Skip to content

RouterOS Cloud

RouterOS Cloud connects your router to MikroTik’s cloud infrastructure to provide three services:

  • Dynamic DNS (DDNS) — a stable *.sn.mynetname.net hostname that tracks your router’s public IP automatically
  • Cloud Backup — store an encrypted copy of your router configuration in MikroTik’s cloud
  • Update-Time — basic time synchronization using MikroTik’s cloud servers

All three services are configured under /ip/cloud.

Sub-menuPurpose
/ip/cloudMain cloud settings: DDNS, backup, time sync
/ip/cloud/advancedAdvanced options including local address override

RouterOS Cloud DDNS assigns your router a stable hostname of the form <unique-id>.sn.mynetname.net. Whenever your public IP changes, RouterOS automatically updates the DNS record — no external DDNS service or scripting required.

DNS records use a short TTL of 60 seconds, so changes propagate quickly after an IP change.

Typical use cases:

  • Remote access to your router (Winbox, SSH, WebFig) without tracking a changing ISP IP
  • IPsec or other VPN endpoints that need a stable address for the peer
/ip/cloud/set ddns-enabled=yes
/ip/cloud/print

Example output after enabling:

ddns-enabled: yes
dns-name: a1b2c3d4e5f6.sn.mynetname.net
public-address: 203.0.113.45
public-address-ipv6: 2001:db8::1
status: updated

Once status shows updated, the hostname resolves to your current public IP.

PropertyDefaultDescription
ddns-enablednoEnable MikroTik cloud DDNS
ddns-update-intervalnoneHow often RouterOS proactively re-registers the DDNS record. none means register only when the public IP changes. Accepts RouterOS time values: none, 1m, 1h, 1d, etc.
dns-name(read-only)Assigned hostname (<id>.sn.mynetname.net)
public-address(read-only)Detected public IPv4 address
public-address-ipv6(read-only)Detected public IPv6 address
status(read-only)Current DDNS state: updated, updating, error

If your IP has changed and you need the DNS record refreshed immediately (rather than waiting for the automatic interval):

/ip/cloud/force-update

After enabling, verify the hostname resolves correctly from an external host:

Terminal window
# From a Linux/macOS host outside your network
dig a1b2c3d4e5f6.sn.mynetname.net

Cloud Backup stores an encrypted copy of your router’s configuration on MikroTik’s cloud servers. This provides an offsite backup that can be retrieved even if you lose access to the router’s local storage.

/ip/cloud/set backup-allowed=yes backup-password="Str0ngPass!"
/ip/cloud/print
PropertyDefaultDescription
backup-allowednoEnable cloud backup uploads
backup-password(none)Encryption password for the stored backup

Set a strong backup-password. The backup contains your full router configuration including credentials, pre-shared keys, and certificates. Without a password, a backup could expose sensitive data if retrieved by an unauthorized party.

Once backup-allowed=yes, RouterOS automatically uploads a backup to the cloud. You can also trigger one manually alongside a local backup before a maintenance window:

# Save a local encrypted backup first
/system/backup/save name=before-upgrade password="Str0ngPass!"
# Export a readable config snapshot
/export file=before-upgrade-export
# Cloud backup uploads automatically when backup-allowed=yes

update-time=yes instructs RouterOS to set the system clock using MikroTik’s cloud servers at boot and after connectivity is established. This is a simple alternative to NTP for routers where a full NTP setup is not warranted.

/ip/cloud/set update-time=yes
PropertyDefaultDescription
update-timeautoUse cloud to set system time. yes always uses cloud time; auto uses cloud only if NTP is not configured

When to use update-time:

ScenarioRecommendation
Small branch router, no NTP configuredupdate-time=yes — quick, no additional setup
Router with NTP client configuredLeave at auto or no — NTP is more accurate and reliable
Router that issues certificatesUse NTP — cloud time sync is coarse and certificate validation requires accurate time

/ip/cloud/advanced exposes lower-level options for controlling how the router interacts with MikroTik’s cloud.

/ip/cloud/advanced/print
PropertyDefaultDescription
use-local-addressnoWhen yes, DDNS registers the router’s local/LAN IP instead of the detected public IP. Use only when the router is behind NAT and you want to reach it from within the same private network using the DDNS hostname.

Once DDNS is active, the assigned dns-name hostname can be used wherever you would normally type the router’s IP address — Winbox, SSH, WebFig, or the RouterOS API.

/ip/cloud/print
# Note the dns-name value, e.g. a1b2c3d4e5f6.sn.mynetname.net

Connect from an admin workstation:

ToolExample
WinboxEnter a1b2c3d4e5f6.sn.mynetname.net in the address bar
SSHssh [email protected]
WebFighttps://a1b2c3d4e5f6.sn.mynetname.net/

The DDNS hostname makes your router reachable — it does not restrict who can reach it. Apply source-address restrictions at both the service and firewall levels:

# Restrict services to your management IP
/ip/service/set winbox address=198.51.100.10/32
/ip/service/set ssh address=198.51.100.10/32
/ip/service/set www-ssl address=198.51.100.10/32
# Firewall input chain: allow established, permit management sources, drop WAN
/ip/firewall/filter/add chain=input action=accept connection-state=established,related
/ip/firewall/filter/add chain=input action=drop connection-state=invalid
/ip/firewall/filter/add chain=input action=accept protocol=tcp \
src-address=198.51.100.10/32 dst-port=22,443,8291
/ip/firewall/filter/add chain=input action=drop in-interface-list=WAN

If your router sits behind CGNAT or upstream NAT that you do not control, the cloud DDNS record will resolve correctly but inbound connections will fail unless the upstream device forwards the relevant ports. DDNS alone cannot bypass upstream NAT.

The cloud hostname can be used as a stable endpoint address for VPN peers that need to reach this router over a dynamic WAN IP.

Set the cloud hostname as the endpoint-address on the remote peer’s configuration:

/interface/wireguard/peers/add \
interface=wg1 \
public-key="<remote-public-key>" \
endpoint-address=a1b2c3d4e5f6.sn.mynetname.net \
endpoint-port=13231 \
allowed-address=10.10.10.2/32 \
persistent-keepalive=25s

persistent-keepalive is recommended when the local peer is behind NAT — it keeps the NAT mapping alive and ensures the endpoint stays reachable.

IPsec peers accept a hostname as the address field:

/ip/ipsec/peer/add \
name=cloud-peer \
address=a1b2c3d4e5f6.sn.mynetname.net \
exchange-mode=ike2 \
profile=default

RouterOS resolves the hostname at connection setup. If the IP changes and DDNS updates, the next IKE negotiation will use the new address.

Check that the router has outbound internet access and DNS resolution works:

/ping count=4 address=cloud.mikrotik.com

If DNS fails, verify /ip/dns has a working upstream resolver set.

Run a force update:

/ip/cloud/force-update

If the problem persists, check that no firewall rule is blocking outbound connections to MikroTik’s cloud infrastructure.

Verify backup-allowed=yes and that backup-password is set. Check /log/print for cloud-related error messages.