Essentially the same advice Cat12 just provided a little more detailed:
/interface bridge
add name=bridge1
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
OK.
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
ether1 needs to be made independent (removed from bridge).
/interface list member
add interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=bridge1 list=LAN
You are going to have only two interfaces, a single one (ether1) which is WAN and a grouped one (bridge1) that is LAN (and includes ether2-5)
/ip dhcp-client
add interface=> bridge1 > > ether1
the dhcp client should get an IP from the ISP for ether1
/system identity
set name=Mikrotik
/system note
set show-at-login=no
OK.
Before physically connecting ether1 to the internet, do add the default firewall settings:
/ip firewall filter
add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
add chain=input action=drop connection-state=invalid comment="defconf: drop invalid"
add chain=input action=accept protocol=icmp comment="defconf: accept ICMP"
add chain=input action=accept dst-address=127.0.0.1 comment="defconf: accept to local loopback (for CAPsMAN)"
add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
add chain=forward action=accept ipsec-policy=in,ipsec comment="defconf: accept in ipsec policy"
add chain=forward action=accept ipsec-policy=out,ipsec comment="defconf: accept out ipsec policy"
add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack"
add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"
add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not DSTNATed"
Then you need to add an address to the bridge (that will be the gateway for the devices on the LAN).
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
Usually a DHCP server is configured on the bridge, so that devices connected on the LAN side will automatically get from it their address and gateway (and DNS):
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
Then you need a firewall nat rule to make the LAN devices be natted to the the WAN:
/ip firewall nat
add action=masquerade chain=srcnat comment=masquerade ipsec-policy=out,none out-interface-list=WAN
Please do study the provided corrections before applying the changes, you need to understand what they do, rather than blindly applying them.
They should be enough to get you a very basic configuration.
A good idea would be (if you don’t really-really need it) to take also ether5 out of the bridge, assign to it a static address in a /30 network and have it as a dedicated “management” port, so that later you can improve the security of your setup without risking to be locked out of the router, example (once ether5 is removed from the bridge):
/interface list
add comment=Management name=MGMT
/interface list member
add interface=ether5 list=LAN
add interface=ether5 list=MGMT
/ip address
add address=192.168.65.1/30 interface=ether5 network=192.168.65.0
The above will allow connection from a PC with a static IP of 192.168.65.2 that later can be made the only access (you will need to add an accept rule in firewall filter for in-interface-list=MGMT placed before the drop one for !LAN) .
Be very careful, the port (if the interface is independent) or the bridge (if the interface is part of a bridge) MUST be part of the LAN in /interface list member otherwise the default firewall rule:
add chain=input action=drop in-interface-list=!LAN comment=“defconf: drop all not coming from LAN”
could lock you out of the router access .