Hopefully it’s now attached. Otherwise I’ll empty all the thousands of lines firewall entries and parse the file as text into this topic.
# 2025-05-11 17:03:17 by RouterOS 7.16.2
# software id = UCYE-VK1K
#
# model = RB3011UiAS
# serial number = E7E60FD836A5
/interface bridge
add ingress-filtering=no name=VLAN1_BR port-cost-mode=short vlan-filtering=\
yes
add admin-mac=hidden-mac auto-mac=no comment=defconf name=bridge \
port-cost-mode=short
/interface ethernet
set [ find default-name=ether10 ] name=DMZ
set [ find default-name=ether1 ] mtu=1504 name=Stadtwerke
/interface wireguard
add listen-port=23947 mtu=1420 name=wireguard1
/interface vlan
add interface=ether2 name=vlan1 vlan-id=1
add interface=Stadtwerke name=vlan2 vlan-id=2
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip firewall layer7-protocol
add comment=bittorrent name=bitorrent regexp=" ^(\\x13bittorrent protocol|azve\
r\\x01\$|get /scrape\\\?info_hash=get /announce\\\?info_has\
\nh=|get /client/bitcomet/|GET /data\\\?fid=)|d1:ad2:id20:|\\x08'7P\\)[RP]\
"
add name=js regexp="/\\/c\\/version.js\$/g"
/ip pool
add name=pool-vpn ranges=192.168.1.100-192.168.1.150
/ip smb users
set [ find default=yes ] disabled=yes
/port
set 0 name=serial0
/system logging action
add disk-file-name=logg name=logfiless target=disk
/interface bridge port
add bridge=bridge comment=defconf ingress-filtering=no interface=ether2 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether3 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether4 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether5 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether6 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether7 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether8 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether9 \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=DMZ \
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp1 \
internal-path-cost=10 path-cost=10
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface detect-internet
set internet-interface-list=WAN lan-interface-list=LAN wan-interface-list=\
dynamic
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=Stadtwerke list=WAN
add interface=ether2 list=LAN
add interface=wireguard1 list=LAN
add interface=DMZ list=LAN
/interface ovpn-server server
set auth=sha1,md5
/interface wireguard peers
add allowed-address=192.168.10.5/24 interface=wireguard1 name=ifurz4 \
public-key="FPBmZgAClxZ8sB0ViS4YQbZYwOdzZ2n+0ujEXK9U/HY="
/ip address
add address=192.168.0.253/24 comment=defconf interface=ether2 network=\
192.168.0.0
add address=91.136.133.54/24 interface=Stadtwerke network=91.136.133.0
add address=10.0.0.1 interface=DMZ network=255.0.0.0
add address=192.168.10.1/24 interface=wireguard1 network=192.168.10.0
/ip dhcp-client
add comment=defconf disabled=yes interface=Stadtwerke
/ip dhcp-server
add address-pool=pool-vpn disabled=yes interface=bridge lease-time=10m name=\
defconf
# No IP address on interface
add interface=vlan1 lease-time=10m name=VLAN1
/ip dhcp-server network
add address=192.168.0.0/24 comment=defconf gateway=192.168.0.253 netmask=24
/ip dns
set allow-remote-requests=yes servers=9.9.9.9,1.1.1.1,server internal ip
/ip dns static
add address=192.168.0.246 comment=defconf name=router.lan type=A
/ip firewall address-list
******************************************************************
lot's of firewall enteis deleted just for making it more convinient
******************************************************************
/ip firewall filter
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related disabled=yes hw-offload=yes
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked disabled=yes
add action=accept chain=input comment="defconf: accept ICMP after RAW" \
disabled=yes protocol=icmp
add action=accept chain=input comment="Ping Reply " disabled=yes protocol=\
icmp
add action=accept chain=output comment="DNS TCP" dst-port=53 protocol=tcp
add action=accept chain=output comment="DNS TCP" dst-port=53 protocol=udp
add action=accept chain=output comment="Router Output" protocol=tcp \
src-address=192.168.0.253
add action=accept chain=output comment="Router Output" protocol=udp \
src-address=192.168.0.253
add action=accept chain=output comment="Router Output" protocol=icmp \
src-address=192.168.0.253
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment=Wireguard dst-port=23947 in-interface=\
wireguard1 log=yes log-prefix=Wireguard_ protocol=udp
add action=accept chain=forward comment="wiregard forward" dst-address=\
0.0.0.0 dst-address-list="" log=yes out-interface=wireguard1
add action=accept chain=forward comment="Alllowed Adresslist Blacklist" \
in-interface=Stadtwerke log=yes log-prefix=allowed_blacklist_foward_ \
src-address-list=allowed_blacklist
add action=accept chain=forward comment="Update Letsencrypt" disabled=yes \
dst-address-list=server internal ip dst-port=80 in-interface=Stadtwerke log=yes \
log-prefix=Letsencrypt_update_ protocol=tcp
add action=accept chain=forward comment="allowed russia" disabled=yes \
in-interface=Stadtwerke log-prefix=allowed_russia protocol=tcp \
src-address-list=allowed_russia
add action=accept chain=forward comment="Allow input Country List" disabled=\
yes in-interface=Stadtwerke log=yes log-prefix=Allowed_Country protocol=\
tcp src-address-list=allowed_country
add action=accept chain=forward comment="defconf: accept established,related" \
connection-state=established,related
add action=accept chain=input comment="Wireguard Allow input" disabled=yes \
in-interface=wireguard1 protocol=udp
add action=accept chain=output comment="UDP Connect towards ptbtime1.ptb.de" \
dst-address-list="NTP List" dst-port=123 log-prefix=\
"UDP Out to ptbtime1.ptb.de" protocol=udp
add action=accept chain=forward connection-nat-state=dstnat connection-state=\
"" disabled=yes
add action=accept chain=input comment=\
"acceppt established and related from the router itself" \
connection-state=established,related in-interface=Stadtwerke
add action=accept chain=forward log-prefix=gateway____ out-interface=\
Stadtwerke src-address=91.136.133.54
add action=drop chain=input dst-address=91.136.169.187 log=yes protocol=tcp
add action=drop chain=output comment="Login incorrect" content=\
"530 Login incorrect" dst-limit=1,5,dst-address/1m40s out-interface=\
Stadtwerke protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ protocol=tcp src-address-list=black-list
add action=drop chain=forward comment="Adresslist Blacklist" log-prefix=\
Blacklist___forward protocol=tcp src-address-list=black-list
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=Oracle
add action=drop chain=input comment=DGNTEKNO log-prefix=Blacklist___ \
src-address-list=DGNTEKNO
add action=drop chain=forward comment=DGNTEKNO log-prefix=Blacklist___ \
src-address-list=DGNTEKNO
add action=drop chain=input comment=DGNTEKNO log-prefix=Blacklist___ \
src-address-list=Facebook
add action=drop chain=forward comment=DGNTEKNO log-prefix=Blacklist___ \
src-address-list=Facebook
add action=drop chain=input comment=TENCENT log-prefix=Blacklist___ \
src-address-list=TENCENT
add action=drop chain=forward comment=TENCENT log-prefix=Blacklist___ \
src-address-list=TENCENT
add action=drop chain=input comment=PPTECHNOLOGY log-prefix=Blacklist___ \
src-address-list=PPTECHNOLOGY
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=uCloud.cn
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=Changway_AS
add action=drop chain=input comment="Private Layer" log-prefix=Blacklist___ \
src-address-list=privatelayer
add action=drop chain=forward comment="Private Layer" log-prefix=Blacklist___ \
src-address-list=privatelayer
add action=drop chain=forward comment=PPTECHNOLOGY log-prefix=Blacklist___ \
src-address-list=PPTECHNOLOGY
add action=drop chain=forward comment="Private Layer" log-prefix=Blacklist___ \
src-address-list=uCloud.cn
add action=drop chain=forward comment="Private Layer" log-prefix=Blacklist___ \
out-interface=Stadtwerke src-address-list=Oracle
add action=drop chain=input comment=pfcloud log-prefix=Blacklist___ \
src-address-list=pfcloud
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=Constantmoulin
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=Digitalocean_2
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=Therecomltd
add action=drop chain=input comment="Adresslist Blacklist" log-prefix=\
Blacklist___ src-address-list=Constantmoulin
add action=drop chain=input src-address-list=alibaba
add action=drop chain=input src-address-list=Hurricane
add action=drop chain=input src-address-list=hostpapa
add action=drop chain=input comment=Retelit src-address-list=Retelit
add action=drop chain=forward comment=Retelit src-address-list=Retelit
add action=drop chain=forward comment=pfcloud src-address-list=pfcloud
add action=drop chain=forward comment="Changeway AS" src-address-list=\
Changway_AS
add action=drop chain=forward comment="Therefore LTD" src-address-list=\
Therecomltd
add action=drop chain=forward comment=DigitalOcean src-address-list=\
Digitalocean_2
add action=drop chain=forward comment=Cloud.ru disabled=yes protocol=tcp \
src-address-list=cloud.ru
add action=drop chain=forward comment=Cloud.ru disabled=yes dst-address=\
server internal ip in-interface=Stadtwerke protocol=tcp src-address-list=\
cloud.ru
add action=drop chain=forward comment=Hurricane src-address-list=Hurricane
add action=drop chain=forward src-address-list=alibaba
add action=drop chain=forward src-address-list=hostpapa
add action=drop chain=forward comment="Adresslist Blacklist" dst-address=\
server internal ip in-interface=Stadtwerke log-prefix=Blacklist___ protocol=tcp \
src-address-list=black-list
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke protocol=tcp src-address-list=windows_update
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=gaza src-port=""
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=digitalocean
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=outbrain
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke protocol=tcp src-address-list=outbrain
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke protocol=tcp src-address-list=Hetzner
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=Hetzner
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=leaseweb_f_ protocol=tcp src-address-list=leaseweb
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=leaseweb
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=colocrossing_f_ protocol=tcp src-address-list=\
colocrossing
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=colocrossing
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=ohve_f_ protocol=tcp src-address-list=OHV
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=OHV
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=M247
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=M274_forward_ protocol=tcp src-address-list=M247
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=Linode
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=Linode_forward_ protocol=tcp src-address-list=\
Linode
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=hostplus_russia
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=namecheap
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=namecheap_ protocol=tcp src-address-list=namecheap
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=godaddy
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=godaddy1
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=namecheap_ protocol=tcp src-address-list=godaddy
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke log-prefix=namecheap_ protocol=tcp src-address-list=godaddy1
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=ponynet
add action=drop chain=forward disabled=yes dst-address=server internal ip \
in-interface=Stadtwerke log-prefix=namecheap_ protocol=tcp \
src-address-list=ponynet
add action=drop chain=input in-interface=Stadtwerke log=yes log-prefix=\
Romania_block_ protocol=tcp src-address-list=Romania
add action=drop chain=forward dst-address=server internal ip in-interface=\
Stadtwerke port=25,443 protocol=tcp src-address-list=Romania
add action=drop chain=forward in-interface=Stadtwerke protocol=tcp \
src-address-list=Scalsways
add action=drop chain=input in-interface=Stadtwerke protocol=tcp \
src-address-list=Scalsways
add action=drop chain=input comment=CountryBlocks in-interface=Stadtwerke \
log-prefix=Country_IN_ src-address-list=CountryIPBlocks
add action=drop chain=forward comment=CountryBlocks in-interface=Stadtwerke \
log-prefix=Country_FORWARD_ src-address-list=CountryIPBlocks
add action=drop chain=input comment="anti Ping Flood" in-interface=Stadtwerke \
limit=2,2:packet protocol=icmp
add action=drop chain=input comment="drop icmp in general" in-interface=\
Stadtwerke protocol=icmp
add action=accept chain=forward comment="allow port forwarding" \
connection-nat-state=dstnat disabled=yes
add action=log chain=input disabled=yes log=yes
add action=accept chain=forward comment="Router raus" disabled=yes \
src-address=192.168.0.253
add action=log chain=forward disabled=yes dst-address=server internal ip dst-port=\
80 protocol=tcp
add action=log chain=forward disabled=yes dst-address=server internal ip dst-port=\
25 protocol=tcp
add action=log chain=forward disabled=yes dst-address=server internal ip dst-port=\
443 in-interface=Stadtwerke log-prefix=HTTPS_mxxxx_ protocol=tcp
add action=accept chain=forward comment=CGI protocol=tcp src-address-list=CGI
add action=accept chain=input comment="defconf: accept ICMP" disabled=yes \
protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new disabled=yes in-interface-list=WAN
add action=fasttrack-connection chain=forward comment="Fasttrack TCP DNS" \
dst-port=53 hw-offload=yes protocol=tcp
add action=fasttrack-connection chain=forward comment="Fasttrack UDP DNS" \
dst-port=53 hw-offload=yes protocol=udp
add action=drop chain=input comment=miscellanious disabled=yes \
src-address-list=miscellanious
add action=drop chain=input comment="Drop UDP Port 17" disabled=yes \
in-interface=Stadtwerke protocol=udp src-address-list=variable
add action=tarpit chain=input comment="Tarpit SSH" connection-limit=5,32 \
disabled=yes dst-port=5017 protocol=tcp
add action=accept chain=input comment="ping accepted" disabled=yes \
in-interface=Stadtwerke limit=1,5:packet protocol=icmp
add action=log chain=forward disabled=yes log=yes log-prefix=Felix__ \
src-address=192.168.0.36
add action=accept chain=input comment="icmp Echo reply" disabled=yes \
icmp-options=0:0-255 in-interface=Stadtwerke protocol=icmp
add action=accept chain=input comment="icmp echo request" disabled=yes \
icmp-options=8:0-255 in-interface=Stadtwerke protocol=icmp
add action=accept chain=input comment="icmp time exceeded" disabled=yes \
icmp-options=11:0-255 in-interface=Stadtwerke protocol=icmp
add action=accept chain=input comment="icmp dest unreachable" disabled=yes \
icmp-options=3:0-255 in-interface=Stadtwerke protocol=icmp
add action=accept chain=forward comment="Proxy Port 60941" disabled=yes \
dst-address=63.161.104.189 log=yes out-interface-list=all src-address=\
192.168.0.113
add action=accept chain=forward comment="Proxy ETKA" disabled=yes \
dst-address=104.223.135.178 log=yes protocol=tcp src-address=\
192.168.0.113
add action=accept chain=forward comment="Proxy ETKA" disabled=yes \
dst-address=51.79.50.31 log=yes protocol=tcp src-address=192.168.0.113
add action=accept chain=forward comment="Proxy ETKA" disabled=yes \
dst-address=158.69.118.135 log=yes protocol=tcp src-address=192.168.0.113
add action=accept chain=forward disabled=yes dst-address=13.93.140.77 \
src-address=192.168.0.113
add action=accept chain=forward disabled=yes log=yes log-prefix=Main_out_ \
out-interface=all-ethernet protocol=tcp
add action=drop chain=forward disabled=yes dst-address=192.168.0.253 \
src-address=192.168.0.111
add action=drop chain=forward comment=\
"Drop all traffic from WIN7 virtual machine (110)" disabled=yes \
dst-address-list=!windows_update log=yes log-prefix=Win7__drop_110_ \
src-address=192.168.0.110
add action=accept chain=forward disabled=yes dst-address=189.113.1.234 log=\
yes protocol=tcp src-address=192.168.0.113
add action=drop chain=forward comment=\
"Drop all traffic from this virtual machine Win10 ETKA83 (113)" \
log-prefix=113_gen_ src-address=192.168.0.113
add action=drop chain=forward comment="Windows 7" log-prefix=113_gen_ \
src-address=192.168.0.118
add action=drop chain=forward comment=\
"Drop all traffic from this virtual machine Win10 ODIS (114)" \
log-prefix=114_ src-address=192.168.0.114
add action=drop chain=forward comment=\
"Drop all traffic from this virtual machine Win10 (116)" \
dst-address-list=!windows_update log-prefix=116_WInUpdate_ src-address=\
192.168.0.116
add action=drop chain=forward comment=\
"Drop all traffic from this virtual machine Win10 ODIS (114)" disabled=\
yes dst-address-list=!windows_update log-prefix=116_WInUpdate_ \
src-address=192.168.0.113
add action=drop chain=forward comment=\
"Drop all traffic from virtual machine (94)" src-address=192.168.0.94
add action=drop chain=forward comment=MS_BLOCK dst-address-list=\
block_commercial log-prefix=MS_BLOCK_ src-address=192.168.0.110
add action=drop chain=forward comment=saveDB disabled=yes dst-address-list=\
!windows_update log=yes log-prefix=64_ src-address=192.168.0.64
add action=drop chain=output comment="VW Win7 ETKA" disabled=yes log=yes \
log-prefix=O_110_ out-interface=Stadtwerke src-address=192.168.0.110
add action=drop chain=output comment="WIN98 VM" dst-address-list=\
windows_update src-address=192.168.0.111
add action=drop chain=output comment=Emotet dst-port=449 log=yes log-prefix=\
Emotet_ protocol=tcp
add action=accept chain=input disabled=yes dst-port=80 in-interface=\
Stadtwerke log-prefix=80_input_ protocol=tcp
add action=accept chain=input disabled=yes dst-port=443 in-interface=\
Stadtwerke log=yes log-prefix=443_input_ protocol=tcp
add action=log chain=forward disabled=yes log=yes log-prefix=114_ protocol=\
tcp src-address=192.168.0.114
add action=log chain=forward disabled=yes out-interface=Stadtwerke protocol=\
tcp src-address=192.168.0.36
add action=log chain=forward disabled=yes out-interface=Stadtwerke protocol=\
tcp src-address=192.168.0.119
add action=log chain=forward disabled=yes out-interface=Stadtwerke protocol=\
tcp src-address=192.168.0.141
add action=log chain=output disabled=yes protocol=tcp src-address=\
91.136.133.54
add action=accept chain=forward disabled=yes log=yes src-address=\
192.168.0.250
add action=log chain=forward disabled=yes src-address=192.168.0.250
add action=accept chain=forward disabled=yes log=yes src-address=192.168.0.17
add action=log chain=forward disabled=yes dst-address=server internal ip dst-port=\
25 in-interface=Stadtwerke log=yes protocol=tcp
add action=log chain=forward disabled=yes dst-address=server internal ip dst-port=\
587 in-interface=Stadtwerke log=yes protocol=tcp
add action=log chain=forward disabled=yes out-interface=Stadtwerke protocol=\
tcp src-address=192.168.0.15
add action=log chain=forward disabled=yes dst-port=2476 in-interface=\
Stadtwerke out-interface=all-ethernet protocol=tcp
add action=accept chain=forward comment=ltspice.analog.com dst-address=\
23.196.235.45 log=yes protocol=tcp src-address=192.168.0.113
add action=accept chain=forward comment=ltspice.analog.com disabled=yes \
dst-address=23.206.18.229 protocol=tcp src-address=192.168.0.113
add action=accept chain=forward comment="BWI CLient" log-prefix=BWI_ \
src-address=192.168.0.11
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN log-prefix=!LAN_
add action=drop chain=input comment=\
"defconf: drop all from WAN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!" \
in-interface=Stadtwerke
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN packet-mark=""
add action=accept chain=srcnat disabled=yes out-interface=wireguard1
add action=dst-nat chain=dstnat comment="Dovecot access on server" dst-port=\
993 in-interface=Stadtwerke protocol=tcp to-addresses=server internal ip \
to-ports=993
add action=dst-nat chain=dstnat comment="smtps on mailserver" dst-port=587 \
in-interface=Stadtwerke log-prefix=587_ protocol=tcp to-addresses=\
server internal ip
add action=dst-nat chain=dstnat comment="stmp port on mxxxy" dst-port=25 \
in-interface=Stadtwerke in-interface-list=WAN log=yes log-prefix=25_ \
protocol=tcp to-addresses=server internal ip to-ports=25
add action=dst-nat chain=dstnat comment="letsencrypt update" dst-port=80 \
in-interface=Stadtwerke log=yes log-prefix=NAT_80_ protocol=tcp \
to-addresses=server internal ip to-ports=80
add action=dst-nat chain=dstnat comment="HG1500 UDP SIP Traffic" disabled=yes \
dst-port=5060 in-interface=Stadtwerke protocol=udp to-addresses=\
192.168.0.79 to-ports=5060
add action=dst-nat chain=dstnat comment="SSH Port" disabled=yes dst-port=\
18729 in-interface=Stadtwerke log=yes protocol=tcp to-addresses=\
server internal ip to-ports=22
add action=dst-nat chain=dstnat disabled=yes protocol=udp to-addresses=\
192.168.10.1 to-ports=14856
add action=src-nat chain=srcnat disabled=yes in-interface=Stadtwerke \
protocol=tcp to-addresses=0.0.0.0
add action=accept chain=dstnat disabled=yes dst-port=18730 log=yes \
log-prefix=Wiregurd_ protocol=udp
add action=dst-nat chain=dstnat comment="https webserver " dst-port=443 \
in-interface=Stadtwerke log=yes log-prefix=HTTP___ protocol=tcp src-port=\
"" to-addresses=server internal ip to-ports=443
/ip firewall raw
add action=accept chain=prerouting dst-address-list=allowed_russia
add action=accept chain=prerouting dst-address-list=allowed_blacklist
add action=drop chain=prerouting dst-address=server internal ip dst-port=80 \
protocol=tcp
add action=drop chain=prerouting disabled=yes src-address-list=\
CountryIPBlocks
add action=drop chain=prerouting disabled=yes in-interface=Stadtwerke \
src-address-list=godaddy
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip route
add disabled=no dst-address=0.0.0.0/0 gateway=91.136.133.53
add disabled=no distance=1 dst-address=0.0.0.0/128 gateway="" routing-table=\
main scope=30 target-scope=10
/ip service
set www-ssl certificate=Webfig disabled=no
/ip smb shares
set [ find default=yes ] directory=/pub
/ipv6 address
add address=::ffff:192.168.0.253 interface=ether2
/lcd
set backlight-timeout=15m default-screen=stats-all
/routing bfd configuration
add disabled=no
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=gateway002
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=192.53.103.108
add address=192.53.103.104
/system package update
set channel=long-term
/system routerboard reset-button
set enabled=yes
*************************************************
Scheduler scripts removed
*************************************************
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool traffic-monitor
add interface=Stadtwerke name=In_Stadtwerke threshold=10 traffic=received