I migrated the settings to my wannabe working setup. It worked! Until I decided to test it by rebooting. It stopped working after that. I’ve checked things for the last couple days and just can’t find the issue. The East side unit is existing. I upgraded the ROS and added the Wireguard. It has a lot of unused stuff from the IPSEC setup.
A question.
The mangle rule only works on TCP packets, but the firewall has to allow UDP. I don’t see any traffic on the mangle rules. How does a TCP rule help?
Here are the exports:
2025-10-19 18:35:42 by RouterOS 7.20.1
software id = TJEA-BPU1
model = E60iUGS
serial number =
/caps-man channel
add comment=2.4Ghz control-channel-width=10mhz frequency=2412,2437,2462 name=
US-WiFi
/interface bridge
add admin-mac=##:##:##:##:##:## auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether5 ] poe-out=off
/interface wireguard
add comment=WG-East-West listen-port=13400 mtu=1420 name=wg-east-west
add comment=WG-Management listen-port=13231 mtu=1420 name=wg-manage
/caps-man datapath
add bridge=bridge name=datapath1
/caps-man security
add authentication-types=wpa2-psk name=security1
/caps-man configuration
add country="united states3" datapath=datapath1 installation=any mode=ap
name=cfg1 security=security1 ssid=ridge
/caps-man interface
add configuration=cfg1 disabled=no l2mtu=1600 mac-address=##:##:##:##:##:##
master-interface=none name=cap1 radio-mac=##:##:##:##:##:## radio-name=
D401C3ACA22A
add configuration=cfg1 disabled=no l2mtu=1600 mac-address=##:##:##:##:##:##
master-interface=none name=cap2 radio-mac=##:##:##:##:##:## radio-name=
D401C3ACA22B
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wifi configuration
add country="United States" disabled=no mode=ap name=cfg1 ssid=crguest
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=sec1
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp_pool2 ranges=192.168.7.50-192.168.7.250
/ip dhcp-server
add address-pool=dhcp_pool2 interface=bridge name=dhcp1
/zerotier
set zt1 disabled=no disabled=no
/zerotier interface
add allow-default=no allow-global=no allow-managed=yes disabled=no instance=
zt1 name=zerotier1 network=################
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes upgrade-policy=
suggest-same-version
/caps-man provisioning
add action=create-enabled master-configuration=cfg1
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defcon interface=ether5
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=all
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add comment="Allow ZT to LAN" interface=zerotier1 list=LAN
add comment="Allow East West Traffic" interface=wg-east-west list=LAN
/interface wifi capsman
set ca-certificate=auto certificate=auto enabled=yes interfaces=ether5,ether4
package-path="" require-peer-certificate=no upgrade-policy=
suggest-same-version
/interface wireguard peers
add allowed-address=172.16.50.3/32 comment=2ndry-HP interface=wg-manage
name=2nd-hp public-key=
"##########################################=" responder=yes
add allowed-address=172.16.60.1/32 comment=WG-2-StH endpoint-address=
###.###.###.### endpoint-port=13400 interface=wg-east-west name=wg-sh
persistent-keepalive=10s public-key=
"##########################################="
/ip address
add address=172.16.50.10/24 comment=WG-Mgmnt-IP interface=wg-manage network=
172.16.50.0
add address=192.168.7.1/24 comment=LAN interface=bridge network=192.168.7.0
add address=172.16.60.2/24 comment=WG-East-West-Net interface=wg-east-west
network=172.16.60.0
/ip dhcp-client
add comment=House interface=ether1
/ip dhcp-server lease
add address=192.168.7.250 client-id=1:##:##:##:##:##:## mac-address=
##:##:##:##:##:## server=dhcp1
/ip dhcp-server network
add address=192.168.7.0/24 comment=mainconf dns-server=192.168.7.1 gateway=
192.168.7.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment=
"defconf: accept established,related,untracked" connection-state=
established,related,untracked
add action=accept chain=input comment="Allow ZT-Mgmnt" src-address=
10.244.0.0/16
add action=accept chain=forward comment="Allow ZT 2 LAN:Management"
src-address=10.244.0.0/16
add action=accept chain=input comment="Allow WG :Mgmnt" dst-port=13231
in-interface=ether1 protocol=udp
add action=accept chain=input comment="Allow WG-EW-Mgmnt" dst-port=13400
in-interface=ether1 protocol=tcp
add action=accept chain=input comment="Allow WG :Management" src-address=
172.16.50.0/24
add action=accept chain=input comment="Allow WG :Coast" src-address=
172.16.60.0/24
add action=drop chain=input comment="defconf: drop invalid" connection-state=
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN"
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy"
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy"
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack"
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
"defconf: accept established,related, untracked" connection-state=
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid"
connection-state=invalid
add action=drop chain=forward comment=
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat
connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=change-mss chain=forward comment="reduce MSS for WG-Manage"
new-mss=1380 out-interface=wg-manage protocol=tcp tcp-flags=syn tcp-mss=
1381-65535
add action=change-mss chain=forward comment="reduce MSS for WG-East-West"
log=yes new-mss=1380 out-interface=wg-east-west protocol=tcp tcp-flags=
syn tcp-mss=1381-65535
add action=change-mss chain=forward comment="reduce MSS for Zerotier"
new-mss=1380 out-interface=zerotier1 protocol=tcp tcp-flags=syn tcp-mss=
1381-65535
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade"
ipsec-policy=out,none out-interface-list=WAN
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=ether1
routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add check-gateway=ping comment="Rout to East end LAN" disabled=no distance=1
dst-address=192.168.6.0/24 gateway=172.16.60.1 routing-table=main scope=
30 suppress-hw-offload=no target-scope=10
/ip service
set winbox address=172.16.50.0/24,192.168.6.0/24,192.168.7.0/24,10.244.0.0/16
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=
"defconf: accept established,related,untracked" connection-state=
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute"
dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=
ipsec-esp
add action=accept chain=input comment=
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=
"defconf: drop everything else not coming from LAN" in-interface-list=
!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6"
connection-state=established,related
add action=accept chain=forward comment=
"defconf: accept established,related,untracked" connection-state=
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid"
connection-state=invalid
add action=drop chain=forward comment=
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1"
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=
ipsec-esp
add action=accept chain=forward comment=
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=
"defconf: drop everything else not coming from LAN" in-interface-list=
!LAN
/system clock
set time-zone-name=America/Los_Angeles
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
2025-10-19 18:36:26 by RouterOS 7.20.1
software id = ATH4-TBKK
model = RB960PGS
serial number =
/interface bridge
add admin-mac=##:##:##:##:##:## auto-mac=no comment=defconf name=bridge
port-cost-mode=short
add comment="Bridge for remote logins for maintenance." name=bridge-maint-vpn
port-cost-mode=short
/interface wireguard
add comment=WG-East-West listen-port=13400 mtu=1420 name=wg-east-west
add comment="WG=Management" listen-port=13231 mtu=1420 name=wg-manage
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=Neighbor
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec policy group
add name="group vpn.cxxx.cr"
add name="group vpn.maint"
add name="group vpn.cxxxx.selfip.com"
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
add dh-group=modp2048,modp1536,modp1024 dpd-interval=2m dpd-maximum-failures=
5 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=
"profile vpn.cxxxx.cr" prf-algorithm=sha256
add dh-group=modp2048,modp1536,modp1024 dpd-interval=2m dpd-maximum-failures=
5 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=
"profile vpn.maint"
add dh-group=modp2048,modp1536,modp1024 dpd-interval=2m dpd-maximum-failures=
5 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=
"profile cxxxxx.selfip.com"
/ip ipsec peer
add address=vpn.cxxxxx.selfip.com exchange-mode=ike2 name=
"peer vpn.crcxxxxx.selfip.com" profile="profile crcxxxxx.selfip.com"
add address=###.###.####.##6/32 disabled=yes exchange-mode=ike2 name=
"peer ###.###.####.##6" profile="profile vpn.cxxx.cr"
add disabled=yes exchange-mode=ike2 local-address=192.168.177.107 name=
"peer 192.168.177.107" passive=yes profile="profile vpn.maint"
/ip ipsec proposal
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr
,aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-128-gcm"
lifetime=8h name="proposal vpn.cxxxxx.cr" pfs-group=none
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr
,aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-128-gcm"
lifetime=8h name="proposal maint.vpn.sxxxxx.cr" pfs-group=none
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr
,aes-256-gcm,aes-192-cbc,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,a
es-128-gcm" lifetime=8h name="proposal vpn.crcxxxxx.selfip.com" pfs-group=
none
/ip pool
add name=dhcp ranges=192.168.6.100-192.168.6.199
add comment="Pool for Maintenance VPN logins" name="Pool Maint-Login" ranges=
10.0.101.0/24
add name=Pool-vpn ranges=192.168.89.100-192.168.89.199
/ip ipsec mode-config
add address-pool="Pool Maint-Login" address-prefix-length=32 name=
"modeconf maint.vpn.sxxxxx.cr" split-include=0.0.0.0/0 static-dns=
10.0.101.1 system-dns=no
/ip smb users
set [ find default=yes ] disabled=yes
/ppp profile
add name=PPTP-cxxxxx
set *FFFFFFFE local-address=192.168.89.1 remote-address=Pool-vpn
/interface pptp-client
add connect-to=###.###.####.##6 keepalive-timeout=disabled max-mtu=1360 name=
pptp-out-2-cxxxxx profile=PPTP-cxxxxx user=EastEnd
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
/routing rip instance
add name=rip-instance-4 originate-default=always redistribute=
connected,static route-gc-timeout=120 route-timeout=180 routing-table=
main update-interval=30
/interface bridge port
add bridge=bridge comment=defconf ingress-filtering=no interface=ether2
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether3
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether4
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether5
internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp1
internal-path-cost=10 path-cost=10
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=Neighbor
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface detect-internet
set detect-interface-list=WAN
/interface l2tp-server server
set enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add comment="Allow cxxxxx Traffic" interface=wg-east-west list=LAN
/interface ovpn-server server
add auth=sha1,md5 mac-address=FE:66:DC:E5:79:6C name=ovpn-server1
/interface pptp-server server
PPTP connections are considered unsafe, it is suggested to use a more modern VPN protocol instead
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/interface wireguard peers
add allowed-address=172.16.50.3/32,192.168.6.0/24,192.168.7.0/24 client-dns=
8.8.8.8 comment=Bobs-Secondary-HP endpoint-port=13231 interface=wg-manage
name=Bob-2ndry-HP preshared-key=
"##########################################=" public-key=
"##########################################=" responder=yes
add allowed-address=172.16.50.4/32 comment="Bobs Phone" interface=wg-manage
name=Bobs_Phone preshared-key=
"##########################################=" public-key=
"##########################################="
add allowed-address=172.16.60.1/32 comment=WG-E-W endpoint-port=13400
interface=wg-east-west name=wg-e-w public-key=
"##########################################=" responder=yes
add allowed-address=172.16.60.7/32 comment=WG-SRCa disabled=yes
endpoint-address=XXX.XXX.XXX.XXX endpoint-port=13400 interface=
wg-east-west name=wg-srca persistent-keepalive=10s public-key=
"##########################################="
/ip address
add address=192.168.6.1/24 comment="LAN Network" interface=bridge network=
192.168.6.0
add address=10.0.101.1/24 comment="IP Address for Maint VPN Bridge."
interface=bridge-maint-vpn network=10.0.101.0
add address=10.1.1.3 comment="IPIP Tunnel endoints" interface=*E network=
10.1.1.1
add address=208.53.87.125 comment="Public IP Address" interface=ether1
network=208.53.87.125
add address=192.168.0.50/24 comment="DIgiPath's LAN IP for our router"
interface=ether1 network=192.168.0.0
add address=172.16.50.1/24 comment=WG-Mgmnt-IP interface=wg-manage network=
172.16.50.0
add address=172.16.60.1/24 comment=WG-cxxxxx-Net interface=wg-east-west
network=172.16.60.0
/ip cloud
set ddns-enabled=yes
/ip cloud advanced
set use-local-address=yes
/ip dhcp-client
add disabled=yes interface=ether1
/ip dhcp-server
add address-pool=dhcp interface=bridge lease-time=10m name=defconf
/ip dhcp-server network
add address=192.168.6.0/24 comment=defconf dns-server=8.8.8.8,8.8.4.4
gateway=192.168.6.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.4.4,8.8.8.8
/ip firewall filter
add action=accept chain=input comment=
"defconf: accept established,related,untracked" connection-state=
established,related,untracked
add action=drop chain=input comment="Colorado IP addresses 23.0.0.0" log=yes
log-prefix="Colorado Hacker 23.0" src-address=23.0.0.0/8
add action=drop chain=input comment="Polish IP addresses 87.0.0.0" log=yes
log-prefix="Polish Hacker 87.0" src-address=87.0.0.0/8
add action=drop chain=input comment="Colorado IP addresses 107.0.0.0.0" log=
yes log-prefix="Colorado Hacker" src-address=107.0.0.0/8
add action=accept chain=input comment="Wireguard in allow" dst-port=13231
in-interface=ether1 protocol=udp
add action=accept chain=input comment="Wireguard in allow" dst-port=13400
in-interface=ether1 protocol=udp
add action=accept chain=input comment="Allow WG Road Warrior to East-End"
dst-address=192.168.6.1 in-interface=wg-manage src-address=172.16.50.0/24
add action=accept chain=input comment="Allow WG Road Warrior to East-End"
dst-address=192.168.6.1 in-interface=wg-east-west src-address=
172.16.60.0/24
add action=accept chain=forward comment="Allow WG Road Warrior to cxxxxx"
dst-address=192.168.7.1 in-interface=wg-manage src-address=172.16.50.0/24
add action=accept chain=forward comment="Allow WG Road Warrior to cxxxxx"
dst-address=192.168.7.1 src-address=172.16.50.0/24
add action=accept chain=forward comment=
"Allow WG Mgmnt traffic onto local LAN" dst-address=192.168.6.0/24
src-address=172.16.50.0/24
add action=accept chain=forward comment=
"Allow WG cxxxxx traffic onto local LAN" dst-address=192.168.6.0/24
src-address=172.16.55.0/24
add action=accept chain=forward comment=
"Allow dot 7 connections from WG users." dst-address=192.168.7.0/24
src-address=172.16.60.0/24
add action=accept chain=input comment=
"Allow admin connections from Dot 7 addresses" dst-address=192.168.6.1
src-address=192.168.7.0/24
add action=accept chain=forward comment=
"Allow connections on the Dot 6 net from Dot 7 addresses" dst-address=
192.168.6.0/24 src-address=192.168.7.0/24
add action=accept chain=forward comment=
"Allow connections on the Dot 6 net from WG addresses" dst-address=
192.168.6.0/24 in-interface=wg-manage src-address=172.16.50.0/24
add action=accept chain=forward comment=
"Allow connections from Dot 7 addresses" dst-address=192.168.7.0/24
src-address=192.168.6.0/24
add action=accept chain=forward comment=
"Allow cxxxxx VPN users to access the Dot 6 LAN" disabled=yes dst-address=
192.168.90.0 out-interface=*E src-address=192.168.6.0/24
add action=accept chain=input comment=
"Allow Admin connections from PPTP clients" dst-address=192.168.6.1
src-address=192.168.89.0/24
add action=accept chain=forward comment=
"Allow dot 7 connections from PPTP VPN users." disabled=yes dst-address=
192.168.7.0/24 src-address=192.168.89.0/24
add action=accept chain=forward comment=
"Allow dot 7 connections from WG users." dst-address=192.168.7.0/24
src-address=172.16.50.0/24
add action=accept chain=forward comment=
"Allow dot 6 connections from PPTP VPN users." disabled=yes dst-address=
192.168.89.0 src-address=192.168.89.0/24
add action=accept chain=forward comment=
"Allow dot 6 connections from cxxxxx Dot 91 (IKEv2) VPN users." disabled=
yes dst-address=192.168.89.0 src-address=10.0.91.0/24
add action=accept chain=input comment="allow IPsec NAT" disabled=yes
dst-port=4500 protocol=udp
add action=accept chain=input comment="allow IKE" disabled=yes dst-port=500
protocol=udp
add action=accept chain=input comment="allow l2tp" disabled=yes dst-port=1701
protocol=udp
add action=accept chain=input comment="allow pptp from any network" dst-port=
1723 protocol=tcp
add action=accept chain=input comment=
"allow pptp data transfer from any network" protocol=gre
add action=accept chain=input comment="allow pptp from any network" protocol=
ipencap
add action=accept chain=input comment="allow pptp from ISPs LAN network"
dst-address=192.168.0.50 dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow pptp from Public IP"
dst-address=208.53.87.125 dst-port=1723 protocol=tcp
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="allow sstp" disabled=yes dst-port=443
protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=
invalid
add action=accept chain=input comment=
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=forward comment="defconf: accept in ipsec policy"
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy"
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack"
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
"defconf: accept established,related, untracked" connection-state=
established,related,untracked
add action=drop chain=input comment="defconf: drop all not coming from LAN"
disabled=yes in-interface-list=!LAN
add action=drop chain=forward comment="defconf: drop invalid"
connection-state=invalid
add action=drop chain=forward comment=
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat
connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=change-mss chain=forward comment="reduce MSS for WG-Manage"
new-mss=1380 out-interface=wg-manage protocol=tcp tcp-flags=syn tcp-mss=
1381-65535
add action=change-mss chain=forward comment="reduce MSS for WG-cxxxxx"
new-mss=1380 out-interface=wg-east-west protocol=tcp tcp-flags=syn
tcp-mss=1381-65535
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade"
ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=
192.168.89.0/24
/ip firewall raw
add action=drop chain=prerouting dst-address=192.168.0.50 log=yes log-prefix=
"CO Hackr IP" src-address=23.139.224.114
add action=drop chain=prerouting comment="Raw Colorado Hacker Drop" log=yes
log-prefix="Raw - Colorado Hacker" src-address=23.0.0.0/8
add action=drop chain=prerouting comment="Raw - Polish Hacker 87.0.0.0 Drop "
log=yes log-prefix="Raw - Polish Hacker Drop" src-address=87.0.0.0/8
add action=drop chain=prerouting comment="Raw - Colo Hacker 107 Drop" log=yes
log-prefix="Raw Drop 107" src-address=107.0.0.0/8
add action=drop chain=prerouting comment="Raw Netherlands Hacker" log=yes
log-prefix="Raw - Netherlands" src-address=94.0.0.0/8
add action=drop chain=prerouting comment="Raw Santa Clara Hacker" log=yes
log-prefix="Raw - Santa Clara" src-address=216.218.0.0/16
add action=drop chain=prerouting comment="Some unknown Hacker" log=yes
log-prefix="Raw - Santa Clara" src-address=45.61.150.38
add action=drop chain=prerouting comment="Raw unknown Hacker" log=yes
log-prefix="Raw - Santa Clara" src-address=3.137.73.221
add action=drop chain=prerouting comment="Raw unknown Hacker" log=yes
log-prefix="Raw - Santa Clara" src-address=103.203.0.0/16
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set h323 disabled=yes
set sip disabled=yes
set sctp disabled=yes
/ip ipsec identity
add auth-method=digital-signature certificate=CA.sxxxxx comment=Admin
disabled=yes generate-policy=port-strict match-by=certificate
mode-config="modeconf maint.vpn.sxxxxx.cr" peer="peer 192.168.177.107"
policy-template-group="group vpn.maint" remote-certificate=newadmin
remote-id=ignore
add auth-method=digital-signature certificate=
rf001@vpn.crcxxxxx.selfip.com.p12 generate-policy=port-strict mode-config=
request-only my-id=user-fqdn:rf001@vpn.crcxxxxx.selfip.com peer=
"peer vpn.crcxxxxx.selfip.com" policy-template-group=
"group vpn.crcxxxxx.selfip.com" remote-id=fqdn:vpn.crcxxxxx.selfip.com
/ip ipsec policy
add dst-address=10.0.101.1/32 group="group vpn.maint" proposal=
"proposal maint.vpn.sxxxxx.cr" src-address=0.0.0.0/0 template=yes
add dst-address=XXX.XXX.XXX.XXX/32 group="group vpn.crcxxxxx.selfip.com"
proposal="proposal vpn.crcxxxxx.selfip.com" src-address=0.0.0.0/0
template=yes
add disabled=yes dst-address=XXX.XXX.XXX.XXX/32 peer=
"peer vpn.crcxxxxx.selfip.com" proposal="proposal vpn.crcxxxxx.selfip.com"
src-address=192.168.177.107/32 tunnel=yes
add comment="Policy Template vpn.crcxxxxx.selfip.com" dst-address=0.0.0.0/0
group="group vpn.crcxxxxx.selfip.com" proposal=
"proposal vpn.crcxxxxx.selfip.com" src-address=10.0.88.0/24 template=yes
/ip route
add disabled=no dst-address=0.0.0.0/0 gateway=192.168.0.1
add disabled=no dst-address=0.0.0.0/0 gateway=###.###.###.### routing-table=
main suppress-hw-offload=no
add check-gateway=ping comment=WG-West-End disabled=no distance=1
dst-address=192.168.7.0/24 gateway=172.16.60.2 routing-table=main scope=
30 suppress-hw-offload=no target-scope=10
/ip service
set ftp disabled=yes
set ssh disabled=yes
set telnet disabled=yes
set www address=192.168.89.0/32,192.168.6.0/32,192.168.7.0/32 disabled=yes
set winbox address="172.16.50.0/24,192.168.6.0/24,192.168.7.0/24,172.16.55.0/2
4,192.168.89.0/24"
set api disabled=yes
set api-ssl disabled=yes
/ip smb shares
set [ find default=yes ] directory=/flash/pub
/ppp secret
add name=vpn
add name=sxxxxx profile=default-encryption remote-address=XXX.XXX.XXX.XXX
/routing bfd configuration
add disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5
/routing rip interface-template
add instance=rip-instance-4 interfaces=*E
/routing rule
add action=lookup disabled=yes dst-address=0.0.0.0/0 interface=bridge
src-address=192.168.6.0/24 table=main
/system clock
set time-zone-name=America/Los_Angeles
/system identity
set name=cr.East-End
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.pool.ntp.org
add address=1.pool.ntp.org
/tool e-mail
set from="" port=587 server=XX@XXX.CCC tls=starttls user=
xxxxx@xxxx.xxx
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool traffic-monitor
add interface=ether1 name=tmon1 traffic=received