Thanks
# aug/27/2024 08:39:13 by RouterOS 6.48.2
# software id = AALN-R52Q
#
# model = 2011UiAS
#
/interface bridge
"created from master port" name=bridge1 protocol-mode=none
/interface ethernet
set [ find default-name=ether1 ] comment=LAN speed=100Mbps
set [ find default-name=ether2 ] speed=100Mbps
set [ find default-name=ether3 ] speed=100Mbps
set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether5 ] comment="WAN - Fibre" speed=100Mbps
set [ find default-name=ether6 ] advertise=\
10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full name=\
ether6-NBN
set [ find default-name=ether7 ] advertise=\
10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether8 ] advertise=\
10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether9 ] advertise=\
10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether10 ] advertise=\
10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=\
aes-256-cbc,aes-192-cbc,aes-128-cbc,3des pfs-group=none
/ip pool
add name=dhcp_pool0 ranges=192.168.1.50-192.168.1.150
add name=vpn ranges=192.168.1.180-192.168.1.190
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=bridge1 lease-time=12h \
name=dhcp1
/ppp profile
set *FFFFFFFE dns-server=192.168.1.254 local-address=192.168.89.1 \
remote-address=vpn
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas\
sword,web,sniff,sensitive,api,romon,dude,tikapp"
/interface bridge port
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
/interface l2tp-server server
set authentication=mschap1,mschap2 enabled=yes use-ipsec=yes
/interface list member
add interface=sfp1 list=WAN
add interface=bridge1 list=LAN
/interface pptp-server server
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add add-default-route=no disabled=no interface=ether6-NBN
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=192.168.1.254 gateway=192.168.1.1
/ip dns
set servers=192.168.1.254
/ip firewall address-list
add address=192.168.1.0/24 list=support
add address=0.0.0.0/8 comment="Self-Identification [RFC 3330]" list=bogons
add address=10.0.0.0/8 comment="Private[RFC 1918] - CLASS A # Check if you nee\
d this subnet before enable it" disabled=yes list=bogons
add address=127.0.0.0/8 comment="Loopback [RFC 3330]" list=bogons
add address=169.254.0.0/16 comment="Link Local [RFC 3330]" list=bogons
add address=172.16.0.0/12 comment="Private[RFC 1918] - CLASS B # Check if you \
need this subnet before enable it" disabled=yes list=bogons
add address=192.168.0.0/16 comment="Private[RFC 1918] - CLASS C # Check if you\
\_need this subnet before enable it" disabled=yes list=bogons
add address=192.0.2.0/24 comment="Reserved - IANA - TestNet1" list=bogons
add address=192.88.99.0/24 comment="6to4 Relay Anycast [RFC 3068]" list=\
bogons
add address=198.18.0.0/15 comment="NIDB Testing" list=bogons
add address=198.51.100.0/24 comment="Reserved - IANA - TestNet2" list=bogons
add address=203.0.113.0/24 comment="Reserved - IANA - TestNet3" list=bogons
add address=224.0.0.0/4 comment=\
"MC, Class D, IANA # Check if you need this subnet before enable it" \
disabled=yes list=bogons
add address=119.18.37.215 list=support
add address=167.179.174.119 list=support
/ip firewall filter
add action=accept chain=input comment="TEST - BIT allow all" src-address=\
167.179.174.119
add action=add-src-to-address-list address-list=Syn_Flooder \
address-list-timeout=30m chain=input comment=\
"Add Syn Flood IP to the list" connection-limit=30,32 protocol=tcp \
tcp-flags=syn
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="Allow VPN L2TP IPSEC" dst-port=\
1701,500,4500 protocol=udp
add action=accept chain=input comment="Allow VPN IPSEC ESP" protocol=\
ipsec-esp
add action=accept chain=input comment="Allow VPN IPSEC AH" protocol=ipsec-ah
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="Drop to syn flood list" \
src-address-list=Syn_Flooder
add action=add-src-to-address-list address-list=Port_Scanner \
address-list-timeout=1w chain=input comment="Port Scanner Detect" \
protocol=tcp psd=21,3s,3,1
add action=drop chain=input comment="Drop to port scan list" \
src-address-list=Port_Scanner
add action=jump chain=input comment="Jump for icmp input flow" jump-target=\
ICMP protocol=icmp
add action=drop chain=input comment=\
"Block all access to the winbox - except to support list" dst-port=8291 \
protocol=tcp src-address-list=!support
add action=jump chain=forward comment="Jump for icmp forward flow" \
jump-target=ICMP protocol=icmp
add action=drop chain=forward comment="Drop to bogon list" dst-address-list=\
bogons
add action=add-src-to-address-list address-list=spammers \
address-list-timeout=3h chain=forward comment=\
"Add Spammers to the list for 3 hours" connection-limit=30,32 dst-port=\
25,587 limit=30/1m,0 protocol=tcp
add action=drop chain=forward comment="Avoid spammers action" dst-port=25,587 \
protocol=tcp src-address-list=spammers
add action=drop chain=input comment="Drop DNS - WAN UDP" in-interface=ether5 \
port=53 protocol=udp
add action=drop chain=input comment="Drop DNS - WAN TCP" in-interface=ether5 \
port=53 protocol=tcp
add action=accept chain=input comment="Accept DNS - UDP" port=53 protocol=udp
add action=accept chain=input comment="Accept DNS - TCP" port=53 protocol=tcp
add action=accept chain=input comment="Accept to established connections" \
connection-state=established
add action=accept chain=input comment="Accept to related connections" \
connection-state=related
add action=accept chain=input comment="Full access to SUPPORT address list" \
src-address-list=support
add action=drop chain=input comment="Drop anything else!"
add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" \
icmp-options=8:0 limit=1,5 protocol=icmp
add action=accept chain=ICMP comment="Echo reply" icmp-options=0:0 protocol=\
icmp
add action=accept chain=ICMP comment="Time Exceeded" icmp-options=11:0 \
protocol=icmp
add action=accept chain=ICMP comment="Destination unreachable" icmp-options=\
3:0-1 protocol=icmp
add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp
add action=drop chain=ICMP comment="Drop to the other ICMPs" protocol=icmp
add action=jump chain=output comment="Jump for icmp output" jump-target=ICMP \
protocol=icmp
/ip firewall nat
add action=masquerade chain=srcnat comment="MASQ local" src-address=\
192.168.1.0/24
add action=masquerade chain=srcnat out-interface=ether5 src-address=\
192.168.1.0/24
add action=masquerade chain=srcnat out-interface=ether6-NBN
add action=dst-nat chain=dstnat comment="iLO - Support list" dst-port=8081 \
in-interface=ether5 protocol=tcp src-address-list=support to-addresses=\
192.168.1.252 to-ports=443
add action=dst-nat chain=dstnat comment="CARHOST - Support list" dst-port=\
4001 in-interface=ether5 protocol=tcp src-address-list=support \
to-addresses=192.168.1.250 to-ports=3389
add action=dst-nat chain=dstnat comment="CARFS - Support list" dst-port=4002 \
in-interface=ether5 protocol=tcp src-address-list=support to-addresses=\
192.168.1.254 to-ports=3389
add action=dst-nat chain=dstnat comment=CCTV1 dst-port=8000 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.199 to-ports=8000
add action=dst-nat chain=dstnat comment="RTI UDP" dst-port=5053 in-interface=\
ether6-NBN protocol=udp to-addresses=192.168.1.200 to-ports=5053
add action=dst-nat chain=dstnat comment="RTI TCP" dst-port=5056 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.200 to-ports=5056
add action=dst-nat chain=dstnat comment=CCTV2 dst-port=8008 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.199 to-ports=8008
add action=dst-nat chain=dstnat comment=CCTV3 dst-port=5554 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.199 to-ports=5554
add action=dst-nat chain=dstnat comment="RTI_ACCESS TCP" dst-port=5056 \
in-interface=ether6-NBN protocol=tcp to-addresses=192.168.1.200 to-ports=\
5056
add action=dst-nat chain=dstnat comment="RTI_ACCESS UDP" dst-port=5053 \
in-interface=ether6-NBN protocol=udp to-addresses=192.168.1.200 to-ports=\
5053
add action=dst-nat chain=dstnat comment=ALARM dst-port=9050 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.90 to-ports=9050
add action=dst-nat chain=dstnat comment=ALARM dst-port=9051 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.90 to-ports=9051
add action=dst-nat chain=dstnat comment=RTI dst-port=4110 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.200 to-ports=4110
add action=dst-nat chain=dstnat comment=RTI dst-port=5053 in-interface=\
ether6-NBN protocol=udp to-addresses=192.168.1.200 to-ports=5053
add action=dst-nat chain=dstnat comment=RTI dst-port=5056 in-interface=\
ether6-NBN protocol=tcp to-addresses=192.168.1.200 to-ports=5056
add action=dst-nat chain=dstnat comment=RTI dst-port=2113 in-interface=\
ether6-NBN in-interface-list=all protocol=tcp src-port="" to-addresses=\
192.168.1.200 to-ports=2113
add action=dst-nat chain=dstnat comment=RTI dst-port=2113 in-interface=\
ether6-NBN protocol=udp to-addresses=192.168.1.200 to-ports=2113
add action=dst-nat chain=dstnat comment=RTI dst-port=4110 in-interface=\
ether6-NBN protocol=udp src-port="" to-addresses=192.168.1.200 to-ports=\
4110
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
192.168.89.0/24
/ip route
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/lcd
set time-interval=daily
/lcd interface
add interface=bridge1
/lcd interface pages
set 0 interfaces="sfp1,bridge1,ether2,ether3,ether4,ether5,ether6-NBN,ether7,e\
ther8,ether9,ether10"
/ppp aaa
set use-radius=yes
/ppp secret
add name=vpn
/radius
add address=192.168.1.254 service=ppp src-address=192.168.1.1
/system clock
set time-zone-name=Australia/Brisbane
/system logging
add disabled=yes topics=ipsec
add action=disk topics=ipsec