routeros-fundamentals
RouterOS v7 domain knowledge for AI agents. Use when: working with MikroTik RouterOS, writing RouterOS CLI/script commands, calling RouterOS REST API, debugging why a Linux command fails on RouterOS, or when the user mentions MikroTik, RouterOS, CHR, or /ip /system /interface paths. Scope: RouterOS 7.x (long-term and newer) only — v6 is NOT covered and accuracy for v6 problems will be low.
Best use case
routeros-fundamentals is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
RouterOS v7 domain knowledge for AI agents. Use when: working with MikroTik RouterOS, writing RouterOS CLI/script commands, calling RouterOS REST API, debugging why a Linux command fails on RouterOS, or when the user mentions MikroTik, RouterOS, CHR, or /ip /system /interface paths. Scope: RouterOS 7.x (long-term and newer) only — v6 is NOT covered and accuracy for v6 problems will be low.
Teams using routeros-fundamentals should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/routeros-fundamentals/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How routeros-fundamentals Compares
| Feature / Agent | routeros-fundamentals | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
RouterOS v7 domain knowledge for AI agents. Use when: working with MikroTik RouterOS, writing RouterOS CLI/script commands, calling RouterOS REST API, debugging why a Linux command fails on RouterOS, or when the user mentions MikroTik, RouterOS, CHR, or /ip /system /interface paths. Scope: RouterOS 7.x (long-term and newer) only — v6 is NOT covered and accuracy for v6 problems will be low.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# RouterOS Fundamentals ## RouterOS Is NOT GNU/Linux RouterOS runs a Linux kernel (5.6.3) but **everything above the kernel is MikroTik's proprietary `nova` system**. This is the single most important fact for agents to internalize. **What does NOT exist on RouterOS:** - No `/bin`, `/usr`, `/etc`, `/var` — no FHS layout - No bash, sh, ash, zsh — no Unix shell at all - No coreutils (`ls`, `cat`, `grep`, `ps`, `mount`, `ip`, `iptables`, etc.) - No glibc, musl, busybox - No apt, pkg, opkg — no package manager (packages are `.npk` files installed via upload + reboot) - No `systemctl`, `service`, init system - No `/proc` or `/sys` accessible from userland - No `docker`, `podman` — RouterOS has its own `/container` subsystem (7.x+) **What DOES exist:** - RouterOS CLI — its own language, not shell. Accessed via SSH, serial, WinBox, or WebFig - REST API at `/rest/` (HTTP, port 80 by default) — the primary programmatic interface - RouterOS scripting language (`.rsc` files) — its own syntax, not bash. See [Scripting reference](./references/scripting.md) - WebFig (web UI) on port 80 - WinBox protocol on port 8291 **Common agent mistakes to avoid:** - Do NOT try `ssh admin@host 'ls /'` — it opens RouterOS CLI, not a shell - Do NOT suggest `mount`, `fdisk`, `mkfs` — use `/disk` commands instead - Do NOT look for config files at `/etc/` — configuration is in the RouterOS database - Do NOT assume `ping` works the same — it's `/tool/ping` or `/ping` in CLI - Do NOT suggest installing packages via `apt` or `opkg` — upload `.npk` via SCP then `/system/package/apply-changes` (7.18+) or `/system/reboot` (<7.18) - See [Extra packages reference](./references/extra-packages.md) for the full package list and installation pattern ## RouterOS CLI Syntax RouterOS CLI uses path-based navigation, not Unix command pipelines: ```routeros # Navigation /ip/address/print /interface/print /system/resource/print # Adding entries /ip/address/add address=192.168.1.1/24 interface=ether1 # Modifying (by internal ID or find expression) /ip/address/set [find interface=ether1] address=10.0.0.1/24 # Removing /ip/address/remove [find address="192.168.1.1/24"] # Running a command /system/reboot /tool/fetch url="http://example.com/file.npk" dst-path="/" ``` **Key syntax differences from shell:** - `=` assigns properties (no spaces around it) - `[find ...]` is the query expression (like WHERE) - Strings use `""` (double quotes only) - Comments use `#` - Variables: `:local myVar "value"` and `$myVar` - No pipes, no redirection, no subshell ## REST API RouterOS REST API at `http://HOST:PORT/rest/`. HTTP verbs map non-standardly: | HTTP | RouterOS Action | CLI Equiv | |---|---|---| | `GET` | print (list/read) | `/path/print` | | `PUT` | **add (create)** | `/path/add` | | `PATCH` | set (update) | `/path/set` | | `DELETE` | remove | `/path/remove` | | `POST` | command (execute) | `/path/command` | **Key gotchas:** - `PUT` creates (NOT updates) — opposite of many REST APIs - Empty password auth: `admin:` (colon required, nothing after) - WebFig root (`GET /`) returns HTTP 200 without auth — use as health check - REST API (`/rest/`) requires auth (HTTP 401 without it) - `.id` field is `*HEX` format (e.g., `*1`, `*A`) See [REST API reference](./references/rest-api-patterns.md) for full patterns, error handling, filtering, POST commands, and `/console/inspect`. ## Version Scheme Format: `MAJOR.MINOR[.PATCH][betaN|rcN]` — e.g., `7.22`, `7.22.1`, `7.23beta2`, `7.22rc1` **Channels:** `stable` / `long-term` / `testing` / `development` Version endpoint (plain text): `https://upgrade.mikrotik.com/routeros/NEWESTa7.<channel>` For version parsing, comparison, download URLs, and package naming: see [Version parsing reference](./references/version-parsing.md). ## Architecture Names MikroTik uses these architecture identifiers (not standard Linux arch names): | MikroTik name | CPU | Common hardware | |---|---|---| | `x86` | x86_64 | CHR, x86-based RouterBOARDs | | `arm64` | aarch64 | Modern ARM boards (RB5009, Chateau) | | `arm` | ARMv7 | Older ARM boards | | `mipsbe` | MIPS big-endian | Legacy RouterBOARDs | | `mmips` | MIPS multi-core | hAP ac, RB4011 | | `smips` | MIPS single-core | hAP lite, mAP | | `ppc` | PowerPC | CCR1xxx series | | `tile` | Tilera | CCR (older models) | CHR (Cloud Hosted Router) is available only for `x86` and `arm64`. ## Default Credentials - Username: `admin` - Password: (empty — no password) - On first login via SSH/console, RouterOS 7.x prompts to set a password or press `a` to skip - REST API and WebFig allow empty-password access ## Inspecting Hardware from RouterOS CLI ```routeros # PCI devices (the RouterOS equivalent of lspci) /system/resource/hardware/print # IRQ assignments (shows driver binding) /system/resource/irq/print # System overview /system/resource/print # Disk info /disk/print # Installed packages /system/package/print # IP services and ports /ip/service/print # Network interfaces /interface/print ``` ## Additional Resources **Reference files:** - For REST API details and `/console/inspect` command tree: see [REST API reference](./references/rest-api-patterns.md) - For version parsing, comparison, and download URL logic: see [Version parsing reference](./references/version-parsing.md) - For extra packages (container, iot, zerotier, etc.): see [Extra packages reference](./references/extra-packages.md) - For device-mode (modes, feature matrix, physical confirmation): see [Device-mode reference](./references/device-mode.md) - For RouterOS scripting language syntax: see [Scripting reference](./references/scripting.md) - For user management, SSH keys, admin account: see [Users REST reference](./references/routeros-users-rest.md) - For IP addressing, routing, DHCP, DNS, interfaces: see [Networking REST reference](./references/routeros-networking-rest.md) - For firewall filter/NAT/mangle and rule ordering: see [Firewall REST reference](./references/routeros-firewall-rest.md) - For Bun runtime bugs affecting HTTP (req.destroy, pool, secrets): see [Bun runtime gotchas](./references/bun-runtime-gotchas.md) **Related skills:** - For the /container subsystem (VETH, device-mode, lifecycle): see the `routeros-container` skill - For netinstall-cli and device flashing: see the `routeros-netinstall` skill - For the /app YAML container format (7.22+): see the `routeros-app-yaml` skill - For /console/inspect tree traversal and schema generation: see the `routeros-command-tree` skill - For running CHR in QEMU (local or CI): see the `routeros-qemu-chr` skill - For packet capture, /tool/sniffer, and TZSP streaming: see the `routeros-sniffer` skill **MCP tools:** - For command tree browsing and property lookups: use the `rosetta` MCP server tools (`routeros_search`, `routeros_get_page`, `routeros_command_tree`)
Related Skills
routeros-qemu-chr
MikroTik RouterOS CHR (Cloud Hosted Router) with QEMU. Use when: running RouterOS in QEMU, booting CHR images, debugging CHR boot failures, setting up VirtIO devices for RouterOS, choosing between SeaBIOS and UEFI boot, configuring QEMU port forwarding for RouterOS REST API, or selecting QEMU acceleration (KVM/HVF/TCG).
routeros-netinstall
MikroTik netinstall-cli for automated RouterOS device flashing. Use when: automating netinstall, writing scripts that invoke netinstall-cli, building netinstall tooling, understanding etherboot/BOOTP/TFTP protocols, working with RouterOS package files (.npk), using modescript or configure script, or when the user mentions netinstall, etherboot, or device flashing.
routeros-container
RouterOS /container subsystem for running OCI containers on MikroTik devices. Use when: enabling containers on RouterOS, setting up VETH/bridge networking for containers, managing container lifecycle via CLI or REST API, building OCI images for RouterOS, configuring container environment variables, troubleshooting container issues, or when the user mentions RouterOS container, /container, VETH, device-mode container, or MikroTik Docker.
routeros-command-tree
RouterOS command tree introspection via /console/inspect API. Use when: building tools that parse RouterOS commands, generating API schemas from RouterOS, working with /console/inspect, mapping CLI commands to REST verbs, traversing the RouterOS command hierarchy, or when the user mentions inspect, command tree, RAML, or OpenAPI generation for RouterOS.
routeros-app-yaml
RouterOS /app YAML format for container applications (7.21+ builtin app, 7.22+ custom YAML creation). Use when: writing or validating RouterOS /app YAML files, working with MikroTik container apps, building docker-compose-like definitions for RouterOS, creating /app store schemas, debugging /app validation errors, or when the user mentions /app, tikapp, or RouterOS container YAML.
geo-fundamentals
Generative Engine Optimization for AI search engines (ChatGPT, Claude, Perplexity).
testing-fundamentals
Auto-invoke when reviewing test files or discussing testing strategy. Enforces testing pyramid, strategic coverage, and stack-appropriate frameworks.
seo-fundamentals
Auto-invoke when reviewing HTML head, meta tags, or Next.js page components. Enforces semantic HTML and search optimization.
security-fundamentals
Auto-invoke when reviewing authentication, authorization, input handling, data exposure, or any user-facing code. Enforces OWASP top 10 awareness and security-first thinking.
performance-fundamentals
Auto-invoke when reviewing loops, data fetching, rendering, database queries, or resource-intensive operations. Identifies N+1 queries, unnecessary re-renders, memory leaks, and scalability issues.
fundamentals-gate
Verify code quality standards are met - naming, structure, DRY principles. Issues result in SUGGESTIONS for improvement.
frontend-fundamentals
Auto-invoke when reviewing React, Vue, or frontend component code. Enforces component architecture, state management patterns, and UI best practices.