Not working. The original cable internet on this router is working fine, but the new fiber internet is not.. Can’t even ping it via the fiber. Torch shows the ICMP packets arriving on the interface, and an added rule to specifically allow ICMP packets from the fiber is counting the packets. Outbound pings and traceroute from the router when I specify the fiber interface work fine. I have not even tried traffic through the router on the 201 - 204 LANs that will use the fiber. I figure that if I can’t even ping it and get a response, I’m missing something…
Here is a cleaned up export.
# sep/30/2021 15:22:42 by RouterOS 6.48.3
# software id = <redacted>
#
# model = RB4011iGS+
# serial number = <redacted>
/interface ethernet
set [ find default-name=ether1 ] comment="Spectrum cable internet" name=\
E01-p2_Cable_Internet speed=100Mbps
set [ find default-name=ether2 ] comment="Main cable home LAN" name=\
E02-p4_101 speed=100Mbps
set [ find default-name=ether3 ] comment="Cable Private WiFi" name=E03-p6_103 \
speed=100Mbps
set [ find default-name=ether4 ] comment="802.1Q trunk" name=E04-p8_802.1Q \
speed=100Mbps
set [ find default-name=ether5 ] comment="Router to Router tie" name=\
"E05 to Router 2" speed=100Mbps
set [ find default-name=ether8 ] disabled=yes
set [ find default-name=ether10 ] name=E10-Fiber poe-out=off
set [ find default-name=ether7 ] disabled=yes
set [ find default-name=ether9 ] disabled=yes
set [ find default-name=sfp-sfpplus1 ] disabled=yes
/interface vlan
add comment="AREDN WAN" interface=E04-p8_802.1Q name=VLAN_001 vlan-id=1
add comment="AREDN LAN" interface=E04-p8_802.1Q name=VLAN_005 vlan-id=5
add comment="AREDN 3GHz at Johnstone to Pleasants Peak LAN interface" \
interface=E04-p8_802.1Q name=VLAN_011 vlan-id=11
add comment="AREDN 5GHz at Johnstone SW sector LAN interface" interface=\
E04-p8_802.1Q name=VLAN_012 vlan-id=12
add comment="AREDN 5GHz at Johnstone SE sector LAN interface" interface=\
E04-p8_802.1Q name=VLAN_013 vlan-id=13
add comment="Cable Public WiFi" interface=E04-p8_802.1Q name=VLAN_102 \
vlan-id=102
add comment="Cactus" interface=E04-p8_802.1Q name=VLAN_104 vlan-id=104
add comment="VOIP phones" interface=E04-p8_802.1Q name=VLAN_105 vlan-id=105
add comment="Internet of Things" interface=E04-p8_802.1Q name=VLAN_106 \
vlan-id=106
add comment=".131 E1.31 LAN" interface=E04-p8_802.1Q name=VLAN_131 vlan-id=\
131
add comment="Main FO home LAN" interface=E04-p8_802.1Q name=VLAN_201 \
vlan-id=201
add comment=".202 Public WiFi LAN" interface=E04-p8_802.1Q name=VLAN_202 \
vlan-id=202
add comment=".203 Private WiFi LAN" interface=E04-p8_802.1Q name=VLAN_203 \
vlan-id=203
add comment=".204 Cactus" interface=E04-p8_802.1Q name=VLAN_204 vlan-id=204
add comment=".209 HARPUSA LAN" interface=E04-p8_802.1Q name=VLAN_209 vlan-id=\
209
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add exclude=dynamic name=discover
add name=mactel
add name=mac-winbox
add name=LAN
add name=Router-access
add name=WAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip firewall layer7-protocol
add name=local.mesh regexp=local.mesh
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc
/ip pool
add name=".101 DHCP pool" ranges=192.168.101.100-192.168.101.119
add name=".102 DHCP pool" ranges=192.168.102.100-192.168.102.119
add name=".103 DHCP pool" ranges=192.168.103.100-192.168.103.119
add name=".104 DHCP pool" ranges=192.168.104.100-192.168.104.109
add name=".106 DHCP pool" ranges=192.168.106.100-192.168.106.109
add name=".105 DHCP pool" ranges=192.168.105.100-192.168.105.109
add name=".151 DHCP pool" ranges=192.168.151.100-192.168.151.119
add name=".001 DHCP pool" ranges=192.168.1.100-192.168.1.109
add name=".131 DHCP pool" ranges=192.168.131.100-192.168.131.109
add name=".201 DHCP pool" ranges=192.168.201.100-192.168.201.119
add name=".202 DHCP pool" ranges=192.168.202.100-192.168.202.119
add name=".203 DHCP pool" ranges=192.168.203.100-192.168.203.119
add name=".204 DHCP pool" ranges=192.168.204.100-192.168.204.109
add name=".209 DHCP pool" ranges=192.168.209.100-192.168.209.109
add name=".206 DHCP pool" ranges=192.168.206.100-192.168.206.119
/ip dhcp-server
add address-pool=".101 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=E02-p4_101 lease-time=3h name=".101 DHCP server"
add address-pool=".102 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_102 lease-time=3h name=".102 DHCP server"
add address-pool=".103 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=E03-p6_103 lease-time=3h name=".103 DHCP server"
add address-pool=".104 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_104 lease-time=3h name=".104 DHCP server"
add address-pool=".106 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_106 lease-time=3h name=".106 DHCP server"
add address-pool=".105 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_105 lease-time=3h name=".105 DHCP server"
add address-pool=".151 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_151 lease-time=3h name=".151 DHCP server"
add address-pool=".001 DHCP pool" disabled=no interface=VLAN_001 lease-time=\
3h name=".001 DHCP server"
add address-pool=".131 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_131 lease-time=3h name=".131 DHCP server"
add address-pool=".201 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_201 lease-time=3h name=".201 DHCP server"
add address-pool=".202 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_202 lease-time=3h name=".202 DHCP server"
add address-pool=".204 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_204 lease-time=3h name=".204 DHCP server"
add address-pool=".203 DHCP pool" authoritative=after-2sec-delay disabled=no \
interface=VLAN_203 lease-time=3h name=".203 DHCP server"
add address-pool=".209 DHCP pool" disabled=no interface=VLAN_209 lease-time=\
3h name=".209 DHCP server"
add address-pool=".206 DHCP pool" authoritative=after-2sec-delay interface=\
E08-pXX_206 lease-time=3h name=".206 DHCP server"
/ipv6 dhcp-server
add address-pool=pool1 interface=E02-p4_101 name=server1
/ipv6 pool
add name=pool1 prefix-length=56
/queue simple
add burst-limit=256k/512k burst-time=10s/10s limit-at=128k/256k max-limit=\
128k/256k name="Test queue" target=192.168.103.182/32
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/system logging action
set 3 remote=192.168.101.11 src-address=192.168.101.251
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas\
sword,web,sniff,sensitive,api,romon,dude,tikapp"
#error exporting /interface bridge calea
/ip neighbor discovery-settings
set discover-interface-list=all
/ip settings
set allow-fast-path=no
/interface list member
add interface=E02-p4_101 list=mactel
add interface=E02-p4_101 list=mac-winbox
add interface=VLAN_201 list=LAN
add interface=VLAN_202 list=LAN
add interface=VLAN_203 list=LAN
add interface=VLAN_204 list=LAN
add interface=E02-p4_101 list=LAN
add interface=E03-p6_103 list=LAN
add interface=VLAN_102 list=LAN
add interface=VLAN_104 list=LAN
add interface=VLAN_105 list=LAN
add interface=VLAN_106 list=LAN
add interface=VLAN_131 list=LAN
add interface=VLAN_151 list=LAN
add interface=E02-p4_101 list=Router-access
add interface=VLAN_201 list=Router-access
add interface=E01-p2_Cable_Internet list=WAN
add interface=E10-Fiber list=WAN
/ip accounting
set account-local-traffic=yes enabled=yes
/ip accounting web-access
set accessible-via-web=yes address=192.168.101.0/26
/ip address
add address=192.168.101.251/24 interface=E02-p4_101 network=192.168.101.0
add address=192.168.102.251/24 interface=VLAN_102 network=192.168.102.0
add address=192.168.103.251/24 interface=E03-p6_103 network=192.168.103.0
add address=192.168.211.251/24 interface="E05 to Router 2" network=\
192.168.211.0
add address=192.168.104.251/24 interface=VLAN_104 network=192.168.104.0
add address=192.168.105.251/24 interface=VLAN_105 network=192.168.105.0
add address=192.168.106.251/24 interface=VLAN_106 network=192.168.106.0
add address=192.168.151.251/24 interface=VLAN_151 network=192.168.151.0
add address=192.168.204.251/24 interface=VLAN_204 network=192.168.204.0
add address=192.168.1.251/24 interface=VLAN_001 network=192.168.1.0
add address=192.168.201.251/24 interface=VLAN_201 network=192.168.201.0
add address=192.168.202.251/24 interface=VLAN_202 network=192.168.202.0
add address=192.168.203.251/24 interface=VLAN_203 network=192.168.203.0
add address=192.168.209.251/24 interface=VLAN_209 network=192.168.209.0
add address=192.168.131.251/24 interface=VLAN_131 network=192.168.131.0
/ip cloud
set update-time=no
/ip dhcp-client
< Removed simply because it's a really long list that should serve no
purpose in this discussion >
/ip dhcp-server network
add address=192.168.1.0/24 comment="AREDN WAN network" dns-server=\
192.168.1.251 gateway=192.168.1.251 netmask=24
add address=192.168.101.0/24 comment=".101 network" dns-server=\
192.168.101.11,192.168.101.251 gateway=192.168.101.251 netmask=24
add address=192.168.102.0/24 comment=".102 network" dns-server=\
192.168.102.251,8.8.8.8,4.2.2.2 gateway=192.168.102.251 netmask=24
add address=192.168.103.0/24 comment=".103 network" dns-server=\
192.168.103.251,8.8.8.8,4.2.2.3 gateway=192.168.103.251 netmask=24
add address=192.168.104.0/24 comment=".104 network" dns-server=\
192.168.104.251,8.8.8.8,4.2.2.4 gateway=192.168.104.251 netmask=24
add address=192.168.105.0/24 comment=".105 network" dns-server=\
192.168.105.251,8.8.8.8,4.2.2.2 gateway=192.168.105.251 netmask=24
add address=192.168.106.0/24 comment=".106 network" dns-server=\
192.168.106.251,8.8.8.8,4.2.2.4 gateway=192.168.106.251 netmask=24
add address=192.168.131.0/24 comment=".131 network" dns-server=\
192.168.131.251,8.8.8.8,4.2.2.1 gateway=192.168.131.251 netmask=24
add address=192.168.151.0/24 comment=".151 network" dns-server=\
192.168.151.251,8.8.8.8,4.2.2.1 gateway=192.168.151.251 netmask=24
add address=192.168.201.0/24 comment=".201 network" dns-server=\
192.168.201.251,8.8.8.8,4.2.2.1 gateway=192.168.201.251 netmask=24
add address=192.168.202.0/24 comment=".202 network" dns-server=\
192.168.202.251,8.8.8.8,4.2.2.2 gateway=192.168.202.251 netmask=24
add address=192.168.203.0/24 comment=".203 network" dns-server=\
192.168.203.251,8.8.8.8,4.2.2.3 gateway=192.168.203.251 netmask=24
add address=192.168.204.0/24 comment=".204 network" dns-server=\
192.168.204.251,8.8.8.8,4.2.2.4 gateway=192.168.204.251 netmask=24
add address=192.168.209.0/24 comment=".209 network" dns-server=\
192.168.209.251,8.8.8.8,4.2.2.5 gateway=192.168.209.251 netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,4.2.2.1
/ip dns static
add address=192.168.101.251 name=router
add address=192.168.101.11 name=k6ccc.org
/ip firewall address-list
add address=131.107.13.100 list="NTP servers"
add address=64.62.190.177 list="NTP servers"
add address=50.22.155.163 list="NTP servers"
add address=8.8.8.8 comment="Google #2" list="DNS servers"
add address=8.8.4.4 comment="Google #1" list="DNS servers"
add address=107.167.0.0/16 list="Manual Blacklist"
add address=10.9.60.81 comment="Mikrotik hAP-at-Home for AREDN" list=\
hAP-at-Home
add address=192.73.242.152 list="NTP servers"
add address=132.163.97.4 list="NTP servers"
#error exporting /ip firewall calea
/ip firewall filter
add action=passthrough chain=output out-interface=E01-p2_Cable_Internet
add action=passthrough chain=output out-interface=VLAN_106
add action=passthrough chain=input in-interface=VLAN_106
add action=jump chain=input comment="Jump to Attack chain to prevent Port scan\
\_and DoS attacks from WAN interfaces" in-interface-list=WAN jump-target=\
Attack
add action=jump chain=input comment=\
"Jump to ICMP chain to prevent being ping flooded from WAN interfaces" \
in-interface-list=WAN jump-target=ICMP protocol=icmp
add action=accept chain=input comment="Allow PING on all LAN interfaces." \
in-interface-list=LAN protocol=icmp
add action=drop chain=input comment=\
"Drop TCP DNS packets from WAN interfaces" dst-port=53 in-interface-list=\
WAN protocol=tcp
add action=drop chain=input comment=\
"Drop UPD DNS packets from WAN interfaces" dst-port=53 in-interface-list=\
WAN protocol=udp
add action=drop chain=input comment=\
"Drop FTP attempts to router from internet via \"normal\" port 21" \
dst-port=21 in-interface=E01-p2_Cable_Internet log-prefix=\
"Invalid FTP p21" protocol=tcp
add action=drop chain=input comment=\
"Drop SSH attempts to router from internet via \"normal\" port 22" \
dst-port=22 in-interface=E01-p2_Cable_Internet log-prefix=\
"Invalid SSH p22" protocol=tcp
add action=drop chain=input comment=\
"Drop Telnet attempts to router from internet via \"normal\" port 23" \
dst-port=23 in-interface=E01-p2_Cable_Internet log-prefix=\
"Invalid Telnet p23" protocol=tcp
add action=drop chain=input comment=\
"Drop WinBox attempts to router from internet via \"normal\" port 8291" \
dst-port=8291 in-interface=E01-p2_Cable_Internet log-prefix=\
"Invalid WinBox p8291" protocol=tcp
add action=accept chain=input comment=\
"Allow established and related connections to router" connection-state=\
established,related
add action=drop chain=input comment=\
"Drop any other input packets that get this far" log-prefix=\
"Dropped connection"
add action=drop chain=forward comment="Drop invalid packets" \
connection-state=invalid
add action=accept chain=forward comment="Allow AREDN VLAN 11 access to .101" \
disabled=yes in-interface=VLAN_011 out-interface=E02-p4_101
add action=accept chain=forward comment="Allow AREDN VLAN 12 access to .101" \
disabled=yes in-interface=VLAN_012 out-interface=E02-p4_101
add action=accept chain=forward comment="Allow AREDN VLAN 13 access to .101" \
disabled=yes in-interface=VLAN_013 out-interface=E02-p4_101
< Deleted a bunch of passthrough rules used a packet counters - normally disabled
except when needed >
add action=accept chain=forward comment="Accept all that is DST NATed" \
connection-nat-state=dstnat connection-state=new
add action=accept chain=forward comment="Accept all that is Source NATed" \
connection-nat-state=srcnat connection-state=new
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"Accept established and related packets" connection-state=\
established,related
add action=accept chain=forward comment=\
"Allow outbound traffic from .101 to Cable internet" in-interface=\
E02-p4_101 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from .102 to Cable internet" in-interface=\
VLAN_102 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from .103 to Cable internet" in-interface=\
E03-p6_103 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from .104 to Cable internet" in-interface=\
VLAN_104 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from .105 to Cable internet" in-interface=\
VLAN_105 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from .106 to Cable internet" in-interface=\
VLAN_106 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from .209 to Cable internet" in-interface=\
VLAN_209 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment=\
"Allow outbound traffic from AREDN WAN to Cable internet" in-interface=\
VLAN_001 out-interface=E01-p2_Cable_Internet
add action=accept chain=forward comment="Allow internet to AREDN WAN" \
in-interface=E01-p2_Cable_Internet out-interface=VLAN_001
add action=drop chain=forward comment=\
"Drop any forward packets that get this far"
add action=drop chain=Attack comment=\
"Drop all packets from IPs on the Manual Blacklist" log=yes log-prefix=\
"Manual Blacklist" src-address-list="Manual Blacklist"
add action=drop chain=Attack comment=\
"Detect and drop TCP port scan connections" protocol=tcp psd=21,3s,3,1
add action=drop chain=Attack comment=\
"Detect and drop UDP port scan connections" protocol=udp psd=21,3s,3,1
add action=return chain=Attack comment=\
"Prevent safe IPs from getting tarpitted." src-address-list=Safe
add action=tarpit chain=Attack comment="Suppress DoS attackby tarpitting" \
connection-limit=3,32 protocol=tcp src-address-list=Black_list
add action=add-src-to-address-list address-list=Black_list \
address-list-timeout=1d chain=Attack comment="Detect DoS attack" \
connection-limit=10,32 log=yes log-prefix="Black list" protocol=tcp
add action=return chain=Attack comment="Return from Attack chain"
add action=accept chain=ICMP comment=\
"Accept ICMP type 0:0 (Echo reply) and limit to 5 packets / sec" \
icmp-options=0:0-255 limit=5,5 protocol=icmp
add action=accept chain=ICMP comment="Accept ICMP type 3:3 (Destination host u\
nreachable) and limit to 5 packets / sec" icmp-options=3:3 limit=5,5 \
protocol=icmp
add action=accept chain=ICMP comment="Accept ICMP type 3:4 (Fragmentation requ\
ired) and limit to 5 packets / sec" icmp-options=3:4 limit=5,5 protocol=\
icmp
add action=accept chain=ICMP comment="Accept ICMP type 8:0 (Echo request) and \
limit to 5 packets / sec via Fiber" icmp-options=8:0-255 in-interface=\
E10-Fiber limit=5,5:packet protocol=icmp
add action=accept chain=ICMP comment=\
"Accept ICMP type 8:0 (Echo request) and limit to 5 packets / sec" \
icmp-options=8:0-255 limit=5,5 protocol=icmp
add action=accept chain=ICMP comment=\
"Accept ICMP type 11:0 (Time exceeded) and limit to 5 packets / sec" \
icmp-options=11:0-255 limit=5,5 protocol=icmp
add action=drop chain=ICMP comment="Drop all other ICMP packets" protocol=\
icmp
add action=return chain=ICMP comment="Return from ICMP chain"
/ip firewall mangle
add action=mark-connection chain=prerouting dst-address=192.168.101.251 \
dst-port=53 layer7-protocol=local.mesh new-connection-mark=\
local.mesh-forward passthrough=yes protocol=tcp
add action=mark-connection chain=prerouting dst-address=192.168.101.251 \
dst-port=53 layer7-protocol=local.mesh new-connection-mark=\
local.mesh-forward passthrough=yes protocol=udp
add action=mark-connection chain=prerouting in-interface=VLAN_201 \
new-connection-mark=DSL passthrough=yes
/ip firewall nat
add action=masquerade chain=srcnat comment="Masquerade for cable" \
out-interface=E01-p2_Cable_Internet
add action=masquerade chain=srcnat comment="Masquerade for Fiber" \
out-interface=E10-Fiber
add action=masquerade chain=srcnat comment=\
"Outbound masquerade for traffic to VLAN 11" dst-address=10.113.6.64/29
add action=masquerade chain=srcnat comment=\
"Outbound masquerade for traffic to VLAN 12" dst-address=10.115.242.96/29
add action=masquerade chain=srcnat comment=\
"Outbound masquerade for traffic to VLAN 13" dst-address=10.115.244.80/29
add action=masquerade chain=srcnat comment="Masquerade for AREDN LAN" \
out-interface=VLAN_005
add action=dst-nat chain=dstnat comment="Web Server on Jupiter." \
dst-address-type=local dst-port=80 in-interface=!VLAN_005 protocol=tcp \
to-addresses=192.168.101.11 to-ports=80
add action=dst-nat chain=dstnat comment="Web Server on Jupiter from AREDN." \
dst-address-type=local dst-port=80 in-interface=VLAN_005 protocol=tcp \
to-addresses=192.168.101.11 to-ports=80
add action=dst-nat chain=dstnat comment="AREDN Tunnel server" dst-port=5525 \
in-interface=E01-p2_Cable_Internet protocol=tcp to-addresses=192.168.1.71 \
to-ports=5525
add action=dst-nat chain=dstnat connection-mark=local.mesh-forward \
to-addresses=10.9.60.81
add action=masquerade chain=srcnat connection-mark=local.mesh-forward
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip route
add distance=1 gateway=Fiber.GW.IP.Address routing-mark=via-FO
add comment="AREDN hAP-at-Home" distance=1 dst-address=10.0.0.0/8 gateway=\
10.9.60.81
add distance=1 dst-address=172.16.0.0/12 gateway=10.9.60.81
add distance=1 dst-address=192.168.0.96/28 gateway=192.168.211.250
add distance=1 dst-address=192.168.202.0/24 gateway=192.168.211.252
add disabled=yes distance=1 dst-address=192.168.203.0/24 gateway=\
192.168.211.252
add distance=1 dst-address=192.168.204.0/24 gateway=192.168.211.252
add distance=1 dst-address=192.168.205.0/24 gateway=192.168.211.252
/ip route rule
add action=lookup-only-in-table interface=E10-Fiber table=via-FO
add action=lookup-only-in-table interface=VLAN_201 table=via-FO
add action=lookup-only-in-table interface=VLAN_202 table=via-FO
add action=lookup-only-in-table interface=VLAN_203 table=via-FO
add action=lookup-only-in-table interface=VLAN_204 table=via-FO
/ip service
set telnet disabled=yes
set ftp port=<redacted>
set www port=<redacted>
set ssh port=<redacted>
set www-ssl disabled=no port=<redacted>
set api disabled=yes
set winbox port=<redacted>
set api-ssl disabled=yes
/ip ssh
set allow-none-crypto=yes forwarding-enabled=remote
/ipv6 dhcp-client
add add-default-route=yes interface=E01-p2_Cable_Internet pool-name=pool1 \
pool-prefix-length=56 request=address,prefix
/ipv6 firewall filter
add action=accept chain=input comment=\
"Accept Established and Related packets" connection-state=\
established,related
add action=drop chain=input comment="Drop all ICMPv6 packets from cable" \
disabled=yes in-interface=E01-p2_Cable_Internet protocol=icmpv6
add action=accept chain=input comment="Accept all ICMPv6 packets from cable." \
in-interface=E01-p2_Cable_Internet protocol=icmpv6
add action=accept chain=input comment=\
"Accept all ICMPv6 packets from LAN interface list." in-interface-list=\
LAN protocol=icmpv6
add action=drop chain=input comment="Drop all IPV6 packets from cable" \
in-interface=E01-p2_Cable_Internet log-prefix=IPV6
add action=drop chain=input comment=\
"Drop all IPV6 packets from all interfaces - optionally log them" \
disabled=yes log-prefix=IPV6
add action=drop chain=input comment="Drop all input IPV6 packets"
add action=accept chain=forward comment=\
"Accept Established and Related packets" connection-state=\
established,related
add action=accept chain=forward comment=\
"Accept outbound IPv6 packets from .101 LAN" in-interface=E02-p4_101
add action=drop chain=forward comment="Drop all forwarded IPV6 packets"
/ipv6 nd
set [ find default=yes ] advertise-dns=no disabled=yes
/system clock
set time-zone-name=America/Los_Angeles
/system identity
set name=RB4011iGS+
/system logging
set 1 disabled=yes
set 2 disabled=yes
add action=remote topics=info
add action=remote topics=error
add action=remote topics=critical
add action=disk topics=critical
add action=disk topics=error
add action=remote topics=warning
add action=disk topics=warning
add disabled=yes topics=critical
/system ntp client
set enabled=yes primary-ntp=192.73.242.152 secondary-ntp=132.163.97.4 \
server-dns-names=pool.ntp.org
/system resource irq rps
set E01-p2_Cable_Internet disabled=no
set E02-p4_101 disabled=no
set E03-p6_103 disabled=no
set E04-p8_802.1Q disabled=no
set "E05 to Router 2" disabled=no
/tool graphing interface
add allow-address=192.168.101.11/32
add allow-address=192.168.101.43/32
add allow-address=192.168.201.11/32
add allow-address=192.168.201.43/32
add allow-address=192.168.101.171/32
/tool graphing resource
add allow-address=192.168.101.11/32
add allow-address=192.168.101.43/32
add allow-address=192.168.201.11/32
add allow-address=192.168.201.43/32
add allow-address=47.44.2.90/32
add allow-address=192.168.101.171/32
/tool mac-server
set allowed-interface-list=mactel
/tool mac-server mac-winbox
set allowed-interface-list=mac-winbox
/tool sniffer
set file-name="Echo 2" filter-interface=VLAN_106 filter-ip-address=\
192.168.106.12/32
I think I cleaned up anything that would be sensitive without deleting anything that is needed. Ask if something does not make sense…
See anything I did stupid?