Skip to content

Diagnostics, Monitoring and Troubleshooting

Diagnostics, Monitoring and Troubleshooting

Section titled “Diagnostics, Monitoring and Troubleshooting”

RouterOS provides a comprehensive suite of diagnostic and monitoring tools to help network administrators identify issues, analyze traffic, and maintain optimal router performance. This guide covers all major diagnostic tools available in RouterOS.

MikroTik routers include built-in tools for:

  • System resource monitoring
  • Hardware health monitoring
  • Network connectivity testing
  • Traffic analysis and packet capture
  • Network discovery

The Resource menu displays overall system statistics including uptime, memory usage, disk space, and CPU information.

/system resource print

Example output:

uptime: 29s
version: 7.11.2 (stable)
build-time: Aug/31/2023 13:55:47
factory-software: 7.6
free-memory: 94.2MiB
total-memory: 224.0MiB
cpu: ARM
cpu-count: 2
cpu-frequency: 800MHz
cpu-load: 2%
free-hdd-space: 93.5MiB
total-hdd-space: 128.5MiB
write-sect-since-reboot: 85
bad-blocks: 0%
architecture-name: arm
board-name: hAP ax lite LTE6
platform: MikroTik
PropertyDescription
uptimeTime elapsed since last boot
versionInstalled RouterOS version
cpuCPU model
cpu-countNumber of CPU cores
cpu-loadCurrent CPU utilization percentage
free-memoryAvailable RAM
total-memoryTotal installed RAM
free-hdd-spaceAvailable NAND/SSD storage
total-hdd-spaceTotal storage capacity
bad-blocksPercentage of defective NAND blocks

View individual CPU core usage on multi-core systems:

/system resource cpu print

Output:

CPU LOAD IRQ DISK
0 5% 0% 0%
1 3% 0% 0%

View interrupt request (IRQ) distribution:

/system resource irq print

This helps identify hardware conflicts or overloaded interrupt handlers.

View all PCI devices installed in the router:

/system resource pci print

View connected USB devices:

/system resource usb print

The Health menu displays real-time hardware sensor data including temperature, voltage, fan speed, and power consumption.

/system health print

Example output on CCR1072-1G-8S+:

Columns: NAME, VALUE, TYPE
# NAME VALUE TYPE
0 power-consumption 50.8 W
1 cpu-temperature 43 C
2 fan1-speed 5654 RPM
3 fan3-speed 5800 RPM
4 board-temperature1 29 C
5 psu1-voltage 0 V
6 psu2-voltage 12.1 V

Routers with temperature sensors display:

  • cpu-temperature: Processor temperature
  • pcb-temperature: Printed circuit board temperature
  • sfp-temperature: SFP module temperature

View input voltage and power supply status:

Columns: NAME, VALUE, TYPE
# NAME VALUE TYPE
0 voltage 23.8 V
1 temperature 39 C

For devices with configurable fans:

/system health set fan-target-temp=55 fan-min-speed-percent=10
PropertyDescription
fan-target-tempTarget temperature for fan speed adjustment (default: 58°C)
fan-full-speed-tempTemperature triggering maximum fan speed (default: 65°C)
fan-min-speed-percentMinimum fan speed percentage
fan-control-intervalTemperature reading interval in seconds (5-30)
cpu-overtemp-checkEnable CPU overtemperature protection (ARM devices)
cpu-overtemp-thresholdMaximum temperature before shutdown

Fan speed automatically adjusts based on:

PoE-out LoadFan Speed
0-24%0% (off)
25-46%25%
47-70%50%
71-92%75%
93%+100%

The Ping tool uses ICMP Echo messages to test network connectivity and measure round-trip delay between the router and target hosts.

See Ping for comprehensive documentation covering:

  • Basic and advanced ping parameters
  • MAC ping, multicast ping, and broadcast ping
  • Troubleshooting techniques and result interpretation
  • Script integration and automation

Traceroute displays the path packets take to reach a destination, helping identify where network delays or failures occur.

/tool traceroute 10.0.0.1

Output:

ADDRESS STATUS
1 10.0.1.17 2ms 1ms 1ms
2 10.255.255.1 5ms 1ms 1ms

Traceroute exploits the TTL (Time-To-Live) field in IP packets:

  1. First packet sent with TTL=1 - first router replies with ICMP Time Exceeded
  2. Second packet with TTL=2 - second router replies
  3. Continues incrementing until destination reached

This reveals each hop in the path and response times.

ParameterDescription
addressTarget destination
max-hopsMaximum number of hops (default: 30)
timeoutWait time for responses
countProbes per hop
  • High latency at a specific hop: That router or link is congested
  • Request timeout: Packet loss or firewall blocking ICMP
  • ** asterisks (*)**: No response received

Torch is a real-time traffic monitoring tool that displays active traffic flows through an interface.

/tool torch interface=ether1

Torch can monitor traffic by:

  • Source/destination IP address (IPv4 and IPv6)
  • Port numbers
  • Protocol (TCP, UDP, ICMP, etc.)
  • MAC protocol
  • VLAN ID
  • DSCP
ParameterDescription
interfaceInterface to monitor
addressFilter by IP address
portFilter by port
protocolFilter by protocol
src-addressFilter by source IP
dst-addressFilter by destination IP
  • Unicast traffic between wireless clients with client-to-client forwarding enabled is not visible
  • Traffic processed with hardware offloading on bridges may not appear

The packet sniffer captures network packets for detailed analysis, useful for troubleshooting and security auditing.

/tool sniffer start interface=ether1
/tool sniffer stop
/tool sniffer save file-name=capture.pcap

The captured file can be analyzed with Wireshark.

For immediate results without saving:

/tool sniffer quick ip-protocol=icmp

The sniffer supports extensive filtering:

FilterDescription
filter-ip-addressFilter by IP address
filter-src-ip-addressFilter by source IP
filter-dst-ip-addressFilter by destination IP
filter-portFilter by port
filter-src-portFilter by source port
filter-dst-portFilter by destination port
filter-ip-protocolFilter by protocol (tcp, udp, icmp, etc.)
filter-mac-addressFilter by MAC address
filter-vlanFilter by VLAN ID
filter-directionFilter by direction (rx, tx)
/tool sniffer set file-name=capture.pcap file-limit=5000KiB \
filter-ip-protocol=tcp filter-dst-port=80,443
PropertyDescription
file-nameSave capture to file
file-limitMaximum file size (10-4294967295 KiB)
memory-limitBuffer size for captured packets
memory-scrollOverwrite old data when buffer full
only-headersCapture headers only, not payload
streaming-enabledStream to remote server

After capturing, view results:

/tool sniffer protocol print # Protocol distribution
/tool sniffer host print # Host statistics
/tool sniffer connection print # Active connections

IP Scan discovers devices on your network, collecting IP addresses, MAC addresses, DNS names, and SNMP information.

See IP Scan for complete documentation.

RouterOS logging provides detailed system event records essential for troubleshooting.

/log print
/system logging add topics=info
/system logging add topics=error
/system logging add topics=warning
/system logging add topics=critical

Configure where logs are stored:

ActionDescription
memoryRAM buffer (default)
diskNAND/SD card storage
remoteRemote syslog server
echoDisplay in terminal

Send logs to a remote server:

/system logging action set remote remote=192.168.1.100
/system logging add action=remote topics=info

Essential topics for troubleshooting:

/system logging add topics=firewall action=memory
/system logging add topics=interface action=memory
/system logging add topics=error action=memory
/system logging add topics=critical action=memory

When specifying multiple topics in a logging rule, the behavior depends on how topics are combined:

  • Multiple topics in one rule (AND logic): When you specify topics=firewall,info, the rule matches only if BOTH conditions are true—the log entry must have both the firewall topic AND the info topic.
# Log entries that have BOTH 'firewall' AND 'info' topics
/system logging add topics=firewall,info action=memory
  • Multiple rules (OR logic): When you have separate logging rules, a log entry matches if it matches ANY of the rules:
# Log entries that have 'firewall' topic OR 'error' topic
/system logging add topics=firewall action=memory
/system logging add topics=error action=memory
# Log all firewall events (any severity)
/system logging add topics=firewall action=memory
# Log only critical firewall events (AND logic)
/system logging add topics=firewall,critical action=memory
# Log all critical events regardless of topic (separate rules = OR)
/system logging add topics=firewall action=memory
/system logging add topics=interface action=memory
/system logging add topics=critical action=memory
  1. Check CPU usage by process: /system resource cpu print
  2. Review IRQ distribution: /system resource irq print
  3. Check for interface storms
  4. Review firewall rules for excessive logging
  1. Check memory with /system resource print
  2. Review active connections
  3. Check for routing table issues
  4. Look for memory leaks in packages
  1. Verify interface status: /interface print
  2. Test basic connectivity: /ping
  3. Trace path: /tool traceroute
  4. Check firewall rules: /ip firewall filter print
  5. Review NAT rules: /ip firewall nat print
  1. Check interface statistics: /interface ethernet print
  2. Look for CRC errors, frame errors
  3. Verify cable and link status
  4. Check speed/duplex settings
  1. Monitor health: /system health print
  2. Check fan operation
  3. Verify environmental conditions
  4. Review CPU/overtemp settings
  1. Regular monitoring: Check resource usage periodically
  2. Set up logging: Enable appropriate log topics
  3. Use profiles: Create threshold alerts for critical metrics
  4. Baseline performance: Document normal values for comparison
  5. Document issues: Keep records of problems and resolutions