I don't know if this is correct or not
/caps-man channel
add band=5ghz-a/n/ac name="Mikrotik 5g"
add band=2ghz-b/g/n name="Mikrotik 2g"
/interface bridge
add admin-mac=2C:C8:1B:8B:DA:41 auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full,2500M-full
set [ find default-name=ether10 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full,2500M-full
/caps-man datapath
add bridge=bridge name=Default
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 service-name=Xmission use-peer-dns=yes user=usernamehere
/caps-man security
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm,tkip name=Terminator
/caps-man configuration
add channel="Mikrotik 5g" channel.band=5ghz-a/n/ac country="united states3" datapath=Default datapath.bridge=bridge mode=ap name="MikroTik 5g" security=Terminator security.authentication-types=wpa-psk,wpa2-psk .encryption=aes-ccm,tkip ssid="MikroTik 5g"
add channel="Mikrotik 2g" channel.band=2ghz-b/g/n country="united states3" datapath=Default datapath.bridge=bridge mode=ap name="Mikrotik 2g" security=Terminator ssid="Mikrotik 2g"
/caps-man interface
add channel="Mikrotik 2g" channel.band=2ghz-g/n configuration="Mikrotik 2g" configuration.mode=ap .ssid="Mikrotik 2g" datapath=Default datapath.bridge=bridge disabled=no l2mtu=1600 mac-address=48:8F:5A:0A:62:A8 master-interface=none name=cap1 radio-mac=48:8F:5A:0A:62:A8 radio-name="" security=Terminator \
security.authentication-types=wpa-psk,wpa2-psk
add channel="Mikrotik 5g" channel.band=5ghz-a/n/ac configuration="MikroTik 5g" configuration.mode=ap .ssid="MikroTik 5g" datapath=Default disabled=no l2mtu=1600 mac-address=48:8F:5A:0A:62:A9 master-interface=none name=cap2 radio-mac=48:8F:5A:0A:62:A9 radio-name="" security=Terminator \
security.authentication-types=wpa-psk,wpa2-psk
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=dhcp interface=bridge name=DHCP
/port
set 0 name=serial0
set 1 name=serial1
/ppp profile
set *FFFFFFFE dns-server=192.168.88.1 local-address=192.168.89.1 remote-address=vpn
/caps-man manager
set ca-certificate=auto enabled=yes upgrade-policy=suggest-same-version
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface=bridge
/caps-man provisioning
add action=create-dynamic-enabled master-configuration="MikroTik 5g" radio-mac=48:8F:5A:0A:62:A9
add action=create-dynamic-enabled master-configuration="Mikrotik 2g" radio-mac=48:8F:5A:0A:62:A8
/interface bridge port
add bridge=bridge comment=defconf ingress-filtering=no interface=ether2
add bridge=bridge comment=defconf ingress-filtering=no interface=ether3
add bridge=bridge comment=defconf ingress-filtering=no interface=ether4
add bridge=bridge comment=defconf ingress-filtering=no interface=ether5
add bridge=bridge comment=defconf ingress-filtering=no interface=ether6
add bridge=bridge comment=defconf ingress-filtering=no interface=ether7
add bridge=bridge comment=defconf ingress-filtering=no interface=ether8
add bridge=bridge comment=defconf ingress-filtering=no interface=ether9
add bridge=bridge comment=defconf ingress-filtering=no interface=ether10
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set max-neighbor-entries=8192
/interface detect-internet
set detect-interface-list=all
/interface l2tp-server server
set enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
/interface ovpn-server server
set auth=sha1,md5
/interface pptp-server server
# PPTP connections are considered unsafe, it is suggested to use a more modern VPN protocol instead
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/interface wireless cap
set caps-man-addresses=::,:: discovery-interfaces=cap1
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=192.168.88.2/30 interface=ether1 network=192.168.88.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add interface=ether1
add interface=cap1
/ip dhcp-server lease
add address=192.168.88.100 client-id=1:a8:a1:59:13:f9:a2 mac-address=A8:A1:59:13:F9:A2 server=DHCP
add address=192.168.88.17 client-id=1:7c:d3
7a:84:9a mac-address=7C:D3:0A:7A:84:9A server=DHCP
add address=192.168.88.97 mac-address=84:EA:ED:11:E0:2D server=DHCP
add address=192.168.88.254 client-id=1:b4:2e:99:3a:75:fe mac-address=B4:2E:99:3A:75:FE server=DHCP
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=1.1.1.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-port=32400 in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.88.100 to-ports=32400
add action=dst-nat chain=dstnat dst-port=921 in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.88.100 to-ports=443
add action=dst-nat chain=dstnat dst-port=2456-2458 in-interface=pppoe-out1 protocol=udp to-addresses=192.168.88.100 to-ports=2456-2458
add action=dst-nat chain=dstnat dst-port=2456-2458 in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.88.100 to-ports=2456-2458
add action=dst-nat chain=dstnat dst-port=443 in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.88.100 to-ports=443
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=192.168.89.0/24
/ip upnp
set enabled=yes
/ppp secret
add name=vpn
/system clock
set time-zone-name=America/Denver
/system resource irq rps
set sfp-sfpplus1 disabled=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN