Control plane policies define the management services SDX should allow on your MikroTik routers. They centralize settings for WinBox, SSH, HTTP, HTTPS, Telnet, FTP, API, and API-SSL access, including service ports and trusted networks.Documentation Index
Fetch the complete documentation index at: https://altostrat.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
Before you change a policy, make sure you have:- Permission to create or update control plane policies.
- A trusted-network list in CIDR format.
- A recent configuration backup for any production site you will affect.
- A maintenance window for broad rollout.
How Policies Work
When you save a control plane policy and attach it to sites, SDX records the policy and updates the affected site assignments. Device-side enforcement is delivered through the platform’s management and job model, so a site must be reachable before the router can receive and apply the change. The policy model validates that:- Each management service has an enabled or disabled state.
- Each service uses a valid TCP port.
- Service ports do not conflict with each other.
- Trusted networks and per-service networks use valid CIDR notation.
If your account has no policy yet, SDX creates a default policy for the customer. The default policy is protected from deletion and is used as the fallback when a custom policy is removed.
Create a Policy
Create the policy
Select Add, enter a clear policy name, and choose whether you need custom input rules.
Roll Out Safely
For production changes:- Apply the policy to a low-risk test site.
- Confirm WinBox or SSH access behaves as expected.
- Review the site orchestration or job history for failures.
- Apply the policy to a small batch.
- Expand to the remaining sites after validation.
Common Policy Decisions
Disable Unused Services
If your team does not use Telnet, FTP, HTTP, or non-SSL API access, disable them in the policy.
Restrict Source Networks
Prefer narrow CIDR ranges for operations networks, bastion hosts, or trusted office networks.
Keep Ports Predictable
Use a documented port standard so support staff know what to expect during incidents.
Stage Changes
Attach the policy to a small number of sites before applying it fleet-wide.
Troubleshooting
If a policy does not appear to apply:- Confirm the site is online.
- Confirm the site is attached to the intended policy.
- Check whether the router has picked up the queued work.
- Review the orchestration or job history for the site.
- Verify the source IP you are connecting from is inside an allowed CIDR.
Troubleshooting
Use the fleet troubleshooting checklist for policy and job-delivery issues.