Микротик роутер настройка pppoe


Applies to RouterOS: v3, v4



The PPPoE (Point to Point Protocol over Ethernet) protocol provides extensive user management, network management and accounting benefits to ISPs and network administrators. Currently PPPoE is used mainly by ISPs to control client connections for xDSL and cable modems as well as plain Ethernet networks. PPPoE is an extension of the standard Point to Point Protocol (PPP). The difference between them is expressed in transport method: PPPoE employs Ethernet instead of serial modem connection.

Generally speaking, PPPoE is used to hand out IP addresses to clients based on authentication by username (and also if required, by workstation) as opposed to workstation only authentication where static IP addresses or DHCP are used. It is advised not to use static IP addresses or DHCP on the same interfaces as PPPoE for obvious security reasons.

The PPPoE client and server work over any Layer2 Ethernet level interface on the router — wireless 802.11 (Aironet, Cisco, WaveLan, Prism, Atheros), 10/100/1000 Mbit/s Ethernet, RadioLan and EoIP (Ethernet over IP tunnel).

Feature list

  • PPPoE server and client support;
  • Multilink PPP (MLPPP);
  • MLPPP over single link (ability to transmit full-sized frames);
  • BCP (Bridge Control Protocol) support — allows sending of raw Ethernet frames over PPP links;
  • MPPE 128bit RSA encryption;
  • pap, chap, mschap v1/v2 authentication;
  • RADIUS support for client authentication and accounting.

Note that when RADIUS server is authenticating a user with CHAP, MS-CHAPv1 or MS-CHAPv2, the RADIUS protocol does not use shared secret, it is used only in authentication reply. So if you have a wrong shared secret, RADIUS server will accept the request. You can use /radius monitor command to see bad-replies parameter. This value should increase whenever a client tries to connect.

  • MikroTik RouterOS PPPoE client to any PPPoE server (access concentrator)
  • MikroTik RouterOS server (access concentrator) to multiple PPPoE clients (clients are available for almost all operating systems and most routers)


  • Packages required: ppp
  • License required: Level1 (limited to 1 interface) , Level3 (limited to 200 interfaces) , Level4 (limited to 200 interfaces) , Level5 (limited to 500 interfaces) , Level6 (unlimited)
  • Submenu level: /interface pppoe-server, /interface pppoe-client
  • Standards and Technologies: PPPoE (RFC 2516)
  • Hardware usage: PPPoE server may require additional RAM (uses approx. 9KiB (plus extra 10KiB for packet queue, if data rate limitation is used) for each connection) and CPU power. Maximum of 65535 connections is supported.

Quick Setup Guide

To configure MikroTik RouterOS to be a PPPoE client, just add a pppoe-client:

To configure MikroTik RouterOS to be an Access Concentrator (PPPoE Server):

  • add an address pool for the clients from to;
  • add ppp profile;
  • add ppp secret (username/password);
  • add pppoe server itself.

PPPoE Operation


PPPoE has two stages:

  • Discovery stage — a client discovers all available access concentrators and selects one of them to establish PPPoE session.This stage has four steps: initialization, offer, request and session confirmation . PPPoE Discovery uses special Ethernet frames with their own Ethernet frame type 0x8863.

To initiate discovery, PPPoE client sends PADI frame to the broadcast Ethernet address (FF:FF:FF:FF:FF:FF) and optionally may specify a service name.

When server receives PADI frame, it responds with PADO frame to Client’s unicast Ethernet address. There can be more than one server in broadcast range of the client. In such case client collects PADO frames and picks one (in most cases it picks the server which responds first) to start session.

Client sends PADR frame to unicast Ethernet address of the server it chose. If server agrees to set up a session with this particular client, it allocates resources to set up PPP session and assigns Session ID number. This number is sent back to client in PADS frame. When client receives PADS frame, it knows servers mac address and Session ID, it allocates resources and session can begin.

  • Session — When discovery stage is completed, both peers know PPPoE Session ID and other peer’s Etehrnet (MAC) address which together defines PPPoE session. PPP frames are encapsulated in PPPoE session frames, which have Ethernet frame type 0x8864.
    When server sends confirmation and client receives it, PPP Session stage is started that consists of following steps:
    • LCP negotiation
    • Authentication
    • IPCP negotiation — where client is assigned an IP address.

PPPoE server sends Echo-Request packets to the client to determine the state of the session, otherwise server will not be able to determine that session is terminated in cases when client terminates session without sending Terminate-Request packet.

More detailed description of PPPoE protocol can be found in RFC 2516

Used Packet Types

Packet Description
PADI PPPoE Active Discovery Initialization
The PPPoE client sends out a PADI packet to the broadcast address. This packet can also populate the «service-name» field if a service name has been entered in the dial-up networking properties of the PPPoE client. If a service name has not been entered, this field is not populated
PADO PPPoE Active Discovery Offer
The PPPoE server, or Access Concentrator, should respond to the PADI with a PADO if the Access Concentrator is able to service the «service-name» field that had been listed in the PADI packet. If no «service-name» field had been listed, the Access Concentrator will respond with a PADO packet that has the «service-name» field populated with the service names that the Access Concentrator can service. The PADO packet is sent to the unicast address of the PPPoE client
PADR PPPoE Active Discovery Request
When a PADO packet is received, the PPPoE client responds with a PADR packet. This packet is sent to the unicast address of the Access Concentrator. The client may receive multiple PADO packets, but the client responds to the first valid PADO that the client received. If the initial PADI packet had a blank «service-name» field filed, the client populates the «service-name» field of the PADR packet with the first service name that had been returned in the PADO packet.
PADS PPPoE Active Discovery Session confirmation
When the PADR is received, the Access Concentrator generates a unique session identification (ID) for the Point-to-Point Protocol (PPP) session and returns this ID to the PPPoE client in the PADS packet. This packet is sent to the unicast address of the client.
PADT PPPoE Active Discovery Terminate
can be sent anytime after a session is established to indicate that a PPPoE session terminated. It can be sent by either server or client.
Читайте также:  Смарт бокс про роутер настройка

Typically, the largest Ethernet frame that can be transmitted without fragmentation is 1500 bytes. PPPoE adds another 6 bytes of overhead and PPP field adds two more bytes, leaving 1492 bytes for IP datagram. Therefore max PPPoE MRU and MTU values must not be larger than 1492.

TCP stacks try to avoid fragmentation, so they use an MSS (Maximum Segment Size). By default MSS is chosen as MTU of the outgoing interface minus the usual size of the TCP and IP headers (40 bytes), which results in 1460 bytes for an Ethernet interface. Unfortunately there may be intermediate links with lower MTU which will cause fragmentation. In such case TCP stack performs path MTU discovery. Routers which cannot forward the datagram without fragmentation are supposed to drop packet and send ICMP-Fragmentation-Required to originating host. When host receives such ICMP packet, it tries to lower the MTU. This should work in the ideal world, however in the real world many routers do not generate fragmentation-required datagrams, also many firewalls drop all ICMP datagrams.

The workaround for this problem is to adjust MSS if it is too big. By default RouterOS adds mangle rules to intercept TCP SYN packets and silently adjust any advertised MSS option so they will be appropriate for the PPPoE link.

Additional information on maximum supported MTUs for RouterBoards are listed here.

PPPoE Client

Sub-menu: /interface pppoe-client


Property Description
ac-name (string; Default: «») Access Concentrator name, this may be left blank and the client will connect to any access concentrator on the broadcast domain
add-default-route (yes|no; Default: no) Enable/Disable whether to add default route automatically
allow (mschap2|mschap1|chap|pap; Default: mschap2,mschap1,chap,pap) allowed authentication methods, by default all methods are allowed
default-route-distance (byte [0..255]; Default:1) sets distance value applied to auto created default route, if add-default-route is also selected
dial-on-demand (yes|no; Default: no) connects to AC only when outbound traffic is generated. If selected, then route with gateway address from network will be added while connection is not established.
interface (string; Default: ) interface name on which client will run
keepalive-timeout (integer; Default:60) Sets keepalive timeout in seconds.
max-mru (integer; Default: 1460) Maximum Receive Unit
max-mtu (integer; Default: 1460) Maximum Transmission Unit
mrru (integer: 512..65535|disabled; Default: disabled) maximum packet size that can be received on the link. If a packet is bigger than tunnel MTU, it will be split into multiple packets, allowing full size IP or Ethernet packets to be sent over the tunnel. Read more >>
name (string; Default: pppoe-out[i]) name of the PPPoE interface, generated by RouterOS if not specified
password (string; Default: ) password used to authenticate
profile (string; Default: default) default profile for the connection defined in /ppp profiles
service-name (string; Default: «») specifies the service name set on the access concentrator, can be left blank to connect to any PPPoE server
use-peer-dns (yes|no; Default: no) enable/disable getting DNS settings from the peer
user (string; Default: «») username used for authentication


Command /interface pppoe-client monitor will display current PPPoE status.

Available read only properties:

Property Description
ac-mac (MAC address) MAC address of the access concentrator (AC) the client is connected to
ac-name (string) name of the Access Concentrator
active-links (integer) Number of bonded MLPPP connections, (‘1’ if not using MLPPP)
encoding (string) encryption and encoding (if asymmetric, separated with ‘/’) being used in this connection
local-address (IP Address) IP Address allocated to client
remote-address (IP Address) Remote IP Address allocated to server (ie gateway address)
mru (integer) effective MRU of the link
mtu (integer) effective MTU of the link
service-name (string) used service name
status (string) current link status. Available values are:

  • dialing,
  • verifying password.
  • connected,
  • disconnected.
uptime (time) connection time displayed in days, hours, minutes and seconds
Читайте также:  Окно настройки роутера zyxel


Starting from v3.21 RouterOS has new tool — PPPoE Scanner. It allows you to scan all active PPPoE servers in broadcast domain. Command to run scanner is as follows /interface pppoe-client scan

Available read only properties:

Property Description
service (string) Service name configured on server
mac-address (MAC) Mac address of detected server
ac-name (string) name of the Access Concentrator


Note for Windows. Some connection instructions may use the form where the «phone number», such as «MikroTik_AC\mt1», is specified to indicate that «MikroTik_AC» is the access concentrator name and «mt1» is the service name.

Specifying MRRU means enabling MP (Multilink PPP) over single link. This protocol is used to split big packets into smaller ones. Under Windows it can be enabled in Networking tab, Settings button, «Negotiate multi-link for single link connections». MRRU is hardcoded to 1614 on Windows. This setting is useful to overcome PathMTU discovery failures. The MP setting should be enabled on both peers.


To add and enable PPPoE client on the ether1 interface connecting to the AC that provides ‘testSN’ service using user name user with the password ‘passwd’:

PPPoE Server Setup (Access Concentrator)

Sub-menu: /interface pppoe-server server

The PPPoE server (access concentrator) supports multiple servers for each interface — with differing service names. Currently the throughput of the PPPoE server has been tested to 160 Mb/s on a Celeron 600 CPU. Using higher speed CPUs, throughput should increase proportionately.

The access concentrator name and PPPoE service name are used by clients to identity the access concentrator to register with. The access concentrator name is the same as the identity of the router displayed before the command prompt. The identity may be set within the /system identity submenu.

Note that if no service name is specified in WindowsXP, it will only use a service with no name! So if you want to serve WindowsXP clients, leave your service name empty.


Property Description
authentication ( mschap2 | mschap1 | chap | pap; Default: «mschap2, mschap1, chap, pap») Authentication algorithm
default-profile (string; Default: «default») Default user profile to use
interface (string; Default: «») Interface that the clients are connected to
keepalive-timeout (time; Default: «10») Defines the time period (in seconds) after which the router is starting to send keepalive packets every second. If there is no traffic and no keepalive responses arrive for that period of time (i.e. 2 * keepalive-timeout), the non responding client is proclaimed disconnected.
max-mru (integer; Default: «1480») Maximum Receive Unit. The optimal value is the MTU of the interface the tunnel is working over reduced by 20 (so, for 1500-byte Ethernet link, set the MTU to 1480 to avoid fragmentation of packets)
max-mtu (integer; Default: «1480») Maximum Transmission Unit. The optimal value is the MTU of the interface the tunnel is working over reduced by 20 (so, for 1500-byte Ethernet link, set the MTU to 1480 to avoid fragmentation of packets)
max-sessions (integer; Default: «0») Maximum number of clients that the AC can serve. ‘0’ = no limitations.
mrru (integer: 512..65535 | disabled; Default: «disabled») Maximum packet size that can be received on the link. If a packet is bigger than tunnel MTU, it will be split into multiple packets, allowing full size IP or Ethernet packets to be sent over the tunnel. Read more >>
one-session-per-host (yes | no; Default: «no») Allow only one session per host (determined by MAC address). If a host tries to establish a new session, the old one will be closed.
service-name (string; Default: «») The PPPoE service name. Server will accept clients which sends PADI message with service-names that matches this setting or if service-name field in PADI message is not set.


The default keepalive-timeout value of 10s is OK in most cases. If you set it to 0, the router will not disconnect clients until they explicitly log out or the router is restarted. To resolve this problem, the one-session-per-host property can be used.

Note: Security issue: do not assign an IP address to the interface you will be receiving the PPPoE requests on.

Specifying MRRU means enabling MP (Multilink PPP) over a single link. This protocol is used to split big packets into smaller ones. Under Windows it can be enabled in Networking tag, Settings button, «Negotiate multi-link for single link connections». Their MRRU is hardcoded to 1614. This setting is useful to overcome PathMTU discovery failures. The MP setting should be enabled on both peers.

Читайте также:  Настройка домашней сети через wi fi роутеры


To add PPPoE server on ether1 interface provided with a service-name of «ex» and allowing only one connection per host:

PPPoE Server

Sub-menu: /interface pppoe-server

There are two types of interface (tunnel) items in PPPoE server configuration — static users and dynamic connections. An interface is created for each tunnel established to the given server. Static interfaces are added administratively if there is a need to reference the particular interface name (in firewall rules or elsewhere) created for the particular user. Dynamic interfaces are added to this list automatically whenever a user is connected and its username does not match any existing static entry (or in case the entry is active already, as there can not be two separate tunnel interfaces referenced by the same name — set one-session-per-host value if this is a problem). Dynamic interfaces appear when a user connects and disappear once the user disconnects, so it is impossible to reference the tunnel created for that use in router configuration (for example, in firewall), so if you need a persistent rules for that user, create a static entry for him/her. Otherwise it is safe to use dynamic configuration. Note that in both cases PPP users must be configured properly — static entries do not replace PPP configuration.

Property Description

  • encoding (read-only: text) — encryption and encoding (if asymmetric, separated with ‘/’) being used in this connection
  • mru (read-only: integer) — client’s MRU
  • mtu (read-only: integer) — client’s MTU
  • name (name) — interface name
  • remote-address (read-only: MAC address) — MAC address of the connected client
  • service (name) — name of the service the user is connected to
  • uptime (read-only: time) — shows how long the client is connected
  • user (name) — the name of the connected user (must be present in the user darabase anyway)


To view the currently connected users:

To disconnect the user ex:

Application Examples

PPPoE in a multipoint wireless 802.11g network

In a wireless network, the PPPoE server may be attached to an Access Point (as well as to a regular station of wireless infrastructure). Either our RouterOS client or Windows PPPoE clients may connect to the Access Point for PPPoE authentication. Further, for RouterOS clients, the radio interface may be set to MTU 1600 so that the PPPoE interface may be set to MTU 1500. This optimizes the transmission of 1500 byte packets and avoids any problems associated with MTUs lower than 1500. It is not discussed here, how to change the MTU of the Windows wireless interface.

Let us consider the following setup where the MikroTik Wireless AP offers wireless clients transparent access to the local network with authentication:

First of all, the wireless interface should be configured:

Now, configure the Ethernet interface, add the IP address and set the default route:

We should add PPPoE server to the wireless interface:

Finally, we can set up PPPoE clients:

We have now completed the configuration and added two users: w and l who are able to connect to Internet, using PPPoE client software.

Note that Windows XP built-in client supports encryption, but RASPPPOE does not. So, if it is planned to support Windows clients older than Windows XP, it is recommended not to require encryption. In either case, the server is able to support clients that cannot encrypt the data.

  • What are those numbers in PPPoE client disconnect logs?

Numbers in log message contain following information: Uptime Bytes-In Bytes-Out Packets-In Packets-Out

  • I can connect to my PPPoE server. I can even ping through it, but I still cannot open web pages

Make sure that you have specified a valid DNS server in the router (in /ip dns or in /ppp profile the dns-server parameter).

  • The PPPoE server shows more than one active user entry for one client, when the clients disconnect, they are still shown and active

Set the keepalive-timeout parameter (in the PPPoE server configuration) to 10 if you want clients to be considered logged off if they do not respond for 10 seconds.

Note that if the keepalive-timeout parameter is set to 0 and the only-one parameter (in PPP profile settings) is set to ‘yes’ then the clients may be able to connect only the once. To resolve this problem one-session-per-host parameter in PPPoE server configuration should be set to ‘yes’

  • My Windows XP client cannot connect to the PPPoE server

You have to specify the «Service Name» in the properties of the XP PPPoE client. If the service name is not set, or it does not match the service name of the MikroTik PPPoE server, you get the «line is busy» errors, or the system shows «verifying password — unknown error»

  • I want to have logs for PPPoE connection establishment

Configure the logging feature under the /system logging facility and enable the PPP type logs. Read more >>