-The easiest way to accomplish what you wish is to separate etheport5 from the rest of the subnets.
-There are two ways to accomplish this.
one bridge and ethport 5 off the bridge with its own address.
one bridge and two vlans
We will do the first one........
-Remove default IP DNS STATIC entry
-Remove the last rule in forward chain and will replace with appropriate rules. "defconf: drop all from WAN not DSTNATed"
- I am assuming there is NO local traffic between ether5 users and bridge LAN users. PLEASE CONFIRM!!!
( those going out wireguard dont need to talk to ether5 users and similarly ether5 users to do not need to reach wireguard users)
-wireguard route out table main is not required, it is created automatically when creating the IP address for wireguard, you are missing other items.
-missing IP route for local WAN ???
-Did the 3rd party VPN provider give you a DNS address to use???? Please confirm.
jun/03/2024 19:29:37 by RouterOS 7.9.2
model = RB952Ui-5ac2nD
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
add name=dhcp-local ranges=192.168.99.10-192.168.99.254
/ip dhcp-server
add address-pool=dhcp interface=bridge name=defconf
add address-pool=dhcp interface=ether5 name=port5
/interface list member
add comment=defconf interface=bridge list=LAN
add interface=ether5 list=LAN
add comment=defconf interface=ether1 list=WAN
/interface wireguard peers
add allowed-address=0.0.0.0/0 comment=wg2 endpoint-address=...
endpoint-port=____ interface=wireguard1 public-key=
"_______" persistent-keep-alive=35s
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=
192.168.88.0
add address=192.168.99.1/24 comment="ether5 local traffic" network=192.168.99.0
add address=10.65.135.144**/24** comment=wg1 interface=wireguard1 network=
10.65.135.0
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=
192.168.88.1
add address=192.168.99.0/24 comment=defconf dns-server=192.168.99.1 gateway=
192.168.99.1
/ip firewall filter
.............
.............
.............
add action=accept chain=forward comment="internet traffic" in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="users out wireguard" src-address=192.168.88.0/24 out-interface=wireguard1
add action=accept chain=forward comment="port forwarding" connection-nat-state=dstnat
add action=drop chain=forward comment="drop all else"
/routing table
add fib name=use-WG
/ip route
add dst-address=0.0.0.0/0 gateway=ISP-gatewayIP routing-table=main
add dst-address=0.0.0.0/0 gateway=wireguard1 routing-table=use-WG
/routing rule
add src-address=192.168.88.0/24 action=lookup table=use-WG.
NOTE: if you never want the bridge users to be able to access the local WAN, IF the wireguard tunnel is broken, then change action to action=lookup-only-in-table