Sindy,
and I thought this would be easy!! Thanks for looking.
There are two problems:
- How to ping from one router to another - The ping says “Host Unreachable” and names the WAN address
- How to default the Sub Office so all internet traffic goes though the main office.
The two router configs have morphed over time as I’ve added bits in They are:
Black - The Main Office Router
# aug/21/2018 10:30:36 by RouterOS 6.42.7
# software id = KAE3-NN91
#
# model = RouterBOARD D52G-5HacD2HnD-TC
/interface bridge
add admin-mac=CC:GG:HH:1D:7A arp=proxy-arp auto-mac=no comment=defconf name=bridge
/interface l2tp-server
add name=l2tp-in-W10_Laptop user=W10_Laptop
add name=l2tp-in-Nexus user=Nexus
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n disabled=no distance=indoors frequency=2447 mode=ap-bridge ssid=SSID wireless-protocol=802.11
set [ find default-name=wlan2 ] band=5ghz-a/n/ac country="united kingdom" disabled=no distance=indoors frequency=5200 mode=ap-bridge ssid=SSID-B5 wireless-protocol=802.11
add disabled=no mac-address=CE:2D:E0:EB:1D:7F master-interface=wlan1 name=wlan3 ssid=SSID-B2 wds-default-bridge=bridge wps-mode=disabled
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512,sha256,sha1 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc,3des
/ip pool
add name=dhcp ranges=192.168.64.2-192.168.64.100
add name=vpn-pool ranges=192.168.99.2-192.168.99.100
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name="Default DHCP Server"
/ppp profile
set *0 local-address=192.168.64.1 remote-address=dhcp
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set authentication=mschap2 default-profile=default enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=l2tp-in-W10_Laptop list=LAN
add interface=l2tp-in-Nexus list=LAN
/ip address
add address=192.168.64.1/24 comment="defconf" interface=bridge network=192.168.64.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.64.0/24 comment=defconf gateway=192.168.64.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=208.67.222.222,208.67.220.220
/ip dns static
add address=192.168.88.1 name=router.lan
add address=192.168.64.1 name=router.lan
/ip firewall address-list
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment="6to4 relay Anycast [RFC 3068]" list=not_in_internet
add address=172.105.193.147 comment=malc0de list=blacklist
add address=31.177.78.96 comment=malc0de list=blacklist
/ip firewall filter
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log-prefix="Track invalid"
add action=drop chain=input comment="Drop input from blacklist" log-prefix="Track Drop input from blacklist" src-address-list=blacklist
add action=drop chain=forward comment="Drop incoming from internet which is not public IP" in-interface-list=WAN log=yes log-prefix="Track !public" src-address-list=not_in_internet
add action=drop chain=forward comment="Drop from Blacklist sites" log=yes log-prefix="Track Blacklist In:" src-address-list=blacklist
add action=drop chain=forward comment="Drop to Blacklist sites" dst-address-list=blacklist log=yes log-prefix="Track Blacklist Out"
add action=drop chain=output comment="Drop from Router to blacklist sites" dst-address-list=blacklist log=yes log-prefix="Track blacklist out from router"
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="TCP flags and Port 0 attacks" protocol=tcp tcp-flags=!fin,!syn,!rst,!ack
add action=drop chain=forward protocol=tcp tcp-flags=fin,syn
add action=drop chain=forward protocol=tcp tcp-flags=fin,rst
add action=drop chain=forward protocol=tcp tcp-flags=fin,!ack
add action=drop chain=forward protocol=tcp tcp-flags=fin,urg
add action=drop chain=forward protocol=tcp tcp-flags=syn,rst
add action=drop chain=forward protocol=tcp tcp-flags=rst,urg
add action=drop chain=forward protocol=tcp src-port=0
add action=accept chain=input comment=VPN log-prefix="Track VPN" port=1701,500,4500 protocol=udp
add action=accept chain=input comment=VPN protocol=ipsec-esp
add action=accept chain=input protocol=icmp
add action=accept chain=input comment="accept input established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN log-prefix="Track input not from LAN"
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=input comment="Drop everything else that has got through" in-interface-list=WAN log=yes log-prefix="Last rule"
/ip firewall nat
add action=accept chain=srcnat comment=MyVPN dst-address=192.168.65.0/24 src-address=192.168.64.0/24
add action=accept chain=dstnat comment=MyVPN dst-address=192.168.64.0/24 src-address=192.168.65.0/24
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip firewall raw
add action=notrack chain=prerouting dst-address=192.168.64.0/24 src-address=192.168.65.0/24
add action=notrack chain=prerouting dst-address=192.168.65.0/24 src-address=192.168.64.0/24
/ip ipsec peer
add address=xx.xx.xx.xx/32 comment=MyVPN dh-group=modp4096 enc-algorithm=aes-256,aes-128,3des exchange-mode=ike2 hash-algorithm=sha512
/ip ipsec policy
add comment=MyVPN dst-address=192.168.65.0/24 sa-dst-address=xx.xx.xx.xx sa-src-address=0.0.0.0 src-address=192.168.64.0/24 tunnel=yes
/ip route
add comment=MyVPN distance=1 dst-address=192.168.65.0/24 gateway=ether1
/ip service
set telnet disabled=yes
set ftp disabled=yes
/ppp secret
add name=W10_Laptop
add name=Nexus
/system clock
set time-zone-name=Europe/London
/system identity
set name="Black MikroTik"
/system logging
set 0 disabled=yes
add topics=firewall
add disabled=yes topics=e-mail
add topics=account
add disabled=yes topics=dhcp,info
add topics=script
add topics=ipsec,info
add topics=l2tp,info
add topics=ppp,info
add topics=ssh,info
add topics=interface
/system ntp client
set enabled=yes primary-ntp=80.86.38.193 secondary-ntp=108.61.73.243
/tool netwatch
add comment=ipsec-peer-update-MyVPN down-script="/system scheduler enable ipsec-peer-update-MyVPN\n/system scheduler enable ip-cloud-forceupdate" host=192.168.65.1 up-script="/system scheduler disable ip-cloud-forceupdate\n/system scheduler disable ipsec-peer-update-MyVPN"
Red - Sub Office
# aug/21/2018 11:21:04 by RouterOS 6.42.6
# software id = 65FW-3KRA
#
# model = 2011UiAS-2HnD
/interface l2tp-server
add name=l2tp-in-W10_Laptop user=W10_Laptop
add name=l2tp-in-Nexus user=Nexus
/interface bridge
add admin-mac=4C:5E:0C:B8:9D:92 arp=proxy-arp auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether1 ] name="ether1"
set [ find default-name=ether2 ] advertise=10M-half,10M-full,100M-half,100M-full name=ether2
set [ find default-name=ether3 ] name="ether3"
set [ find default-name=ether4 ] advertise=10M-half,10M-full,100M-half,100M-full name="ether4"
set [ find default-name=ether6 ] name="ether6"
set [ find default-name=ether7 ] name="ether7"
set [ find default-name=sfp1 ] disabled=yes
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-g/n country="united kingdom" disabled=no distance=indoors frequency=2472 l2mtu=1598 mode=ap-bridge name=wlan1-2G ssid=SSID1 wireless-protocol=802.11 wps-mode=disabled
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add exclude=dynamic name=discover
add name=mactel
add name=mac-winbox
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk eap-methods="" mode=dynamic-keys supplicant-identity=MikroTik
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512,sha256,sha1 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc,3des
/ip pool
add name=dhcp ranges=192.168.65.2-192.168.65.100
add name=vpn-pool ranges=192.168.99.2-192.168.99.100
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge lease-time=1h name="Default DHCP Server"
/ppp profile
set *0 local-address=192.168.65.1 remote-address=dhcp
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface="ether6"
add bridge=bridge comment=defconf hw=no interface=sfp1
add bridge=bridge comment=defconf interface=wlan1-2G
add bridge=bridge interface=*13
add bridge=bridge interface="ether3"
add bridge=bridge interface="ether4"
add bridge=bridge interface=ether5
add bridge=bridge interface="ether7"
add bridge=bridge interface=ether8
add bridge=bridge interface=ether9
add bridge=bridge interface=ether10
/ip neighbor discovery-settings
set discover-interface-list=discover
/interface l2tp-server server
set authentication=mschap2 default-profile=default enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface="ether1" list=WAN
add interface=l2tp-in-W10_Laptop list=LAN
add interface=l2tp-in-Nexus list=LAN
add interface=wlan1-2G list=discover
add interface=sfp1 list=discover
add interface=ether2 list=discover
add interface="ether3" list=discover
add interface="ether4" list=discover
add interface=ether5 list=discover
add interface="ether6" list=discover
add interface="ether7" list=discover
add interface=ether8 list=discover
add interface=ether9 list=discover
add interface=ether10 list=discover
add interface=bridge list=discover
add list=discover
add interface=bridge list=mactel
add interface=bridge list=mac-winbox
/interface wireless access-list
add mac-address=94:9F:3E:18:18:5E
add mac-address=B8:E9:37:5E:50:BA
/ip address
add address=192.168.65.1/24 comment=defconf interface=bridge network=192.168.65.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface="ether1"
/ip dhcp-server network
add address=192.168.65.0/24 comment=defconf gateway=192.168.65.1 netmask=24
/ip dns
set servers=208.67.222.222,208.67.220.220
/ip dns static
add address=192.168.65.1 name=router.lan
/ip firewall address-list
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment="6to4 relay Anycast [RFC 3068]" list=not_in_internet
add address=62.4.10.157 comment=malc0de list=blacklist
add address=213.202.218.77 comment=malc0de list=blacklist
/ip firewall filter
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=drop chain=forward comment=CameraOut dst-address=!192.168.64.0/24 log=yes log-prefix=CameraOut: out-interface-list=WAN src-address-list=Camera
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked log-prefix=Previous
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log=yes log-prefix="Track invalid"
add action=drop chain=input comment="Drop incoming to router from my Blacklist" in-interface-list=WAN log=yes log-prefix="Track My Blacklist In:" src-address-list=blacklist
add action=drop chain=forward comment="Drop incoming from internet whiis not public IP" in-interface-list=WAN log=yes log-prefix="Track !public" src-address-list=not_in_internet
add action=drop chain=forward comment="Drop incoming from Blacklist site" in-interface-list=WAN log=yes log-prefix="Track Blacklist In:" src-address-list=blacklist
add action=drop chain=forward comment="To stop things getting out to Blacklist sites" dst-address-list=blacklist log=yes log-prefix="Track Blacklist Out" out-interface-list=WAN
add action=drop chain=output comment="Drop from Router to Blacklist sites" dst-address-list=blacklist log=yes log-prefix="Track blacklist out from router" out-interface="ether1 To VM"
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN log=yes log-prefix="defconf: drop all from WAN not DSTNATed"
add action=drop chain=forward comment="TCP flags and Port 0 attacks" log=yes log-prefix="TCP flags and Port 0 attacks" protocol=tcp tcp-flags=!fin,!syn,!rst,!ack
add action=drop chain=forward comment="TCP Flag1" log=yes log-prefix="TCP Flag1" protocol=tcp tcp-flags=fin,syn
add action=drop chain=forward comment="TCP Flag2" log=yes log-prefix="TCP Flag1" protocol=tcp tcp-flags=fin,rst
add action=drop chain=forward comment="TCP Flag3" log=yes log-prefix="TCP Flag3" protocol=tcp tcp-flags=fin,!ack
add action=drop chain=forward comment="TCP Flag4" log=yes log-prefix="TCP Flag4" protocol=tcp tcp-flags=fin,urg
add action=drop chain=forward log=yes log-prefix="TCP Flag5" protocol=tcp tcp-flags=syn,rst
add action=drop chain=forward protocol=tcp tcp-flags=rst,urg
add action=drop chain=forward protocol=tcp src-port=0
add action=accept chain=input comment=VPN log-prefix="Track VPN" port=1701,500,4500 protocol=udp
add action=accept chain=input comment=VPN protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="accept input established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop all not coming from LAN" disabled=yes in-interface-list=!LAN log-prefix="Track input not from LAN"
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=input comment="Drop everything else that has got through" in-interface-list=WAN log=yes log-prefix="Last rule"
/ip firewall nat
add action=accept chain=srcnat comment=MyVPN dst-address=192.168.64.0/24 src-address=192.168.65.0/24
add action=accept chain=dstnat comment=MyVPN dst-address=192.168.65.0/24 src-address=192.168.64.0/24
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat out-interface="ether1"
/ip firewall raw
add action=notrack chain=prerouting dst-address=192.168.65.0/24 src-address=192.168.64.0/24
add action=notrack chain=prerouting dst-address=192.168.64.0/24 src-address=192.168.65.0/24
/ip ipsec peer
add address=xx.xx.xx.xx/32 comment=MyVPN dh-group=modp4096 enc-algorithm=aes-256,aes-128,3des exchange-mode=ike2 hash-algorithm=sha512
/ip ipsec policy
add comment=MyVPN dst-address=192.168.64.0/24 sa-dst-address=xx.xx.xx.xx sa-src-address=0.0.0.0 src-address=192.168.65.0/24 tunnel=yes
/ip route
add comment=MyVPN disabled=no distance=1 dst-address=192.168.64.0/24 gateway="ether1"
/ppp secret
add name=W10_Laptop
add name=Nexus
/system clock
set time-zone-name=Europe/Paris
/system identity
set name="Red MikroTik"
/system logging
set 0 disabled=yes
add topics=firewall
add disabled=yes topics=e-mail
add topics=account
add disabled=yes topics=dhcp,info
add topics=script
add topics=ipsec,info
add topics=l2tp,info
add topics=ppp,info
add topics=ssh,info
add topics=interface
/system ntp client
set enabled=yes primary-ntp=80.86.38.193 secondary-ntp=108.61.73.243
/system routerboard settings
set silent-boot=no
/tool netwatch
add comment=ipsec-peer-update-MyVPN down-script="/system scheduler enable ipsec-peer-update-MyVPN\n/system scheduler enable ip-cloud-forceupdate" host=192.168.64.1 up-script="/system scheduler disable ip-cloud-forceupdate\n/system scheduler disable ipsec-peer-update-MyVPN"