The following Traefik .toml
file which reverse proxies a MikroTik router’s WebFig webinterface is based on our Traefik setup from Simple Traefik docker-compose setup with Lets Encrypt Cloudflare DNS-01 & TLS-ALPN-01 & HTTP-01 challenges. It assumes that the MikroTik router is reachable at 10.1.2.3
via HTTP.
No Authentication beyond the MikroTik router’s WebFig internal authentication is performed. However – at least when using our Traefik config from our previous post it enforces HTTPS i.e. encrypted access.
Save the following file under config/mikrotik01.toml
. Traefik will automatically reload, no restart will be required.
[http.routers.mikrotik01] rule = "Host(`mikrotik01.mydomain.com`)" service = "mikrotik01" [http.routers.mikrotik01.tls] certresolver = "cloudflare" [[http.routers.mikrotik01.tls.domains]] main = "mydomain.com" sans = ["*.mydomain.com"] [http.services] [http.services.mikrotik01.loadBalancer] [[http.services.mikrotik01.loadBalancer.servers]] url = "http://10.1.2.3.4/"