Accessing Mikrotik VPN from internet

Firstly, apologies, newbie here. Just recently purchased mikrotik vpn router. Did the absolute minimum - tick vpn access in “Quick Set”, gave vpn user a password.

From my internal network I can log in to the vpn server. Works as expected.

Set up my tplink internet router - NAT Forwarding port 1723 to internal mikrotik ip with same port, all protocol. Ensure “PPTP Passthrough” is ticked.

Tried to connect from my phone - using my internal network, connected. Using my phone network (data line), connection fail.

Export config below.

What am I doing wrong? Driving me mad. :frowning: Please help.

[admin@MikroTik] > export hide-sensitive 

# oct/10/2019 15:26:22 by RouterOS 6.42.12

# software id = DMDL-IQSD

#

# model = RB750Gr3

# serial number = 8B010AEBA7E9

/interface bridge

add admin-mac=74:4D:28:A6:14:B6 auto-mac=no comment=defconf name=bridge

/interface list

add comment=defconf name=WAN

add comment=defconf name=LAN

/interface wireless security-profiles

set [ find default=yes ] supplicant-identity=MikroTik

/ip hotspot profile

set [ find default=yes ] html-directory=flash/hotspot

/ip pool

add name=dhcp ranges=192.168.88.10-192.168.88.254

add name=vpn ranges=192.168.89.2-192.168.89.255

/ip dhcp-server

add address-pool=dhcp disabled=no interface=bridge name=defconf

/ppp profile

set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn

/interface bridge port

add bridge=bridge comment=defconf interface=ether2

add bridge=bridge comment=defconf interface=ether3

add bridge=bridge comment=defconf interface=ether4

add bridge=bridge comment=defconf interface=ether5

/ip neighbor discovery-settings

set discover-interface-list=LAN

/interface l2tp-server server

set enabled=yes use-ipsec=yes

/interface list member

add comment=defconf interface=bridge list=LAN

add comment=defconf interface=ether1 list=WAN

/interface pptp-server server

set enabled=yes

/interface sstp-server server

set default-profile=default-encryption enabled=yes

/ip address

add address=192.168.88.1/24 comment=defconf interface=ether2 network=192.168.88.0

/ip cloud

set ddns-enabled=yes

/ip dhcp-client

add comment=defconf dhcp-options=hostname,clientid disabled=no interface=ether1

/ip dhcp-server network

add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1

/ip dns

set allow-remote-requests=yes

/ip dns static

add address=192.168.88.1 name=router.lan

/ip firewall filter

add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked

add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 protocol=udp

add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp

add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp

add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp

add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp

add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid

add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp

add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN

add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec

add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec

add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related

add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked

add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid

add action=drop chain=forward comment="defconf:  drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN

/ip firewall nat

add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN

add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=192.168.89.0/24

/ppp secret

add name=vpn profile=default-encryption

add name=dt profile=default-encryption service=pptp

/system clock

set time-zone-name=Asia/Kuala_Lumpur

/tool mac-server

set allowed-interface-list=LAN

/tool mac-server mac-winbox

set allowed-interface-list=LAN