Page 1 of 1

SwitchOS CLI

Posted: Wed Apr 18, 2018 5:20 pm
by 4k1l
is it possible to configure SwitchOS using CLI/SSH ?

Re: SwitchOS CLI

Posted: Fri Apr 20, 2018 2:50 pm
by skylark
No, SwOS uses a simple algorithm to ensure TCP/IP communication - it just replies to the same IP and MAC address packet came from.

Re: SwitchOS CLI

Posted: Sun Feb 09, 2020 8:21 pm
by rekahsoft
This would be a very nice feature to have. Even if it was a cli client that could be run locally to interact with a secured api running from the switch. What is the process to request a new feature for SWOS?

Re: SwitchOS CLI

Posted: Sun Dec 13, 2020 12:04 pm
by awonglk
This is not a nice to have anymore. It’s a necessity in a world where are moving towards highly automated networks. Need a way for scripts and automation engines to automatically configure/provision SwOS based switches.

Would love to see this implemented as well, even is it’s a basic one.

Re: SwitchOS CLI

Posted: Sun Dec 13, 2020 5:02 pm
by mkx
It’s a necessity in a world where are moving towards highly automated networks. Need a way for scripts and automation engines to automatically configure/provision SwOS based switches.

There's a version of OS available which has everything you want. It's called ROS. Yes, ROS device can be configured as a switch, doesn't have to be router.

Re: SwitchOS CLI

Posted: Mon Dec 14, 2020 4:11 am
by k6ccc
There's a version of OS available which has everything you want. It's called ROS. Yes, ROS device can be configured as a switch, doesn't have to be router.
That does not help with switch only devices (see my list below). And for managing switches, SwitchOS works very well.
With that said, it would be nice to have at least https...

Re: SwitchOS CLI

Posted: Mon Dec 14, 2020 10:45 am
by mkx
SwOS-only switches are pretty basic units. The advanced units come in both SwOS and ROS variants (or are actually dual-bootable). The post I was quoting mentioned "highly automated networks". I don't see basic (SwOS only) units fit the advanced use implied by that. I can agree that full ROS might be an overkill for switch-only setup. But OTOH it does offer all the advanced configuration possibilities wanted (or needed) for building "highly automated networks".

Re: SwitchOS CLI

Posted: Mon Dec 14, 2020 11:20 pm
by k6ccc
I use switches exclusively as switches and I use routers exclusively as routers - the two functions do not cross. In fact, the only reason I have one CRS326 is that I ordered a CSS326 and the vendor incorrectly sent me a CRS326. When I contacted them about it, they said it was not worth the effort and shipping costs to swap it out for me.

As I said above, it would be nice to at least have https in SwitchOS...

Re: SwitchOS CLI

Posted: Tue Dec 15, 2020 10:32 am
by mkx
As I said above, it would be nice to at least have https in SwitchOS...

I really don't get the "https on SwOS" fame. I mean: if one doesn't care about separation of management from other traffic, then http is enough. If one does care about management security, it is possible to move management to separate VLAN and use management station inside that dedicated VLAN. Again no need for https. Managing switches over internet without using some kind of secure VPN is unwise (to put it mildly).

If one really needs all the bells and whistles, then it is possible to have it ... by running ROS. And again: it is completely possible (and not too hard) to configure switch-only configuration using ROS. I'm not saying anybody should abandon SwOS, I'm just saying that for advanced configuration stuff (or security stuff for that matter) SwOS might be just too light-weight. And judging from sparse notes by MT team members, SwOS-oly units might even lack HW resources needed for anything more than plain http anyway.

Re: SwitchOS CLI

Posted: Thu Oct 28, 2021 1:40 pm
by lumag
I'd also vote/kindly ask for the cli or API support for the SwOS. It would be nice to be able to control the switch from the command line.

Re: SwitchOS CLI

Posted: Thu Jul 21, 2022 8:30 am
by BuGless
The argument against https support, I support: just keep your config access on a VLAN that is secure, then http is fine.

The argument to upgrade to ROS I do not support: not all devices are capable of that.

As for doing automated advanced management without a CLI, there might be two ways:
a. Through SNMP writes; does SwOS support those?
b. Through uploading generated configuration files.

Re: SwitchOS CLI

Posted: Thu Jul 21, 2022 4:28 pm
by k6ccc
As for doing automated advanced management without a CLI, there might be two ways:
a. Through SNMP writes; does SwOS support those?

I don't think so. Could be wrong however.

b. Through uploading generated configuration files.

I'm doing that this week. I will be making a major shuffle of network arrangement of my data cabinet at home. As part of that I am adding a second CSS326 switch. I configured the new switch as the existing switch will become on Saturday and saved that config file. Then reconfigured the new switch to the way it will configured and saved that config. When I do my changes on Saturday, I plug my laptop into the existing switch and upload the saved config, and it should be ready to go.

Re: SwitchOS CLI

Posted: Thu Jul 21, 2022 4:36 pm
by BuGless
As for doing automated advanced management without a CLI, there might be two ways:
As I just figured out, there actually is a third way:
c. Through the Javascript API that the web management console of SwOS already uses.

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 1:38 am
by semaja2
The argument against https support, I support: just keep your config access on a VLAN that is secure, then http is fine.
The lack of basic security concepts is shocking in this statement... a VLAN does not provide any protections against interception and manipulation (eg. the password is clear text over the wire)

A VLAN is good to secure the access path to the device, however it shouldn't not be used for protecting the data over the wire/air

SSL is good at protecting the data whilst in transit, but does nothing to secure the access

If the cheaper/smaller guys (TP-Link etc) can do a switch with HTTPS then MikroTik sure can, heck pretty sure the TP-Links often have some basic CLI available too (shame they dont do passive PoE though...)

It is quite surprising HTTPS is missing from the devices, this may actually prevent us from using these switches in our deployment for compliance reasons (the CSS610 is a perfect device for small solar repeater locations)

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 2:30 am
by rextended
All this worry makes no sense, because (just for cite something, and not all):
only an idiot would reuse the same username and password on a mainframe and a switch,
attractively, apart from disfiguring it, with the SwOS you can do nothing,
if someone have hacked the device on which you write the password, https or not, who cares...
if someone already intercept your traffic, "imagine" if it cares about the switch password...

https on SwOS? all b–s–t...

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 9:58 am
by semaja2
That seriously is the worst attitude to security, password reuse isn't the only possible exploit, easily could do code injection etc

Pretty sure you would also change your mind if someone did a factory reset on your switch at an RTS thats 8 hours away, but sure who cares about enabling the most basic feature...

The serious question is what is holding MikroTik back from implementing it? SSL libraries are available for literally every architecture (most of them at no monetary cost)

At the same time, besides your very lacking security attitude, what is YOUR reasons that MikroTik shouldn't implement it? how does them implementing it cause any issue for you?

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 10:35 am
by rextended
That seriously is the worst attitude to security […]
[…] besides your very lacking security attitude […]

(just for cite something, and not all)
I have not written everything, as already warned, but simply if I need to use a managed switch in sensitive points, I certainly do not go to put a switch with SwOS...

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 10:45 am
by tangent
…apart from disfiguring it, with the SwOS you can do nothing…

Such lack of imagination. 😧

Given admin access on a SwOS box, I can:


…and doubtless more if I put my mind to it.

I’m all for the proposition that RouterOS is the right solution to the OP’s wish for more power, but SwOS is far from powerless.

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 10:49 am
by rextended
@tangent, try to understand my point of view: Really impressive that there is really someone who makes all this effort to "annoy" a "home" network ...
I have not written everything, as already warned, but simply if I need to use a managed switch in sensitive points, I certainly do not go to put a switch with SwOS...

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 10:51 am
by rextended
easily could do code injection etc
Where you mean, inside SwOS or in http connection when you manage the switch?
If someone is already to that level, is too late.......

Pretty sure you would also change your mind if someone did a factory reset on your switch at an RTS thats 8 hours away
I would be an idiot if I only counted on the correct functioning of a single device in a location so far away...
(and anyway, I would not use something with only SwOS regardless)
If HTTP on a remote, VPN-managed network, becomes a problem, what does that mean?
Has SwOS been configured to answer directly with a Public IP??? On this case the problem is not the HTTP but who manage the network...

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 11:02 am
by rextended
a) The serious question is what is holding MikroTik back from implementing it?
b) […] what is YOUR reasons that MikroTik shouldn't implement it? how does them implementing it cause any issue for you?
Finally some serious questions, and "not point of view".
a) For what mikrotik has made to understand so far:
Limited memory for SwOS on devices (also the device than can do dual boot)
User request are constantly discarded.
b) I've never written that MikroTik doesn't have to do it (on the contrary),
but I fight against the false belief that just put the https on that device and it becomes safe ...

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 11:03 am
by tangent
Really impressive that there is really someone who makes all this effort to "annoy" a "home" network ...

You haven’t been paying attention to security at all, then. LAN equipment attacks are HUGE.

Also, there’s no reason to restrict this to “home” networks. Just for one example, this SwOS-only product is unlikely to ever be installed in a home.

Get your head out of the sand.

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 11:05 am
by tangent
…the false belief that just put the https on that device and it becomes safe ...

It’s a good start, though.

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 11:08 am
by rextended
@tangent
You haven’t been paying attention to security at all […]
Yes, exactly, but again, I don't know how to explain to you that I would never use them (any model)... not even at home...
So I don't care about if those (and only those) have security problems...
It cannot be a generic discourse that concerns everything...
This obviously does not mean that, as I work it is infallible, maybe I make even bigger mistakes: now he was just writing about SwOS!

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 11:10 am
by semaja2
(and anyway, I would not use something with only SwOS regardless)
That’s all good and nice to say… until there is a global supply chain problem, and mikrotik has little options when it comes to DC powered PoE switches

If they sold the CSS610 as a CRS610 version I’d be all over it

You assume we all pick SwOS by choice, but for me it’s a forced choice by MikroTik

Also agreed HTTPS is not the correct way to secure a device, but it is part of that process and is quite important

PS. The CSS610 is also the only DC switch that also handles the conversion of 48V to 24V DC etc

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 11:12 am
by rextended
...until there is a global supply chain problem...
touché

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 4:58 pm
by k6ccc
In IT, security is layers. Each layer makes it some amount more secure, and generally, no one layer will take you from totally insecure to totally secure. Each layer makes it a bit harder to be attacked. Some layers are fairly simple (and in some cases have serious vulnerabilities if broken). For example, using a non-standard port - sometimes called security through obscurity. By itself, provides very little security, but it means there is one more layer to crack. A simple password is a layer, but a complex password is thicker layer. Two factor authentication is another layer. Using a VPN adds a layer, but by itself is not total security. VPNs can be hacked...
HTTPS vs HTTP is just another layer. It means that it is harder to read the password (among other stuff) with a packet sniffer. Does not make it impossible, just harder.
In reference to whether a home network is worthy of being attacked - yes they are. Ever dealt with a teenager computer geek that thinks that hacking YOUR network is a challenge either just because they can, or they want to get around the limitations that their parents put on their network access?
Yes, Mikrotik should add https to SwitchOS...

Re: SwitchOS CLI

Posted: Wed Oct 19, 2022 6:23 pm
by rextended
"Press Reset Button for apply the changes"