I have tried including the address but nothing.
I have disabled all firewall rules and nothing.
I currently have the rule in mangle to log the connections:

\
model = RB1100x4
/interface bridge
add arp=proxy-arp comment="VPN ikev2" name=bridge-loopback
add mtu=1500 name=bridge_troncal
/interface ethernet
set [ find default-name=ether2 ] l2mtu=1598 loop-protect=on name=
"eth2-Trunk Vlan"
set [ find default-name=ether1 ] comment="Entrada Proveedor ISP"
loop-protect=on name=ether1-WAN
/ip ipsec peer
add disabled=yes name=servidor-2ltp passive=yes
/ip ipsec policy group
add name="group ike2"
/ip ipsec profile
set [ find default=yes ] name="por defecto"
add dh-group=modp2048,modp1536,modp1024 enc-algorithm=aes-256,aes-192,aes-128
hash-algorithm=sha256 name=profile-ikev2
/ip ipsec peer
add exchange-mode=ike2 local-address=IP PUBLIC name="servidor ikev2"
passive=yes profile=profile-ikev2
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc,3des
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr
,aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-128-gcm"
lifetime=8h name=proposal-ikev2 pfs-group=none
/ip pool
add comment="Administraci\F3n de red" name=dhcp ranges=
10.10.10.25-10.10.10.30
add name=vpn ranges=192.168.200.210-192.168.200.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge_troncal name=dhcpLanRed
/ip ipsec mode-config
add address-pool=vpn address-prefix-length=32 name=modeconf-vpnikev2
split-include=192.168.200.0/24
/interface bridge port
add bridge=bridge_troncal comment="Troncal Vlan" interface="eth2-Trunk Vlan"
/ip neighbor discovery-settings
set discover-interface-list=none
/ip settings
set tcp-syncookies=yes
/interface l2tp-server server
set authentication=mschap1,mschap2 default-profile=ipsec_vpn
keepalive-timeout=60 use-ipsec=yes
/interface list member
add interface=ether1-WAN list=WAN
add interface=bridge_troncal list=LAN
/interface ovpn-server server
set auth=sha1 certificate=Server cipher=aes256 enabled=yes max-mtu=1460
netmask=29 require-client-certificate=yes
/interface pptp-server server
set authentication=pap,chap,mschap1,mschap2
/ip address
add address=10.10.10.1/27 interface="eth2-Trunk Vlan" network=10.10.10.0
add address=10.10.11.1/24 interface=vlan100 network=10.10.11.0
add address=10.10.12.1/24 interface=vlan101 network=10.10.12.0
add address=192.160.0.1/22 interface=vlan102 network=192.160.0.0
add address=192.160.4.1/28 interface=vlan103 network=192.160.4.0
add address=192.160.5.1/24 interface=vlan104 network=192.160.5.0
add address=192.160.6.1/24 interface=vlan105 network=192.160.6.0
add address=192.160.7.1/27 interface=vlan106 network=192.160.7.0
add address=192.160.8.1/27 interface=vlan107 network=192.160.8.0
add address=IP PUBLIC/29 interface=ether1-WAN network=181.129.XX.XX
add address=192.168.200.0/24 comment=VPN interface=bridge-loopback network=
192.168.200.0
/ip cloud
set ddns-enabled=yes
/ip dns
set allow-remote-requests=yes cache-max-ttl=10m servers=
208.67.222.222,208.67.220.220
/ip firewall filter
add action=accept chain=input comment="Aceptar conexiones seguras VPN"
dst-port=1194,1723 protocol=tcp
add action=accept chain=input comment="VPN-IKE2 IPSEC" dst-address=
IP PUBLIC dst-port=500,4500 in-interface=ether1-WAN protocol=udp
add action=accept chain=input comment="VPN-IKE2 IPSEC" dst-address=
IP PUBLIC in-interface=ether1-WAN protocol=ipsec-esp
add action=accept chain=input comment=
"IKE2: Aceptar trafico entrante al segmento VPN IKE2" in-interface=
ether1-WAN ipsec-policy=in,ipsec src-address=192.168.200.0/24
add action=accept chain=input comment=
"Permitir conexi\F3n a Winbox desde la WAN" dst-port=2525 protocol=tcp
add action=add-src-to-address-list address-list=drop_telnet
address-list-timeout=1w chain=input comment="DetectarTelnet to WAN"
dst-port=23,2323 in-interface=ether1-WAN protocol=tcp src-port=""
add action=drop chain=input comment="Bloquear Telnet detectados"
src-address-list=drop_telnet
add action=add-src-to-address-list address-list=drop_ssh
address-list-timeout=1w chain=input comment="Detectar SSH to WAN"
dst-port=22 in-interface=ether1-WAN protocol=tcp src-port=""
add action=drop chain=input comment="Bloquear SSH detectados"
src-address-list=drop_ssh
add action=add-src-to-address-list address-list=
"Ip con demasiadas conexiones" address-list-timeout=1d chain=input
comment="Lista de ip con demasiadas conexiones" connection-limit=32,32
protocol=tcp
add action=tarpit chain=input connection-limit=3,32 protocol=tcp
src-address-list="Ip con demasiadas conexiones"
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment=
"NMAP FIN Stealth escaner de puertos" protocol=tcp tcp-flags=
fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment=
"Lista de lectores de puertos" protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment="SYN/FIN escaner de puertos"
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment="SYN/RST escaner de puertos"
protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment=
"FIN/PSH/URG escaner de puertos" protocol=tcp tcp-flags=
fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment="ALL/ALL escaner de puertos"
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="Escaner de puertos"
address-list-timeout=2w chain=input comment=
"NMAP NULL escaner de puertos" protocol=tcp tcp-flags=
!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment="Bloquear escaner de puertos"
src-address-list="Escaner de puertos"
add action=drop chain=input comment="Bloquear solicitudes externas DNS"
dst-port=53 in-interface=ether1-WAN log=yes log-prefix=BlockDNSTCP
protocol=tcp
add action=drop chain=input comment="Bloquear solicitudes externas DNS"
dst-port=53 in-interface=ether1-WAN log=yes log-prefix=BlockDNSUDP
protocol=udp
add action=accept chain=input comment=
"Aceptar el tr\E1fico establecido y relacionado" connection-state=
established,related,untracked
add action=accept chain=input comment=
"Pemitir ICMP (ping) Wan - Se habilita cuando funcione ip publica"
in-interface=ether1-WAN protocol=icmp
add action=accept chain=input comment=
"Permitir UDP al router - Se habilita cuando funcione ip publica"
in-interface=ether1-WAN protocol=udp
add action=accept chain=input comment=
"Aceptar el tr\E1fico que viene de Lan y Vlan" src-address-list=RedLan
add action=drop chain=input comment="Denegar conexiones entrantes inv\E1lidas
(Se debe desactivar al actualizar mikrotik)" connection-state=invalid
in-interface=ether1-WAN log=yes log-prefix=DropInputInvalid
add action=drop chain=input comment="Denegar todos los paquetes que no tengan
una direcci\F3n IP de origen de unidifusi\F3n" log=yes log-prefix=
DropUnicast src-address-type=!unicast
add action=drop chain=input comment="Denegar conexiones restantes"
in-interface-list=!LAN log=yes log-prefix=DropInputRest
add action=accept chain=forward comment=
"IKE2: Aceptar trafico VPN IKE2 al cualquier segmento de la red local"
dst-address=0.0.0.0/0 ipsec-policy=in,ipsec src-address=192.168.200.0/24
add action=add-src-to-address-list address-list=Porno-Tracking
address-list-timeout=1w3d chain=forward comment=
"Lista de visualizadores de porno" layer7-protocol=Porno
src-address-list=RedLan
add action=drop chain=forward comment="Bloquear visualizadores de porno"
layer7-protocol=Porno src-address-list=Porno-Tracking
add action=drop chain=forward comment=
"Bloquear puerto TCP 445 - SMB - Entrada" dst-port=445,135-139
in-interface=ether1-WAN log=yes log-prefix=drop_tcp_445 protocol=tcp
add action=drop chain=forward comment=
"Bloquear puerto TCP 445 - SMB - Entrada" dst-port=445,135-139
in-interface=ether1-WAN log=yes log-prefix=drop_tcp_445 protocol=udp
add action=drop chain=forward comment=
"Bloquear puerto TCP 445 - SMB - Salida" log=yes log-prefix=drop_tcp_445
out-interface=ether1-WAN protocol=tcp src-port=445,135-139
add action=drop chain=forward comment=
"Bloquear puerto TCP 445 - SMB - Salida" log=yes log-prefix=drop_tcp_445
out-interface=ether1-WAN protocol=udp src-port=445,135-139
add action=accept chain=forward comment="Aceptar Windows Update-1"
layer7-protocol=bloquear-update-windows src-address-list=
"Permitir Windows update"
add action=accept chain=forward comment="Aceptar Windows Update-2"
layer7-protocol=bloquer-update-windows-2 log=yes log-prefix=R1
src-address-list="Permitir Windows update"
add action=accept chain=forward comment="Aceptar Windows Update-3"
dst-address-list="Windows Update" src-address-list=
"Permitir Windows update"
add action=drop chain=forward comment="Bloquear Actualizaciones Windows-1"
layer7-protocol=bloquear-update-windows log=yes log-prefix=BloqUpdate
src-address-list=RedLan
add action=drop chain=forward comment="Bloquear Actualizaciones Windows-2"
layer7-protocol=bloquer-update-windows-2 log=yes log-prefix=BloqUpdate-2
src-address-list=RedLan
add action=drop chain=forward comment="Bloquear Actualizaciones Windows-3"
dst-address-list="Windows Update" log=yes log-prefix=BloqUpdate-3
src-address-list=RedLan
add action=accept chain=forward comment=
"Permitir conexiona Impresoras Publicas" dst-address-list=
ImpresorasPublicas src-address-list=PermitidosImpresora
add action=drop chain=forward comment="Aislar Administraci\F3n de red"
connection-state=new dst-address-list="Administracion de red" log=yes
log-prefix=DropRedAdmon src-address-list=Vlans
add action=accept chain=forward comment=
"Aceptar conexiones establecidas y relacionadas la red interna"
connection-state=established,related
add action=drop chain=forward comment=
"Denegar conexiones invalidas a la red interna" connection-state=invalid
log=yes log-prefix=ForwardDrop
add action=drop chain=forward comment=
"Denegar conexiones no NAT hacia la red local" connection-nat-state=
!dstnat connection-state=new in-interface=ether1-WAN log=yes log-prefix=
Dropno_NAT
add action=drop chain=forward comment=
"Denegar conexiones a los clientes a una ip privada no existente"
in-interface-list=LAN log=yes log-prefix=ForwardDrop src-address-list=
!RedLan
add action=accept chain=forward comment="Aceptar trafico hacia los clientes"
/ip firewall mangle
add action=log chain=prerouting dst-address=192.168.200.0/24 src-address=
192.168.200.0/24
add action=log chain=postrouting dst-address=192.168.200.0/24 src-address=
192.168.200.0/24
add action=mark-packet chain=prerouting comment="Red WiFi" new-packet-mark=
WiFi_Upload passthrough=yes src-address=192.160.0.0/22
add action=mark-packet chain=postrouting dst-address=192.160.0.0/22
new-packet-mark=WiFi_Down passthrough=yes
add action=mark-packet chain=prerouting comment="Sala Sistemas"
new-packet-mark=Sistemas_Upload passthrough=yes src-address=10.10.12.0/24
add action=mark-packet chain=postrouting dst-address=10.10.12.0/24
new-packet-mark=Sistemas_Down passthrough=yes
add action=change-mss chain=forward comment="IKE2:Cambia MSS" ipsec-policy=
in,ipsec new-mss=1360 passthrough=yes protocol=tcp src-address=
10.0.88.0/24 tcp-flags=syn tcp-mss=!0-1360
add action=change-mss chain=forward comment="IKE2:Cambia MSS" dst-address=
10.0.88.0/24 ipsec-policy=out,ipsec new-mss=1360 passthrough=yes
protocol=tcp tcp-flags=syn tcp-mss=!0-1360
/ip firewall nat
add action=masquerade chain=srcnat comment="MSQRD IKE2->WAN" ipsec-policy=
out,none out-interface=ether1-WAN src-address=192.168.200.0/24
add action=src-nat chain=srcnat comment="SRC-NAT IKE2->WAN" ipsec-policy=
out,none out-interface=ether1-WAN src-address=192.168.200.0/24
to-addresses=IP PUBLIC
add action=masquerade chain=srcnat comment="Nateo - Red Local" out-interface=
ether1-WAN
add action=dst-nat chain=dstnat dst-port=53 protocol=udp to-addresses=
10.10.10.1 to-ports=53
add action=dst-nat chain=dstnat dst-port=8180 in-interface=ether1-WAN
protocol=tcp to-addresses=10.10.10.1 to-ports=8180
/ip ipsec identity
add auth-method=digital-signature certificate=91d80a945dea.sn.mynetname.net
generate-policy=port-strict match-by=certificate mode-config=
modeconf-vpnikev2 peer="servidor ikev2" policy-template-group=
"group ike2" remote-certificate=c2@91d80a945dea.sn.mynetname.net
remote-id=user-fqdn:c2@91d80a945dea.sn.mynetname.net
add auth-method=digital-signature certificate=91d80a945dea.sn.mynetname.net
generate-policy=port-strict match-by=certificate mode-config=
modeconf-vpnikev2 peer="servidor ikev2" policy-template-group=
"group ike2" remote-certificate=c1@91d80a945dea.sn.mynetname.net
remote-id=user-fqdn:c1@91d80a945dea.sn.mynetname.net
/ip ipsec policy
set 0 disabled=yes dst-address=0.0.0.0/0 src-address=0.0.0.0/0
add dst-address=192.168.200.0/24 group="group ike2" proposal=proposal-ikev2
src-address=0.0.0.0/0 template=yes
