You’re not forgotten, but this is my voluntary activity and I have more than enough else to do these days. And you’ve said you are a beginner so reddit-style brief hints don’t help much.
So below is a config to be set on a router with no configuration at all. Which is not the same as a router with a factory default configuration. As factory default configuration differs between SOHO models and enterprise/ISP ones, an RB4011 and a CCR1008 in particular come with different factory default configurations. You have to merge the settings below with what you find in the router when you start setting it up manually; once you fine-tune the configuration, you can use it during netinstall or you can place it to a file which survives a reboot (this should not require any special measures at RB4011 nor CCR1008), named e.g. my-generic-config.rsc, and then run /system reset-configuration no-defaults=yes keep-users=yes run-after-reset=my-generic-config.rsc.
Do not connect the router to internet before setting up the configuration, especially the firewall rules. Once you configure it completely, you can enable the only rule in firewall filter which is highlighted in red below, test that you are able to open a new management connection even with that rule enabled, and if you can, you can connect ether1 to an internet uplink. The assumption is that the uplink assigns an address to the device using DHCP, along with a gateway IP and DNS server(s).
After you check that the device can be accessed via the management tunnel, you can disable the firewall rule highlighted in blue, thus disabling management access from LAN ports.
/interface list
add name=WAN
add name=LAN
add name=MGMT
add name=CORP
/interface bridge
add name=bridge
/interface bridge port
add bridge=bridge interface=ether2
add bridge=bridge interface=ether3
…some more similar lines here depending on the actual ports available on your router…
/ip firewall filter
add chain=input connection-state=established,related,untracked action=accept
add chain=input connection-state=invalid action=drop
add chain=input protocol=icmp action=accept
add chain=input in-interface-list=LAN protocol=tcp dst-port=53 action=accept
add chain=input in-interface-list=LAN protocol=udp dst-port=53 action=accept
add chain=input protocol=tcp dst-port=22,443,8291 in-interface-list=MGMT action=accept
add chain=input in-interface-list=LAN dst-port=22,443,8291 in-interface-list=LAN action=accept
add chain=input action=drop disabled=yes
add chain=forward connection-state=established,related,untracked action=accept
add chain=forward connection-state=invalid action=drop
add chain=forward in-interface-list=LAN out-interface-list=WAN action=accept
add chain=forward in-interface-list=LAN out-interface-list=CORP action=accept
add chain=forward action=drop
/ip firewall nat
add action=masquerade out-interface-list=WAN
/interface l2tp-client
add name=management connect-to=management.server.tld disabled=no ipsec-secret=averysecretpassphrase use-ipsec=yes user=not-set-yet password=notsoimportant
add name=corporate connect-to=corporate.server.tld disabled=no ipsec-secret=anotherverysecretone use-ipsec=yes user=not-set-yet password=maybeabitsimpler
/interface list member
add list=WAN interface=ether1
add list=LAN interface=bridge
add list=MGMT interface=management
add list=CORP interface=corporate
/ip dns
set allow-remote-requests=yes
/ip dhcp-client
add interface=ether1 disabled=no
/ip address
add address=192.168.15.1/24 interface=bridge
/ip pool add
name=lan1 ranges=192.168.15.20-192.168.15.254
/ip dhcp-server network add address=192.168.15.0/24 gateway=192.168.15.1 dns-server=192.168.15.1
/ip dhcp-server add name=lan interface=bridge address-pool=lan1 disabled=no
/ip route
add dst-address=10.200.0.0/16 gateway=management
add dst-address=192.168.0.0/16 gateway=corporate
/system script
add name=set-username source=“/interface l2tp-client set [find] user=[/system routerboard get serial-number] ; /system scheduler disable set-username”
/system scheduler
add interval=1m name=set-username on-event=set-username start-date=jan/01/2021 start-time=00:00:00
With use-ipsec=yes, the L2TP client configuration above will create the IPsec configurations for the L2TP connections dynamically, using the default profile and default proposal. So it makes sense to modify the default profile and default proposal to contain the most advanced encryption and authentication algorithms supported in hardware on the devices you are going to use, and align the server side settings with these algorithms. You can configure the IPsec part completely manually, but that’s another can of worms.
As you seem to intend to use this as a template solution to be repeated with several enterprise clients, rest assured that one day you’ll meet a client that will use 10.200.0.0/16 in their internal network. At that moment, you’ll have to deal with VRF (virtual routing and forwarding) functionality, allowing the hosts in LAN to use a dedicated routing table different from the one used by the Mikrotik device itself for its own traffic.