Here is the config for the router 01
apr/26/2023 19:16:30 by RouterOS 7.8
software id = XXX
model = RB5009UG+S+
/interface bridge
add admin-mac=XX:XX:XX:XX:XX:XX auto-mac=no comment=defconf frame-types=
admit-only-vlan-tagged name=bridge protocol-mode=none pvid=20
vlan-filtering=yes
/interface vlan
add interface=bridge name=GUEST_VLAN vlan-id=3090
add interface=bridge name=MGMT_VLAN vlan-id=20
add interface=bridge name=VLAN5 vlan-id=5
add interface=bridge name=VLAN10 vlan-id=10
add interface=ether1 name=VLAN835 vlan-id=835
/interface pppoe-client
add disabled=no interface=VLAN835 name=pppoe-out user=XXX
/interface vrrp
add interface=VLAN5 name=vrrp5 vrid=5
add interface=VLAN5 name=vrrp6 priority=254 vrid=6
add interface=VLAN10 name=vrrp10 vrid=10
add interface=VLAN10 name=vrrp11 priority=200 vrid=11
add interface=MGMT_VLAN name=vrrp20 vrid=20
add interface=MGMT_VLAN name=vrrp21 priority=200 vrid=21
add interface=GUEST_VLAN name=vrrp3090 vrid=90
add interface=GUEST_VLAN name=vrrp3091 priority=254 vrid=91
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=VRRP
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=MGMT_POOL ranges=XX.YY.72.201-XX.YY.72.250
add name=VLAN5_POOL ranges=XX.YY.70.201-XX.YY.70.250
add name=VLAN10_POOL ranges=XX.YY.71.231-XX.YY.71.250
add name=GUEST_POOL ranges=192.168.ZZ.101-192.168.ZZ.150
/ip dhcp-server
add address-pool=MGMT_POOL comment=“DHCP Server”
interface=MGMT_VLAN name=MGMT_DHCP
add address-pool=VLAN5_POOL comment=“DHCP Server” interface=VLAN5
name=VLAN5_DHCP
add address-pool=VLAN10_POOL comment=“DHCP Server” interface=VLAN10 name=
VLAN10_DHCP
add address-pool=GUEST_POOL comment=“Guest DHCP Server” interface=GUEST_VLAN
name=GUEST_DHCP
/user group
add name=remote policy=“ssh,read,write,!local,!telnet,!ftp,!reboot,!policy,!te
st,!winbox,!password,!web,!sniff,!sensitive,!api,!romon,!rest-api”
/interface bridge port
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether3 pvid=5
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether4 pvid=10
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether5 pvid=3090
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=“Management Access Port” frame-types=
admit-only-untagged-and-priority-tagged interface=ether8 pvid=20
add bridge=bridge comment=defconf frame-types=admit-only-vlan-tagged
interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set rp-filter=loose
/ipv6 settings
set disable-ipv6=yes
/interface bridge vlan
add bridge=bridge comment=“VLAN 5” tagged=bridge,sfp-sfpplus1
untagged=ether3 vlan-ids=5
add bridge=bridge comment=“VLAN 10” tagged=bridge,sfp-sfpplus1 untagged=
ether4 vlan-ids=10
add bridge=bridge comment=“VLAN 20” tagged=
bridge,sfp-sfpplus1 untagged=ether8 vlan-ids=20
add bridge=bridge comment=“VLAN Guest” tagged=bridge,sfp-sfpplus1 untagged=
ether5 vlan-ids=3090
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=WAN
add interface=pppoe-out list=WAN
add interface=vrrp5 list=VRRP
add interface=vrrp6 list=VRRP
add interface=vrrp10 list=VRRP
add interface=vrrp11 list=VRRP
add interface=vrrp20 list=VRRP
add interface=vrrp21 list=VRRP
add interface=vrrp3090 list=VRRP
add interface=vrrp3091 list=VRRP
/ip address
add address=XX.YY.72.111/24 comment=“VLAN Gateway” interface=
MGMT_VLAN network=XX.YY.72.0
add address=XX.YY.70.111/24 comment=“VLAN Gateway” interface=VLAN5
network=XX.YY.70.0
add address=XX.YY.71.111/24 comment=“VLAN Gateway” interface=VLAN10
network=XX.YY.71.0
add address=192.168.ZZ.253/24 comment=“VLAN Guest Gateway” interface=
GUEST_VLAN network=192.168.ZZ.0
add address=XX.YY.72.115 interface=vrrp20 network=XX.YY.72.115
add address=XX.YY.72.116 interface=vrrp21 network=XX.YY.72.116
add address=XX.YY.70.115 interface=vrrp5 network=XX.YY.70.115
add address=XX.YY.70.116 interface=vrrp6 network=XX.YY.70.116
add address=XX.YY.71.115 interface=vrrp10 network=XX.YY.71.115
add address=XX.YY.71.116 interface=vrrp11 network=XX.YY.71.116
add address=192.168.ZZ.1 interface=vrrp3090 network=192.168.ZZ.1
add address=192.168.ZZ.2 interface=vrrp3091 network=192.168.ZZ.2
/ip dhcp-client
add interface=ether2
/ip dhcp-server network
add address=XX.YY.70.0/24 dns-server=XX.YY.70.111,1.1.1.1,8.8.8.8 gateway=
XX.YY.70.116
add address=XX.YY.71.0/24 dns-server=XX.YY.71.111,1.1.1.1,8.8.8.8 gateway=
XX.YY.71.115
add address=XX.YY.72.0/24 dns-server=XX.YY.72.111,1.1.1.1,8.8.8.8 gateway=
XX.YY.72.115
add address=192.168.ZZ.0/24 dns-server=192.168.ZZ.253,1.1.1.1,8.8.8.8
gateway=192.168.ZZ.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,8.8.8.8
/ip dns static
add address=XX.YY.72.115 comment=“Secured / Management Network” name=
router.lan
add address=159.148.172.226 name=upgrade.mikrotik.com
/ip firewall filter
add action=accept chain=input comment=
“defconf: accept established,related,untracked” connection-state=
established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=
invalid log=yes log-prefix=“*** drop invalids "
add action=accept chain=input comment=“accept vrrp packets” protocol=vrrp
add action=accept chain=input comment=“defconf: accept ICMP” disabled=yes
protocol=icmp
add action=accept chain=input comment=
“allow VLAN 5 only (inter-vlan is blocked)” dst-address=XX.YY.70.0/24
src-address=XX.YY.70.0/24
add action=accept chain=input comment=
“allow VLAN 10 only (inter-vlan is blocked)” dst-address=XX.YY.71.0/24
src-address=XX.YY.71.0/24
add action=accept chain=input comment=
“allow VLAN 20 only (inter-vlan is blocked)” dst-address=
XX.YY.72.0/24 src-address=XX.YY.72.0/24
add action=accept chain=input comment=
“allow GUEST VLAN 3090 only (inter-vlan is blocked)” disabled=yes
dst-address=192.168.ZZ.0/24 src-address=192.168.ZZ.0/24
add action=accept chain=input comment=“"defconf: accept local loopback (for D
ude, RADIUS, user-manager, CAPsMAN, Wireguard) (https://forum.mikrotik.com
/viewtopic.php?t=180838)” dst-address=127.0.0.1
add action=reject chain=input comment=" TBC LOGGING *** optional → useful
_but only if interested in tracking LAN issues (https://forum.mikrotik.co
m/viewtopic.php?t=180838) - The purpose of the action=reject rule is to p
revent users in LAN from waiting for tens of seconds to get a timeout if t
hey are trying to connect to forbidden destinations, and of course for the
_admin to be aware of traffic that has the potential to be a problem (aka
_pinpoint device with issues).” in-interface-list=LAN log=yes
log-prefix=“*** TRACKING LAN ISSUES " reject-with=
icmp-admin-prohibited
add action=drop chain=input comment=“block everything else”
add action=drop chain=input comment=“defconf: drop all not coming from LAN”
disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related,untracked
add action=accept chain=forward comment=“need this rule to manage the ISP fail
over on the other VRRP router, otherwise these packets will be discarded a
s invalid by the next rule.” in-interface-list=VRRP out-interface=
MGMT_VLAN
add action=accept chain=forward comment=“need this rule to manage the ISP fail
over on the other VRRP router, otherwise these packets will be discarded a
s invalid by the next rule.” in-interface-list=VRRP out-interface=
pppoe-out
add action=drop chain=forward comment=“defconf: drop invalid”
connection-state=invalid log=yes log-prefix=" drop invalid "
add action=accept chain=forward comment=“allow internet traffic (all vrrp inte
rfaces) - non presente in RB5009 default, aggiunto da CCR2216 (che usava i
nvece all-vlan).” in-interface=all-vlan out-interface-list=WAN
add action=accept chain=forward comment=“allow port forwarding
\ (https://forum.mikrotik.com/viewtopic.php?t=180838)
" connection-nat-state=dstnat disabled=yes
add action=reject chain=forward comment=” TBC LOGGING *** optional → usef
ul for tracking LAN issues - in most installations the rule doesn’t have t
o care about multicast traffic because it never sees it (https://forum.mik
rotik.com/viewtopic.php?t=180838) - The purpose of the action=reject rule
_is to prevent users in LAN from waiting for tens of seconds to get a tim
eout if they are trying to connect to forbidden destinations, and of cours
e for the admin to be aware of traffic that has the potential to be a prob
lem (aka pinpoint device with issues).” dst-address=!0.0.0.0/0
in-interface-list=LAN log=yes log-prefix=“*** TRACK LAN ISSUES "
reject-with=icmp-admin-prohibited
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed
_- drop access to clients behind NAT from WAN - drops all new connection
attempts from the WAN port to our LAN network (unless DstNat is used). Wit
hout this rule, if an attacker knows or guesses your local subnet, he/she
can establish connections directly to local hosts and cause a security thr
eat.” connection-nat-state=!dstnat connection-state=new
in-interface-list=WAN
add action=drop chain=forward comment=“block everything else - non presente in
_RB5009 default” log-prefix=" blocked fwd ***”
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade”
ipsec-policy=out,none out-interface-list=WAN
/ip route
add comment=“WAN1 ISP1 via PPPoE” disabled=yes distance=1 dst-address=
0.0.0.0/0 gateway=pppoe-out pref-src=“” routing-table=main scope=30
suppress-hw-offload=no target-scope=10
add comment=“4G/LTE ISP via ether2” disabled=yes distance=2 dst-address=
0.0.0.0/0 gateway=ether2 pref-src=“” routing-table=main scope=30
suppress-hw-offload=no target-scope=10
add check-gateway=ping distance=1 dst-address=0.0.0.0/0 gateway=1.0.0.1
scope=10 target-scope=12
add comment=“WAN1 ISP1 via PPPoE - ping host 1” distance=1 dst-address=
1.0.0.1/32 gateway=pppoe-out scope=10 target-scope=11
add check-gateway=ping distance=2 dst-address=0.0.0.0/0 gateway=9.9.9.9
scope=10 target-scope=12
add comment=“WAN1 ISP1 via PPPoE - ping host 2” distance=2 dst-address=
9.9.9.9/32 gateway=pppoe-out scope=10 target-scope=11
add comment=“ISP2 via Backup Router” disabled=no distance=3 dst-address=
0.0.0.0/0 gateway=XX.YY.72.112 pref-src=“” routing-table=main scope=3
suppress-hw-offload=no target-scope=30
add comment=“4G/LTE ISP via ether2” disabled=no distance=4 dst-address=
0.0.0.0/0 gateway=ether2 pref-src=“” routing-table=main
suppress-hw-offload=no
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set www-ssl certificate=Webfig disabled=no
set api disabled=yes
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=“MikroTik RB5009 #01”
/system ntp client
set enabled=yes
/system ntp client servers
add address=194.0.5.123
add address=216.239.32.15
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=LAN
and here the config for the router 02
apr/26/2023 19:17:17 by RouterOS 7.8
software id = XXX
model = RB5009UG+S+
/interface bridge
add admin-mac=XX:XX:XX:XX:XX:XX auto-mac=no comment=defconf frame-types=
admit-only-vlan-tagged name=bridge protocol-mode=none pvid=20
vlan-filtering=yes
/interface vlan
add interface=bridge name=GUEST_VLAN vlan-id=3090
add interface=bridge name=MGMT_VLAN vlan-id=20
add interface=bridge name=VLAN5 vlan-id=5
add interface=bridge name=VLAN10 vlan-id=10
add interface=ether1 name=VLAN835 vlan-id=835
/interface pppoe-client
add disabled=no interface=VLAN835 name=pppoe-out user=XXX
/interface vrrp
add interface=VLAN5 name=vrrp5 priority=200 vrid=5
add interface=VLAN5 name=vrrp6 vrid=6
add interface=VLAN10 name=vrrp10 priority=254 vrid=10
add interface=VLAN10 name=vrrp11 vrid=11
add interface=MGMT_VLAN name=vrrp20 priority=254 vrid=20
add interface=MGMT_VLAN name=vrrp21 vrid=21
add interface=GUEST_VLAN name=vrrp3090 priority=200 vrid=90
add interface=GUEST_VLAN name=vrrp3091 vrid=91
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=VRRP
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=MGMT_POOL ranges=XX.YY.72.201-XX.YY.72.250
add name=VLAN5_POOL ranges=XX.YY.70.201-XX.YY.70.250
add name=VLAN10_POOL ranges=XX.YY.71.231-XX.YY.71.250
add name=GUEST_POOL ranges=192.168.ZZ.101-192.168.ZZ.150
/ip dhcp-server
add address-pool=MGMT_POOL comment=“DHCP Server”
interface=MGMT_VLAN name=MGMT_DHCP
add address-pool=VLAN5_POOL comment=“DHCP Server” interface=VLAN5
name=VLAN5_DHCP
add address-pool=VLAN10_POOL comment=“DHCP Server” interface=VLAN10 name=
VLAN10_DHCP
add address-pool=GUEST_POOL comment=“Guest DHCP Server” interface=GUEST_VLAN
name=GUEST_DHCP
/interface bridge port
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether3 pvid=5
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether4 pvid=10
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether5 pvid=3090
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf frame-types=
admit-only-untagged-and-priority-tagged interface=ether8 pvid=20
add bridge=bridge comment=defconf frame-types=admit-only-vlan-tagged
interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set rp-filter=loose
/ipv6 settings
set disable-ipv6=yes
/interface bridge vlan
add bridge=bridge comment=“VLAN 5” tagged=bridge,sfp-sfpplus1
untagged=ether3 vlan-ids=5
add bridge=bridge comment=“VLAN 10” tagged=bridge,sfp-sfpplus1 untagged=
ether4 vlan-ids=10
add bridge=bridge comment=“VLAN 20” tagged=
bridge,sfp-sfpplus1 untagged=ether8 vlan-ids=20
add bridge=bridge comment=“VLAN Guest” tagged=bridge,sfp-sfpplus1 untagged=
ether5 vlan-ids=3090
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=WAN
add interface=pppoe-out list=WAN
add interface=vrrp5 list=VRRP
add interface=vrrp6 list=VRRP
add interface=vrrp10 list=VRRP
add interface=vrrp11 list=VRRP
add interface=vrrp20 list=VRRP
add interface=vrrp21 list=VRRP
add interface=vrrp3090 list=VRRP
add interface=vrrp3091 list=VRRP
/ip address
add address=XX.YY.72.112/24 comment=“VLAN Gateway”
interface=MGMT_VLAN network=XX.YY.72.0
add address=XX.YY.70.112/24 comment=“VLAN Gateway” interface=VLAN5
network=XX.YY.70.0
add address=XX.YY.71.112/24 comment=“VLAN Gateway” interface=VLAN10
network=XX.YY.71.0
add address=192.168.ZZ.254/24 comment=“VLAN Guest Gateway” interface=
GUEST_VLAN network=192.168.ZZ.0
add address=XX.YY.72.115 interface=vrrp20 network=XX.YY.72.115
add address=XX.YY.72.116 interface=vrrp21 network=XX.YY.72.116
add address=XX.YY.70.115 interface=vrrp5 network=XX.YY.70.115
add address=XX.YY.70.116 interface=vrrp6 network=XX.YY.70.116
add address=XX.YY.71.115 interface=vrrp10 network=XX.YY.71.115
add address=XX.YY.71.116 interface=vrrp11 network=XX.YY.71.116
add address=192.168.ZZ.1 interface=vrrp3090 network=192.168.ZZ.1
add address=192.168.ZZ.2 interface=vrrp3091 network=192.168.ZZ.2
/ip dhcp-client
add interface=ether2
/ip dhcp-server network
add address=XX.YY.70.0/24 dns-server=XX.YY.70.112,1.1.1.1,8.8.8.8 gateway=
XX.YY.70.116
add address=XX.YY.71.0/24 dns-server=XX.YY.71.112,1.1.1.1,8.8.8.8 gateway=
XX.YY.71.115
add address=XX.YY.72.0/24 dns-server=XX.YY.72.112,1.1.1.1,8.8.8.8 gateway=
XX.YY.72.115
add address=192.168.ZZ.0/24 dns-server=192.168.ZZ.254,1.1.1.1,8.8.8.8
gateway=192.168.ZZ.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,8.8.8.8
/ip dns static
add address=XX.YY.72.116 comment=“Secured / Management Network Gateway” name=
router.lan
add address=159.148.172.226 name=upgrade.mikrotik.com
/ip firewall filter
add action=accept chain=input comment=
“defconf: accept established,related,untracked” connection-state=
established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=
invalid
add action=accept chain=input comment=“accept vrrp packets” protocol=vrrp
add action=accept chain=input comment=“defconf: accept ICMP” disabled=yes
protocol=icmp
add action=accept chain=input comment=
“allow VLAN 5 only (inter-vlan is blocked)” dst-address=XX.YY.70.0/24
src-address=XX.YY.70.0/24
add action=accept chain=input comment=
“allow VLAN 10 only (inter-vlan is blocked)” dst-address=XX.YY.71.0/24
src-address=XX.YY.71.0/24
add action=accept chain=input comment=
“allow VLAN 20 only (inter-vlan is blocked)” dst-address=
XX.YY.72.0/24 src-address=XX.YY.72.0/24
add action=accept chain=input comment=
“allow GUEST VLAN 3090 only (inter-vlan is blocked)” disabled=yes
dst-address=192.168.ZZ.0/24 src-address=192.168.ZZ.0/24
add action=accept chain=input comment=“"defconf: accept local loopback (for D
ude, RADIUS, user-manager, CAPsMAN, Wireguard) (https://forum.mikrotik.com
/viewtopic.php?t=180838)” dst-address=127.0.0.1
add action=reject chain=input comment=“*** TBC LOGGING *** optional → useful
_but only if interested in tracking LAN issues (https://forum.mikrotik.co
m/viewtopic.php?t=180838) - The purpose of the action=reject rule is to p
revent users in LAN from waiting for tens of seconds to get a timeout if t
hey are trying to connect to forbidden destinations, and of course for the
_admin to be aware of traffic that has the potential to be a problem (aka
_pinpoint device with issues).” in-interface-list=LAN log=yes
log-prefix=“*** TRACKING LAN ISSUES ***” reject-with=
icmp-admin-prohibited
add action=drop chain=input comment=“block everything else”
add action=drop chain=input comment=“defconf: drop all not coming from LAN”
disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related,untracked
add action=accept chain=forward comment=“need this rule to manage the ISP fail
over on the other VRRP router, otherwise these packets will be discarded a
s invalid by the next rule.” in-interface-list=VRRP out-interface=
MGMT_VLAN
pppoe-out not ready
add action=accept chain=forward comment=“need this rule to manage the ISP fail
over on the other VRRP router, otherwise these packets will be discarded a
s invalid by the next rule.” in-interface-list=VRRP out-interface=
pppoe-out
add action=drop chain=forward comment=“defconf: drop invalid”
connection-state=invalid log=yes log-prefix=“*** invalid "
add action=accept chain=forward comment=“allow internet traffic (all vrrp inte
rfaces) - non presente in RB5009 default, aggiunto da CCR2216 (che usava i
nvece all-vlan).” in-interface=all-vlan out-interface-list=WAN
add action=accept chain=forward comment=“allow port forwarding
\ (https://forum.mikrotik.com/viewtopic.php?t=180838)
" connection-nat-state=dstnat disabled=yes
add action=reject chain=forward comment=” TBC LOGGING *** optional → usef
ul for tracking LAN issues - in most installations the rule doesn’t have t
o care about multicast traffic because it never sees it (https://forum.mik
rotik.com/viewtopic.php?t=180838) - The purpose of the action=reject rule
_is to prevent users in LAN from waiting for tens of seconds to get a tim
eout if they are trying to connect to forbidden destinations, and of cours
e for the admin to be aware of traffic that has the potential to be a prob
lem (aka pinpoint device with issues).” dst-address=!0.0.0.0/0
in-interface-list=LAN log=yes log-prefix=“*** TRACK LAN ISSUES "
reject-with=icmp-admin-prohibited
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed
_- drop access to clients behind NAT from WAN - drops all new connection
attempts from the WAN port to our LAN network (unless DstNat is used). Wit
hout this rule, if an attacker knows or guesses your local subnet, he/she
can establish connections directly to local hosts and cause a security thr
eat.” connection-nat-state=!dstnat connection-state=new
in-interface-list=WAN
add action=drop chain=forward comment=“block everything else” log-prefix=
" blocked by fwd ***”
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade”
ipsec-policy=out,none out-interface-list=WAN
/ip route
add comment=“WAN1 ISP2 via PPPoE” disabled=yes distance=1 dst-address=
0.0.0.0/0 gateway=pppoe-out pref-src=“” routing-table=main scope=30
suppress-hw-offload=no target-scope=10
add comment=“4G/LTE ISP via ether2” disabled=yes distance=2 dst-address=
0.0.0.0/0 gateway=ether2 pref-src=“” routing-table=main scope=30
suppress-hw-offload=no target-scope=10
add check-gateway=ping distance=1 dst-address=0.0.0.0/0 gateway=1.0.0.1
scope=10 target-scope=12
add comment=“WAN1 ISP2 via PPPoE - ping host 1” distance=1 dst-address=
1.0.0.1/32 gateway=pppoe-out scope=10 target-scope=11
add check-gateway=ping distance=2 dst-address=0.0.0.0/0 gateway=9.9.9.9
scope=10 target-scope=12
add comment=“WAN1 ISP2 via PPPoE - ping host 2” distance=2 dst-address=
9.9.9.9/32 gateway=pppoe-out scope=10 target-scope=11
add comment=“ISP1 via Backup Router” disabled=no distance=3 dst-address=
0.0.0.0/0 gateway=XX.YY.72.111 pref-src=“” routing-table=main scope=3
suppress-hw-offload=no target-scope=30
add comment=“4G/LTE ISP via ether2” disabled=no distance=4 dst-address=
0.0.0.0/0 gateway=ether2 pref-src=“” routing-table=main
suppress-hw-offload=no
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set www-ssl certificate=Webfig disabled=no
set api disabled=yes
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=“MikroTik RB5009 #02”
/system ntp client
set enabled=yes
/system ntp client servers
add address=194.0.5.123
add address=216.239.32.15
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=LAN