Thanks for the attention and responses.
Strange that no one simply put “we need more information” at the start. I was just asked for the firmware versions…
I have a pretty simple setup.
The router connects to the ISP with PPPoE through a ISP router that is in bridge mode. 1Gb symmetrical fibre connection.
Ethernet 1 connects to the ISP router.
Pppoe dialup give an interface pppoe-out1 across Ethernet 1
Sfp1 with fibre connects to a switch for the LAN
Ethernet 5 is a backup connection to the router in case of emergencies
‘bridge’ is for the general LAN
‘DHCPbridge’ is for Ethernet 5
Several linux desktops, phone etc and a Linux server behind the router.
The Linux server handles local DHCP and DNS. A few ports are forwarded to the server, and there is a media server with a few forwards.
I have 4 ipsec tunnels to some other sites.
Ipv6 via Hurricane Electric as a test for local devices as w have no IPv6 via our ISP.
I have upgraded a number of times without issue.
However, this time my linux server suddenly could not see the remote IP of a ssh connection. They all appeared to come from the router 192.168.10.250 That meant the geoipblocking of attackers failed and I suddenly got a mountain of warnings of connections in my logs. I also found we could not ping outside he local network and had no DNS either.
The filter rules were left this way after an extremely expensive consultant tried to fix another issue I had, and failed. I fixed it myself eventually (guesswork + trail & error). However, I didn’t touch the rules that he left as he said they were OK… and it all worked bar the ipsec issues he was meant to fix.
I only posted the filter rules because no rules had changed between upgrades, but I suddenly could not access sites online. I applied some logging as it looked like a DNS lookup issue, and the filter rule “drop all from WAN not DSTNATed” seemed to be the culprit dropping lots of packets on UDP 53. I had to add the new filter forwarding rules to get it working as you can see - I touched no other rules at all.
I had asked if someone could advise a tidy up as I know they are not very neat
But if it wasn’t broken don’t fix it. Which it wasn’t until this upgrade.
Note one point I really don’t understand is the interfaces and wonder whether this has any influence. Which interfaces should be in WAN and which is LAN? Are some of the interfaces in WAN that should be in LAN - eg
sfp1 which connects to the internal switch and therefore LAN?
bridge should be LAN as per DHCPBridge?
sit1 is IPv6 and internet?
Should I have the lists eg LAN, WAN, Internet and manually add the interfaces in the correct lists for use in the rules? And how would that affect say the IPsec rules (where we had issues with one particular connection that connects to an almost identical router in my remote office)?
/interface detect-internet state> print
# NAME STATE STATE-CHANGE-TIME CLOUD-RTT
0 sfp1-ToSwitch wan jun/15/2024 13:39:48
1 ether1-ToRouter wan jun/15/2024 13:39:48
2 ether2 no-link jun/15/2024 13:39:42
3 ether3 no-link jun/15/2024 13:39:42
4 ether4 no-link jun/15/2024 13:39:42
5 ether5 no-link jun/15/2024 13:39:42
6 ether6 no-link jun/15/2024 13:39:42
7 ether7 no-link jun/15/2024 13:39:42
8 ether8 no-link jun/15/2024 13:39:42
9 ether9 no-link jun/15/2024 13:39:42
10 ether10 no-link jun/15/2024 13:39:42
11 bridge wan jun/15/2024 13:39:48
12 pppoe-out1 internet jun/15/2024 13:39:48 76ms
13 sit1 wan jun/15/2024 13:39:48
14 DHCPBridge lan jun/15/2024 13:39:42
Either way, herewith the rules in place - I have tried to tidy up and group input & forward. I just changed a few public IP addresses
# jun/15/2024 13:25:52 by RouterOS 6.49.15
# software id = FSDE-XXW1
#
# model = 2011UiAS
# serial number = 75B90689C77B
/interface bridge
add name=DHCPBridge
add admin-mac=6C:3B:6B:84:2A:CE auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether1 ] name=ether1-ToRouter
set [ find default-name=ether2 ] disabled=yes
set [ find default-name=ether3 ] disabled=yes
set [ find default-name=ether4 ] disabled=yes
set [ find default-name=ether6 ] disabled=yes
set [ find default-name=ether7 ] disabled=yes
set [ find default-name=ether8 ] disabled=yes
set [ find default-name=ether9 ] disabled=yes
set [ find default-name=ether10 ] disabled=yes
set [ find default-name=sfp1 ] name=sfp1-ToSwitch
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1-ToRouter max-mru=1492 \
max-mtu=1492 name=pppoe-out1 password=adslppp service-name=ISP user=\
user
/interface 6to4
add comment="Hurricane Electric IPv6 Tunnel Broker" !keepalive local-address=\
my.wan.ip.addr mtu=1280 name=sit1 remote-address=1.2.3.4
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec profile
set [ find default=yes ] dh-group=modp4096 enc-algorithm=aes-256 \
hash-algorithm=sha512
add dh-group=modp4096 enc-algorithm=aes-256 hash-algorithm=sha256 name=\
ike2-256-4096 prf-algorithm=sha256
/ip ipsec peer
add address=x.x.164.73/32 exchange-mode=ike2 name=ike2-Test profile=\
ike2-256-4096
add address=x.x.143.44/32 exchange-mode=ike2 name=ike2-Cloud profile=\
ike2-256-4096
add address=x.x.138.58/32 exchange-mode=ike2 name=ike2-Asterisk profile=\
ike2-256-4096
add address=office.ip.addr/32 exchange-mode=ike2 name=ike2-WorkNew profile=\
ike2-256-4096
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512,sha256 enc-algorithms=\
aes-256-cbc,aes-256-gcm pfs-group=modp4096
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc name=ike2-sha256 \
pfs-group=modp4096
add auth-algorithms=sha512,sha256 enc-algorithms=aes-256-cbc name=\
ike2-256-4096 pfs-group=modp4096
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=DHCPBridge name=defconf
/interface bridge port
add bridge=DHCPBridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=sfp1-ToSwitch
/ip firewall connection tracking
set udp-timeout=3m10s
/ip neighbor discovery-settings
set discover-interface-list=*2000012
/ipv6 settings
set accept-router-advertisements=yes
/interface detect-internet
set detect-interface-list=all internet-interface-list=all lan-interface-list=\
LAN wan-interface-list=WAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1-ToRouter list=WAN
add interface=pppoe-out1 list=WAN
add interface=DHCPBridge list=LAN
/ip accounting
set account-local-traffic=yes enabled=yes
/ip accounting web-access
set accessible-via-web=yes address=my.wan.ip.addr/32
/ip address
add address=192.168.10.250/24 comment=defconf interface=bridge network=\
192.168.10.0
add address=192.168.88.1/24 comment=ETH5 interface=DHCPBridge network=\
192.168.88.0
/ip cloud
set update-time=no
/ip dhcp-client
add comment=defconf interface=ether1-ToRouter
add disabled=no interface=ether1-ToRouter
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers="208.67.222.222,208.67.220.220,2001:470:\
20::2,2620:119:35::35,2620:119:53::53"
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall address-list
add address=192.168.10.0/24 comment="ES local" list=Admin
add address=185.212.149.203 comment=Blacklists list=Blacklist
add address=office.ip.addr comment="remote" list=Admin
add address=10.0.0.0/24 comment="local" list=Admin
/ip firewall filter
add action=accept chain=input comment="Input Router Admin Access - Remote" \
dst-address=my.wan.ip.addr dst-port=8291 protocol=tcp
add action=drop chain=input comment="Input drop 2224" dst-address=my.wan.ip.addr \
dst-port=2224 protocol=tcp
add action=accept chain=input comment="Input Router Admin Access - Local" \
dst-address=192.168.10.250 dst-port=2224,8291,80 protocol=tcp \
src-address-list=Admin
add action=accept chain=input comment="Input Allow IPsec NAT" dst-port=4500 \
in-interface-list=WAN protocol=udp
add action=accept chain=input comment="Input Allow IKE" dst-port=500 \
in-interface-list=WAN protocol=udp
add action=accept chain=input comment="Input Allow ESP" in-interface-list=WAN \
log-prefix="Firewall filter ESP" protocol=ipsec-esp
add action=accept chain=input comment=\
"Input defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment=\
"Input Allow LAN access to router and internet" in-interface=bridge
add action=accept chain=input comment=\
"Input Allow DHCP Bridge Access to router & internet" in-interface=\
DHCPBridge
add action=accept chain=input comment="Input defconf: accept ICMP" protocol=\
icmp
add action=accept chain=input comment=\
"Input defconf: accept to local loopback (for CAPsMAN)" dst-address=\
127.0.0.1
add action=accept chain=input comment="Input Allow LAN DNS queries - TCP" \
dst-port=53 in-interface-list=LAN protocol=tcp
add action=accept chain=input comment="Input Allow LAN DNS queries - UDP" \
dst-port=53 in-interface-list=LAN protocol=udp
add action=drop chain=input comment="Input defconf: drop invalid" \
connection-state=invalid log-prefix="Input - Invalid"
add action=drop chain=input comment=\
"Input defconf: drop all not coming from LAN" in-interface-list=!LAN \
log-prefix=NotLAN
add action=accept chain=forward comment=\
"Forward defconf: accept in ipsec policy - use RAW instead" \
connection-state=established,related disabled=yes ipsec-policy=in,ipsec \
log-prefix=Ipsec-In
add action=accept chain=forward comment=\
"Forward defconf: accept out ipsec policy - use RAW instead" \
connection-state=established,related disabled=yes ipsec-policy=out,ipsec \
log-prefix=Ipsec-Out
add action=accept chain=forward comment=\
"Ron - Allow all traffic from Spain via IPSec tunnel to UK" \
connection-state=established,related,untracked dst-address=10.0.0.0/24 \
src-address=192.168.10.0/24
add action=accept chain=forward comment=\
"Ron - Allow all traffic from via IPSec tunnel to Spain" \
connection-state=established,related,untracked dst-address=\
192.168.10.0/24 src-address=10.0.0.0/24
add action=accept chain=forward comment=\
"Ron - Allow all traffic from Spain via IPSec tunnel to FreePBX" \
connection-state=established,related,untracked dst-address=\
192.168.98.0/24 src-address=192.168.10.0/24
add action=accept chain=forward comment=\
"Ron - Allow all traffic from FreePBX via IPSec tunnel to Spain" \
connection-state=established,related,untracked dst-address=\
192.168.10.0/24 src-address=192.168.98.0/24
add action=accept chain=forward comment=\
"Ron - Allow all traffic from Spain via IPSec tunnel to Cloud" \
connection-state=established,related,untracked dst-address=\
192.168.99.0/24 src-address=192.168.10.0/24
add action=accept chain=forward comment=\
"Ron - Allow all traffic from Cloud via IPSec tunnel to Spain" \
connection-state=established,related,untracked dst-address=\
192.168.10.0/24 src-address=192.168.99.0/24
add action=accept chain=forward comment="Allow for Test" connection-state=\
established,related,untracked dst-address=192.168.97.0/24 src-address=\
192.168.10.0/24
add action=accept chain=forward comment="Allow for Test" connection-state=\
established,related,untracked dst-address=192.168.10.0/24 src-address=\
192.168.97.0/24
add action=fasttrack-connection chain=forward comment=\
"Forward defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment=\
"Forward defconf: accept established,related, untracked" \
connection-state=established,related,untracked
add action=accept chain=forward comment="Forward Allow Port forwards" \
connection-nat-state=srcnat disabled=yes
add action=accept chain=forward comment=\
"Forward Allow LAN access to router and Internet" connection-state=\
established,related in-interface=bridge
add action=accept chain=forward comment=\
"Forward Allow LAN access to router and Internet" connection-state=\
established,related in-interface=DHCPBridge
add action=drop chain=forward comment="Forward defconf: drop invalid" \
connection-state=invalid log-prefix="Forward - Invalid"
# I had to add these to permit traffic - If I disable them then
# the original rule below seems to block traffic
add action=accept chain=forward comment="Forward drop all from WAN not DSTNATe\
d - See this https://forum.mikrotik.com/viewtopic.php\?t=187296#p943179" \
in-interface-list=LAN log=yes log-prefix=\
"Forward drop LAN to WAN not DSTNATed " out-interface-list=WAN
add action=accept chain=forward connection-nat-state=dstnat \
in-interface-list=WAN out-interface-list=LAN
# Original rule
add action=drop chain=forward comment="Forward defconf: drop all from WAN not \
DSTNATed - original rule" connection-nat-state=!dstnat connection-state=\
new in-interface-list=WAN log=yes log-prefix="Forward drop WAN Not \
DSTNATed"
# Added as per above post
add action=drop chain=forward comment="Forward drop all else" log=yes \
log-prefix="Drop forward all else"
add action=log chain=input connection-state=\
invalid,established,related,new,untracked disabled=yes log=yes \
log-prefix=EverythingElseInput
add action=log chain=forward connection-state=\
invalid,established,related,new,untracked disabled=yes log=yes \
log-prefix=EverythingElseForward
/ip firewall mangle
add action=change-mss chain=forward comment="Clamp MSS to PMTU" log-prefix=\
"Clamp to PMTU forward" new-mss=clamp-to-pmtu out-interface=pppoe-out1 \
passthrough=yes protocol=tcp tcp-flags=syn
add action=change-mss chain=forward comment=\
"Ron - Set MSS Clamp to 1366 for MTU 1406 for IPSec to UK" dst-address=\
10.0.0.0/24 new-mss=1366 passthrough=yes protocol=tcp tcp-flags=syn \
tcp-mss=1367-65535
add action=change-mss chain=forward comment=\
"Ron - Set MSS Clamp to 1382 for MTU 1411 for IPSec to FreePBX" \
dst-address=192.168.98.0/24 new-mss=1382 passthrough=yes protocol=tcp \
tcp-flags=syn tcp-mss=1383-65535
/ip firewall nat
add action=accept chain=srcnat comment=\
"defconf: accept all that matches IPSec policy OUT" ipsec-policy=\
out,ipsec
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none log-prefix=Masquerade out-interface-list=WAN
add action=dst-nat chain=dstnat comment="SERVER SMTP" dst-address=my.wan.ip.addr \
dst-port=25 protocol=tcp to-addresses=192.168.10.1 to-ports=25
add action=dst-nat chain=dstnat comment="SERVER SMTPS" dst-address=\
my.wan.ip.addr dst-port=465 protocol=tcp to-addresses=192.168.10.1 to-ports=\
465
add action=dst-nat chain=dstnat comment="SERVER HTTP" dst-address=my.wan.ip.addr \
dst-port=80 protocol=tcp to-addresses=192.168.10.1 to-ports=80
add action=dst-nat chain=dstnat comment="SERVER HTTPS" dst-address=\
my.wan.ip.addr dst-port=443 protocol=tcp to-addresses=192.168.10.1 to-ports=\
443
add action=dst-nat chain=dstnat comment="SERVER IMAPS" dst-address=\
my.wan.ip.addr dst-port=993 protocol=tcp to-addresses=192.168.10.1 to-ports=\
993
add action=dst-nat chain=dstnat comment="SERVER SSH" dst-address=my.wan.ip.addr \
dst-port=2222 log-prefix=ssh protocol=tcp to-addresses=192.168.10.1 \
to-ports=2222
add action=dst-nat chain=dstnat comment="SERVER Proxmox" dst-address=\
my.wan.ip.addr dst-port=56001 protocol=tcp to-addresses=192.168.10.12 \
to-ports=8006
add action=dst-nat chain=dstnat comment="SERVER media https" dst-address=\
my.wan.ip.addr dst-port=8920 protocol=tcp to-addresses=192.168.10.191 \
to-ports=8920
add action=dst-nat chain=dstnat comment=Jitsi dst-address=my.wan.ip.addr \
dst-port=8448 protocol=tcp to-addresses=192.168.10.191 to-ports=8448
add action=dst-nat chain=dstnat dst-address=my.wan.ip.addr dst-port=10000-10002 \
protocol=udp to-addresses=192.168.10.191 to-ports=10000-10002
add action=dst-nat chain=dstnat dst-address=my.wan.ip.addr dst-port=5349 \
protocol=tcp to-addresses=192.168.10.191 to-ports=5349
add action=dst-nat chain=dstnat dst-address=my.wan.ip.addr dst-port=4443 \
protocol=tcp src-port="" to-addresses=192.168.10.191 to-ports=4443
add action=log chain=srcnat comment="Logging SRC NAT" disabled=yes log=yes \
log-prefix=SRC-NAT
add action=log chain=dstnat comment="Logging DST NAT" disabled=yes log=yes \
log-prefix=DST-NAT
/ip firewall raw
add action=drop chain=prerouting in-interface-list=WAN log=yes log-prefix=\
"Blacklist Raw" src-address-list=Blacklist
add action=notrack chain=prerouting comment="Office" dst-address=\
10.0.0.0/24 src-address=192.168.10.0/24
add action=notrack chain=prerouting comment="Office" dst-address=\
192.168.10.0/24 src-address=10.0.0.0/24
add action=notrack chain=prerouting comment="Working for Asterisk" \
dst-address=192.168.98.0/24 src-address=192.168.10.0/24
add action=notrack chain=prerouting comment="Working for Asterisk" \
dst-address=192.168.10.0/24 src-address=192.168.98.0/24
add action=notrack chain=prerouting comment="Working for Cloud" dst-address=\
192.168.99.0/24 src-address=192.168.10.0/24
add action=notrack chain=prerouting comment="Working for Cloud" dst-address=\
192.168.10.0/24 src-address=192.168.99.0/24
add action=notrack chain=prerouting comment="Working for Test" dst-address=\
192.168.97.0/24 src-address=192.168.10.0/24
add action=notrack chain=prerouting comment="Working for Test" dst-address=\
192.168.10.0/24 src-address=192.168.97.0/24
add action=log chain=prerouting disabled=yes log=yes log-prefix=RawPrerouting
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
/ip ipsec identity
add auth-method=digital-signature certificate="Mikrotik ES" match-by=\
certificate peer=ike2-Asterisk remote-certificate="Asterisk Server"
add auth-method=digital-signature certificate="Mikrotik ES" peer=ike2-WorkNew \
remote-certificate="Mikrotik UK"
add auth-method=digital-signature certificate="Mikrotik ES" peer=ike2-Cloud \
remote-certificate="Cloud Server"
add auth-method=digital-signature certificate="Mikrotik ES" match-by=\
certificate peer=ike2-Test remote-certificate="Test Server"
/ip ipsec policy
add dst-address=192.168.98.0/24 peer=ike2-Asterisk proposal=ike2-256-4096 \
src-address=192.168.10.0/24 tunnel=yes
add dst-address=10.0.0.0/24 peer=ike2-WorkNew proposal=ike2-256-4096 \
src-address=192.168.10.0/24 tunnel=yes
add dst-address=192.168.99.0/24 peer=ike2-Cloud proposal=ike2-256-4096 \
src-address=192.168.10.0/24 tunnel=yes
add dst-address=192.168.97.0/24 peer=ike2-Test proposal=ike2-256-4096 \
src-address=192.168.10.0/24 tunnel=yes
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=0.0.0.0/0
set ssh port=2224
set www-ssl address=0.0.0.0/0
set api disabled=yes
set winbox address=0.0.0.0/0
set api-ssl disabled=yes
/ip ssh
set strong-crypto=yes
/ipv6 address
add address=2001:470:1f12:3ef::2 advertise=no comment="Client IPv6 address" \
interface=sit1
add address=2001:470:1f13:3ee::1 comment="Router /64" interface=bridge
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
add address=::224.0.0.0/100 comment="defconf: other" list=bad_ipv6
add address=::127.0.0.0/104 comment="defconf: other" list=bad_ipv6
add address=::/104 comment="defconf: other" list=bad_ipv6
add address=::255.0.0.0/104 comment="defconf: other" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/ipv6 firewall mangle
add action=change-mss chain=forward new-mss=clamp-to-pmtu out-interface=\
pppoe-out1 passthrough=yes protocol=tcp tcp-flags=syn
/ipv6 nd
set [ find default=yes ] interface=bridge ra-interval=5s-30s
/ipv6 route
add comment="Hurricane Routes" distance=1 dst-address=2000::/3 gateway=\
2001:470:1f12:3ef::1
/lcd
set default-screen=stat-slideshow
/lcd pin
set hide-pin-number=yes pin-number=3713
/lcd interface
set ether2 disabled=yes
set ether3 disabled=yes
set ether4 disabled=yes
set ether5 disabled=yes
set ether6 disabled=yes
set ether7 disabled=yes
set ether8 disabled=yes
set ether9 disabled=yes
set ether10 disabled=yes
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Madrid
/system clock manual
set time-zone=+01:00
/system identity
set name=RouterOS
/system logging
set 3 action=memory
add disabled=yes topics=firewall
add disabled=yes prefix=!packet topics=ipsec
/system ntp client
set enabled=yes primary-ntp=192.168.10.1
/tool bandwidth-server
set enabled=no
/tool graphing interface
add allow-address=192.168.10.0/24 interface=pppoe-out1
add allow-address=192.168.10.0/24 interface=bridge
add allow-address=192.168.10.0/24 interface=sit1
add allow-address=192.168.10.0/24 interface=sfp1-ToSwitch
/tool graphing resource
add allow-address=192.168.10.0/24
/tool mac-server ping
set enabled=no
/tool sniffer
set filter-direction=rx filter-interface=all filter-ip-address=\
192.168.98.1/32
Please let me know if more information is required. Any advice appreciated.
I’d happily pay someone if I thought they could fix it… 