OK, I’ve revised everything a bit now. Is it more understandable now?
# 2023-12-03 11:21:51 by RouterOS 7.12.1
/caps-man channel
add band=5ghz-n/ac control-channel-width=20mhz frequency="" name=\
5Ghz-Channels skip-dfs-channels=yes
add band=2ghz-g/n control-channel-width=20mhz extension-channel=disabled \
frequency=2412,2437,2462 name=2.4Ghz-Channels
/interface bridge
add name=BRIDGE priority=0x7000 vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] name=WAN1
set [ find default-name=ether2 ] name=WAN2
set [ find default-name=ether3 ] name=WAN3
set [ find default-name=ether4 ] disabled=yes name=WAN4
/interface l2tp-client
add allow-fast-path=yes connect-to=vpn.test.de disabled=no name=l2tp-DM \
user=APV01
/interface wireguard
add comment=test listen-port=40231 mtu=1420 name=WIREGUARD_MGMT
add comment="VPN to 2nd customer location" listen-port=13239 mtu=1420 name=\
WIREGUARD_VPN01
/interface vlan
add comment=MGT interface=BRIDGE name=VLAN_99 vlan-id=99
add comment=COMPANY interface=BRIDGE name=VLAN_100 vlan-id=100
add comment=GUEST interface=BRIDGE name=VLAN_200 vlan-id=200
add comment=DMZ interface=BRIDGE name=VLAN_300 vlan-id=300
add comment=HOTSPOT interface=BRIDGE name=VLAN_400 vlan-id=400
add comment=PRIVAT interface=BRIDGE name=VLAN_500 vlan-id=500
add comment=LTE interface=BRIDGE name=VLAN_600 vlan-id=600
add comment=BACKUP01 interface=BRIDGE name=VLAN_700 vlan-id=700
add comment=BACKUP02 interface=BRIDGE name=VLAN_800 vlan-id=800
add comment=PHONE interface=BRIDGE name=VLAN_900 vlan-id=900
add comment=IOT interface=BRIDGE name=VLAN_1000 vlan-id=1000
add comment=PRINTER interface=BRIDGE name=VLAN_1100 vlan-id=1100
add comment=SONOS interface=BRIDGE name=VLAN_1200 vlan-id=1200
add comment=CAMERA interface=BRIDGE name=VLAN_1300 vlan-id=1300
add comment=PRODUCTION interface=BRIDGE name=VLAN_1400 vlan-id=1400
add comment=SERVER interface=BRIDGE name=VLAN_1500 vlan-id=1500
add comment=MISCELLANEOUS01 interface=BRIDGE name=VLAN_1600 vlan-id=1600
add comment=MISCELLANEOUS02 interface=BRIDGE name=VLAN_1700 vlan-id=1700
add comment=MISCELLANEOUS03 interface=BRIDGE name=VLAN_1800 vlan-id=1800
add comment=MISCELLANEOUS04 interface=BRIDGE name=VLAN_1900 vlan-id=1900
add comment=MISCELLANEOUS05 interface=BRIDGE name=VLAN_2000 vlan-id=2000
/caps-man datapath
add bridge=BRIDGE client-to-client-forwarding=yes local-forwarding=no name=\
COMPANY vlan-id=100 vlan-mode=use-tag
add bridge=BRIDGE client-to-client-forwarding=no comment=GUEST \
local-forwarding=no name=GAST vlan-id=200 vlan-mode=use-tag
add bridge=BRIDGE client-to-client-forwarding=no local-forwarding=no name=\
HOTSPOT vlan-id=400 vlan-mode=use-tag
add bridge=BRIDGE client-to-client-forwarding=yes local-forwarding=no name=\
PRIVAT vlan-id=500 vlan-mode=use-tag
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=COMPANY
add authentication-types=wpa2-psk encryption=aes-ccm name=GUEST
add authentication-types=wpa2-psk encryption=aes-ccm name=HOTSPOT
add authentication-types=wpa2-psk encryption=aes-ccm name=PRIVAT
/caps-man configuration
add channel=2.4Ghz-Channels country=etsi datapath=COMPANY installation=indoor \
mode=ap name=COMPANY2GHZ security=COMPANY ssid=COMPANY
add channel=5Ghz-Channels country=etsi datapath=COMPANY installation=indoor \
mode=ap name=COMPANY5GHZ security=COMPANY ssid=COMPANY
add channel=2.4Ghz-Channels country=etsi datapath=GAST installation=indoor \
mode=ap name=GUEST2GHZ security=GUEST ssid=GUEST
add channel=5Ghz-Channels country=etsi datapath=GAST installation=indoor \
mode=ap name=GUEST5GHZ security=GUEST ssid=GUEST
add channel=2.4Ghz-Channels country=etsi datapath=HOTSPOT installation=indoor \
mode=ap name=HOTSPOT2GHZ security=HOTSPOT ssid=HOTSPOT
add channel=5Ghz-Channels country=etsi datapath=HOTSPOT installation=indoor \
mode=ap name=HOTSPOT5GHZ security=HOTSPOT ssid=HOTSPOT
add channel=2.4Ghz-Channels country=etsi datapath=PRIVAT installation=indoor \
mode=ap name=PRIVATE2GHZ security=PRIVAT ssid=PRIVATE
add channel=5Ghz-Channels country=etsi datapath=PRIVAT installation=indoor \
mode=ap name=PRIVATE5GHZ security=PRIVAT ssid=PRIVATE
/interface list
add name=VLAN
add name=LAN
add name=WAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=MGT ranges=10.99.9.5-10.99.9.253
add name=COMPANY ranges=192.168.9.20-192.168.9.250
add name=GUEST ranges=10.178.1.10-10.178.1.100
add name=DMZ ranges=10.178.2.10-10.178.2.20
add name=HOTSPOT ranges=10.178.3.10-10.178.3.100
add name=PRIVAT ranges=192.168.114.10-192.168.114.100
add name=LTE ranges=10.178.4.10-10.178.4.20
add name=BACKUP01 ranges=10.178.5.5-10.178.5.10
add name=BACKUP02 ranges=10.178.6.10-10.178.6.20
add name=PHONE ranges=10.178.7.10-10.178.7.100
add name=IOT ranges=192.168.1.10-192.168.1.200
add name=PRODUCTION ranges=192.168.44.10-192.168.44.100
/ip dhcp-server
add address-pool=MGT interface=VLAN_99 lease-time=1w10m name=MGT
add address-pool=COMPANY interface=VLAN_100 lease-time=1w10m name=COMPANY
add address-pool=GUEST interface=VLAN_200 lease-time=1h name=GUEST
add address-pool=DMZ interface=VLAN_300 lease-time=1d10m name=DMZ
add address-pool=HOTSPOT interface=VLAN_400 lease-time=1d10m name=HOTSPOT
add address-pool=PRIVAT interface=VLAN_500 lease-time=1d10m name=PRIVAT
add address-pool=LTE interface=VLAN_600 lease-time=1d10m name=LTE
add address-pool=BACKUP01 interface=VLAN_700 lease-time=1d10m name=BACKUP01
add address-pool=BACKUP02 interface=VLAN_800 lease-time=1d10m name=BACKUP02
add address-pool=PHONE interface=VLAN_900 lease-time=1d10m name=PHONE
add address-pool=IOT interface=VLAN_1000 lease-time=1d10m name=IOT
add address-pool=PRODUCTION interface=VLAN_1400 lease-time=1d30m name=\
PRODUCTION
/port
set 0 name=serial0
set 1 name=serial1
/queue simple
add max-limit=8M/8M name=queue-Gast target=10.178.1.0/24
/snmp community
add addresses=192.168.254.0/24,10.16.0.0/16,10.99.0.0/16,10.10.9.0/24 \
authentication-protocol=SHA1 encryption-protocol=AES name=snmpv3DIM \
security=private
/user-manager user
add attributes=\
Tunnel-Medium-Type:6,Tunnel-Private-Group-ID:300,Tunnel-Type:13 comment=\
Macbook disabled=yes name=22:E0:4C:A4:91:76
add attributes=Tunnel-Medium-Type:6,Tunnel-Private-Group-ID:99,Tunnel-Type:13 \
comment=Kamera disabled=yes name=EC:71:DB:EA:51:FD
add attributes=\
Tunnel-Medium-Type:6,Tunnel-Private-Group-ID:100,Tunnel-Type:13 comment=\
TV disabled=yes name=7C:0A:3F:FB:B6:2A
/caps-man access-list
add action=reject allow-signal-out-of-range=10s disabled=no interface=all \
signal-range=-115..-76 ssid-regexp=""
add action=accept allow-signal-out-of-range=10s disabled=no interface=all \
signal-range=-75..115 ssid-regexp=""
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes package-path=/
/caps-man provisioning
add action=create-dynamic-enabled hw-supported-modes=gn master-configuration=\
COMPANY2GHZ name-format=prefix-identity slave-configurations=\
GUEST2GHZ,PRIVATE2GHZ,HOTSPOT2GHZ
add action=create-dynamic-enabled hw-supported-modes=an master-configuration=\
COMPANY5GHZ name-format=prefix-identity slave-configurations=\
GUEST5GHZ,PRIVATE5GHZ,HOTSPOT5GHZ
/interface bridge port
add bridge=BRIDGE frame-types=admit-only-vlan-tagged interface=ether5
add bridge=BRIDGE frame-types=admit-only-vlan-tagged interface=ether6
add bridge=BRIDGE frame-types=admit-only-vlan-tagged interface=ether7
add bridge=BRIDGE frame-types=admit-only-vlan-tagged interface=ether8
add bridge=BRIDGE interface=sfp-sfpplus1
/interface list member
add comment=DSL interface=WAN1 list=WAN
add comment="DSL Backup" interface=WAN2 list=WAN
add interface=VLAN_99 list=VLAN
add interface=VLAN_100 list=VLAN
add interface=VLAN_200 list=VLAN
add interface=VLAN_300 list=VLAN
add interface=VLAN_400 list=VLAN
add interface=VLAN_500 list=VLAN
add interface=VLAN_600 list=VLAN
add interface=VLAN_700 list=VLAN
add interface=VLAN_800 list=VLAN
add interface=VLAN_900 list=VLAN
add interface=VLAN_1000 list=VLAN
add comment="LTE Backup" interface=WAN3 list=WAN
add interface=WIREGUARD_VPN01 list=VLAN
/interface wireguard peers
add allowed-address=192.168.85.0/24 comment="2nd Customer Location" \
interface=WIREGUARD_VPN01 public-key=\
"BnZ546q66tS+A9elKeqToC5cmXjfGU7AaN6MHwCZjU0="
add allowed-address=\
10.10.9.254/32,192.168.254.0/24,192.168.155.0/24,192.168.249.0/24 \
comment="MGMT test" endpoint-address=vpn.test.de endpoint-port=40231 \
interface=WIREGUARD_MGMT persistent-keepalive=25s public-key=\
"XREJdyp/MYRh57rtVOsXU8a/mLXdoTc953D39TIvW60="
/ip address
add address=10.99.9.254/24 interface=VLAN_99 network=10.99.9.0
add address=192.168.9.1/24 interface=VLAN_100 network=192.168.9.0
add address=10.178.1.254/24 interface=VLAN_200 network=10.178.1.0
add address=10.178.2.254/24 interface=VLAN_300 network=10.178.2.0
add address=10.178.3.254/24 interface=VLAN_400 network=10.178.3.0
add address=192.168.114.254/24 interface=VLAN_500 network=192.168.114.0
add address=10.178.4.254/24 interface=VLAN_600 network=10.178.4.0
add address=10.178.5.254/24 interface=VLAN_700 network=10.178.5.0
add address=10.178.6.254/24 interface=VLAN_800 network=10.178.6.0
add address=10.178.7.254/24 interface=VLAN_900 network=10.178.7.0
add address=192.168.1.254/24 interface=VLAN_1000 network=192.168.1.0
add address=192.168.85.254/24 interface=WIREGUARD_VPN01 network=192.168.85.0
add address=10.10.9.9/24 interface=WIREGUARD_MGMT network=10.10.9.0
add address=192.168.44.254/24 interface=VLAN_1400 network=192.168.44.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=1m
/ip dhcp-client
add comment=DSL interface=WAN1
add comment="BACKUP DSL" interface=WAN2
add comment="LTE BACKUP" interface=WAN3
/ip dhcp-server network
add address=10.99.9.0/24 comment=VLAN99_MGMT dns-server=10.99.9.254 gateway=\
10.99.9.254
add address=10.178.1.0/24 comment=VLAN200_GUEST dns-server=8.8.8.8 gateway=\
10.178.1.254
add address=10.178.2.0/24 comment=VLAN300_DMZ dns-server=10.178.2.254 \
gateway=10.178.2.254
add address=10.178.3.0/24 comment=VLAN400_HOTSPOT dns-server=10.178.3.254 \
gateway=10.178.3.254
add address=10.178.4.0/24 comment=VLAN600_LTE dns-server=10.178.4.254 \
gateway=10.178.4.254
add address=10.178.5.0/24 comment=VLAN700_BACKUP01 dns-server=10.178.5.254 \
gateway=10.178.5.254
add address=10.178.6.0/24 comment=VLAN800_BACKUP02 dns-server=10.178.6.254 \
gateway=10.178.6.254
add address=10.178.7.0/24 comment=VLAN900_PHONE dns-server=10.178.7.254 \
gateway=10.178.7.254
add address=192.168.1.0/24 comment=VLAN1000_IOT dns-server=8.8.8.8 gateway=\
192.168.1.254
add address=192.168.9.0/24 comment=VLAN100_COMPANY dns-server=192.168.9.5 \
domain=test.local gateway=192.168.9.1
add address=192.168.114.0/24 comment=VLAN500_PRIVATE dns-server=\
192.168.114.254 gateway=192.168.114.254
/ip dns
set allow-remote-requests=yes
/ip firewall address-list
add comment="Black List (SSH)" list="Black List (SSH)"
add comment="Black List (Winbox)" list="Black List (Winbox)"
add comment="Black List (Port Scanner WAN)" list=\
"Black List (Port Scanner WAN)"
add comment="Black List (Port Scanner LAN)" list=\
"Black List (Port Scanner LAN)"
add address=m.test.de list=MGMT
add address=vpn.test.de list=MGMT
add address=192.168.254.0/24 list=MGMT
add address=192.168.155.0/24 list=MGMT
add address=10.178.1.0/24 list=DNS
add address=192.168.9.0/24 list=DNS
add address=10.99.9.0/24 list=DNS
add address=10.178.7.0/24 list=DNS
add address=192.168.9.0/24 list=COMPANY
add address=192.168.1.0/24 list=IOT
add address=192.168.44.0/24 list=PRODUCTION
add address=10.178.1.0/24 list=GUEST
add address=192.168.9.10 list=OFFLINE
add address=127.0.0.1 list=FIREWALL
add address=192.168.85.0/24 list=REMOTE
add address=10.10.9.0/24 list=MGMT
add address=10.178.2.0/24 list=OFFLINE
add address=10.178.5.0/24 list=OFFLINE
add address=10.178.6.0/24 list=OFFLINE
/ip firewall filter
add action=drop chain=input comment=Drop_detect_DDoS connection-state=new \
dst-address-list=ddosed src-address-list=ddoser
add action=jump chain=input comment=detect_DDoS connection-state=new \
jump-target=detect_DDoS
add action=drop chain=input comment=Drop_FtB_Level_03 src-address-list=\
Level_03
add action=add-src-to-address-list address-list=Level_03 \
address-list-timeout=none-dynamic chain=input comment=FtB_Level_03 \
connection-state=new dst-port=45131,8291 protocol=tcp src-address-list=\
Level_02
add action=add-src-to-address-list address-list=Level_02 \
address-list-timeout=5m chain=input comment=FtB_Level_02 \
connection-state=new dst-port=45131,8291 protocol=tcp src-address-list=\
Level_01
add action=add-src-to-address-list address-list=Level_01 \
address-list-timeout=5m chain=input comment=FtB_Level_01 \
connection-state=new dst-port=45131,8291 protocol=tcp
add action=accept chain=input comment=Accept_Est_und_Rel connection-state=\
established,related
add action=accept chain=input comment=Wireguard dst-port=13240,13241,53245 \
in-interface-list=WAN protocol=udp
add action=accept chain=input comment=IPsec-ESP protocol=ipsec-esp
add action=accept chain=input comment=L2TP dst-port=500,4500 protocol=udp
add action=accept chain=input comment=SNMP dst-port=161 protocol=udp \
src-address-list=MGMT
add action=accept chain=input comment=HTTPS_ROUTER_Intern dst-port=1449 \
protocol=tcp src-address-list=MGMT
add action=accept chain=input comment=Accept_DNS dst-port=53 \
in-interface-list=!WAN log=yes log-prefix=DNS protocol=udp \
src-address-list=DNS
add action=accept chain=input comment=MGMT dst-port=45131,8291 \
in-interface-list=!WAN protocol=tcp src-address-list=MGMT
add action=accept chain=input comment=MGMT dst-port=45131,8291 protocol=tcp
add action=accept chain=input comment=CAPsMAN_localhost dst-address=127.0.0.1
add action=drop chain=input comment=Drop_Invalid connection-state=invalid
add action=drop chain=input comment=Drop_Rest_all
add action=accept chain=input comment="Accept Radius" dst-port=3799,1812,1813 \
in-interface-list=!WAN protocol=udp src-address-list=FIREWALL
add action=accept chain=input comment="CAPsMAN accept all local traffic" \
src-address-type=local
add action=accept chain=input comment="WAN -> FW | WireGuard-Zugriff" \
dst-port=13239 log=yes log-prefix=WireGuard protocol=udp
add action=accept chain=input comment="FIRMA Port | WireGuard-Zugriff" \
dst-port=40231 log=yes log-prefix=WireGuard protocol=udp
add action=accept chain=input comment="WAN -> FW | WireGuard-Zugriff" \
dst-address=192.168.85.254 in-interface=WIREGUARD_VPN01 log=yes \
log-prefix=Wireguard
add action=accept chain=input comment="WAN -> FW | WireGuard-Zugriff" \
dst-address=10.10.9.254 in-interface=WIREGUARD_MGMT log=yes log-prefix=\
Wireguard
add action=drop chain=input comment="Drop everything else" log=yes \
log-prefix="IN DROP REST -> "
add action=accept chain=forward comment=\
"WireGuard-VPN -> VLAN_100 | Network Access" dst-address=\
!192.168.85.0/24 in-interface=WIREGUARD_VPN01 out-interface=VLAN_100
add action=accept chain=forward comment=\
"WireGuard-VPN test | all VLAN Network Access" dst-address=\
!10.10.9.0/24 in-interface=WIREGUARD_MGMT out-interface=all-vlan
add action=accept chain=forward comment=Accept_Remote_to_Company \
dst-address-list=COMPANY src-address-list=REMOTE
add action=accept chain=forward comment=Accept_Remote_to_Company \
dst-address-list=COMPANY src-address-list=MGMT
add action=drop chain=forward comment=Drop_IOT_to_Company dst-address-list=\
COMPANY src-address-list=IOT
add action=accept chain=forward comment=Accept_Est_und_Rel connection-state=\
established,related
add action=accept chain=forward comment=Starface dst-port=5060 protocol=tcp
add action=accept chain=forward comment=Starface dst-port=5060 protocol=udp
add action=accept chain=forward comment=Starface dst-port=5061 protocol=tcp
add action=accept chain=forward comment=Starface dst-port=10000-13239 \
protocol=udp
add action=drop chain=forward comment=Only_Internet out-interface-list=!WAN \
src-address-list=PRODUCTION
add action=drop chain=forward comment=GUEST_ONLY_INTERNET dst-port=!80,443 \
out-interface-list=!WAN protocol=tcp src-address-list=GUEST
add action=drop chain=forward comment=NO_INTERNET out-interface-list=WAN \
src-address-list=OFFLINE
add action=drop chain=forward comment=Drop_Invalid connection-state=invalid
add action=drop chain=forward comment=Drop_Rest_all
add action=return chain=detect_DDoS dst-limit=\
128,128,src-and-dst-addresses/20s src-address-list=!COMPANY
add action=return chain=detect_DDoS src-address-list=COMPANY
add action=add-dst-to-address-list address-list=ddosed address-list-timeout=\
30m chain=detect_DDoS
add action=add-src-to-address-list address-list=ddoser address-list-timeout=\
30m chain=detect_DDoS
add action=accept chain=input comment=\
"Allow existing and related connections" connection-state=\
established,related
add action=drop chain=input comment="Blockiere ungltige Verbindungen" \
connection-state=invalid
add action=accept chain=input comment="Allow ICMP (Ping)" protocol=icmp
add action=drop chain=input comment="Block than others from WAN" \
in-interface-list=WAN
/ip firewall nat
add action=dst-nat chain=dstnat dst-port=5060 in-interface=WAN1 log=yes \
protocol=tcp to-addresses=192.168.9.20 to-ports=5060
add action=dst-nat chain=dstnat dst-port=5060 in-interface=WAN1 log=yes \
protocol=udp to-addresses=192.168.9.20 to-ports=5060
add action=dst-nat chain=dstnat dst-port=10000-13238 in-interface=WAN1 log=\
yes protocol=udp to-addresses=192.168.9.20 to-ports=10000-13238
add action=dst-nat chain=dstnat dst-port=5061 in-interface=WAN1 log=yes \
protocol=tcp to-addresses=192.168.9.20 to-ports=5061
add action=masquerade chain=srcnat comment=DSL out-interface=WAN1
add action=masquerade chain=srcnat comment="DSL Backup" out-interface=WAN2
add action=masquerade chain=srcnat comment="LTE Backup" out-interface=WAN3
/ip firewall service-port
set sip disabled=yes
/ip route
add disabled=no distance=1 dst-address=192.168.254.0/24 gateway=\
WIREGUARD_MGMT routing-table=main scope=10 suppress-hw-offload=no
add disabled=no distance=1 dst-address=192.168.249.0/24 gateway=\
WIREGUARD_MGMT pref-src="" routing-table=main scope=10 \
suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.155.0/24 gateway=\
WIREGUARD_MGMT pref-src="" routing-table=main scope=10 \
suppress-hw-offload=no target-scope=10
add disabled=no dst-address=188.144.0.0/15 gateway=192.168.9.3 routing-table=\
main suppress-hw-offload=no
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh port=45131
set www-ssl disabled=no port=1455
set api disabled=yes
/ip ssh
set forwarding-enabled=both host-key-size=4096 strong-crypto=yes
/radius
add address=10.99.254.1 service=login
/snmp
set contact="test <mikrotik@test.de>" enabled=yes trap-community=snmpv3test \
trap-version=3
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=Router
/system note
set note="test - Authorized Administrators only. Access to this d\
evice is monitored." show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=1.de.pool.ntp.org
add address=2.de.pool.ntp.org
add address=3.de.pool.ntp.org
/system routerboard settings
set auto-upgrade=yes silent-boot=yes
/system scheduler
add name=schedule1 on-event="/system routerboard :if ( [get current-firmware] \
!= [get upgrade-firmware] ) do={ /system reboot }" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=1w name=Backup on-event=Backup policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=1970-01-01 start-time=00:00:00
/system watchdog
set automatic-supout=no ping-start-after-boot=1w watchdog-timer=no
/tool bandwidth-server
set enabled=no
/tool romon
set enabled=yes
/user aaa
set interim-update=5m use-radius=yes
/user settings
set minimum-categories=3 minimum-password-length=8
/user-manager
set certificate=*0
/user-manager router
add address=10.99.1.251 name=ROUTER