Hello there. I have a setup where I need three locations to be connected via wireguard. 2 of the three location will be utilizing existing internet provider by the owner of that location while the other is my own internet setup where I have full control to open/close specific ports.
Currently I have to sites set up: my own location (called Maragang) and the one of the 2 location called KKIP. My issue currently is that I am unable to establish a wireguard connection between the two location. I am able to connect to Maragang via wireguard using my phone set as a RoadWarrior tunnel (i.e. allowable address 0.0.0.0/0)
I have both config files for Maragang and KKIP. Appreciate your assistance on letting me know why the site to site connection is not establishing. Also if there’s anything at all that I seem to be doing wrong/not ideal, do let me know.
# 2025-07-22 15:08:59 by RouterOS 7.19.3
# software id = 7EPL-Q814
#
# model = RB760iGS
# serial number = ********
/interface bridge
add admin-mac=F4:1E:57:CE:58:F9 auto-mac=no comment=defconf name=bridge \
vlan-filtering=yes
/interface wireguard
add listen-port=16226 mtu=1420 name=wireguard1
/interface vlan
add interface=ether1 name=vlan1 vlan-id=500
add interface=bridge name=vlan_Admin vlan-id=4
add interface=bridge name=vlan_External vlan-id=30
add interface=bridge name=vlan_Hexide vlan-id=14
/interface pppoe-client
add add-default-route=yes disabled=no interface=vlan1 name=pppoe-out1 \
use-peer-dns=yes user=h*********************
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.48.10-192.168.48.254
add name=adrPool_Admin ranges=10.89.4.10-10.89.4.29
add name=adrPool_Hexide ranges=10.89.14.10-10.89.14.254
add name=adrPool_External ranges=172.30.14.10-172.30.14.69
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
add address-pool=adrPool_Admin interface=vlan_Admin name=dhcp1
add address-pool=adrPool_External interface=vlan_External name=dhcp2
add address-pool=adrPool_Hexide interface=vlan_Hexide name=dhcp3
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2 pvid=4
add bridge=bridge comment=defconf interface=ether3 pvid=14
add bridge=bridge comment=defconf interface=ether4 pvid=30
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=bridge tagged=bridge untagged=ether4 vlan-ids=30
add bridge=bridge tagged=bridge untagged=ether3 vlan-ids=14
add bridge=bridge tagged=bridge untagged=ether2 vlan-ids=4
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
add interface=vlan_Admin list=LAN
add interface=wireguard1 list=LAN
/interface wireguard peers
add allowed-address=10.2.12.0/27,10.89.3.0/24,10.89.13.0/24,172.30.13.0/24 \
interface=wireguard1 name=HexideTRC public-key=\
"0hmrXF7*************************************"
add allowed-address=10.2.12.0/27 interface=wireguard1 name=Faiz_Samsung \
public-key="5SQGuud*************************************"
add allowed-address=10.2.12.0/27,10.89.2.0/24,10.89.12.0/24,172.30.12.0/24 \
interface=wireguard1 name=HexideKKIP public-key=\
"+7QNpe9*************************************"
/ip address
add address=192.168.48.1/24 comment=defconf interface=bridge network=\
192.168.48.0
add address=10.89.4.1/24 interface=vlan_Admin network=10.89.4.0
add address=10.89.14.1/24 interface=vlan_Hexide network=10.89.14.0
add address=172.30.14.1/24 interface=vlan_External network=172.30.14.0
add address=10.2.12.1/27 interface=wireguard1 network=10.2.12.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf disabled=yes interface=ether1
/ip dhcp-server network
add address=10.89.4.0/24 dns-server=10.89.4.1 gateway=10.89.4.1
add address=10.89.14.0/24 dns-server=1.1.1.1,8.8.8.8 gateway=10.89.14.1
add address=172.30.14.0/24 dns-server=8.8.8.8,1.1.1.1 gateway=172.30.14.1
add address=192.168.48.0/24 comment=defconf dns-server=192.168.48.1 gateway=\
192.168.48.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.48.1 comment=defconf name=router.lan type=A
/ip firewall address-list
add address=10.89.4.0/24 list=Local_Admin
add address=10.89.14.0/24 list=Local_Hexide
add address=172.30.14.0/24 list=Local_External
add address=10.89.2.0/24 list=WG_Admin
add address=10.89.12.0/24 list=WG_Hexide
add address=172.30.12.0/24 list=WG_External
add address=10.89.3.0/24 list=WG_Admin
add address=10.89.13.0/24 list=WG_Hexide
add address=172.30.13.0/24 list=WG_External
add address=192.168.48.0/24 list=DefaultBridge
add address=10.2.12.24 list=WG_Admin
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input dst-port=16226 protocol=udp
add action=accept chain=input comment="Allow WG network" disabled=yes \
src-address=10.2.12.24
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=forward comment="Allow WG Admin To Local Admin" \
dst-address-list=Local_Admin src-address-list=WG_Admin
add action=accept chain=forward comment="Allow Local Admin To WG Admin" \
dst-address-list=WG_Admin src-address-list=Local_Admin
add action=accept chain=forward comment="Allow WG Admin To Local Hexide" \
dst-address-list=Local_Hexide src-address-list=WG_Admin
add action=accept chain=forward comment="Allow WG Admin To Local External" \
dst-address-list=Local_External src-address-list=WG_Admin
add action=accept chain=forward comment="Allow WG Hexide To Local Hexide" \
dst-address-list=Local_Hexide src-address-list=WG_Hexide
add action=accept chain=forward comment="Allow Local Hexide To WG Hexide" \
dst-address-list=WG_Hexide src-address-list=Local_Hexide
add action=accept chain=forward comment="Allow WG Hexide To Local External" \
dst-address-list=Local_External src-address-list=WG_Hexide
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="Drop Hexide to Admin" \
dst-address-list=Local_Admin src-address-list=Local_Hexide
add action=drop chain=forward comment="Drop External to Admin" \
dst-address-list=Local_Admin src-address-list=Local_External
add action=drop chain=forward comment="Drop External to Hexide" \
dst-address-list=Local_Hexide src-address-list=Local_External
add action=drop chain=forward comment="Drop WG Hexide To Local Admin" \
dst-address-list=Local_Admin src-address-list=WG_Hexide
add action=drop chain=forward comment="Drop WG External To Local Admin" \
dst-address-list=Local_Admin src-address-list=WG_External
add action=drop chain=forward comment="Drop Default to All" disabled=yes \
dst-address-list=!DefaultBridge src-address-list=DefaultBridge
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip route
add comment=WG_Admin_KKIP disabled=no dst-address=10.89.2.0/24 gateway=\
wireguard1 routing-table=main suppress-hw-offload=no
add comment=WG_Hexide_KKIP disabled=no distance=1 dst-address=10.89.12.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
add comment=WG_External_KKIP disabled=no distance=1 dst-address=\
172.30.12.0/24 gateway=wireguard1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment=WG_Admin_TRC disabled=no dst-address=10.89.3.0/24 gateway=\
wireguard1 routing-table=main suppress-hw-offload=no
add comment=WG_Hexide_TRC disabled=no distance=1 dst-address=10.89.13.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
add comment=WG_External_TRC disabled=no distance=1 dst-address=172.30.13.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=Asia/Kuala_Lumpur
/system identity
set name=Hexide_Maragang
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
# 2025-07-22 14:49:00 by RouterOS 7.19.3
# software id = 0AFC-R067
#
# model = RB760iGS
# serial number = **********
/interface bridge
add admin-mac=F4:1E:57:CE:59:39 auto-mac=no comment=defconf name=bridge \
vlan-filtering=yes
/interface wireguard
add listen-port=16226 mtu=1420 name=wireguard1
/interface vlan
add interface=bridge name=vlan_Admin vlan-id=2
add interface=bridge name=vlan_External vlan-id=30
add interface=bridge name=vlan_Hexide vlan-id=12
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.28.10-192.168.28.254
add name=adrPool_Admin ranges=10.89.2.10-10.89.2.29
add name=adrPool_Hexide ranges=10.89.12.10-10.89.12.254
add name=adrPool_External ranges=172.30.12.10-172.30.12.69
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
add address-pool=adrPool_Admin interface=vlan_Admin name=dhcp1
add address-pool=adrPool_External interface=vlan_External name=dhcp2
add address-pool=adrPool_Hexide interface=vlan_Hexide name=dhcp3
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2 pvid=2
add bridge=bridge comment=defconf interface=ether3 pvid=12
add bridge=bridge comment=defconf interface=ether4 pvid=30
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=bridge tagged=bridge untagged=ether2 vlan-ids=2
add bridge=bridge tagged=bridge untagged=ether3 vlan-ids=30
add bridge=bridge tagged=bridge untagged=ether3 vlan-ids=12
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=vlan_Admin list=LAN
add interface=wireguard1 list=LAN
add interface=vlan_Hexide list=LAN
/interface wireguard peers
add allowed-address=10.2.12.0/27,10.89.4.0/24,10.89.14.0/24,172.30.14.0/24 \
comment=Hexide_Maragang endpoint-address=myendpointaddress.fake \
endpoint-port=16226 interface=wireguard1 name=peer1 public-key=\
"b5223**********************************YrBw="
/ip address
add address=192.168.28.1/24 comment=defconf interface=bridge network=\
192.168.28.0
add address=10.89.2.1/24 interface=vlan_Admin network=10.89.2.0
add address=10.89.12.1/24 interface=vlan_Hexide network=10.89.12.0
add address=172.30.12.1/24 interface=vlan_External network=172.30.12.0
add address=10.2.12.2/27 interface=wireguard1 network=10.2.12.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=10.89.2.0/24 dns-server=192.168.28.1 gateway=10.89.2.1
add address=10.89.12.0/24 dns-server=10.89.12.30 gateway=10.89.12.1
add address=172.30.12.0/24 dns-server=192.168.28.1 gateway=172.30.12.1
add address=192.168.28.0/24 comment=defconf dns-server=192.168.28.1 gateway=\
192.168.28.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.28.1 comment=defconf name=router.lan type=A
/ip firewall address-list
add address=10.89.2.0/24 list=Local_Admin
add address=10.89.12.0/24 list=Local_Hexide
add address=172.30.12.0/24 list=Local_External
add address=10.89.4.0/24 list=WG_Admin
add address=10.89.14.0/24 list=WG_Hexide
add address=172.30.14.0/24 list=WG_External
add address=10.89.3.0/24 list=WG_Admin
add address=10.89.13.0/24 list=WG_Hexide
add address=172.30.13.0/24 list=WG_External
add address=192.168.28.0/24 list=DefaultBridge
add address=10.2.12.0/27 disabled=yes list=WG_Admin
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input dst-port=16226 protocol=udp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=forward comment="Allow WG Admin To Local Admin" \
dst-address-list=Local_Admin src-address-list=WG_Admin
add action=accept chain=forward comment="Allow Local Admin To WG Admin" \
dst-address-list=WG_Admin src-address-list=Local_Admin
add action=accept chain=forward comment="Allow WG Admin To Local Hexide" \
dst-address-list=Local_Hexide src-address-list=WG_Admin
add action=accept chain=forward comment="Allow WG Admin To Local External" \
dst-address-list=Local_External src-address-list=WG_Admin
add action=accept chain=forward comment="Allow WG Hexide To Local Hexide" \
dst-address-list=Local_Hexide src-address-list=WG_Hexide
add action=accept chain=forward comment="Allow Local Hexide To WG Hexide" \
dst-address-list=WG_Hexide src-address-list=Local_Hexide
add action=accept chain=forward comment="Allow WG Hexide To Local External" \
dst-address-list=Local_External src-address-list=WG_Hexide
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="Drop Hexide to Admin" \
dst-address-list=Local_Admin src-address-list=Local_Hexide
add action=drop chain=forward comment="Drop External to Admin" \
dst-address-list=Local_Admin src-address-list=Local_External
add action=drop chain=forward comment="Drop External to Hexide" \
dst-address-list=Local_Hexide src-address-list=Local_External
add action=drop chain=forward comment="Drop WG Hexide To Local Admin" \
dst-address-list=Local_Admin src-address-list=WG_Hexide
add action=drop chain=forward comment="Drop WG External To Local Admin" \
dst-address-list=Local_Admin src-address-list=WG_External
add action=drop chain=forward comment="Drop Default to All" disabled=yes \
dst-address-list=!DefaultBridge src-address-list=DefaultBridge
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip route
add comment=WG_Admin_Maragang disabled=no dst-address=10.89.4.0/24 gateway=\
wireguard1 routing-table=main suppress-hw-offload=no
add comment=WG_Hexide_Maragang disabled=no distance=1 dst-address=\
10.89.14.0/24 gateway=wireguard1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment=WG_External_Maragang disabled=no distance=1 dst-address=\
172.30.14.0/24 gateway=wireguard1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment=WG_Admin_TRC disabled=no dst-address=10.89.3.0/24 gateway=\
wireguard1 routing-table=main suppress-hw-offload=no
add comment=WG_Hexide_TRC disabled=no distance=1 dst-address=10.89.13.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
add comment=WG_External_TRC disabled=no distance=1 dst-address=172.30.13.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
add comment=WG_Admin_Maragang disabled=no dst-address=10.89.4.0/24 gateway=\
wireguard1 routing-table=main suppress-hw-offload=no
add comment=WG_Hexide_Maragang disabled=no distance=1 dst-address=\
10.89.14.0/24 gateway=wireguard1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment=WG_External_Maragang disabled=no distance=1 dst-address=\
172.30.14.0/24 gateway=wireguard1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment=WG_Admin_TRC disabled=no dst-address=10.89.3.0/24 gateway=\
wireguard1 routing-table=main suppress-hw-offload=no
add comment=WG_Hexide_TRC disabled=no distance=1 dst-address=10.89.13.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
add comment=WG_External_TRC disabled=no distance=1 dst-address=172.30.13.0/24 \
gateway=wireguard1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=Asia/Kuala_Lumpur
/system identity
set name=Hexide_KKIP
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN