A beating is deserved, that’s fair enough.
Here is a complete /export minus the obviously not required bits (ppp secrets, ipsec config for vpns, etc).
Please note: There are definitely a bunch of extra firewall rules in here right now due to mid-stream debugging this. Certainly some do absolutely nothing or are altogether just dumb, broken, or not required.
# jul/18/2022 12:29:28 by RouterOS 7.3.1
#
/interface ethernet
set [ find default-name=ether1 ] disable-running-check=no name=eth1_lan
set [ find default-name=ether2 ] disable-running-check=no name=eth2_tagged
set [ find default-name=ether5 ] disable-running-check=no name=eth3_cogeco
set [ find default-name=ether6 ] disable-running-check=no name=eth4_gvs
set [ find default-name=ether3 ] disable-running-check=no name=eth5_bellfibe
set [ find default-name=ether4 ] disable-running-check=no name=eth6
/interface ovpn-server
add name=ovpn-in1-chops user=xxx
/interface wireguard
add listen-port=52522 mtu=1420 name=wg_embybuds
add listen-port=52520 mtu=1420 name=wg_thad
add listen-port=52521 mtu=1420 name=wg_trgmobile
/interface vlan
add interface=eth2_tagged name=vlan63_addfree vlan-id=63
add interface=eth2_tagged name=vlan66_dmz vlan-id=66
add interface=eth2_tagged name=vlan67_mgmt vlan-id=67
add interface=eth2_tagged name=vlan69_vpn vlan-id=69
add interface=eth2_tagged name=vlan70_emby vlan-id=70
add interface=eth2_tagged name=vlan99_heartbeat vlan-id=99
/disk
set usb1 disabled=no
set usb1-part1 disabled=no
/interface list
add name=WAN
add name=TRUSTED_LANS
add name=INET_FWD_ALLOWED
add name=LAN-FWD-ALLOW
add name=EMBY-ALLOWED
add name=WIREGUARD_TRUSTED
/interface pppoe-client
add disabled=no interface=eth5_bellfibe name=pppoe-bellfibe profile=bell-fibe user=xxx
/ip vrf
add disabled=yes interfaces=pppoe-bellfibe name=bellfibe
/queue simple
add max-limit=20M/150M name=gvs queue=ethernet-default/ethernet-default target=eth4_gvs total-queue=ethernet-default
/routing table
add disabled=no fib name=bellfibe
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface l2tp-server server
set default-profile=default enabled=yes use-ipsec=required
/interface list member
add interface=eth3_cogeco list=WAN
add interface=eth1_lan list=TRUSTED_LANS
add interface=eth1_lan list=INET_FWD_ALLOWED
add interface=vlan63_addfree list=INET_FWD_ALLOWED
add interface=vlan66_dmz list=INET_FWD_ALLOWED
add interface=eth4_gvs list=INET_FWD_ALLOWED
add interface=vlan66_dmz list=LAN-FWD-ALLOW
add interface=vlan67_mgmt list=LAN-FWD-ALLOW
add interface=vlan63_addfree list=LAN-FWD-ALLOW
add interface=eth4_gvs list=LAN-FWD-ALLOW
add interface=vlan63_addfree list=TRUSTED_LANS
add interface=eth3_cogeco list=EMBY-ALLOWED
add interface=vlan63_addfree list=EMBY-ALLOWED
add disabled=yes interface=vlan67_mgmt list=INET_FWD_ALLOWED
add disabled=yes interface=ovpn-in1-chops list=LAN-FWD-ALLOW
add interface=pppoe-bellfibe list=WAN
add interface=eth1_lan list=LAN-FWD-ALLOW
add interface=wg_thad list=WIREGUARD_TRUSTED
add interface=wg_trgmobile list=WIREGUARD_TRUSTED
add interface=wg_trgmobile list=TRUSTED_LANS
add interface=wg_trgmobile list=INET_FWD_ALLOWED
add interface=vlan70_emby list=LAN-FWD-ALLOW
/interface wireguard peers
add allowed-address=192.168.203.2/32,192.168.1.0/24 comment="WireGuard Peer - Thad" endpoint-address=XXX \
endpoint-port=13231 interface=wg_thad public-key="XXX"
add allowed-address=192.168.205.20/32 comment="WireGuard Peer - Dave's iPhone" interface=wg_trgmobile public-key=\
"XXX"
add allowed-address=192.168.205.10/32 comment="WireGuard Peer - Dave's Macbook Air" interface=wg_trgmobile \
public-key="XXX"
add allowed-address=192.168.205.30/32 comment="Thaddeus Test" interface=wg_trgmobile public-key=\
"XXX"
add allowed-address=192.168.206.20/32 comment="Dave iPhone Emby" interface=wg_embybuds public-key=\
"XXX"
/ip address
add address=10.0.2.1/22 interface=eth1_lan network=10.0.0.0
add address=PUBLIC_IP_RANGE.122/29 interface=eth3_cogeco network=PUBLIC_IP_RANGE.120
add address=PUBLIC_IP_RANGE.123/29 interface=eth3_cogeco network=PUBLIC_IP_RANGE.120
add address=PUBLIC_IP_RANGE.126/29 interface=eth3_cogeco network=PUBLIC_IP_RANGE.120
add address=PUBLIC_IP_RANGE.124/29 interface=eth3_cogeco network=PUBLIC_IP_RANGE.120
add address=PUBLIC_IP_RANGE.125/29 interface=eth3_cogeco network=PUBLIC_IP_RANGE.120
add address=192.168.66.1/24 interface=vlan66_dmz network=192.168.66.0
add address=192.168.67.1/24 interface=vlan67_mgmt network=192.168.67.0
add address=192.168.63.1/24 interface=vlan63_addfree network=192.168.63.0
add address=192.168.120.1/24 interface=eth4_gvs network=192.168.120.0
add address=192.168.69.1/24 interface=vlan69_vpn network=192.168.69.0
add address=192.168.66.11/24 interface=vlan66_dmz network=192.168.66.0
add address=10.0.0.1/22 interface=eth1_lan network=10.0.0.0
add address=192.168.203.1/30 interface=wg_thad network=192.168.203.0
add address=192.168.205.1/24 interface=wg_trgmobile network=192.168.205.0
add address=10.255.255.1/30 interface=vlan99_heartbeat network=10.255.255.0
add address=192.168.70.1/24 interface=vlan70_emby network=192.168.70.0
add address=192.168.206.1/24 interface=wg_embybuds network=192.168.206.0
/ip dns
set allow-remote-requests=yes servers=xxx,10.0.0.6
/ip firewall filter
add action=accept chain=input comment="ACCEPT ALL FROM WIREGUARD TEST" in-interface=wg_trgmobile
add action=accept chain=input comment="ALLOW WIREGUARD PORTS" dst-port=52520-52522 in-interface=pppoe-bellfibe \
protocol=udp
add action=accept chain=input comment="ALLOW WIREGUARD PORTS" dst-address=PUBLIC_IP_RANGE.122 dst-port=52521 in-interface=\
eth3_cogeco protocol=udp
add action=drop chain=input comment="DROP INVALID" connection-state=invalid disabled=yes
add action=accept chain=forward comment="ALLOW ESTABLISHED RELATED FOR ALL" connection-state=established,related
add action=accept chain=input comment="ACCEPT INPUT FROM TRUSTED_LANS" in-interface-list=TRUSTED_LANS
add action=accept chain=forward comment="ALLOW FORWARD - INTERNET ALLOWED ONLY" in-interface-list=INET_FWD_ALLOWED \
out-interface-list=WAN
add action=accept chain=forward comment="ALLOW FORWARD - TRUSTED LAN FOWARDS" in-interface-list=TRUSTED_LANS \
out-interface-list=LAN-FWD-ALLOW
add action=accept chain=forward comment="ALLOW FORWARD - TRUSTED LAN TO CHOPSVPN" dst-address=192.168.78.0/24 \
in-interface-list=TRUSTED_LANS
add action=accept chain=input comment="ALLOW INPUT - WIREGUARD TRUSTED" in-interface-list=WIREGUARD_TRUSTED
add action=accept chain=output comment="ALLOW OUTPUT - WIREGUARD TRUSTED" out-interface-list=WIREGUARD_TRUSTED
add action=accept chain=forward comment="ALLOW FORWARD - THAD TO LAN" in-interface-list=WIREGUARD_TRUSTED \
out-interface=eth1_lan
add action=accept chain=forward comment="ALLOW FORWARD - LAN TO THAD" in-interface=eth1_lan out-interface-list=\
WIREGUARD_TRUSTED
add action=accept chain=forward comment="ALLOW FORWARD - EMBY USERS TO EMBY DMZ" in-interface=wg_embybuds \
out-interface=vlan70_emby
add action=accept chain=forward comment="ALLOW EMBY DMZ BOX TO MOUNT NFS FROM NEUTRON" dst-address=10.0.0.13 \
dst-port=111,649,2049,35010-35012 in-interface=vlan70_emby protocol=tcp src-address=192.168.70.10
add action=accept chain=forward comment="ALLOW EMBY DMZ BOX TO MOUNT NFS FROM NEUTRON" dst-address=10.0.0.13 \
dst-port=111,649,2049,35010-35012 in-interface=vlan70_emby protocol=udp src-address=192.168.70.10
add action=accept chain=input comment="TRGBoyz VPN" dst-address=PUBLIC_IP_RANGE.122 in-interface=eth3_cogeco protocol=l2tp
add action=accept chain=input comment="TRGBoyz VPN" dst-address=PUBLIC_IP_RANGE.122 in-interface=eth3_cogeco protocol=\
ipsec-esp
add action=accept chain=input comment="ACCEPT INPUT - VPNs - IPSEC OVPN ETC" dst-address=PUBLIC_IP_RANGE.122 dst-port=\
500,4500,1701,52768 in-interface=eth3_cogeco protocol=udp
add action=accept chain=input comment="TRGBoyz & ChopsCallhome VPN" dst-address=PUBLIC_IP_RANGE.122 dst-port=52768 \
in-interface=eth3_cogeco protocol=tcp
add action=accept chain=forward comment=CH2A-Test dst-address=192.168.77.200
add action=accept chain=forward comment=MobileMike dst-address=192.168.77.58
add action=accept chain=input comment="ACCEPT ICMP IF NOT INTERNET" in-interface-list=!WAN protocol=icmp
add action=accept chain=forward comment="ACCEPT FORWARD Gaming-Stuff UDP" dst-address=192.168.66.50 dst-port=\
2456-2458,3979,7780-9780,25565,25575,26800-29015,32123-32125,42420,41234 out-interface=vlan66_dmz protocol=udp
add action=accept chain=forward comment="ACCEPT FORWARD Gaming-Stuff TCP" dst-address=192.168.66.50 dst-port=\
2456-2458,3979,7780-9780,25565,25575,26800-29015,32123-32125,42420,41234 out-interface=vlan66_dmz protocol=tcp
add action=drop chain=forward comment="DROP MAIL IN CASE OF MALWARE" dst-port=25,587,2525 out-interface=eth3_cogeco \
protocol=tcp
add action=accept chain=forward comment="ACCEPT EMBY TRAFFIC TO EMBY-SERVERS FROM INTERFACES EMBY-ALLOWED" \
dst-address-list=EMBY-SERVERS dst-port=8096 in-interface-list=EMBY-ALLOWED out-interface=eth1_lan protocol=tcp
add action=accept chain=forward comment="REDACTED OpenVPN" dst-address=192.168.66.10 dst-port=62234 in-interface=\
eth3_cogeco out-interface=vlan66_dmz protocol=udp
add action=accept chain=forward comment=REDACTEDDev dst-address=192.168.66.151 dst-port=22,80,443,3306 in-interface=\
eth3_cogeco out-interface=vlan66_dmz protocol=tcp
add action=accept chain=forward comment="dmzweb forwards" dst-address=192.168.66.160 dst-port=80,443,8080 \
in-interface=eth3_cogeco out-interface=vlan66_dmz protocol=tcp
add action=accept chain=forward comment="Allow ssh/http/httpd connections from DMZ to LAN git server" dst-address=\
10.0.0.40 dst-port=22,80,443 in-interface=vlan66_dmz out-interface=eth1_lan protocol=tcp
add action=accept chain=forward comment="ACCEPT FORWARD Pi-Hole to AD-DNS" dst-address-list=AD-DNS dst-port=53 \
protocol=udp src-address=192.168.66.2
add action=accept chain=forward comment="Allow forwards for wifi_vlan63 to DMZ for DNS" dst-port=53 in-interface=\
vlan63_addfree out-interface=vlan66_dmz protocol=udp
add action=drop chain=forward comment="Drop DNS queries from Addfree Network to Internet" dst-port=53 in-interface=\
vlan63_addfree out-interface=eth3_cogeco protocol=udp
add action=drop chain=forward comment="DROP FORWARD"
add action=accept chain=input comment="ALLOW Established/Related INPUT" connection-state=established,related
add action=accept chain=input comment="ACCEPT INPUT FOR DNS FROM NOT INTERNET" dst-port=53 in-interface-list=!WAN \
protocol=udp
add action=drop chain=input comment="DROP INPUT"
add action=accept chain=output comment="ACCEPT Established/Related OUTPUT" connection-state=established,related
add action=accept chain=output comment="ACCEPT OUTPUT FOR UDP/53 ROUTERDNS" dst-port=53 protocol=udp
add action=drop chain=output comment="DROP OUTPUT" disabled=yes
/ip firewall mangle
add action=mark-packet chain=prerouting comment="Cogeco incoming packets" in-interface=eth3_cogeco new-packet-mark=\
cogeco-packet passthrough=yes
add action=mark-packet chain=prerouting comment="Bell incoming packets" in-interface=pppoe-bellfibe new-packet-mark=\
bell-packet passthrough=yes
add action=mark-connection chain=prerouting comment="Mark incoming connections from bell for tracking" in-interface=\
pppoe-bellfibe new-connection-mark=bell
add action=mark-connection chain=prerouting comment="Mark incoming connections from Cogeco for tracking" \
in-interface=eth3_cogeco new-connection-mark=cogeco
add action=mark-routing chain=prerouting comment="Single gateway Fibe clients by list" dst-address-list=!LOCAL \
new-routing-mark=bellfibe src-address-list=BELL-FIBE-CLIENTS
add action=mark-connection chain=prerouting comment="Mark connections for Dual gateway with Nth 2/1" \
connection-state=new dst-address-list=!LOCAL new-connection-mark=bell nth=2,1 src-address-list=\
DUAL-GATEWAY-CLIENTS
add action=mark-routing chain=prerouting comment="Mark routing for connections for dual gateway" connection-mark=bell \
dst-address-list=!LOCAL new-routing-mark=bellfibe src-address-list=DUAL-GATEWAY-CLIENTS
add action=mark-routing chain=output comment="Send wireguard out the fast interface" new-routing-mark=bellfibe \
protocol=udp src-port=52520,52521
add action=mark-routing chain=prerouting disabled=yes dst-port=52520 in-interface-list=WAN new-routing-mark=bellfibe \
protocol=udp
add action=mark-routing chain=output dst-port=13231 new-routing-mark=bellfibe protocol=udp
/ip firewall nat
add action=masquerade chain=srcnat comment="Hairpin NAT for rules not matching an IN" dst-address=10.0.0.0/22 \
src-address=10.0.0.0/22
add action=masquerade chain=srcnat comment="Masq to Steve" dst-address=192.168.78.100 src-address=10.0.0.0/22
add action=masquerade chain=srcnat comment="CH2A Test" dst-address=192.168.77.200 src-address=10.0.0.70
add action=masquerade chain=srcnat comment=MobileMike dst-address=192.168.77.58 src-address=10.0.0.70
add action=masquerade chain=srcnat comment="TEST 10.0.0.16 - FIBE" dst-address-list=!LOCAL out-interface=\
pppoe-bellfibe src-address-list=DUAL-GATEWAY-CLIENTS
add action=masquerade chain=srcnat comment="TEST 10.0.0.16 - COGECO" dst-address-list=!LOCAL out-interface=\
eth3_cogeco src-address-list=DUAL-GATEWAY-CLIENTS
add action=masquerade chain=srcnat comment="SECONDARY INTERNET (BELL FIBE) MASQUERADE BY ROUTING MARK" \
dst-address-list=!LOCAL out-interface=pppoe-bellfibe routing-mark=bellfibe src-address-list=BELL-FIBE-CLIENTS
add action=masquerade chain=srcnat comment="PRIMARY INTERNET (COGECO) MASQUERADE" dst-address-list=!LOCAL \
out-interface=eth3_cogeco src-address-list=NAT_ALLOWED_SUBNETS
add action=dst-nat chain=dstnat comment="Win2k19 Games Server " dst-address=PUBLIC_IP_RANGE.122 dst-port=\
2456-2458,3979,7780-8095,8097-9780,25565,26800-29015,32123-32125,42420,41234 protocol=udp to-addresses=\
192.168.66.50
add action=dst-nat chain=dstnat comment="Win2k19 Games Server" dst-address=PUBLIC_IP_RANGE.122 dst-port=\
2456-2458,3979,7780-8095,8097-9780,25565,26800-29015,32123-32125,42420,41234 protocol=tcp to-addresses=\
192.168.66.50
add action=dst-nat chain=dstnat comment="Win2k19 Games - For TRGBoyz NAT" dst-address=192.168.77.1 dst-port=\
25000-30000 protocol=tcp to-addresses=192.168.66.50
add action=dst-nat chain=dstnat comment="REDACTED OpenVPN" dst-address=PUBLIC_IP_RANGE.126 dst-port=62234 in-interface=\
eth3_cogeco protocol=udp to-addresses=192.168.66.10
add action=dst-nat chain=dstnat comment=Web dst-address=PUBLIC_IP_RANGE.124 dst-port=80,443,8080,65123 in-interface=\
eth3_cogeco protocol=tcp to-addresses=192.168.66.160
add action=dst-nat chain=dstnat comment="WFC WEb" dst-address=PUBLIC_IP_RANGE.123 dst-port=80 in-interface=eth3_cogeco \
protocol=tcp to-addresses=192.168.66.160 to-ports=80
add action=dst-nat chain=dstnat comment="Emby for EMBY-USERS List" dst-address=PUBLIC_IP_RANGE.122 dst-port=8096 \
in-interface=pppoe-bellfibe protocol=tcp src-address-list=EMBY-USERS to-addresses=10.0.0.17 to-ports=8096
add action=dst-nat chain=dstnat comment="REDACTEDDev - Web" dst-address=PUBLIC_IP_RANGE.126 dst-port=80,443 in-interface=\
eth3_cogeco protocol=tcp to-addresses=192.168.66.151
add action=dst-nat chain=dstnat comment="REDACTEDDev - SSH - Aaron" dst-address=PUBLIC_IP_RANGE.126 dst-port=22422 \
in-interface=eth3_cogeco protocol=tcp src-address=24.57.244.15 to-addresses=192.168.66.151 to-ports=22
add action=dst-nat chain=dstnat comment="REDACTEDDev- DB - List" dst-address=PUBLIC_IP_RANGE.126 dst-port=3306 \
in-interface=eth3_cogeco protocol=tcp src-address-list=REDACTED-DB-ACCESS to-addresses=192.168.66.151
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=PUBLIC_IP_RANGE.121 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-bellfibe pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add disabled=no distance=2 dst-address=192.168.69.0/24 gateway=vlan69_vpn pref-src=0.0.0.0 routing-table=bellfibe \
scope=30 suppress-hw-offload=no target-scope=10
add disabled=no dst-address=192.168.66.0/24 gateway=vlan66_dmz routing-table=bellfibe suppress-hw-offload=no
add disabled=no dst-address=192.168.1.0/24 gateway=192.168.203.2 routing-table=main suppress-hw-offload=no
add disabled=no distance=3 dst-address=0.0.0.0/0 gateway=pppoe-bellfibe pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
/system hardware
set allow-x86-64=yes