Thanks for being willing to help.
I think I managed to removed everything that should not be visible! I hope so.
Just a side note, you may find yourself asking about the SFP port. Well I figured that I don’t use the SFP port for anything so I decided to make that port my WAN port instead freeing up ether1 for a LAN port.
# 2024-11-07 06:39:58 by RouterOS 7.15.3
# software id =
#
# model = RB5009UPr+S+
# serial number =
/interface bridge
add admin-mac=XX:XX:XX:XX:XX:XX auto-mac=no comment=defconf name=bridge \
port-cost-mode=short
/interface ethernet
set [ find default-name=sfp-sfpplus1 ] name="sfp-sfpplus1[INTERNET]"
/interface pppoe-client
add add-default-route=yes disabled=no interface="sfp-sfpplus1[INTERNET]" \
name=pppoe-out1 use-peer-dns=yes user=XXXXXXX
/interface wireguard
add listen-port=13231 mtu=1420 name=Wireguard1
/disk
set usb1 media-interface=none media-sharing=no
add media-interface=none media-sharing=no parent=usb1 partition-number=1 \
partition-offset="1 048 576" partition-size="300 060 508 160" type=\
partition
add media-interface=none media-sharing=no parent=usb1 partition-number=2 \
partition-offset="300 061 556 736" partition-size="700 007 317 504" type=\
partition
set usb2 media-interface=none media-sharing=no
add media-interface=none media-sharing=no parent=usb2 partition-number=1 \
partition-offset="1 048 576" partition-size="300 060 508 160" type=\
partition
add media-interface=none media-sharing=no parent=usb2 partition-number=2 \
partition-offset="300 061 556 736" partition-size="700 007 317 504" type=\
partition
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=10.0.0.50-10.0.0.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=default-dhcp interface=bridge lease-time=1d name=defconf
/ip smb users
add name=sambauser
/ppp profile
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/ip smb
set enabled=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether3 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether4 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether5 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether6 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether7 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether8 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=ManuallyAdded interface=ether1 internal-path-cost=\
10 path-cost=10
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=pppoe-out1 list=WAN
add interface="sfp-sfpplus1[INTERNET]" list=WAN
/interface wireguard peers
add allowed-address=192.168.100.2/32 interface=Wireguard1 name=\
Wireguard-Peer1 public-key="XXXXXXX"
/ip address
add address=10.0.0.1/24 comment=defconf interface=bridge network=10.0.0.0
add address=192.168.100.1/24 interface=Wireguard1 network=192.168.100.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=5m update-time=no
/ip dhcp-client
add comment=defconf disabled=yes interface="sfp-sfpplus1[INTERNET]"
/ip dhcp-server lease
add address=10.0.0.100 client-id=1:b4:2e:99:a3:8f:58 comment="" \
mac-address=B4:2E:99:A3:8F:58 server=defconf
add address=10.0.0.9 client-id=1:48:b0:2d:2a:ea:bd comment="" \
mac-address=48:B0:2D:2A:EA:BD server=defconf
add address=10.0.0.8 client-id=1:4:4b:ed:a6:43:fa comment="" \
mac-address=04:4B:ED:A6:43:FA server=defconf
add address=10.0.0.5 client-id=1:94:b5:55:92:9f:dc comment=\
"" mac-address=94:B5:55:92:9F:DC server=defconf
add address=10.0.0.7 client-id=1:e8:fb:1c:97:e5:4b comment="" \
mac-address=E8:FB:1C:97:E5:4B server=defconf
add address=10.0.0.6 comment="" mac-address=80:64:6F:B9:43:70 \
server=defconf
add address=10.0.0.4 client-id=1:64:c6:d2:1b:7c:d7 comment="" \
mac-address=64:C6:D2:1B:7C:D7 server=defconf
add address=10.0.0.10 comment="" mac-address=00:19:BA:13:0C:94 \
server=defconf
/ip dhcp-server network
add address=10.0.0.0/24 comment=defconf dns-server=10.0.0.1 gateway=10.0.0.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=10.0.0.1 comment=defconf name=router.lan
/ip firewall address-list
add address=104.131.107.63 list=allow_uptime_robot_traffic
add address=122.248.234.23 list=allow_uptime_robot_traffic
add address=128.140.106.114 list=allow_uptime_robot_traffic
add address=128.140.41.193 list=allow_uptime_robot_traffic
add address=128.199.195.156 list=allow_uptime_robot_traffic
add address=13.127.188.124 list=allow_uptime_robot_traffic
add address=13.56.33.4 list=allow_uptime_robot_traffic
add address=135.181.154.9 list=allow_uptime_robot_traffic
add address=138.197.150.151 list=allow_uptime_robot_traffic
add address=139.59.173.249 list=allow_uptime_robot_traffic
add address=142.132.180.39 list=allow_uptime_robot_traffic
add address=146.185.143.14 list=allow_uptime_robot_traffic
add address=157.90.155.240 list=allow_uptime_robot_traffic
add address=157.90.156.63 list=allow_uptime_robot_traffic
add address=159.203.30.41 list=allow_uptime_robot_traffic
add address=159.69.158.189 list=allow_uptime_robot_traffic
add address=159.89.8.111 list=allow_uptime_robot_traffic
add address=165.227.83.148 list=allow_uptime_robot_traffic
add address=167.235.143.113 list=allow_uptime_robot_traffic
add address=167.99.209.234 list=allow_uptime_robot_traffic
add address=168.119.123.75 list=allow_uptime_robot_traffic
add address=168.119.53.160 list=allow_uptime_robot_traffic
add address=168.119.96.239 list=allow_uptime_robot_traffic
add address=178.62.52.237 list=allow_uptime_robot_traffic
add address=18.116.158.121 list=allow_uptime_robot_traffic
add address=18.116.205.62 list=allow_uptime_robot_traffic
add address=18.180.208.214 list=allow_uptime_robot_traffic
add address=18.221.56.27 list=allow_uptime_robot_traffic
add address=18.223.50.16 list=allow_uptime_robot_traffic
add address=208.115.199.18 list=allow_uptime_robot_traffic
add address=208.115.199.19 list=allow_uptime_robot_traffic
add address=208.115.199.20 list=allow_uptime_robot_traffic
add address=208.115.199.21 list=allow_uptime_robot_traffic
add address=208.115.199.22 list=allow_uptime_robot_traffic
add address=208.115.199.23 list=allow_uptime_robot_traffic
add address=208.115.199.24 list=allow_uptime_robot_traffic
add address=208.115.199.25 list=allow_uptime_robot_traffic
add address=208.115.199.26 list=allow_uptime_robot_traffic
add address=208.115.199.27 list=allow_uptime_robot_traffic
add address=208.115.199.28 list=allow_uptime_robot_traffic
add address=208.115.199.29 list=allow_uptime_robot_traffic
add address=208.115.199.30 list=allow_uptime_robot_traffic
add address=216.144.248.18 list=allow_uptime_robot_traffic
add address=216.144.248.19 list=allow_uptime_robot_traffic
add address=216.144.248.20 list=allow_uptime_robot_traffic
add address=216.144.248.21 list=allow_uptime_robot_traffic
add address=216.144.248.22 list=allow_uptime_robot_traffic
add address=216.144.248.23 list=allow_uptime_robot_traffic
add address=216.144.248.24 list=allow_uptime_robot_traffic
add address=216.144.248.25 list=allow_uptime_robot_traffic
add address=216.144.248.26 list=allow_uptime_robot_traffic
add address=216.144.248.27 list=allow_uptime_robot_traffic
add address=216.144.248.28 list=allow_uptime_robot_traffic
add address=216.144.248.29 list=allow_uptime_robot_traffic
add address=216.144.248.30 list=allow_uptime_robot_traffic
add address=216.144.250.150 list=allow_uptime_robot_traffic
add address=216.245.221.82 list=allow_uptime_robot_traffic
add address=216.245.221.83 list=allow_uptime_robot_traffic
add address=216.245.221.84 list=allow_uptime_robot_traffic
add address=216.245.221.85 list=allow_uptime_robot_traffic
add address=216.245.221.86 list=allow_uptime_robot_traffic
add address=216.245.221.87 list=allow_uptime_robot_traffic
add address=216.245.221.88 list=allow_uptime_robot_traffic
add address=216.245.221.89 list=allow_uptime_robot_traffic
add address=216.245.221.90 list=allow_uptime_robot_traffic
add address=216.245.221.91 list=allow_uptime_robot_traffic
add address=216.245.221.92 list=allow_uptime_robot_traffic
add address=216.245.221.93 list=allow_uptime_robot_traffic
add address=3.105.133.239 list=allow_uptime_robot_traffic
add address=3.105.190.221 list=allow_uptime_robot_traffic
add address=3.111.88.158 list=allow_uptime_robot_traffic
add address=3.12.251.153 list=allow_uptime_robot_traffic
add address=3.20.63.178 list=allow_uptime_robot_traffic
add address=3.21.136.87 list=allow_uptime_robot_traffic
add address=3.212.128.62 list=allow_uptime_robot_traffic
add address=3.79.92.117 list=allow_uptime_robot_traffic
add address=34.198.201.66 list=allow_uptime_robot_traffic
add address=34.233.66.117 list=allow_uptime_robot_traffic
add address=35.153.243.148 list=allow_uptime_robot_traffic
add address=35.166.228.98 list=allow_uptime_robot_traffic
add address=35.170.215.196 list=allow_uptime_robot_traffic
add address=35.84.118.171 list=allow_uptime_robot_traffic
add address=37.27.28.153 list=allow_uptime_robot_traffic
add address=37.27.29.68 list=allow_uptime_robot_traffic
add address=37.27.30.213 list=allow_uptime_robot_traffic
add address=37.27.34.49 list=allow_uptime_robot_traffic
add address=37.27.82.220 list=allow_uptime_robot_traffic
add address=37.27.87.149 list=allow_uptime_robot_traffic
add address=44.227.38.253 list=allow_uptime_robot_traffic
add address=46.101.250.135 list=allow_uptime_robot_traffic
add address=46.137.190.132 list=allow_uptime_robot_traffic
add address=49.13.130.29 list=allow_uptime_robot_traffic
add address=49.13.134.145 list=allow_uptime_robot_traffic
add address=49.13.164.148 list=allow_uptime_robot_traffic
add address=49.13.167.123 list=allow_uptime_robot_traffic
add address=49.13.24.81 list=allow_uptime_robot_traffic
add address=5.161.61.238 list=allow_uptime_robot_traffic
add address=5.161.75.7 list=allow_uptime_robot_traffic
add address=5.78.118.142 list=allow_uptime_robot_traffic
add address=5.78.87.38 list=allow_uptime_robot_traffic
add address=52.15.147.27 list=allow_uptime_robot_traffic
add address=52.22.236.30 list=allow_uptime_robot_traffic
add address=52.60.129.180 list=allow_uptime_robot_traffic
add address=52.70.84.165 list=allow_uptime_robot_traffic
add address=52.8.208.143 list=allow_uptime_robot_traffic
add address=54.167.223.174 list=allow_uptime_robot_traffic
add address=54.224.73.211 list=allow_uptime_robot_traffic
add address=54.225.82.45 list=allow_uptime_robot_traffic
add address=54.241.175.147 list=allow_uptime_robot_traffic
add address=54.249.170.27 list=allow_uptime_robot_traffic
add address=54.64.67.106 list=allow_uptime_robot_traffic
add address=54.67.10.127 list=allow_uptime_robot_traffic
add address=54.79.28.129 list=allow_uptime_robot_traffic
add address=54.94.142.218 list=allow_uptime_robot_traffic
add address=63.143.42.242 list=allow_uptime_robot_traffic
add address=63.143.42.243 list=allow_uptime_robot_traffic
add address=63.143.42.244 list=allow_uptime_robot_traffic
add address=63.143.42.245 list=allow_uptime_robot_traffic
add address=63.143.42.246 list=allow_uptime_robot_traffic
add address=63.143.42.247 list=allow_uptime_robot_traffic
add address=63.143.42.248 list=allow_uptime_robot_traffic
add address=63.143.42.249 list=allow_uptime_robot_traffic
add address=63.143.42.250 list=allow_uptime_robot_traffic
add address=63.143.42.251 list=allow_uptime_robot_traffic
add address=63.143.42.252 list=allow_uptime_robot_traffic
add address=63.143.42.253 list=allow_uptime_robot_traffic
add address=65.109.129.165 list=allow_uptime_robot_traffic
add address=65.109.142.78 list=allow_uptime_robot_traffic
add address=65.109.8.202 list=allow_uptime_robot_traffic
add address=69.162.124.226 list=allow_uptime_robot_traffic
add address=69.162.124.227 list=allow_uptime_robot_traffic
add address=69.162.124.228 list=allow_uptime_robot_traffic
add address=69.162.124.229 list=allow_uptime_robot_traffic
add address=69.162.124.230 list=allow_uptime_robot_traffic
add address=69.162.124.231 list=allow_uptime_robot_traffic
add address=69.162.124.232 list=allow_uptime_robot_traffic
add address=69.162.124.233 list=allow_uptime_robot_traffic
add address=69.162.124.234 list=allow_uptime_robot_traffic
add address=69.162.124.235 list=allow_uptime_robot_traffic
add address=69.162.124.236 list=allow_uptime_robot_traffic
add address=69.162.124.237 list=allow_uptime_robot_traffic
add address=69.162.124.238 list=allow_uptime_robot_traffic
add address=78.46.190.63 list=allow_uptime_robot_traffic
add address=78.46.215.1 list=allow_uptime_robot_traffic
add address=78.47.173.76 list=allow_uptime_robot_traffic
add address=78.47.98.55 list=allow_uptime_robot_traffic
add address=88.99.80.227 list=allow_uptime_robot_traffic
add address=99.80.1.74 list=allow_uptime_robot_traffic
add address=99.80.173.191 list=allow_uptime_robot_traffic
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input dst-port=21 in-interface-list=WAN log=yes \
log-prefix="FTP - " protocol=tcp src-address-list=\
allow_hostprovider_traffic
add action=accept chain=input dst-port=21 in-interface-list=WAN log-prefix=\
"FTP - " protocol=tcp src-address-list=\
allow_uptime_robot_traffic
add action=accept chain=input comment="::Allow Wireguard Traffic::" dst-port=\
13231 protocol=udp
add action=accept chain=input comment="::Allow Wireguard Traffic::" \
src-address=192.168.100.0/24
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=change-mss chain=forward new-mss=1452 out-interface=pppoe-out1 \
protocol=tcp tcp-flags=syn tcp-mss=1453-65535
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat comment=Plex dst-port=35200 \
in-interface-list=WAN protocol=tcp to-addresses=10.0.0.100 to-ports=32400
add action=dst-nat chain=dstnat comment="Steam Link3" dst-port=27036 \
in-interface-list=WAN protocol=udp to-addresses=10.0.0.100 to-ports=27036
add action=dst-nat chain=dstnat comment="Steam Link2" dst-port=27036 \
in-interface-list=WAN protocol=tcp to-addresses=10.0.0.100 to-ports=27036
add action=dst-nat chain=dstnat comment="Steam Link1" dst-port=27031 \
in-interface-list=WAN protocol=tcp to-addresses=10.0.0.100 to-ports=27031
add action=dst-nat chain=dstnat comment="Steam Link4" dst-port=27037 \
in-interface-list=WAN protocol=tcp to-addresses=10.0.0.100 to-ports=27037
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
192.168.89.0/24
/ip service
set telnet disabled=yes
set ssh address=10.0.0.0/24 port=XX
set www-ssl disabled=no
set api disabled=yes
set winbox address=10.0.0.0/24
set api-ssl disabled=yes
/ip smb shares
add directory=usb1-part1/Backups invalid-users=guest name=Backups \
valid-users=sambauser
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/ppp secret
add name=vpn
/system clock
set time-zone-name=Africa/Johannesburg
/system identity
set name=MikroTikRouter
/system note
set show-at-login=no
/system scheduler
add interval=5m name=NoIP-Updater on-event="# Data to be modified\r\
\n:local noipuser \"XXXXXXXXX\"\r\
\n:local noippass \"XXXXXXXXX\"\r\
\n:local noiphost \"XXXXXXXXX\"\r\
\n\r\
\n# From now on, do not modify\r\
\n:local cIP [/ip cloud get public-address]\r\
\n\r\
\n:if ([:resolve \$noiphost] != \$cIP) do={\r\
\n # Important, has been replaced \"\?\" with \"\\3F\" to avoid problem\
s. \r\
\n /tool fetch url=\"http://\$noipuser:\$noippass@dynupdate.no-ip.com/n\
ic/update\\3Fhostname=\$noiphost&myip=\$cIP\" keep-result=no\r\
\n :log info \"NO-IP: \$noiphost -> IP updated: \$cIP\"\r\
\n} else={\r\
\n :log info \"No-IP: No update needed. Current: \$cIP\"\r\
\n}\r\
\n" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/user group
add comment="::FTP USERS GROUP ONLY::" name=FTPUsers policy="ftp,read,write,!l\
ocal,!telnet,!ssh,!reboot,!policy,!test,!winbox,!password,!web,!sniff,!sen\
sitive,!api,!romon,!rest-api"