VU+ ZERO 4K satellit receiver port forward

Hello! I am sorry, I do not speak English. I want to ask for help. There is a VU+ ZERO 4K satellite receiver and I would like to access it from outside on port 82. I have done many things but it won’t work. I am at a loss as to what to do.
Képernyőfotó 2024-05-25 - 5.55.46.png
Képernyőfotó 2024-05-25 - 5.55.13.png

Do you have a public IP on “pppoe-out1” ? If you are behind NAT from your ISP this will never work.
So what “WAN” IP did you receive ? 100.64.0.0 to 100.127.255.255 ??

Hello! I’m not NATed because I used OpenWRT and it worked.

First off, don’t open any ports to the internet. Use a VPN instead, like WireGuard or ZeroTier. Then you can access it using its local IP address.

If you’re trying to figure out how to access the receiver on your local network, you’ll first need to find its IP address.

I would like to access the box from outside instead of VPN, because then the cross-section is not reduced. The VPN is active, but I don’t want to use it with proper port protection.

Before anyone will jump in to support you, you’ll be asked to provide your full config anyway.
You might have broken things because of “I have done many things”

Do you have a rule in the FORWARD chain to allow (valid) DNAT-traffic “trough” ? This should be part of the default firewall-rules.

Hello! How can I enter the complete configuration?

Execute something like this on the CLI

/export file=myconfig (minus router serial number and any public WANIP info, keys etc.. )

It will create a file and then you can get it off your router with Winbox for example and upload into the forum

If you don’t understand any of the above, I suggest you start with understanding better the basics of a RouterOS/Mikrotik product before venturing into various configurations.

Letöltöttem a kért konfigurációs állományt:

Moderation edit … please use English and proper tags for code as your post do not fit on two screens.
I have downloaded the requested configuration file

# 2024-05-25 14:41:20 by RouterOS 7.14.3
# software id = IDNR-SIMX
#
# model = C53UiG+5HPaxD2HPaxD
# serial number =
/interface bridge
add admin-mac=78:9A:18:94:B6:5A auto-mac=no comment=defconf name=bridge
/interface wifi
set [ find default-name=wifi1 ] channel.skip-dfs-channels=10min-cac \
    configuration.country=Hungary .mode=ap .ssid=MikroTik-94B65E disabled=no \
    security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
set [ find default-name=wifi2 ] channel.skip-dfs-channels=10min-cac \
    configuration.country=Hungary .mode=ap .ssid=MikroTik-94B65G disabled=no \
    security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
add configuration.mode=ap .ssid="MikroTik-94B65E's Guests" disabled=no \
    mac-address=7A:9A:18:94:B6:5E master-interface=wifi1 name=wifi3 \
    security.authentication-types=wpa2-psk,wpa3-psk
add configuration.mode=ap .ssid="MikroTik-94B65E's Guests" disabled=no \
    mac-address=7A:9A:18:94:B6:5F master-interface=wifi2 name=wifi4 \
    security.authentication-types=wpa2-psk,wpa3-psk
/interface wireguard
add comment=back-to-home-vpn listen-port=10140 mtu=1420 name=back-to-home-vpn
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 \
    use-peer-dns=yes user=tulipan
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/ppp profile
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/interface bridge filter
add action=drop chain=forward in-interface=wifi3
add action=drop chain=forward out-interface=wifi3
add action=drop chain=forward in-interface=wifi4
add action=drop chain=forward out-interface=wifi4
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wifi1
add bridge=bridge comment=defconf interface=wifi2
add bridge=bridge interface=wifi3
add bridge=bridge interface=wifi4
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
/interface wireguard peers
add allowed-address=192.168.216.3/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPhone 13 Pro)" interface=back-to-home-vpn \
    public-key="C1vsn2ze2r3E7pFv5ZDFiB+r7t5fsisPUwl7eOv1ayw="
add allowed-address=192.168.216.4/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPad Mini (6th generation))" interface=\
    back-to-home-vpn public-key=\
    "EMvcbJUndh792pusZ/06ZZAH9F8bb1Wj83YxmDely2c="
add allowed-address=192.168.216.5/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPad (9th generation))" interface=back-to-home-vpn \
    public-key="rpTI4sBp3uh4WcLogW8nqhBm5HRLTZ6IkfhSTVhjbBU="
add allowed-address=192.168.216.6/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPad Pro (12.9-inch) (3rd generation))" interface=\
    back-to-home-vpn public-key=\
    "Z4r/Siv/KwVLwkta/X3kMrKAWpEsBRop+Mb2kgOTcnI="
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
    192.168.88.0
/ip cloud
set back-to-home-vpn=enabled ddns-enabled=yes ddns-update-interval=10m
/ip dhcp-client
add comment="defconf -M\F3dos\EDtott Use PEER DNS - YES volt" disabled=yes \
    interface=ether1 use-peer-dns=no
/ip dhcp-server network
add address=192.168.88.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
    protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=accept chain=input comment=\
    "WINBOX csak bel\F5 h\E1l\F3zatb\F3l \E9rhet\F5 el" dst-port=8291 \
    in-interface=bridge protocol=tcp
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=bejovo_internet comment="Listan levo eldob" \
    src-address-list=ssh_feketelista
add action=add-src-to-address-list address-list=ssh_feketelista \
    address-list-timeout=none-dynamic chain=bejovo_internet comment=\
    "Robot probalkozasok" dst-port=21,22,23,80,443,8291 log=yes protocol=tcp
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=dst-nat chain=dstnat comment="VU ZERO 4K SERVER" dst-port=82 \
    in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.88.68 to-ports=\
    80
add action=dst-nat chain=dstnat comment="VU ZERO 4K STREAM" dst-port=8001 \
    in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.88.68 to-ports=\
    8001
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
    192.168.89.0/24
/ip service
set telnet disabled=yes
set ftp disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
    dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
    udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
    500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
/ppp secret
add name=vpn
/system clock
set time-zone-name=Europe/Budapest
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

i have VU+ ZERO 4K satellit receiver and it’s work port forward
1.png
2.png
3.png
4.png
5.png
6.png

Thank you for your answers. I don’t have sfp-WAN, I have ether1 instead. In theory, everything is set the same, but there is still no connection with the box.
Képernyőfotó 2024-05-25 - 18.28.13.png

The DNAT seems to hit, looking at the traffic-counters.
What are the Filter Rules in the FORWARD chain ? How do they look like ?

FYI:
Képernyőfotó 2024-05-25 - 19.12.10.png

Make a copy of Rule3 and place it just below Rule3 (you can never do harm like that)
Then edit the rule and in “General” on the bottom make sure the “Connection NAT State” menu has selected “dstnat” flag.
Clear all other flags that are on the “Connection State” menu.
Enable the “logging” flag so you see if fly by in the log-screen when it hits.

This means packets will be allowed to traverse the bridge if they have a valid dsnat-entry and then they can hit your backend sat-receiver/server whatever.
Then keep an eye on the counters/logging and test.

These screenshots don’t always tell the full picture or show all attributes clearly. A textual config is straight to the point…
I see some jumps to custom chains etc,etc.

On the NAT side, the bytes increase a little when trying to connect to the VU ZERO 4K SERVER line. For filter rules, there is no action on the created row. Unfortunately, the connection was not established. There is no reference to port forward in the Log.
Képernyőfotó 2024-05-25 - 19.47.32.png
Képernyőfotó 2024-05-25 - 19.56.09.png

Chain must be FORWARD in the “duplication rule”
It is about traffic GOING THROUGH THE BOX

# 2024-05-25 20:02:27 by RouterOS 7.14.3
# software id = IDNR-SIMX
#
# model = C53UiG+5HPaxD2HPaxD
# serial number = lost
/interface bridge
add admin-mac=78:9A:18:94:B6:5A auto-mac=no comment=defconf name=bridge
/interface wifi
set [ find default-name=wifi1 ] channel.skip-dfs-channels=10min-cac \
    configuration.country=Hungary .mode=ap .ssid=MikroTik-94B65E disabled=no \
    security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
set [ find default-name=wifi2 ] channel.skip-dfs-channels=10min-cac \
    configuration.country=Hungary .mode=ap .ssid=MikroTik-94B65G disabled=no \
    security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
add configuration.mode=ap .ssid="MikroTik-94B65E's Guests" disabled=no \
    mac-address=7A:9A:18:94:B6:5E master-interface=wifi1 name=wifi3 \
    security.authentication-types=wpa2-psk,wpa3-psk
add configuration.mode=ap .ssid="MikroTik-94B65E's Guests" disabled=no \
    mac-address=7A:9A:18:94:B6:5F master-interface=wifi2 name=wifi4 \
    security.authentication-types=wpa2-psk,wpa3-psk
/interface wireguard
add comment=back-to-home-vpn listen-port=10140 mtu=1420 name=back-to-home-vpn
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 \
    use-peer-dns=yes user=nobody
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/ppp profile
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/routing table
add disabled=no fib name=LAN
add disabled=no fib name=WAN
/interface bridge filter
add action=drop chain=forward in-interface=wifi3
add action=drop chain=forward out-interface=wifi3
add action=drop chain=forward in-interface=wifi4
add action=drop chain=forward out-interface=wifi4
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wifi1
add bridge=bridge comment=defconf interface=wifi2
add bridge=bridge interface=wifi3
add bridge=bridge interface=wifi4
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
/interface wireguard peers
add allowed-address=192.168.216.3/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPhone 13 Pro)" interface=back-to-home-vpn \
    public-key="C1vsn2ze2r3E7pFv5ZDFiB+r7t5fsisPUwl7eOv1ayw="
add allowed-address=192.168.216.4/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPad Mini (6th generation))" interface=\
    back-to-home-vpn public-key=\
    "EMvcbJUndh792pusZ/06ZZAH9F8bb1Wj83YxmDely2c="
add allowed-address=192.168.216.5/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPad (9th generation))" interface=back-to-home-vpn \
    public-key="rpTI4sBp3uh4WcLogW8nqhBm5HRLTZ6IkfhSTVhjbBU="
add allowed-address=192.168.216.6/32 comment=\
    "C53UiG+5HPaxD2HPaxD (iPad Pro (12.9-inch) (3rd generation))" interface=\
    back-to-home-vpn public-key=\
    "Z4r/Siv/KwVLwkta/X3kMrKAWpEsBRop+Mb2kgOTcnI="
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
    192.168.88.0
/ip cloud
set back-to-home-vpn=enabled ddns-enabled=yes ddns-update-interval=10m
/ip dhcp-client
add comment="defconf -M\F3dos\EDtott Use PEER DNS - YES volt" disabled=yes \
    interface=ether1 use-peer-dns=no
/ip dhcp-server network
add address=192.168.88.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=accept chain=input comment=Duplication connection-nat-state=dstnat \
    connection-state="" log=yes
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
    protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=accept chain=input comment=WINBOX dst-port=8291 in-interface=\
    bridge protocol=tcp
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=input_internet comment="Drop of list" src-address-list=\
    "ssh_black list"
add action=add-src-to-address-list address-list=ssh_feketelista \
    address-list-timeout=none-dynamic chain=Input_internet comment=\
    "Robot attack" dst-port=21,22,23,80,443,8291 log=yes protocol=tcp
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
    192.168.89.0/24
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface=pppoe-out1 out-interface-list=WAN
add action=dst-nat chain=dstnat comment="VU ZERO 4K STREAM" dst-port=8001 \
    in-interface-list=WAN protocol=tcp to-addresses=192.168.88.68 to-ports=\
    8001
add action=dst-nat chain=dstnat comment="VU ZERO 4K STREAM" dst-port=8002 \
    in-interface-list=WAN protocol=tcp to-addresses=192.168.88.68 to-ports=\
    8002
add action=dst-nat chain=dstnat comment="VU ZERO 4K SERVER" dst-port=80 \
    in-interface-list=WAN protocol=tcp to-addresses=192.168.88.68 to-ports=80
/ip service
set telnet disabled=yes
set ftp disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
    dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
    udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
    500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
/ppp secret
add name=vpn
/system clock
set time-zone-name=Europe/Budapest
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

The counter has started, but there is still no connection.
Képernyőfotó 2024-05-25 - 20.18.40.png

Can you disable the embedded webserver in the Mikrotik ?
Under “IP” → “Services” and look for the “www”