Please see both configs below, let me know if you require any further info
*ROUTER LOCAL*
[admin@MikroTik] > export compact hide-sensitive
apr/03/2018 02:20:46 by RouterOS 6.39.2
/interface bridge
add disabled=yes name=Capman protocol-mode=none
add admin-mac= auto-mac=no fast-forward=no mtu=1500 name=
bridge-local
/interface ethernet
set [ find default-name=ether1 ] name=ether1-gateway
set [ find default-name=ether2 ] name=ether2-master-local
set [ find default-name=ether3 ] master-port=ether2-master-local name=
ether3-slave-local
set [ find default-name=ether4 ] master-port=ether2-master-local name=
ether4-slave-local
set [ find default-name=ether5 ] master-port=ether2-master-local name=
ether5-slave-local
/ip neighbor discovery
set ether1-gateway discover=no
/caps-man security
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm,tkip name=
security1
add configuration=cfg1 disabled=yes mac-address=64:D1:54:4D:84:D0
master-interface=none name=cap1 radio-mac=64:D1:54:4D:84:D0 security=
security1
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk eap-methods=“”
mode=dynamic-keys
add authentication-types=wpa-psk,wpa2-psk eap-methods=“” group-ciphers=
tkip,aes-ccm mode=dynamic-keys name=wpa2-profile unicast-ciphers=
tkip,aes-ccm
/interface wireless
set [ find default-name=wlan1 ] ampdu-priorities=0,1 band=2ghz-b/g/n
channel-width=20/40mhz-Ce country=“south africa” disabled=no
disconnect-timeout=15s distance=indoors mode=ap-bridge security-profile=
wpa2-profile ssid=kha-mk wireless-protocol=802.11 wps-mode=disabled
/interface wireless nstreme
set wlan1 enable-nstreme=yes
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha1,md5 enc-algorithms=3des
/ip pool
add name=dhcp_pool1 ranges=192.168.2.100-192.168.2.130
add name=dhcp_pool2 ranges=192.168.2.50-192.168.2.100
/ip dhcp-server
add add-arp=yes address-pool=dhcp_pool1 authoritative=after-2sec-delay
interface=bridge-local lease-time=8h name=dhcp-wan
/ppp profile
/queue interface
/system logging action
set 0 memory-lines=100
set 1 disk-lines-per-file=100
add memory-lines=100 name=firewall target=memory
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes
/interface bridge nat
add action=accept chain=srcnat disabled=yes
/interface bridge port
add bridge=bridge-local interface=ether2-master-local
add bridge=bridge-local interface=wlan1
add bridge=Capman disabled=yes interface=cap1
/ip address
add address=192.168.2.150/24 comment=“default configuration” interface=
ether2-master-local network=192.168.2.0
add address=192.168.2.240/24 disabled=yes interface=ether1-gateway network=
192.168.2.0
add address=172.16.16.150/24 disabled=yes interface=ether2-master-local
network=172.16.16.0
/ip dhcp-client
add comment=“default configuration” dhcp-options=hostname,clientid disabled=no
interface=ether1-gateway
/ip dhcp-relay
add dhcp-server=192.168.2.152 disabled=no interface=bridge-local name=relay1
/ip dhcp-server config
set store-leases-disk=immediately
/ip dhcp-server network
add address=192.168.2.0/24 dns-server=192.168.100.2,192.168.100.3 domain=
gateway=192.168.2.150 netmask=24 wins-server=
192.168.100.11
/ip dns
set allow-remote-requests=yes servers=169.1.1.1,169.1.1.2
/ip dns static
/ip firewall address-list
add address=192.168.2.0/24 list=LAN
add list=Any
/ip firewall filter
add action=accept chain=input comment=“default configuration” protocol=icmp
add action=accept chain=input comment=“default configuration” connection-state=
established,related
add action=drop chain=input comment=“default configuration” in-interface=
ether1-gateway
add action=accept chain=forward comment=“default configuration”
connection-state=established
add action=accept chain=forward comment=“default configuration”
connection-state=related
add action=drop chain=forward comment=“default configuration” connection-state=
invalid disabled=yes
add action=drop chain=input comment=“default configuration” disabled=yes
protocol=icmp
add action=accept chain=output comment=“default configuration”
connection-state=established disabled=yes
add action=accept chain=input comment=“default configuration” connection-state=
related disabled=yes
add action=drop chain=input comment=“default configuration” disabled=yes
in-interface=ether1-gateway
add action=drop chain=forward disabled=yes
add action=accept chain=output
add action=accept chain=forward disabled=yes log=yes src-address-list=LAN
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.100.0/24 log=yes log-prefix=
WK src-address=192.168.2.0/24
add action=masquerade chain=srcnat
add action=dst-nat chain=dstnat disabled=yes protocol=tcp to-addresses=
192.168.2.20 to-ports=61331
add action=dst-nat chain=dstnat disabled=yes log=yes log-prefix=torrent-trans
protocol=tcp src-address=196.25.195.205 to-addresses=192.168.2.20 to-ports=
9091
add action=dst-nat chain=dstnat dst-port=61331 in-interface=ether1-gateway
protocol=tcp src-address=0.0.0.0 to-addresses=192.168.2.20 to-ports=61331
add action=masquerade chain=srcnat disabled=yes out-interface=*15
add action=dst-nat chain=dstnat dst-port=10127 protocol=tcp to-addresses=
192.168.2.101 to-ports=10127
add action=dst-nat chain=dstnat dst-port=10127 protocol=udp to-addresses=
192.168.2.101 to-ports=10127
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
/ip ipsec peer
add address=xx.xx.xx.xx/32 dpd-interval=10s dpd-maximum-failures=2
hash-algorithm=md5 nat-traversal=no
/ip ipsec policy
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
add dst-address=192.168.100.0/24 sa-dst-address=xx.xx.xx.xx sa-src-address=
xx.xx.xx.xx src-address=192.168.2.0/24 tunnel=yes
/ip proxy
set cache-path=web-proxy1 parent-proxy=0.0.0.0
/ip route
add comment=www.wineofthemonth.co.za disabled=yes distance=1 dst-address=
xx.xx.xx.xx/32 gateway=MSpring-MK-VPN
add comment=“DISABLED FOR IPSEC” disabled=yes distance=1 dst-address=
192.168.100.0/24 gateway=MSpring-MK-VPN
/ip service
set telnet disabled=yes
set ftp address=192.168.0.0/24 disabled=yes
set www address=192.168.2.0/24,196.25.102.0/24 port=81
set ssh address=192.168.2.0/24
set api address=192.168.2.0/24
set api-ssl address=192.168.2.0/24 certificate=cert_1 disabled=yes
/ip traffic-flow
set enabled=yes
/ip traffic-flow target
add dst-address=192.168.2.250 version=5
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=bridge-local type=internal
add interface=ether1-gateway type=external
/ppp secret
add local-address=10.10.11.1 name=wkpptpd remote-address=10.10.11.2 service=
pptp
/system clock
set time-zone-autodetect=no time-zone-name=Africa/Johannesburg
/system leds
set 0 interface=wlan1
/system logging
set 3 action=memory
add action=disk topics=firewall
add disabled=yes prefix=IPSECWK topics=ipsec
/system ntp client
set enabled=yes primary-ntp=196.25.1.1 secondary-ntp=196.4.160.4
/system scheduler
add interval=15m name=DyndnsUpdate on-event=DynDNS policy=
reboot,read,write,policy,test,password,sniff,sensitive start-date=
sep/21/2014 start-time=00:00:00
/system script
add name=DynDNS owner=admin policy=
reboot,read,write,policy,test,password,sniff,sensitive source="# Set needed
variables
/tool mac-server
set [ find default=yes ] disabled=yes
add interface=ether2-master-local
add interface=ether3-slave-local
add interface=ether4-slave-local
add interface=ether5-slave-local
add interface=wlan1
add interface=bridge-local
/tool mac-server mac-winbox
set [ find default=yes ] disabled=yes
add interface=ether2-master-local
add interface=ether3-slave-local
add interface=ether4-slave-local
add interface=ether5-slave-local
add interface=wlan1
add interface=bridge-local
/tool sniffer
set streaming-server=192.168.2.28
ROUTE REMOTE
[mindspring@MikroTik] > export compact hide-sensitive
apr/03/2018 02:39:48 by RouterOS 6.41.3
model = 2011iL
/interface l2tp-server
add name=“Dialup L2TP Pramod” user=pramod
/interface ethernet
set [ find default-name=ether2 ] arp=proxy-arp comment=
“LAN Private IPs (192.168.100.0)” name=
“ether 2 -LAN” speed=1Gbps
set [ find default-name=ether5 ] comment=“ether5 - Comtel (xx.xx.xx.xx)”
mac-address= name=“ether 5 - WAN” rx-flow-control=auto
tx-flow-control=auto
set [ find default-name=ether1 ] disabled=yes mac-address=
set [ find default-name=ether3 ] disabled=yes mac-address=
set [ find default-name=ether4 ] disabled=yes full-duplex=no mac-address=
6 rx-flow-control=auto tx-flow-control=auto
/interface pptp-server
add name=“Dialup PPTP " user=
add name=HomeVPN user=
add disabled=yes name=HomeVPN2 user=
/interface ethernet switch port
set 5 !egress-rate !ingress-rate
set 6 !egress-rate !ingress-rate
set 7 !egress-rate !ingress-rate
set 8 !egress-rate !ingress-rate
set 9 !egress-rate !ingress-rate
set 11 !egress-rate !ingress-rate
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip firewall layer7-protocol
add name=torrentsites regexp=”"^.(get|GET).+(torrent|thepiratebay|isohunt|ente
rtane|demonoid|eztv|btjunkie|mininova|flixflux|torrentz|vertor|h33t|btscene|
bitunity|bittoxic|thunderbytes|entertane|zoozle|vcdq|bitnova|bitsoup|meganov
a|fulldls|btbot|flixflux|seedpeer|fenopy|gpirate|commonbits).\$""
add name=“Deny Facebook” regexp=“^.+(facebook.com).$\r
\n^.+(eztv.ag).$\r
\n”
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha1,md5 enc-algorithms=
aes-256-cbc,aes-128-cbc,3des
/ip pool
add name=PrivateIPLan ranges=192.168.100.149
add name=LAN_Pool ranges=192.168.100.129-192.168.100.179
add name=“PPTP IP Pool” ranges=10.10.20.2-10.10.20.254
add name=“PPTP Pool” ranges=192.168.100.210-192.168.100.219
/ip dhcp-server
add add-arp=yes address-pool=LAN_Pool authoritative=after-2sec-delay disabled=
no interface=“ether 2 -LAN” lease-time=30m name=“LAN Private IP”
/ppp profile
set *0 change-tcp-mss=default use-compression=yes
add local-address=“PPTP Pool” name=“PPTP IP Pool” remote-address=“PPTP Pool”
add dns-server=192.168.100.2,192.168.100.3 local-address=10.10.20.1 name=
“L2TP Profile” remote-address=“PPTP IP Pool” use-encryption=required
wins-server=192.168.100.11
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/interface l2tp-server server
set authentication=mschap1,mschap2 default-profile=“L2TP Profile” enabled=yes
use-ipsec=yes
/interface pptp-server server
set enabled=yes
/ip address
add address=192.168.100.14/24 comment=“Private IP Block” interface=
“ether 2 -LAN” network=192.168.100.0
add address=10.10.10.1/30 disabled=yes interface=ether4 network=10.10.10.0
add address=publicip comment=“Comtel Public Ip Range 50Mb Fibre”
disabled=yes interface=“ether 5 - WAN” network=
add address=PublicIP interface=“ether 5 - WAN” network=
add address=PublicIP interface=“ether 5 - WAN” network=
add address=PublicIP disabled=yes interface=“ether 5 - WAN” network=
255.255.255.248
add address=41.xx.xx.54 disabled=yes interface=“ether 5 - WAN” network=
255.255.255.248
add address=xx.xx.xx.50/29 interface=“ether 5 - WAN” network=xx.xx.xx.48
add address=10.10.11.2 disabled=yes interface=WaleedHomeVPN network=10.10.11.1
add address=192.168.100.1/24 interface=“ether 2 -LAN” network=192.168.100.0
/ip dhcp-server lease
“LAN Private IP”
/ip dhcp-server network
add address=192.168.100.0/24 dns-server=192.168.100.2,192.168.100.3 gateway=
192.168.100.1
/ip dns
set servers=192.168.100.2,192.168.100.3
/ip firewall address-list
add address=10.0.0.0/8 comment=RFC6890 list=NotPublic
add address=0.0.0.0/8 comment=RFC6890 list=NotPublic
add address=100.64.0.0/10 comment=RFC6890 list=NotPublic
add address=127.0.0.0/8 comment=RFC6890 list=NotPublic
add address=169.254.0.0/16 comment=RFC6890 list=NotPublic
add address=172.16.0.0/12 comment=RFC6890 list=NotPublic
add address=192.0.0.0/24 comment=RFC6890 list=NotPublic
add address=192.0.2.0/24 comment=RFC6890 list=NotPublic
add address=192.168.0.0/16 comment=RFC6890 list=NotPublic
add address=192.88.99.0/24 comment=RFC3068 list=NotPublic
add address=198.18.0.0/15 comment=RFC6890 list=NotPublic
add address=198.51.100.0/24 comment=RFC6890 list=NotPublic
add address=203.0.113.0/24 comment=RFC6890 list=NotPublic
add address=224.0.0.0/4 comment=RFC4601 list=NotPublic
add address=240.0.0.0/4 comment=RFC6890 list=NotPublic
/ip firewall filter
add action=accept chain=input comment=“Accept all packets from Local Network”
connection-nat-state=“” in-interface=“ether 2 -LAN”
add action=accept chain=input comment=
“Accept INPUT established and related packets” connection-state=
established,related
add action=accept chain=forward comment=
“Accept FORWARDED established and related packets” connection-state=
established,related
add action=accept chain=input comment=“Allow PPTP to Mikrotik” dst-port=1723
protocol=tcp src-address-list=“”
add action=accept chain=input comment=“Allow GRE for PPTP to Mikrotik”
protocol=gre
add action=accept chain=input comment=“Allow L2TP to Mikrotik (IKEv1)”
dst-port=500 protocol=udp src-port=“”
add action=accept chain=input comment=“Allow L2TP to Mikrotik (IKEv1)”
dst-port=4500 protocol=udp
add action=accept chain=input comment=“Allow ESP for IPSEC to Mikrotik”
protocol=ipsec-ah
add action=accept chain=input comment=“Allow ESP for IPSEC to Mikrotik”
protocol=ipsec-esp
add action=accept chain=input comment=“Allow Port 1701 for L2TP to Mikrotik”
dst-port=1701 protocol=udp
add action=accept chain=forward comment=
“Allow Packets to Pramod’s Home Network via VPN” dst-address=192.168.7.0/24
in-interface=“ether 2 -LAN” out-interface=PramodHomeVPN
add action=accept chain=input comment=“Accept NTP” dst-port=123 protocol=udp
add action=accept chain=input comment=“Accept NTP” dst-port=123 protocol=tcp
add action=drop chain=input comment=
“Drop all packets which are not destined to routes IP address”
dst-address-type=!local
add action=drop chain=input comment=
“Drop all packets which does not have unicast source IP address”
src-address-type=!unicast
add action=drop chain=input comment=“Drop invalid packets” connection-state=
invalid
add action=drop chain=input comment=“Drop all packets from public internet which
_should not exist in public network” in-interface=“ether 5 - WAN”
src-address-list=NotPublic
add action=drop chain=forward comment=“Drop invalid packets” connection-state=
invalid
add action=drop chain=forward comment=
“Drop new connections from internet which are not dst-natted”
connection-nat-state=!dstnat connection-state=new in-interface=
“ether 5 - WAN”
add action=drop chain=forward comment=“Drop all packets from public internet whi
ch should not exist in public network” in-interface=“ether 5 - WAN”
src-address-list=NotPublic
add action=drop chain=forward comment=“Drop all packets from local network to in
ternet which should not exist in public network” dst-address-list=NotPublic
in-interface=“ether 2 -LAN”
add action=drop chain=forward comment=“Drop all packets in local network which d
oes not have local network address” in-interface=“ether 2 -LAN”
src-address=!192.168.100.0/24
add action=drop chain=forward comment=
“Drop new connections from internet which are not dst-natted”
connection-nat-state=!dstnat connection-state=new in-interface=
“ether 5 - WAN”
add action=drop chain=input comment=“Drop any other packets from the Internet”
in-interface=“ether 5 - WAN”
p2p matcher is obsolete please use layer7 matcher instead
add action=drop chain=forward comment=“Torrent Sites: ALL P2P Traffic” p2p=
all-p2p src-address-list=“”
add action=drop chain=forward comment=“Torrent Sites: Block Websites”
layer7-protocol=torrentsites src-address=192.168.100.0/24 src-address-list=
“”
add action=drop chain=forward comment=“Torrent Sites: Drop DNS” dst-port=53
layer7-protocol=torrentsites protocol=udp src-address=192.168.100.0/24
add action=drop chain=forward comment=“Torrent Sites: Keyword_Drop” content=
torrent src-address=192.168.100.0/24
add action=drop chain=forward comment=“Torrent Sites: Keyword Tracker” content=
tracker src-address=192.168.100.0/24
add action=drop chain=forward comment=“Torrent Sites: Get Peers Drop” content=
getpeers src-address=192.168.100.0/24
add action=drop chain=forward comment=“Torrent Sites: info_hash_drop” content=
info_hash src-address=192.168.100.0/24
add action=drop chain=forward comment=“Torrent Sites:announce_peers_drop”
content=announce_peers src-address=192.168.100.0/24
add action=accept chain=forward comment=“Staff Waleed IPSEC: LAN to LAN 1”
dst-address=192.168.100.0/24 src-address=192.168.2.0/24
add action=accept chain=forward comment=“Staff Waleed IPSEC: LAN to LAN 2”
dst-address=192.168.2.0/24 src-address=192.168.100.0/24
/ip firewall mangle
add action=mark-routing chain=prerouting comment=
“Mark HTTP to redirect browsing via ADSL” disabled=yes dst-address=
!192.168.100.0/24 dst-port=80 new-routing-mark=HTTP passthrough=yes
protocol=tcp
add action=mark-routing chain=prerouting comment=
“Mark HTTPS to redirect browsing via ADSL” disabled=yes dst-address=
!192.168.100.0/24 dst-port=443 new-routing-mark=HTTPS passthrough=yes
protocol=tcp
add action=mark-routing chain=prerouting comment=“Standard Bank Mark” disabled=
yes dst-address=196.8.0.0/16 log=yes log-prefix=“SB Mark” new-routing-mark=
SBank passthrough=yes src-address=192.168.100.0/24
/ip firewall nat
add action=accept chain=srcnat comment=“Staff: IPSec VPN Waleed NAT”
dst-address=192.168.2.0/24 src-address=192.168.100.0/24
add action=dst-nat chain=dstnat comment=“Elm Openvpn” disabled=yes dst-port=
1194 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=192.168.100.51
to-ports=1194
add action=dst-nat chain=dstnat comment= Port 80"
dst-address=xx.xx.xx.xx dst-port=80 in-interface=“ether 5 - WAN” protocol=
tcp to-addresses=192.168.100.21 to-ports=80
add action=dst-nat chain=dstnat comment=" port 443"
dst-address=xx.xx.xx.xx dst-port=443 in-interface=“ether 5 - WAN” protocol=
tcp to-addresses=192.168.100.21 to-ports=443
add action=dst-nat chain=dstnat commentdst-port=
8181 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=192.168.100.20
to-ports=8181
add action=dst-nat chain=dstnat comment=
" RSYNC TCP, Limited to Offshore Servers"
dst-port=873 in-interface=“ether 5 - WAN” protocol=tcp src-address-list=
OffshoreServer to-addresses=192.168.100.33 to-ports=873
add action=dst-nat chain=dstnat comment=“SMTP”
dst-address=pujblicip dst-port=25 in-interface=“ether 5 - WAN” protocol=
tcp to-addresses=192.168.100.33
add action=dst-nat chain=dstnat comment=" IMAP"
dst-port=143 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=
192.168.100.33 to-ports=143
add action=dst-nat chain=dstnat comment=" IMAPS"
dst-port=993 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=
192.168.100.33 to-ports=993
add action=dst-nat chain=dstnat comment=" SMTPAUTH"
dst-port=587 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=
192.168.100.33 to-ports=587
add action=dst-nat chain=dstnat comment=“SMTPAUTH”
dst-port=465 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=
192.168.100.33 to-ports=465
add action=dst-nat chain=dstnat comment=" RSYNC UDP In
coming, Limited to Offshore Servers" dst-port=873 in-interface=
“ether 5 - WAN” protocol=udp src-address-list=OffshoreServer to-addresses=
192.168.100.33 to-ports=873
add action=dst-nat chain=dstnat comment=
“Geode FTP Incoming, Limited to Offshore Servers” dst-address=publicip
dst-port=20 in-interface=“ether 5 - WAN” protocol=tcp src-address-list=
OffshoreServer to-addresses=192.168.100.23
add action=dst-nat chain=dstnat comment=" port forward"
dst-address=publicip dst-port=2910 in-interface=“ether 5 - WAN”
protocol=tcp to-addresses=192.168.100.19 to-ports=2910
add action=dst-nat chain=dstnat comment=
“Geode FTP Incoming, Limited to Offshore Servers” dst-address=publicip
dst-port=21 in-interface=“ether 5 - WAN” protocol=tcp src-address-list=
OffshoreServer to-addresses=192.168.100.23
add action=dst-nat chain=dstnat comment=
“Geode FTP Incoming, UDP 20, Limited to Offshore Servers” dst-address=
publicip dst-port=20 in-interface=“ether 5 - WAN” protocol=udp
src-address-list=OffshoreServer to-addresses=192.168.100.23
add action=dst-nat chain=dstnat comment=
“Geode Dst-nat Port 21 UDP Incoming, , Limited to Offshore Servers”
dst-address=publicip dst-port=21 in-interface=“ether 5 - WAN” protocol=
udp src-address-list=OffshoreServer to-addresses=192.168.100.23
add action=dst-nat chain=dstnat comment=“SSH/SFTP/Rsync over SSh to Geode”
dst-address=publicip dst-port=22 in-interface=“ether 5 - WAN” protocol=
tcp src-address-list=OffshoreServer to-addresses=192.168.100.23
add action=dst-nat chain=dstnat comment=
“Agate - Iincoming TCP DNS queries from Internet” dst-address-type=“”
dst-port=53 in-interface=“ether 5 - WAN” protocol=tcp to-addresses=
192.168.100.3
add action=dst-nat chain=dstnat comment=
“Agate - Iincoming UDP DNS queries from Internet” dst-port=53 in-interface=
“ether 5 - WAN” protocol=udp to-addresses=192.168.100.3
add action=masquerade chain=srcnat comment=
“Masquerade all private IP traffic from LAN, outgoing” src-address=
192.168.100.0/24
add action=dst-nat chain=dstnat comment=“Crystal: Incoming SMTP from Internet”
dst-address=publicip dst-port=25 in-interface=“ether 5 - WAN” protocol=
tcp to-addresses=192.168.100.17
add action=dst-nat chain=dstnat comment=“Crystal Web Interface” dst-address=
pub2 dst-port=80 in-interface=“ether 5 - WAN” protocol=tcp
to-addresses=192.168.100.17
add action=dst-nat chain=dstnat comment=“Silver Incoming port 80 "
dst-address=pub2 dst-port=80 protocol=tcp to-addresses=
192.168.100.32
add action=dst-nat chain=dstnat comment=“Silver Incoming Port 21 FTP”
dst-address=pub2 dst-port=21 log=yes protocol=tcp to-addresses=
192.168.100.32 to-ports=21
add action=dst-nat chain=dstnat comment=“Silver Incoming Port 20 FTP”
dst-address=pub2 dst-port=20 log=yes protocol=tcp to-addresses=
192.168.100.32 to-ports=20
add action=dst-nat chain=dstnat comment=
“NagiosXI Incoming Port 443 for Passive Monitoring” dst-address=pub2
dst-port=443 protocol=tcp to-addresses=192.168.100.78 to-ports=443
/ip firewall service-port
set sip disabled=yes
/ip ipsec peer
add address=0.0.0.0/0 dh-group=modp1024 generate-policy=port-override
add address=165.0.10.96/32 dh-group=modp1024 dpd-interval=10s
dpd-maximum-failures=2 enc-algorithm=3des hash-algorithm=md5 nat-traversal=
no
/ip ipsec policy
add dst-address=192.168.2.0/24 sa-dst-address=locallan sa-src-address=
publicip src-address=192.168.100.0/24 tunnel=yes
/ip proxy
set cache-administrator=”" parent-proxy=0.0.0.0
/ip route
add check-gateway=ping comment=“Route HTTP Traffic for Comtel Link Failure”
disabled=yes distance=1 gateway=192.168.100.4 routing-mark=HTTP
add check-gateway=ping comment=“HTTPS Routting For Comtel link failure”
disabled=yes distance=1 gateway=192.168.100.4 routing-mark=HTTPS
add check-gateway=ping comment=Primary distance=1 gateway=8.8.8.8
add comment=Secondary distance=2 gateway=192.168.100.4
add check-gateway=ping comment=“Comtel Fibre Route” disabled=yes distance=1
gateway=xx.xx.xx.xx
add check-gateway=ping comment=“ADSL 2” disabled=yes distance=2 gateway=
192.168.100.4
add check-gateway=ping comment=“Validate if Primary Route (Fibre) is up”
distance=1 dst-address=8.8.8.8/32 gateway=x.xx.xx.xx scope=10
add check-gateway=ping comment=“Comtel /29 Subnet onto LAN” distance=1
dst-address=xx.xx.xx.xx gateway=“ether 2 -LAN”
add comment=“Staff: Waleed Home Mikrotik” disabled=yes distance=1 dst-address=
192.168.2.0/24 gateway=10.10.11.1 pref-src=10.10.11.2
add comment=“Staff: Pramod Home Mikrotik” distance=1 dst-address=192.168.7.0/24
gateway=10.10.10.1 pref-src=10.10.10.2
/ip service
set telnet address=192.168.0.0/16
set ftp address=192.168.0.0/16
set www address=192.168.0.0/16
set ssh address=192.168.0.0/16
set www-ssl address=192.168.0.0/16 disabled=no port=81
set api address=192.168.0.0/16
set winbox address=192.168.0.0/16
set api-ssl address=192.168.0.0/16
/ip traffic-flow
set enabled=yes interfaces=“ether 2 -LAN”
/ip traffic-flow target
add dst-address=192.168.100.70 port=3000
add dst-address=192.168.100.129 version=1
/ppp l2tp-secret
add
/ppp secret
add local-address=10.10.10.2 name=pdpptp remote-address=10.10.10.1
add name=pramodPPTP profile=“PPTP IP Pool”
add local-address=10.10.11.2 name=wkpptpd remote-address=10.10.11.1
/snmp
set enabled=yes
/system clock
set time-zone-name=Africa/Johannesburg
/system clock manual
set time-zone=+02:00
/system logging
add disabled=yes topics=ipsec
/system ntp client
set enabled=yes mode=broadcast primary-ntp=196.21.187.2 secondary-ntp=
196.84.150.123
/system ntp server
set broadcast=yes enabled=yes multicast=yes
/tool graphing interface
add interface=“ether 5 - WAN”
add interface=PramodHomeVPN
add interface=“ether 2 -LAN”
/tool graphing resource
add
/tool traffic-monitor
add interface=“ether 5 - WAN” name=tmon1 threshold=0