+)
- Not a replacement for proper IP management - Use as backup access method
Related Features
Section titled âRelated Featuresâ- MAC Server (
/tool mac-server) - MAC-based WinBox/Telnet access - Neighbor Discovery (
/ip neighbor) - Find devices on local network - The Dude - Network monitoring (integrates with RoMON)
- WinBox - GUI management tool with RoMON support
References
Section titled âReferencesâRelated Topics
Section titled âRelated TopicsâDevice Discovery
Section titled âDevice Discoveryâ- IP Neighbors - find devices on local network
- MAC Server - MAC-based management access
Security
Section titled âSecurityâ- User Management - authentication credentials
- SSH - encrypted remote access
Network Management
Section titled âNetwork Managementâ- Bridge Configuration - Layer 2 connectivity for RoMON
- VLAN Configuration - RoMON with VLANs