Ah yes indeed I didn’t noticed that yet. I double checked and yes on site A only those NAT rules exist. I also checked the firewall, nothing for port 5678. I also checked the Neighbour settings, it was set to pretty much every interface, I changed it to “none” and yet that still did not stop those queries.
Both routers are running 6.47.4 (the latest version at the time of writing). I tried to keep the configs as intact as possible but I did remove some information. To give you some context. The config of site A is ‘old’ (when I first started with Mikrotik). Site B is brand-new (this weekend). So B is hopefully much more clean. Site A will follow perhaps next weekend. That might also be the moment when I switch away from PPTP. When I configured that (I guess about 8-10 years ago?) that was perfectly fine
The config for A is explicitly allow and explicitly block, the config for B is really allow a few things and block everything else.
Here is the config from site A:
/interface bridge
add admin-mac=D4:xx arp=proxy-arp auto-mac=no fast-forward=no mtu=1500 name=bridge-local
/interface ethernet
set [ find default-name=ether1 ]
set [ find default-name=ether2 ]
set [ find default-name=ether3 ]
set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether5 ] speed=100Mbps
set [ find default-name=ether6 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full name=ether6-master-local
set [ find default-name=ether7 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full name=ether7-slave-local
set [ find default-name=ether8 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full name=ether8-slave-local
set [ find default-name=ether9 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full name=ether9-slave-local
set [ find default-name=ether10 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full name=ether10-gateway
set [ find default-name=sfp1 ] disabled=yes name=sfp1-gateway
/interface pptp-client
add connect-to=homev4.some-domain.nl disabled=no name=siteB-vpn user=mortel
add connect-to=office.unrelated.net max-mru=1400 max-mtu=1400 name=unrelated-vpn user=xx
/interface 6to4
add clamp-tcp-mss=no comment="no longer in use" disabled=yes !keepalive local-address=xx mtu=1280 name=ipv6-tunnel remote-address=xx
/interface list
add exclude=dynamic name=discover
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk eap-methods="" group-ciphers=tkip,aes-ccm mode=dynamic-keys supplicant-identity=MikroTik unicast-ciphers=tkip,aes-ccm
add authentication-types=wpa-psk,wpa2-psk eap-methods="" management-protection=allowed name=UNSECURED supplicant-identity=""
add authentication-types=wpa-psk eap-methods="" group-ciphers=tkip management-protection=allowed mode=dynamic-keys name=LOL_WPA supplicant-identity="" unicast-ciphers=tkip
add authentication-types=wpa-eap,wpa2-eap eap-methods=eap-ttls-mschapv2 group-ciphers=tkip,aes-ccm mode=dynamic-keys mschapv2-username=xx name=Ziggo radius-eap-accounting=yes radius-mac-mode=as-username-and-password \
supplicant-identity=xx unicast-ciphers=tkip,aes-ccm
add authentication-types=wpa2-psk eap-methods="" group-ciphers=tkip,aes-ccm management-protection=allowed mode=dynamic-keys name=mattie_ap supplicant-identity="" unicast-ciphers=tkip,aes-ccm
add authentication-types=wpa2-psk eap-methods="" management-protection=allowed mode=dynamic-keys name=buren supplicant-identity=""
add authentication-types=wpa2-psk eap-methods="" management-protection=allowed mode=dynamic-keys name=some-domain.nl supplicant-identity=""
/interface wireless
set [ find default-name=wlan1 ] antenna-gain=0 band=2ghz-b/g/n channel-width=20/40mhz-eC country=no_country_set disabled=no distance=indoors frequency=auto mode=ap-bridge security-profile=some-domain.nl ssid=some-domain.nl \
station-roaming=enabled tx-power-mode=all-rates-fixed wps-mode=disabled
/ip hotspot profile
set [ find default=yes ] dns-name=hotspot.xx.nl hotspot-address=192.168.13.1
/ip hotspot user profile
set [ find default=yes ] rate-limit=512000/512000 transparent-proxy=yes
add name=traag rate-limit=1024000/1024000 transparent-proxy=yes
add name=registered_user transparent-proxy=yes
add name="TRIAL USER" rate-limit=1M/1M transparent-proxy=yes
add !idle-timeout !keepalive-timeout name=MEETING rate-limit=1M/1M shared-users=unlimited transparent-proxy=yes
/ip hotspot profile
add dns-name=hotspot.xx.nl hotspot-address=192.168.13.1 login-by=cookie,http-chap,trial name=hsprof1 trial-uptime-limit=1d trial-uptime-reset=15m trial-user-profile=MEETING use-radius=yes
add dns-name=bqq.xx.hwi hotspot-address=192.168.13.1 login-by=cookie,http-chap,trial name=MEETING trial-uptime-limit=1d trial-uptime-reset=15m trial-user-profile=MEETING use-radius=yes
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=3des
/ip pool
add name=default-dhcp ranges=192.168.1.10-192.168.1.200
add name=dhcp ranges=192.168.1.1-192.168.1.200
add name=pool_hotspot ranges=192.168.13.13-192.168.13.113
add name=pool_vpn_no_internal ranges=172.30.30.30-172.30.30.130
add name=MEETING ranges=192.168.14.14-192.168.14.114
add name=dhcp_pool6 ranges=192.168.1.2-192.168.1.254
/ip dhcp-server
add address-pool=default-dhcp authoritative=after-2sec-delay disabled=no interface=bridge-local lease-time=1h name=default
add address-pool=pool_hotspot authoritative=after-2sec-delay lease-time=3d name=dhcp_gast
add address-pool=dhcp_pool6 authoritative=after-2sec-delay interface=bridge-local name=dhcp1 relay=192.168.1.1
/ip hotspot
add address-pool=pool_hotspot disabled=no name=hotspot1 profile=hsprof1
add address-pool=MEETING addresses-per-mac=25 name=MEETING profile=MEETING
/ipv6 dhcp-server
add address-pool=pool1 disabled=yes interface=bridge-local name=ipv6_dhcp
/ipv6 pool
add name=pool1 prefix=fdda:e376:9bf2:8ff0::/64 prefix-length=64
/port
set 1 baud-rate=9600 data-bits=8 flow-control=none name=usb2 parity=none stop-bits=1
/interface ppp-client
add apn=internet.arta default-route-distance=2 dial-on-demand=no name=ppp-out1 phone=*99# port=usb2 use-peer-dns=no
/ppp profile
add change-tcp-mss=yes incoming-filter=vpn_filter_internal local-address=pool_vpn_no_internal name=no_internal remote-address=pool_vpn_no_internal use-encryption=yes
add incoming-filter=vpn_filter_internal local-address=default-dhcp name=vpn_internal remote-address=default-dhcp use-ipv6=default
/queue simple
add burst-time=20s/20s disabled=yes dst=ppp-out1 max-limit=256k/256k name=queue2 target=192.168.1.2/32
add burst-limit=512k/512k burst-time=10s/10s disabled=yes dst=ppp-out1 max-limit=128k/128k name=queue1 target=bridge-local
/snmp community
set [ find default=yes ] addresses=127.0.0.1/32
add addresses=1.2.3.4/32,192.168.178.0/24 name=nope
/system logging action
set 1 disk-lines-per-file=100
/user group
add name=guest policy=read,web,!local,!telnet,!ssh,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!sniff,!sensitive,!api,!romon,!dude,!tikapp
/interface bridge port
add bridge=bridge-local hw=no interface=ether2
add bridge=bridge-local hw=no interface=ether3
add bridge=bridge-local hw=no interface=ether4
add bridge=bridge-local hw=no interface=ether5
add bridge=bridge-local interface=ether6-master-local
add bridge=bridge-local hw=no interface=ether1
add bridge=bridge-local disabled=yes interface=wlan1
add bridge=bridge-local disabled=yes interface=*1E
add disabled=yes interface=*20
add bridge=bridge-local disabled=yes interface=xx-vpn
add bridge=bridge-local interface=wlan1
add bridge=bridge-local disabled=yes interface=ether10-gateway
add bridge=bridge-local interface=ether7-slave-local
add bridge=bridge-local interface=ether8-slave-local
add bridge=bridge-local interface=ether9-slave-local
/ip neighbor discovery-settings
set discover-interface-list=none
/interface detect-internet
set detect-interface-list=all
/interface list member
add interface=ether1 list=discover
add interface=ether2 list=discover
add interface=ether3 list=discover
add interface=ether4 list=discover
add interface=ether5 list=discover
add interface=ether6-master-local list=discover
add interface=ether7-slave-local list=discover
add interface=ether8-slave-local list=discover
add interface=ether9-slave-local list=discover
add interface=ether10-gateway list=discover
add interface=bridge-local list=discover
add interface=wlan1 list=discover
add interface=ppp-out1 list=discover
add interface=unrelated-vpn list=discover
add interface=ipv6-tunnel list=discover
add list=discover
add interface=xx-vpn list=discover
/interface pptp-server server
set enabled=yes
/ip accounting
set enabled=yes
/ip accounting web-access
set accessible-via-web=yes
/ip address
add address=192.168.1.1/24 comment="default configuration" disabled=yes interface=wlan1 network=192.168.1.0
add address=192.168.13.1/24 disabled=yes network=192.168.13.0
add address=192.168.1.1/24 interface=bridge-local network=192.168.1.0
add address=192.168.1.1/24 interface=wlan1 network=192.168.1.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment="default configuration" interface=sfp1-gateway
add comment="default configuration" interface=ether1
add default-route-distance=2 interface=wlan1
add disabled=no interface=ether10-gateway
/ip dhcp-server lease
[..redacted..]
/ip dhcp-server network
add address=192.168.1.0/32 gateway=192.168.1.0 netmask=32
add address=192.168.1.0/24 comment="default configuration" dns-server=192.168.1.1 gateway=192.168.1.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,8.8.8.8,208.67.220.220
/ip dns static
[..redacted..]
/ip firewall address-list
add address=192.168.1.0/24 list=localNet
/ip firewall filter
add action=fasttrack-connection chain=forward connection-state=established,related
add action=drop chain=input dst-port=53 protocol=udp src-address=!192.168.1.0/24
add action=accept chain=forward disabled=yes src-address=172.22.20.0/24
add action=accept chain=forward disabled=yes dst-address=172.22.20.0/24
add action=accept chain=forward disabled=yes in-interface=unrelated-vpn
add action=accept chain=forward disabled=yes out-interface=unrelated-vpn
add action=accept chain=output disabled=yes out-interface=unrelated-vpn
add action=accept chain=input disabled=yes in-interface=unrelated-vpn
add action=accept chain=input comment="snmp van serv naar router" dst-port=161 protocol=udp
add action=drop chain=forward disabled=yes src-address=192.168.1.18
add action=drop chain=forward disabled=yes dst-address=192.168.1.18
add action=passthrough chain=unused-hs-chain comment="place hotspot rules here" disabled=yes
add action=drop chain=hs-input comment="block internal access for hotspot" disabled=yes dst-address=192.168.1.0/24
add action=drop chain=pre-hs-input disabled=yes dst-address-type=local hotspot=auth
add action=drop chain=forward disabled=yes src-address=192.168.1.14
add action=drop chain=input comment="Disallow weird packets" connection-state=invalid disabled=yes
add action=accept chain=input comment="Allow LAN access to the router itself" connection-state=new in-interface=bridge-local
add action=accept chain=input comment=" ^^ that originated from LAN" connection-state=established
add action=accept chain=input comment=" ^^ that originated from LAN" connection-state=related
add action=passthrough chain=input comment="Custom INPUT rules:"
add action=accept chain=input comment="VPN: accept GRE" protocol=gre
add action=accept chain=input comment="accept ipv6 tunnel" src-address=xx
add action=accept chain=input comment="Allow ping ICMP from anywhere" protocol=icmp
add action=accept chain=input comment="VPN: allow port 1723" dst-port=1723 protocol=tcp
add action=accept chain=input comment="ROUTER: winbox" dst-port=8291 protocol=tcp
add action=accept chain=input comment="ROUTER: webfig" dst-port=3333 protocol=tcp
add action=accept chain=input comment="allow UPnP" dst-port=1900 protocol=udp
add action=accept chain=input comment="allow UPnP" dst-port=2828 protocol=tcp
add action=accept chain=input comment="TEMP DNS VPN xx" disabled=yes dst-port=53 protocol=udp
add action=accept chain=input comment="accept xx vpn" src-address=172.16.1.4
add action=reject chain=input dst-port=56803 protocol=tcp reject-with=icmp-network-unreachable
add action=reject chain=input dst-port=56803 protocol=udp reject-with=icmp-network-unreachable
add action=drop chain=input comment="drop strange UPnP\?\? packets through VPN" disabled=yes dst-port=1900 protocol=tcp
add action=log chain=input comment="Disallow anything from anywhere on any interface" disabled=yes log-prefix=INPUT_DROP
add action=drop chain=input comment="Disallow anything from anywhere on any interface" log-prefix="INPUT DROP"
add action=accept chain=forward comment="Allow ping ICMP from anywhere" protocol=icmp
add action=passthrough chain=forward comment=-----spacer-----
add action=accept chain=forward comment="Allow LAN access to move through the router" connection-state=new in-interface=bridge-local
add action=accept chain=forward comment=" ^^ that originated from LAN" connection-state=established in-interface=bridge-local
add action=accept chain=forward comment=" ^^ that originated from LAN" connection-state=related in-interface=bridge-local
add action=passthrough chain=forward comment="Custom bridge-local forward rules" in-interface=bridge-local
add action=drop chain=forward comment="Disallow weird packets" connection-state=invalid disabled=yes in-interface=bridge-local
add action=passthrough chain=forward comment=-----spacer-----
# in/out-interface matcher not possible when interface (wlan1) is slave - use master instead (bridge-local)
add action=accept chain=forward comment="Allow valid internet packets" connection-state=new in-interface=wlan1
add action=accept chain=forward comment="Allow valid internet packets" connection-state=new in-interface=ether10-gateway
# in/out-interface matcher not possible when interface (wlan1) is slave - use master instead (bridge-local)
add action=accept chain=forward comment="^^ - same" connection-state=established in-interface=wlan1
add action=accept chain=forward comment="^^ - same" connection-state=established in-interface=ether10-gateway
# in/out-interface matcher not possible when interface (wlan1) is slave - use master instead (bridge-local)
add action=accept chain=forward comment="^^ - same" connection-state=related in-interface=wlan1
add action=accept chain=forward comment="^^ - same" connection-state=related in-interface=ether10-gateway
# in/out-interface matcher not possible when interface (wlan1) is slave - use master instead (bridge-local)
add action=passthrough chain=forward comment="Custom ether1 forward rules" in-interface=wlan1
add action=passthrough chain=forward comment="Custom ether1 forward rules" in-interface=ether10-gateway
add action=drop chain=forward comment="Disallow weird packets" connection-state=invalid disabled=yes in-interface=wlan1
add action=drop chain=forward comment="Disallow weird packets" connection-state=invalid disabled=yes in-interface=ether10-gateway
add action=passthrough chain=forward comment=-----spacer-----
add action=jump chain=forward comment="Jump to vpn rules" jump-target=ppp log-prefix=xx
add action=passthrough chain=forward comment=-----spacer-----
add action=accept chain=forward comment="Allow all other valid stuff (should we get here\?)" connection-state=new
add action=accept chain=forward comment=" ^^ that originated from \?\?" connection-state=established
add action=accept chain=forward comment=" ^^ that originated from \?\?" connection-state=related
add action=passthrough chain=forward comment="Custom \?\? forward rules"
add action=passthrough chain=forward comment=-----spacer-----
add action=log chain=forward comment="Log dropped packets" log-prefix=FORWARD_DROP
add action=drop chain=forward comment="Disallow anything from anywhere on any interface"
add action=passthrough chain=forward comment=-----spacer-----
add action=accept chain=vpn_pptp_filter comment="Allow xx related" connection-state=related
add action=accept chain=vpn_pptp_filter comment="Allow xx established" connection-state=established
add action=accept chain=vpn_pptp_filter comment="Allow xx -> serv" dst-address=192.168.1.250
add action=accept chain=vpn_pptp_filter comment="Allow xx -> pi" dst-address=192.168.1.50
add action=drop chain=vpn_pptp_filter comment="DROP ALL OTHER VPN" disabled=yes
add action=passthrough chain=vpn_filter_internal comment=-----spacer-----
add action=accept chain=vpn_filter_internal comment="Allow all verified VPN's"
add action=accept chain=forward
/ip firewall mangle
add action=mark-routing chain=prerouting dst-address=172.22.0.0/16 new-routing-mark=unrelated-vpn passthrough=yes
/ip firewall nat
add action=passthrough chain=unused-hs-chain comment="place hotspot rules here" disabled=yes
add action=masquerade chain=srcnat comment="default configuration" disabled=yes out-interface=sfp1-gateway
add action=masquerade chain=srcnat comment=masquerade out-interface=ether10-gateway
add action=masquerade chain=srcnat comment=masquerade disabled=yes out-interface=wlan1
add action=masquerade chain=srcnat comment=masquerade disabled=yes dst-address=xx9 dst-address-list=localNet out-interface=bridge-local src-address-list=localNet
add action=masquerade chain=srcnat comment=masquerade out-interface=siteB-vpn
add action=masquerade chain=srcnat comment="masquerade hotspot network" src-address=192.168.13.0/24 to-addresses=0.0.0.0
add action=masquerade chain=srcnat comment="masquerade hotspot network" src-address=192.168.14.0/24 to-addresses=0.0.0.0
add action=accept chain=srcnat
/ip hotspot user
add name=admin profile=registered_user
add name=test profile=traag
add name=gast
/ip ipsec policy
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
/ip proxy
set cache-path=web-proxy1 max-cache-size=none port=7000
/ip route
add distance=1 dst-address=172.22.0.0/16 gateway=xx-vpn
add disabled=yes distance=1 dst-address=172.22.0.0/16 gateway=unrelated-vpn
add distance=1 dst-address=192.168.100.0/24 gateway=xx-vpn
/ip service
set telnet address=192.168.1.0/24
set ftp address=192.168.1.0/24
set www port=3333
set ssh address=192.168.1.0/24
/ip smb
set allow-guests=no enabled=yes
/ip socks
set enabled=yes port=4153
/ip socks access
add action=deny src-address=!2.2.2.2/25
/ip ssh
set allow-none-crypto=yes forwarding-enabled=remote
/ip traffic-flow
set enabled=yes
/ip traffic-flow target
add dst-address=192.168.1.50
/ip upnp
set show-dummy-rule=no
/ip upnp interfaces
add interface=bridge-local type=internal
add interface=ether1 type=external
/ipv6 address
add address=aa:bb:cc:dd::2 advertise=no comment="client ipv6 address" disabled=yes interface=ipv6-tunnel
add address=aa:bb:cc:dd::1 comment="routed /64" disabled=yes interface=bridge-local
/ipv6 firewall filter
add action=reject chain=forward comment="temp disable ipv6 till HE inlog" reject-with=icmp-no-route
add action=reject chain=forward comment="block netflix ipv6 for android player" reject-with=icmp-address-unreachable src-address=aa:bb:cc:dd:1200:ff:fe2a:df/128
add action=accept chain=input protocol=icmpv6
add action=accept chain=forward comment="accept all"
add action=accept chain=forward comment="uitgaand ipv6" in-interface=bridge-local out-interface=ipv6-tunnel
add action=accept chain=forward comment="uitgaand ipv6" out-interface=ipv6-tunnel
add action=accept chain=output comment="uitgaand ipv6"
add action=accept chain=forward comment=established connection-state=established in-interface=ipv6-tunnel out-interface=bridge-local
add action=accept chain=input comment=established connection-state=established
add action=accept chain=input comment=established protocol=icmpv6
add action=accept chain=forward comment=related connection-state=related in-interface=ipv6-tunnel out-interface=bridge-local
add action=accept chain=forward comment=serv connection-state=new dst-address=aa:bb:cc:dd:9958:14d2:68f4:85d5/128 in-interface=ipv6-tunnel
add action=accept chain=forward comment=serv connection-state=new dst-address=aa:bb:cc:dd::b00b:face/128 in-interface=ipv6-tunnel
add action=log chain=forward
add action=drop chain=forward
add action=drop chain=input
add action=log chain=output
add action=drop chain=output
/ipv6 nd
set [ find default=yes ] advertise-dns=no
/ipv6 route
add check-gateway=ping distance=1 gateway=ipv6-tunnel
add comment="ipv6 fail test rule\?" disabled=yes distance=1 gateway=1:470:1f14:787::1
add disabled=yes distance=1 dst-address=2000::/3 gateway=ipv6-tunnel
add comment="added muni storing" disabled=yes distance=1 dst-address=aa:bb:cc:1::/64 gateway=unrelated-vpn
/lcd
set default-screen=interfaces
/lcd pin
set pin-number=0000
/ppp profile
add change-tcp-mss=yes incoming-filter=vpn_pptp_filter insert-queue-before=bottom name=vpn_profile parent-queue=pptp_limit_upload use-encryption=yes
add bridge=*1F change-tcp-mss=yes name=VPN_BRIDGE use-encryption=yes
/ppp secret
add disabled=yes local-address=172.16.1.1 name=xx profile=vpn_profile remote-address=172.16.1.2 routes="192.168.2.0/24 172.16.1.2 1"
add disabled=yes local-address=172.16.1.1 name=xx profile=vpn_profile remote-address=172.16.1.3 routes="192.168.88.0/24 172.16.1.3 1"
add disabled=yes name=xx profile=no_internal
add name=xx profile=vpn_internal routes=192.168.109.0/24
add disabled=yes local-address=192.168.1.1 name=xx profile=vpn_profile remote-address=192.168.1.177
add disabled=yes name=xx profile=no_internal
add disabled=yes local-address=172.16.1.1 name=xx profile=vpn_internal remote-address=172.16.1.4 routes="192.168.100.0/24 172.16.1.4 1"
add disabled=yes local-address=172.22.1.1 name=xx profile=vpn_profile remote-address=172.16.1.5
/queue simple
add burst-time=1m/1m dst=*F0001A max-limit=5M/0 name=pptp_limit_upload target=192.168.1.250/32 time=7h-23h,sun,mon,tue,wed,thu,fri,sat total-queue=default
add burst-time=1m/1m dst=*F0001A max-limit=5M/0 name=ernst_pptp target=192.168.1.250/32 time=7h-23h,sun,mon,tue,wed,thu,fri,sat total-queue=default
/radius
add address=127.0.0.1 service=hotspot
/snmp
set enabled=yes trap-community=nope trap-version=2
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Amsterdam
/system identity
set name=mortel.home.some-domain.nl
/system logging
add prefix=GSM topics=gsm
add disabled=yes topics=debug
/system ntp client
set enabled=yes primary-ntp=217.77.132.1 secondary-ntp=82.94.196.40
/tool e-mail
set address=3.3.3.3. from=mikrotik@some-domain.nl
/tool graphing interface
add interface=ether5
add interface=ether1
add
/tool netwatch
add host=192.168.1.250
/tool sms
set allowed-number="" auto-erase=yes channel=1 port=usb2
/tool sniffer
set filter-interface=bridge-local filter-ip-address=192.168.1.0/24 filter-stream=yes streaming-server=192.168.1.2
Here is the config from site B:
/interface bridge
add admin-mac=74:xx auto-mac=no comment=defconf name=bridge-local
add name=bridge-SomeVPNProvider
add fast-forward=no name=bridge-secure
/interface ethernet
set [ find default-name=ether1 ] comment="AA "
set [ find default-name=ether2 ] comment=server
set [ find default-name=ether3 ] comment="AB ()"
set [ find default-name=ether4 ] comment="BA ()"
set [ find default-name=ether5 ] comment="CA ()"
set [ find default-name=ether6 ] comment="CB ()"
set [ find default-name=ether7 ] comment="DA ()"
set [ find default-name=ether8 ] comment="DB ()"
set [ find default-name=ether9 ] comment=switch
set [ find default-name=ether10 ] comment=PLA
/interface wireless
set [ find default-name=wlan1 ] country=netherlands disabled=no mode=ap-bridge ssid=xx-xx.nl wireless-protocol=802.11
set [ find default-name=wlan2 ] country=netherlands disabled=no frequency=auto mode=ap-bridge ssid=xx-xx.nl wireless-protocol=802.11
/interface ipip
add local-address=my.external.ip name=MyWork-tunnel remote-address=my.work.ip
/interface 6to4
add !keepalive local-address=my.external.ip mtu=1280 name=ipv6-tunnel remote-address=ipv6.tunnel.ip
/interface vlan
add interface=sfp-sfpplus1 name=vlan-internet vlan-id=300
add interface=sfp-sfpplus1 name=vlan-tv vlan-id=640
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk eap-methods="" mode=dynamic-keys supplicant-identity=MikroTik
add authentication-types=wpa2-psk comment="" eap-methods="" management-protection=allowed mode=dynamic-keys name=mattie-secure supplicant-identity=""
/ip ipsec mode-config
add connection-mark=no-mark name=SomeVPNProvider responder=no src-address-list=SomeVPNProvider
/ip ipsec peer
add address=xx.xx.com disabled=yes exchange-mode=ike2 name="SomeVPNProvider HUNGARY"
add address=xx.xx.com disabled=yes exchange-mode=ike2 name="SomeVPNProvider NL"
add address=xx.xx.com disabled=yes exchange-mode=ike2 name="SomeVPNProvider NORWAY"
/ip ipsec policy group
add name=SomeVPNProvider
/ip ipsec profile
add dh-group=modp2048 enc-algorithm=aes-256 hash-algorithm=sha256 name=muniprofile nat-traversal=no
add name=SomeVPNProvider
/ip ipsec peer
add address=my.work.ip/32 local-address=my.external.ip name=MyWork profile=muniprofile
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc,3des
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc lifetime=1h name=MyWork pfs-group=modp2048
add enc-algorithms=3des name=SomeVPNProvider pfs-group=none
/ip pool
add name=default-dhcp ranges=192.168.100.10-192.168.100.200
add comment="from mikrotik quickstart" name=vpn ranges=192.168.89.2-192.168.89.255
add name=pool_vpn_no_internal ranges=172.30.30.30-172.30.30.130
add name=pool-secure ranges=192.168.101.100-192.168.101.200
add name=SomeVPNProvider-pool ranges=192.168.102.10-192.168.102.100
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge-local name=dhcp-bridge-local
add address-pool=pool-secure authoritative=after-2sec-delay disabled=no interface=bridge-secure name=secure-dhcp
/ppp profile
add incoming-filter=vpn_filter_internal local-address=default-dhcp name=vpn_internal remote-address=default-dhcp use-ipv6=default
add change-tcp-mss=yes incoming-filter=vpn_filter_internal local-address=pool_vpn_no_internal name=no_internal remote-address=pool_vpn_no_internal use-encryption=yes
add incoming-filter=vpn_pptp_filter name=vpn_profile use-encryption=yes
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/routing bgp instance
set default as=65000 disabled=yes
add as=64515 client-to-client-reflection=no name=bgp-MyWork router-id=192.168.100.1
/snmp community
set [ find default=yes ] addresses=127.0.0.1/32
add addresses=xx.xx.xx.xx/32 name=nope
/interface pptp-client
add comment="vpn DISABLED NOT IN USE" connect-to=xx.sn.mynetname.net mrru=1600 name=vpn_mortel_OUT profile=bridge_mortel_OUT user=matthijs
/interface bridge port
add bridge=bridge-local comment=defconf interface=ether2
add bridge=bridge-local comment=defconf interface=ether3
add bridge=bridge-local comment=defconf interface=ether4
add bridge=bridge-local comment=defconf interface=ether5
add bridge=bridge-local comment=defconf interface=ether6
add bridge=bridge-local comment=defconf interface=ether7
add bridge=bridge-local comment=defconf interface=ether8
add bridge=bridge-local comment=defconf interface=ether9
add bridge=bridge-local comment=defconf interface=ether10
add bridge=bridge-local comment=defconf disabled=yes interface=sfp-sfpplus1
add bridge=bridge-local comment=defconf interface=wlan1
add bridge=bridge-local comment=defconf interface=wlan2
add bridge=bridge-local interface=ether1
/interface bridge settings
set use-ip-firewall=yes
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface detect-internet
set detect-interface-list=all
/interface l2tp-server server
set authentication=mschap1,mschap2 enabled=yes use-ipsec=yes
/interface list member
add interface=vlan-internet list=WAN
add interface=bridge-local list=LAN
add interface=ipv6-tunnel list=WAN
/interface pptp-server server
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
add address=192.168.100.1/24 interface=ether1 network=192.168.100.0
add address=172.22.19.173/30 interface=MyWork-tunnel network=172.22.19.172
add address=192.168.101.1/24 interface=bridge-secure network=192.168.101.0
add address=192.168.102.1/24 interface=bridge-SomeVPNProvider network=192.168.102.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add disabled=no interface=vlan-internet
/ip dhcp-server lease
[..redacted..]
/ip dhcp-server network
add address=192.168.100.0/24 comment=defconf dns-server=192.168.100.1 gateway=192.168.100.1 netmask=24
add address=192.168.101.0/24 gateway=192.168.101.1
add address=192.168.102.0/24 gateway=192.168.102.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,208.67.222.222,1.1.1.1,2001:4860:4860::8888,2001:470:20::2
/ip dns static
add address=192.168.100.1 comment=defconf name=router.lan
add address=192.168.100.1 name=router
[..redacted..]
/ip firewall address-list
add address=192.168.100.0/24 list=localNet
add address=192.168.102.0/24 list=SomeVPNProvider
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment="6to4 relay Anycast [RFC 3068]" list=not_in_internet
add address=192.168.100.0/24 list=lan_ip
add address=192.168.102.0/24 list=lan_ip
add address=192.168.101.0/24 list=lan_ip
add address=255.255.255.255 list=lan_ip
add address=my.external.ip list=externalip
/ip firewall filter
add action=fasttrack-connection chain=forward comment="fasttrack established / related" connection-state=established,related
add action=fasttrack-connection chain=forward dst-address=192.168.100.0/24 src-address=192.168.100.0/24
add action=fasttrack-connection chain=forward src-address=192.168.100.0/24
add action=accept chain=input comment="accept pings" protocol=icmp
add action=accept chain=input comment="accept input established" connection-state=established,related
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=accept chain=input comment="VPN: accept GRE" protocol=gre
add action=accept chain=input comment="MUNI: allow MyWork tunnel" protocol=ipencap src-address=my.work.ip
add action=accept chain=input comment="MUNI: allow MyWork tunnel" protocol=ipsec-esp src-address=my.work.ip
add action=accept chain=input comment="MUNI: allow MyWork tunnel" dst-port=179 in-interface=MyWork-tunnel protocol=tcp
add action=jump chain=forward comment="MUNI: other MyWork tunnel traffic goes to jump list" in-interface=MyWork-tunnel jump-target=muni_tunnel
add action=accept chain=input comment="accept ipv6 tunnel" src-address=ipv6.tunnel.ip
add action=accept chain=input comment="accept smnp from server to router" dst-port=161 protocol=udp src-address=xx.xx.xx.xx
add action=accept chain=input comment="ROUTER: winbox" dst-port=8291 protocol=tcp
add action=accept chain=input comment="ROUTER: webfig" dst-port=3333 protocol=tcp
add action=accept chain=input comment="explicitly allow LAN network to access router" in-interface-list=LAN
add action=drop chain=input comment="drop all incoming not LAN" in-interface-list=!LAN
add action=accept chain=forward comment="Accept all established / related" connection-nat-state="" connection-state=established,related
add action=jump chain=forward comment="have all PPP connections to to their rules" in-interface=all-ppp jump-target=vpn_pptp_filter
add action=drop chain=forward comment="drop bridge-secure (no sideways access)" connection-state="" dst-address=0.0.0.0/0 in-interface=bridge-secure
add action=drop chain=forward comment="Drop invalid" connection-state=invalid log=yes log-prefix=invalid
add action=drop chain=forward comment="Drop tries to reach not public addresses from LAN" dst-address-list=not_in_internet in-interface=bridge-local log=yes log-prefix=!public_from_LAN out-interface=vlan-internet
add action=drop chain=forward comment="Drop incoming packets that are not NATted" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN log=yes log-prefix=!NAT
add action=drop chain=forward comment="Drop incoming from internet which is not public IP" in-interface-list=WAN log=yes log-prefix=!public src-address-list=not_in_internet
add action=drop chain=forward comment="Drop packets from LAN that do not have LAN IP" in-interface-list=LAN log=yes log-prefix=LAN_!LAN src-address-list=!lan_ip
add action=accept chain=muni_tunnel comment="MUNI: allow established/related" connection-state=established,related
add action=accept chain=muni_tunnel comment="MUNI: allow matthijs-pc" src-address=172.22.20.94
add action=drop chain=muni_tunnel comment="MUNI: block others to my internal network"
add action=accept chain=vpn_pptp_filter comment="VPN: allow established / related" connection-state=established,related
add action=accept chain=vpn_pptp_filter comment="VPN: allow DNS why are there queries" dst-port=53 protocol=udp src-port=""
add action=accept chain=vpn_pptp_filter comment="VPN: allow server (unraid)" dst-address=192.168.100.200
add action=drop chain=vpn_pptp_filter comment="VPN: block others to my internal network" log=yes log-prefix="PPP Drop"
/ip firewall mangle
add action=mark-routing chain=prerouting dst-address=172.22.0.0/16 new-routing-mark=MyWork-vpn passthrough=yes
add action=mark-connection chain=prerouting disabled=yes new-connection-mark=SomeVPNProvider passthrough=yes src-address=192.168.102.0/24
add action=mark-connection chain=postrouting disabled=yes dst-address=192.168.102.0/24 new-connection-mark=SomeVPNProvider passthrough=yes
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=WAN
add action=masquerade chain=srcnat comment=masquerade disabled=yes out-interface=vlan-internet
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=192.168.89.0/24
add action=masquerade chain=srcnat dst-address=192.168.100.0/24 src-address=192.168.100.0/24
add action=dst-nat chain=dstnat comment="WINSERV: FTP" dst-port=20-21 in-interface=vlan-internet protocol=tcp to-addresses=192.168.100.220 to-ports=20-21
add action=dst-nat chain=dstnat comment="WINSERV: FTP passive" dst-port=36000 in-interface=vlan-internet protocol=tcp to-addresses=192.168.100.220 to-ports=35000
add action=dst-nat chain=dstnat comment="UNRAID: HTTP" dst-address-list=externalip dst-port=80 protocol=tcp to-addresses=192.168.100.200 to-ports=1880
add action=dst-nat chain=dstnat comment="UNRAID: HTTPS" dst-address-list=externalip dst-port=443 protocol=tcp to-addresses=192.168.100.200 to-ports=18443
add action=dst-nat chain=dstnat comment="DebianDNS: SSH" dst-address-list=externalip dst-port=22 protocol=tcp to-addresses=192.168.100.221 to-ports=22
add action=dst-nat chain=dstnat comment="DebianDNS: pdns web interface" disabled=yes dst-port=8081 in-interface=vlan-internet protocol=tcp to-addresses=192.168.100.221 to-ports=8081
add action=dst-nat chain=dstnat comment="DebianDNS: DNS" dst-address-list=externalip dst-port=53 protocol=tcp to-addresses=192.168.100.221 to-ports=53
add action=dst-nat chain=dstnat comment="DebianDNS: DNS" dst-address-list=externalip dst-port=53 protocol=udp to-addresses=192.168.100.221 to-ports=53
add action=dst-nat chain=dstnat comment="WINSERV: RDP" dst-address-list=externalip dst-port=3389 protocol=tcp to-addresses=192.168.100.220 to-ports=3389
add action=dst-nat chain=dstnat comment="WINSERV: Calibre" dst-address-list=externalip dst-port=8100 protocol=tcp to-addresses=192.168.100.220 to-ports=8100
add action=dst-nat chain=dstnat comment="DebianDNS: SNMP" dst-address-list=externalip dst-port=10161 protocol=udp to-addresses=192.168.100.221 to-ports=161
/ip ipsec identity
add auth-method=eap certificate="" disabled=yes eap-methods=eap-mschapv2 generate-policy=port-strict mode-config=SomeVPNProvider peer="SomeVPNProvider HUNGARY" policy-template-group=SomeVPNProvider username=
add auth-method=eap certificate="" disabled=yes eap-methods=eap-mschapv2 generate-policy=port-strict mode-config=SomeVPNProvider peer="Nord VPN NL P2P" policy-template-group=SomeVPNProvider username=
add auth-method=eap certificate="" disabled=yes eap-methods=eap-mschapv2 generate-policy=port-strict mode-config=SomeVPNProvider peer="SomeVPNProvider NL" policy-template-group=SomeVPNProvider username=
add auth-method=eap certificate="" disabled=yes eap-methods=eap-mschapv2 generate-policy=port-strict mode-config=SomeVPNProvider peer="SomeVPNProvider NORWAY" policy-template-group=SomeVPNProvider username=
add peer=MyWork
/ip ipsec policy
set 0 disabled=yes dst-address=0.0.0.0/0 src-address=0.0.0.0/0
add dst-address=my.work.ip/32 peer=MyWork proposal=MyWork src-address=my.external.ip/32
add dst-address=0.0.0.0/0 group=SomeVPNProvider proposal=SomeVPNProvider src-address=0.0.0.0/0 template=yes
/ip service
set winbox address=0.0.0.0/0
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=bridge-local type=internal
add interface=sfp-sfpplus1 type=external
/ipv6 address
add address=2001:470:1f14:787::2 advertise=no comment="client ipv6 address" interface=ipv6-tunnel
add address=my:public:ipv6::1 interface=bridge-local
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
add address=::224.0.0.0/100 comment="defconf: other" list=bad_ipv6
add address=::127.0.0.0/104 comment="defconf: other" list=bad_ipv6
add address=::/104 comment="defconf: other" list=bad_ipv6
add address=::255.0.0.0/104 comment="defconf: other" list=bad_ipv6
/ipv6 firewall filter
add action=reject chain=forward comment=killswitch disabled=yes reject-with=icmp-address-unreachable
add action=reject chain=input comment=killswitch disabled=yes reject-with=icmp-address-unreachable
add action=reject chain=output comment=killswitch disabled=yes reject-with=icmp-address-unreachable
add action=accept chain=input comment="accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="allow pings" protocol=icmpv6
add action=accept chain=input comment="allow established and related" connection-state=established,related
add action=accept chain=forward comment="allow established and related" connection-state=established,related connection-type=""
add action=accept chain=forward comment="Allow DNS @ debiandns" dst-address=my:public:ipv6:11:32ff:fe28:ef7b/128 dst-port=53,33344 protocol=tcp
add action=accept chain=forward comment="Allow DNS @ debiandns" dst-address=my:public:ipv6:11:32ff:fe28:ef7b/128 dst-port=53 protocol=udp
add action=accept chain=forward dst-address=my:public:ipv6:d250:99ff:fe10:f6b3/128 dst-port=80,443 protocol=tcp
add action=accept chain=forward dst-address=my:public:ipv6:d250:99ff:fe10:f6b3/128 dst-port=80,443 protocol=udp
add action=reject chain=forward comment="block SomeVPNProvider" in-interface=bridge-SomeVPNProvider reject-with=icmp-no-route
add action=reject chain=forward comment="block SomeVPNProvider" out-interface=bridge-SomeVPNProvider reject-with=icmp-no-route
add action=passthrough chain=forward comment="mikrotik config from below here"
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/16
add action=accept chain=input comment="allow allowed addresses" src-address-list=allowed
add action=drop chain=input
add action=drop chain=input in-interface-list=WAN log=yes log-prefix=dropLL_from_public src-address=fe80::/16
add action=accept chain=forward comment=established,related connection-state=established,related
add action=accept chain=forward comment="local network" in-interface-list=LAN src-address-list=allowed
add action=accept chain=output
add action=accept chain=forward comment="Allow traffic from LAN to WAN (incl ipv6-tunnel)" in-interface-list=LAN out-interface-list=WAN
add action=drop chain=forward comment=invalid connection-state=invalid log=yes log-prefix=ipv6,invalid
add action=drop chain=forward log-prefix=IPV6
/ipv6 route
add check-gateway=ping distance=1 dst-address=2000::/3 gateway=ipv6-tunnel
/ppp profile
add bridge=*8D change-tcp-mss=yes name=bridge_mortel_OUT use-encryption=yes
add bridge=*A3 dns-server=1.1.1.1 name=SomeVPNProvider use-encryption=yes use-ipv6=no
/ppp secret
add comment="default van mikrotik" name=vpn
add local-address=172.16.1.1 name=AA profile=vpn_profile remote-address=172.16.1.2 routes="192.168.10.0/24 172.16.1.2 1"
add local-address=172.16.1.1 name=BB profile=vpn_profile remote-address=172.16.1.3 routes="192.168.88.0/24 172.16.1.3 1"
add name=CC profile=vpn_internal
add local-address=172.16.1.1 name=mortel profile=vpn_profile remote-address=172.16.1.4 routes="192.168.1.0/24 172.16.1.4 1"
add name=DD profile=vpn_internal
/routing bgp network
add network=192.168.100.0/24 synchronize=no
/routing bgp peer
add instance=bgp-MyWork name=MyWork-office-ziggo remote-address=xx remote-as=64514 ttl=default
/snmp
set contact=[..redacted..]
/system clock
set time-zone-name=Europe/Amsterdam
/system identity
set name=[..redacted..]
/system leds
add interface=wlan2 leds=wlan2_signal1-led,wlan2_signal2-led,wlan2_signal3-led,wlan2_signal4-led,wlan2_signal5-led type=wireless-signal-strength
add interface=wlan2 leds=wlan2_tx-led type=interface-transmit
add interface=wlan2 leds=wlan2_rx-led type=interface-receive
/system ntp client
set enabled=yes primary-ntp=194.109.6.2 secondary-ntp=51.105.208.173 server-dns-names=nl.pool.ntp.org,time.windows.com
/tool graphing interface
add allow-address=192.168.100.0/24
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool sniffer
set filter-interface=vlan-internet filter-stream=yes streaming-enabled=yes streaming-server=192.168.100.10
I could also first clean the config of site A and then convert to l2TP/IPsec but I am also still learning (every day :p) so for this issue I am also really interested in what could cause this.
Thanks again!