Configure inbound management services (WinBox, SSH, API) and firewall rules at scale in Altostrat.
Altostrat’s Control Plane Policies define how MikroTik devices handle inbound connections for critical management services such as WinBox, SSH, and API. By centralizing firewall rules and trusted networks, you ensure consistent security across all routers under a given policy.
When you sign up, Altostrat automatically creates a Default Control Plane Policy for basic protection. This policy includes:
The IP address 154.66.115.255/32
may be added by default as a trusted address for Altostrat’s Management API.
Navigate to Control Plane Policies
Under Policies, select Control Plane. You’ll see a list of existing policies, including the default one.
Add a New Policy
Click + Add Policy. Give your policy a descriptive name (e.g., “Strict Admin Access”).
Configure Trusted Networks
Add or remove IP addresses or CIDR ranges that you consider trusted. For example: 192.168.0.0/16
.
Toggle Custom Input Rules
Decide whether your MikroTik firewall input rules should take precedence. If set to ON, your custom rules will be applied first.
Enable/Disable Services
Under IP Services, specify ports for WinBox, SSH, and API. These services must remain enabled if you plan to manage devices via Altostrat’s API.
Select Sites
Assign the policy to specific sites if desired. You can also assign it later. Click Add to finalize.
Locate the Policy
Navigate to Policies → Control Plane. Click on the policy to open its settings.
Adjust Trusted Networks or Services
Add or remove CIDRs, toggle whether Custom Input Rules override Altostrat’s default drop rules, and modify ports for WinBox, API, and SSH.
Apply Changes
Changes will propagate automatically to any sites using this policy. Allow a short period for routers to update.
Deleting a policy from an active site may disrupt management access if no other policy is assigned.
Find the Policy
In Policies → Control Plane, locate the policy you wish to remove.
Delete the Policy
Click the Trash icon and confirm the action. If any routers depend on this policy for inbound admin services, assign them another policy first.