Consider deploying MSTP if your requirements benefit from root bridge management at the VLAN level. For this topic, addressing STP remains optional but should get attention over the long haul.
I don't know if it will benefit from it as I'm not familiar with it outside it preventing loops.
I think sticking with RSTP is fine for now to prevent changing
too much in one go about things I don't know about.
When configurations change and are stable again, publish changed versions in new post please.
CCR2004 (again, minus IPv6, static DHCP leases and Wireguard peers):
# 2025-02-09 09:39:14 by RouterOS 7.16.1
# software id = REDACTED
#
# model = CCR2004-1G-12S+2XS
# serial number = REDACTED
/interface bridge
add ingress-filtering=no name=bridge1 port-cost-mode=short priority=0x7000 \
vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] comment=Management name=mgmt
set [ find default-name=sfp-sfpplus1 ] comment="To Modem" l2mtu=1600 \
loop-protect=off
set [ find default-name=sfp-sfpplus2 ] comment="To CRS317-1G-16S+RM"
set [ find default-name=sfp-sfpplus3 ] comment="To CRS326-24G-2S+"
set [ find default-name=sfp-sfpplus4 ] comment=RB5009UG+S+
set [ find default-name=sfp-sfpplus5 ] disabled=yes
set [ find default-name=sfp-sfpplus6 ] disabled=yes
set [ find default-name=sfp-sfpplus7 ] disabled=yes
set [ find default-name=sfp-sfpplus8 ] disabled=yes
set [ find default-name=sfp-sfpplus9 ] disabled=yes
set [ find default-name=sfp-sfpplus10 ] disabled=yes
set [ find default-name=sfp-sfpplus11 ] disabled=yes
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface vlan
add comment="Delta Internet" interface=sfp-sfpplus1 loop-protect=off name=\
delta-vlan100 vlan-id=100
add comment="Delta IPTV" interface=sfp-sfpplus1 name=delta-vlan101 vlan-id=101
add comment="Delta VoIP" interface=sfp-sfpplus1 name=delta-vlan102 vlan-id=102
add comment="Main Infra" interface=bridge1 name=vlan1000 vlan-id=1000
add comment="Private VLAN" interface=bridge1 name=vlan1001 vlan-id=1001
add comment=Parents interface=bridge1 name=vlan1002 vlan-id=1002
add comment="Virtual Devices" interface=bridge1 name=vlan1003 vlan-id=1003
add comment=IOT interface=bridge1 name=vlan1005 vlan-id=1005
add comment=Guests interface=bridge1 name=vlan1255 vlan-id=1255
/interface list
add name=WAN
add name=LAN
add comment="Neighbours for MNDP Attack mitigation" name=Neighbour
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/ip dhcp-client option
add code=60 name=iptv_rg value="'IPTV_RG'"
/ip pool
add name=vlan1001 ranges=192.168.1.10-192.168.1.254
add name=vlan1255 ranges=192.168.255.10-192.168.255.254
add name=vlan1002 ranges=192.168.2.10-192.168.2.254
add name=vlan1003 ranges=192.168.3.10-192.168.3.254
add name=vlan1005 ranges=192.168.5.10-192.168.5.243
add name=vlan1000 ranges=192.168.0.2-192.168.0.254
/ip dhcp-server
add add-arp=yes address-pool=vlan1255 interface=vlan1255 lease-time=10m name=\
vlan1255
add add-arp=yes address-pool=vlan1002 interface=vlan1002 lease-time=10m name=\
vlan1002
add add-arp=yes address-pool=vlan1003 interface=vlan1003 lease-time=10m name=\
vlan1003
add add-arp=yes address-pool=vlan1005 interface=vlan1005 lease-time=10m name=\
vlan1005
add add-arp=yes address-pool=vlan1001 interface=vlan1001 lease-time=10m name=\
vlan1001
add add-arp=yes address-pool=vlan1000 interface=vlan1000 lease-time=10m name=\
vlan1000
/ip smb users
set [ find default=yes ] disabled=yes
/port
set 0 name=serial0
set 1 name=serial1
/queue type
set 0 pfifo-limit=250
add cake-nat=yes cake-rtt-scheme=internet kind=cake name=cake-upload
add kind=fq-codel name=fq_codel
add cake-nat=yes cake-rtt-scheme=internet kind=cake name=cake-download
set 11 mq-pfifo-limit=5
/queue simple
add bucket-size=0/0 dst=delta-vlan100 limit-at=980M/980M max-limit=980M/980M \
name=ISP priority=1/1 queue=fq_codel/fq_codel target="" total-queue=default
add bucket-size=0/0 dst=delta-vlan100 limit-at=890M/890M max-limit=980M/980M \
name="Private Wired" parent=ISP priority=1/1 queue=fq_codel/fq_codel \
target=vlan1001 total-queue=default
add bucket-size=0/0 dst=delta-vlan100 limit-at=50M/50M max-limit=900M/900M \
name=Servers parent=ISP priority=2/2 queue=fq_codel/fq_codel target=\
vlan1003 total-queue=default
add bucket-size=0/0 dst=delta-vlan100 limit-at=25M/25M max-limit=900M/900M \
name=Parents parent=ISP queue=pcq-upload-default/pcq-download-default \
target=vlan1002 total-queue=default
add bucket-size=0/0 dst=delta-vlan100 limit-at=1M/10M max-limit=1M/50M name=IOT \
parent=ISP queue=pcq-upload-default/pcq-download-default target=vlan1005 \
total-queue=default
add limit-at=10M/10M max-limit=980M/980M name=Guest parent=ISP queue=\
pcq-upload-default/pcq-download-default target=vlan1255 total-queue=default
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
add disabled=no name=default-v3 version=3
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
add disabled=yes instance=default-v3 name=backbone-v3
/user group
add name=dudes policy="read,winbox,!local,!telnet,!ssh,!ftp,!reboot,!write,!poli\
cy,!test,!password,!web,!sniff,!sensitive,!api,!romon,!rest-api"
add name=ninym policy="read,api,rest-api,!local,!telnet,!ssh,!ftp,!reboot,!write\
,!policy,!test,!winbox,!password,!web,!sniff,!sensitive,!romon"
add name=mktxp policy="read,api,!local,!telnet,!ssh,!ftp,!reboot,!write,!policy,\
!test,!winbox,!password,!web,!sniff,!sensitive,!romon,!rest-api"
add name=disallow
/interface bridge port
add bridge=bridge1 ingress-filtering=no interface=sfp-sfpplus2 \
internal-path-cost=10 multicast-router=disabled path-cost=10
add bridge=bridge1 ingress-filtering=no interface=sfp-sfpplus3 \
internal-path-cost=10 multicast-router=disabled path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp-sfpplus5 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp-sfpplus6 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp-sfpplus7 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp-sfpplus8 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp-sfpplus9 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp-sfpplus10 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp28-1 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes ingress-filtering=no interface=sfp28-2 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 disabled=yes interface=sfp-sfpplus11 internal-path-cost=10 \
path-cost=10
add bridge=bridge1 ingress-filtering=no interface=sfp-sfpplus12 \
internal-path-cost=10 path-cost=10
add bridge=bridge1 interface=sfp-sfpplus4
/interface bridge settings
set use-ip-firewall-for-vlan=yes
/ip firewall connection tracking
set udp-timeout=3m
/ip neighbor discovery-settings
set discover-interface-list=Neighbour lldp-max-frame-size=yes lldp-vlan-info=\
yes
/ip settings
set max-neighbor-entries=8192 tcp-syncookies=yes
/interface bridge vlan
add bridge=bridge1 tagged=bridge1,sfp-sfpplus2,sfp-sfpplus3 vlan-ids=1003
add bridge=bridge1 tagged=bridge1,sfp-sfpplus2,sfp-sfpplus3 vlan-ids=1002
add bridge=bridge1 tagged=bridge1,sfp-sfpplus2,sfp-sfpplus3 vlan-ids=1005
add bridge=bridge1 tagged=bridge1,sfp-sfpplus2,sfp-sfpplus3 vlan-ids=1255
add bridge=bridge1 tagged=bridge1,sfp-sfpplus2,sfp-sfpplus3 vlan-ids=1001
add bridge=bridge1 tagged=sfp-sfpplus2,sfp-sfpplus3,bridge1,sfp-sfpplus4 \
vlan-ids=1000
/interface detect-internet
set lan-interface-list=LAN wan-interface-list=WAN
/interface list member
add interface=vlan1003 list=LAN
add interface=vlan1002 list=LAN
add interface=delta-vlan100 list=WAN
add interface=vlan1005 list=LAN
add interface=delta-vlan102 list=WAN
add interface=delta-vlan101 list=WAN
add interface=vlan1001 list=LAN
add interface=vlan1000 list=Neighbour
/interface ovpn-server server
set auth=sha1,md5
/ip address
add address=192.168.2.1/24 interface=vlan1002 network=192.168.2.0
add address=192.168.255.1/24 interface=vlan1255 network=192.168.255.0
add address=192.168.3.1/24 interface=vlan1003 network=192.168.3.0
add address=192.168.5.1/24 interface=vlan1005 network=192.168.5.0
add address=192.168.254.1/24 interface=wireguard1 network=192.168.254.0
add address=192.168.1.1/24 interface=vlan1001 network=192.168.1.0
add address=192.168.0.1/24 interface=vlan1000 network=192.168.0.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=15m
/ip dhcp-client
add add-default-route=no comment="Delta VoIP" dhcp-options=\
clientid,clientid_duid interface=delta-vlan102 use-peer-dns=no \
use-peer-ntp=no
add comment="Delta Internet" interface=delta-vlan100 use-peer-dns=no \
use-peer-ntp=no
add add-default-route=no comment="Delta IPTV" dhcp-options=\
iptv_rg,hostname,clientid interface=delta-vlan101 use-peer-dns=no \
use-peer-ntp=no
/ip dhcp-server alert
add alert-timeout=1d disabled=no interface=vlan1003 on-alert=\
":log error message=\"Unauthorized DHCP Server Discovered\"" valid-server=\
2C:C8:1B:39:8D:BD
add alert-timeout=1d disabled=no interface=vlan1005 on-alert=\
":log error message=\"Unauthorized DHCP Server Discovered\"" valid-server=\
2C:C8:1B:39:8D:BD
add alert-timeout=1d disabled=no interface=vlan1002 on-alert=\
":log error message=\"Unauthorized DHCP Server Discovered\"" valid-server=\
2C:C8:1B:39:8D:BD
add alert-timeout=1d disabled=no interface=vlan1000 on-alert=\
":log error message=\"Unauthorized DHCP Server Discovered\"" valid-server=\
2C:C8:1B:39:8D:BD
add alert-timeout=1d disabled=no interface=vlan1255 on-alert=\
":log error message=\"Unauthorized DHCP Server Discovered\"" valid-server=\
2C:C8:1B:39:8D:BD
add alert-timeout=1d disabled=no interface=vlan1001 on-alert=\
":log error message=\"Unauthorized DHCP Server Discovered\"" valid-server=\
2C:C8:1B:39:8D:BD
/ip dhcp-server config
set store-leases-disk=never
/ip dhcp-server network
add address=192.168.0.0/24 caps-manager=192.168.0.7 dns-server=192.168.0.7 \
gateway=192.168.0.1 netmask=24 ntp-server=192.168.0.7
add address=192.168.1.0/24 dns-server=192.168.0.7 gateway=192.168.1.1 netmask=\
24 ntp-server=192.168.0.7
add address=192.168.2.0/24 dns-server=192.168.0.7 gateway=192.168.2.1 netmask=\
24 ntp-server=192.168.0.7
add address=192.168.3.0/24 dns-server=192.168.0.7 gateway=192.168.3.1 netmask=\
24 ntp-server=192.168.0.7
add address=192.168.5.0/24 dns-server=192.168.0.7 gateway=192.168.5.1 netmask=\
24 ntp-server=192.168.0.7
add address=192.168.255.0/24 dns-server=192.168.0.7 gateway=192.168.255.1 \
netmask=24 ntp-server=192.168.0.7
/ip dns
set allow-remote-requests=yes cache-size=262144KiB servers=192.168.0.7
/ip firewall address-list
add address=81.172.152.214 list=my-wan-addresses
add address=192.168.0.0/24 list=lan-addresses
add address=192.168.1.0/24 list=lan-addresses
add address=192.168.2.0/24 list=lan-addresses
add address=192.168.3.0/24 list=lan-addresses
add address=192.168.5.0/24 list=lan-addresses
add address=192.168.255.0/24 list=lan-addresses
add address=192.168.254.0/24 list=lan-addresses
add address=127.0.0.0/8 comment="defconf: RFC6890" list=bad-ipv4
add address=192.0.0.0/24 comment="defconf: RFC6890" list=bad-ipv4
add address=192.0.2.0/24 comment="defconf: RFC6890 documentation" list=bad-ipv4
add address=198.51.100.0/24 comment="defconf: RFC6890 documentation" list=\
bad-ipv4
add address=203.0.113.0/24 comment="defconf: RFC6890 documentation" list=\
bad-ipv4
add address=240.0.0.0/4 comment="defconf: RFC6890 reserved" list=bad-ipv4
add address=0.0.0.0/8 comment="defconf: RFC6890" list=not-global-ipv4
add address=10.0.0.0/8 comment="defconf: RFC6890" list=not-global-ipv4
add address=100.64.0.0/10 comment="defconf: RFC6890" list=not-global-ipv4
add address=169.254.0.0/16 comment="defconf: RFC6890" list=not-global-ipv4
add address=172.16.0.0/12 comment="defconf: RFC6890" list=not-global-ipv4
add address=192.0.0.0/29 comment="defconf: RFC6890" list=not-global-ipv4
add address=192.168.0.0/16 comment="defconf: RFC6890" list=not-global-ipv4
add address=198.18.0.0/15 comment="defconf: RFC6890 benchmark" list=\
not-global-ipv4
add address=255.255.255.255 comment="defconf: RFC6890" list=not-global-ipv4
add address=224.0.0.0/4 comment="defconf: multicast" list=bad-src-ipv4
add address=255.255.255.255 comment="defconf: RFC6890" list=bad-src-ipv4
add address=0.0.0.0/8 comment="defconf: RFC6890" list=bad-dst-ipv4
add address=224.0.0.0/4 comment="defconf: RFC6890" list=bad-dst-ipv4
/ip firewall filter
add action=fasttrack-connection chain=forward comment="Fasttrack LAN" \
connection-state=established,related hw-offload=yes in-interface-list=LAN \
out-interface-list=LAN
add action=fasttrack-connection chain=forward comment="Fasttrack IPTV" \
hw-offload=yes out-interface=delta-vlan101
add action=fasttrack-connection chain=forward comment="Fasttrack VoIP" \
hw-offload=yes out-interface=delta-vlan102
add action=fasttrack-connection chain=forward comment=\
"Fasttrack DNS (DNS.Watch)" dst-address=84.200.70.40 hw-offload=yes \
src-address=192.168.0.7
add action=fasttrack-connection chain=forward comment=\
"Fasttrack DNS (LibreDNS)" dst-address=116.202.176.26 hw-offload=yes \
src-address=192.168.0.7
add action=fasttrack-connection chain=forward comment="Fasttrack DNS (Google)" \
dst-address=8.8.8.8 hw-offload=yes src-address=192.168.0.7
add action=fasttrack-connection chain=forward comment=\
"Fasttrack DNS (CloudFlare)" dst-address=1.1.1.1 hw-offload=yes \
src-address=192.168.0.7
add action=fasttrack-connection chain=forward comment=\
"Fasttrack DNS (CloudFlare)" dst-address=1.0.0.1 hw-offload=yes \
src-address=192.168.0.7
add action=fasttrack-connection chain=forward comment="Fasttrack DNS (Quad9)" \
dst-address=9.9.9.11 hw-offload=yes src-address=192.168.0.7
add action=jump chain=forward comment="Chain for LAN Access Control" \
connection-state=new dst-address-list=lan-addresses jump-target=lan-access \
src-address-list=lan-addresses
add action=accept chain=forward comment="Accept established and related" \
connection-state=established,related
add action=jump chain=input comment="Fuck anyone trying to get into my router" \
in-interface-list=WAN jump-target=detect-remote-intrusion
add action=accept chain=input comment="Accept established,related,untracked" \
connection-state=established,related,untracked
add action=jump chain=detect-remote-intrusion comment="MikroTik Service: ssh" \
dst-port=22 jump-target=add-block-list protocol=tcp
add action=jump chain=detect-remote-intrusion comment=\
"MikroTik Service: api-ssl" dst-port=8729 jump-target=add-block-list \
protocol=tcp
add action=jump chain=detect-remote-intrusion comment="MikroTik Service: api" \
dst-port=8728 jump-target=add-block-list protocol=tcp
add action=jump chain=detect-remote-intrusion comment=\
"MikroTik Service: winbox" dst-port=8291 jump-target=add-block-list \
protocol=tcp
add action=jump chain=detect-remote-intrusion comment="BFD: WAN (control)" \
dst-port=3784 jump-target=add-block-list protocol=udp
add action=jump chain=detect-remote-intrusion comment="BFD: WAN (echo)" \
dst-port=3785 jump-target=add-block-list protocol=udp
add action=jump chain=detect-remote-intrusion comment=\
"BFD: WAN (multihop control)" dst-port=4784 jump-target=add-block-list \
protocol=udp
add action=jump chain=detect-remote-intrusion comment=\
"BFD: WAN (multihop control)" dst-port=4784 jump-target=add-block-list \
protocol=tcp
add action=add-src-to-address-list address-list=remote-intrusion \
address-list-timeout=4w2d chain=add-block-list comment=\
"Block address for 30d"
add action=drop chain=add-block-list comment="Drop packet immediately"
add action=return chain=lan-access comment="Allow Private VLAN" in-interface=\
vlan1001
add action=return chain=lan-access comment="Allow Private VLAN" in-interface=\
vlan1001
add action=return chain=lan-access comment="Allow Virtual VLAN" in-interface=\
vlan1003
add action=return chain=lan-access comment="Allow Wireguard" in-interface=\
wireguard1
add action=return chain=lan-access comment="Allow DNS" dst-address=192.168.0.7 \
dst-port=53 protocol=tcp
add action=return chain=lan-access comment="Allow DNS" dst-address=192.168.0.7 \
dst-port=53 protocol=udp
add action=return chain=lan-access comment="Allow DNS" dst-address=192.168.0.7 \
dst-port=853 protocol=tcp
add action=return chain=lan-access comment="Allow DNS" dst-address=192.168.0.7 \
dst-port=853 protocol=udp
add action=return chain=lan-access comment="Allow Plex" dst-address=\
192.168.3.109 dst-port=32400 protocol=tcp
add action=return chain=lan-access comment="Allow Printer Access" dst-address=\
192.168.5.2
add action=return chain=lan-access comment="Allow Tablet to OBS" dst-address=\
192.168.1.2 dst-port=4455 protocol=tcp src-address=192.168.5.233
add action=drop chain=lan-access comment="Isolate Parents (to self)" \
in-interface=vlan1002 log-prefix="[FILTER]" out-interface=!vlan1002
add action=drop chain=lan-access comment="Isolate IOT" in-interface=vlan1005 \
log-prefix="[FILTER]"
add action=drop chain=lan-access comment="Isolate Guests" in-interface=vlan1255 \
log-prefix="[FILTER]"
/ip firewall mangle
add action=mark-connection chain=prerouting comment=\
"Mark connections for hairpint NAT" dst-address-list=my-wan-addresses \
new-connection-mark="Hairpin NAT" passthrough=yes src-address-list=\
lan-addresses
/ip firewall nat
add action=accept chain=input comment="Allow connection to Wireguard server" \
dst-address-list=my-wan-addresses dst-port=13231 protocol=udp
add action=jump chain=srcnat comment="Create chain for LAN access" jump-target=\
lan-access
add action=masquerade chain=srcnat comment="Hairpin NAT" connection-mark=\
"Hairpin NAT"
add action=masquerade chain=srcnat comment="Allow outgoing to internet" \
out-interface-list=WAN
add action=jump chain=dstnat comment="Create chain to force AGH usage (UDP)" \
disabled=yes dst-address-list=!my-wan-addresses dst-port=53 jump-target=\
dns-redirection log-prefix="[DNS REDIR]" protocol=udp
add action=jump chain=dstnat comment="Create chain to force AGH usage (TCP)" \
disabled=yes dst-address-list=!my-wan-addresses dst-port=53 jump-target=\
dns-redirection log-prefix="[DNS REDIR]" protocol=tcp
add action=jump chain=dstnat comment="Create chain for Portforwards" \
dst-address-list=my-wan-addresses jump-target=port-forwards log-prefix=\
"[pf]"
add action=dst-nat chain=port-forwards comment="Traefik Ingress (HTTP)" \
dst-port=80 protocol=tcp to-addresses=192.168.3.122 to-ports=80
add action=dst-nat chain=port-forwards comment="Traefik Ingress (HTTPS)" \
dst-port=443 protocol=tcp to-addresses=192.168.3.122 to-ports=443
add action=dst-nat chain=port-forwards comment="Traefik Ingress (HTTPS/3)" \
dst-port=443 protocol=udp to-addresses=192.168.3.122 to-ports=443
add action=dst-nat chain=port-forwards comment="Modoboa (SMTP)" dst-port=25 \
protocol=tcp to-addresses=192.168.3.6 to-ports=25
add action=dst-nat chain=port-forwards comment="Modoboa (SMTPS)" dst-port=587 \
protocol=tcp to-addresses=192.168.3.6 to-ports=587
add action=dst-nat chain=port-forwards comment="Modoboa (SMTPS)" dst-port=465 \
protocol=tcp to-addresses=192.168.3.6 to-ports=465
add action=dst-nat chain=port-forwards comment="Modoboa (IMAP)" dst-port=143 \
protocol=tcp to-addresses=192.168.3.6 to-ports=143
add action=dst-nat chain=port-forwards comment="Modoboa (IMAPS)" dst-port=993 \
protocol=tcp to-addresses=192.168.3.6 to-ports=993
add action=dst-nat chain=port-forwards comment=Plex dst-port=32400 protocol=tcp \
to-addresses=192.168.3.109 to-ports=32400
add action=dst-nat chain=port-forwards comment=Minecraft dst-port=25565 \
protocol=tcp to-addresses=192.168.3.101 to-ports=25565
add action=dst-nat chain=port-forwards comment=Minecraft dst-port=25565 \
protocol=udp to-addresses=192.168.3.101 to-ports=25565
add action=dst-nat chain=port-forwards comment="pDNS AFXR (TCP)" dst-port=53 \
protocol=tcp to-addresses=192.168.3.122 to-ports=9053
add action=dst-nat chain=port-forwards comment="pDNS AFXR (UDP)" dst-port=53 \
protocol=udp to-addresses=192.168.3.122 to-ports=9053
add action=dst-nat chain=port-forwards comment=Portainer disabled=yes dst-port=\
888 protocol=tcp to-addresses=192.168.3.122 to-ports=9000
add action=dst-nat chain=port-forwards comment="BiglyBT (TCP)" dst-port=44769 \
protocol=tcp to-addresses=192.168.1.3 to-ports=44769
add action=dst-nat chain=port-forwards comment="BiglyBT (UDP)" dst-port=44769 \
protocol=udp to-addresses=192.168.1.3 to-ports=44769
add action=dst-nat chain=port-forwards comment="BiglyBT Remote" disabled=yes \
dst-port=48674 protocol=tcp to-addresses=192.168.1.3 to-ports=48674
add action=masquerade chain=lan-access comment="Printer Access" dst-address=\
192.168.5.2
add action=masquerade chain=lan-access comment="Masquerade Resolve Server" \
dst-address=192.168.1.251 src-address=!192.168.1.0/24
add action=accept chain=dns-redirection comment="Allow AGH out (UDP)" dst-port=\
53 protocol=udp src-address=192.168.0.7
add action=accept chain=dns-redirection comment="Allow AGH out (TCP)" dst-port=\
53 protocol=tcp src-address=192.168.0.7
add action=accept chain=dns-redirection comment="Allow PDNS out (UDP)" \
dst-port=53 protocol=udp src-address=192.168.3.122
add action=accept chain=dns-redirection comment="Allow PDNS out (TCP)" \
dst-port=53 protocol=tcp src-address=192.168.3.122
add action=dst-nat chain=dns-redirection comment="Force AGH usage (UDP)" \
dst-port=53 protocol=udp src-address=!192.168.0.7 to-addresses=192.168.0.7 \
to-ports=53
add action=dst-nat chain=dns-redirection comment="Force AGH usage (TCP)" \
dst-port=53 protocol=tcp src-address=!192.168.0.7 to-addresses=192.168.0.7 \
to-ports=53
/ip firewall raw
add action=drop chain=prerouting comment=\
"Drop banned IPs in remote intrusion list" log-prefix="[DoS]" \
src-address-list=remote-intrusion
add action=accept chain=prerouting comment=\
"defconf: enable for transparent firewall" disabled=yes
add action=accept chain=prerouting comment="defconf: accept DHCP discover" \
dst-address=255.255.255.255 dst-port=67 in-interface-list=LAN protocol=udp \
src-address=0.0.0.0 src-port=68
add action=drop chain=prerouting comment="defconf: drop bogon IP's" \
src-address-list=bad-ipv4
add action=drop chain=prerouting comment="defconf: drop bogon IP's" \
dst-address-list=bad-ipv4
add action=drop chain=prerouting comment="defconf: drop bogon IP's" \
src-address-list=bad-src-ipv4
add action=drop chain=prerouting comment="defconf: drop bogon IP's" \
dst-address-list=bad-dst-ipv4
add action=drop chain=prerouting comment="defconf: drop non global from WAN" \
in-interface-list=WAN src-address-list=not-global-ipv4
add action=drop chain=prerouting comment="defconf: drop bad UDP" port=0 \
protocol=udp
add action=jump chain=prerouting comment="defconf: jump to ICMP chain" \
jump-target=icmp4 protocol=icmp
add action=jump chain=prerouting comment="defconf: jump to TCP chain" \
jump-target=bad-tcp protocol=tcp
add action=accept chain=prerouting comment=\
"defconf: accept everything else from LAN" in-interface-list=LAN
add action=accept chain=prerouting comment=\
"defconf: accept everything else from WAN" in-interface-list=WAN
add action=accept chain=icmp4 comment="defconf: echo reply" icmp-options=0:0 \
limit=5,10:packet protocol=icmp
add action=accept chain=icmp4 comment="defconf: net unreachable" icmp-options=\
3:0 protocol=icmp
add action=accept chain=icmp4 comment="defconf: host unreachable" icmp-options=\
3:1 protocol=icmp
add action=accept chain=icmp4 comment="defconf: protocol unreachable" \
icmp-options=3:2 protocol=icmp
add action=accept chain=icmp4 comment="defconf: port unreachable" icmp-options=\
3:3 protocol=icmp
add action=accept chain=icmp4 comment="defconf: fragmentation needed" \
icmp-options=3:4 protocol=icmp
add action=accept chain=icmp4 comment="defconf: echo" icmp-options=8:0 \
protocol=icmp
add action=accept chain=icmp4 comment="defconf: time exceeded" icmp-options=\
11:0-255 protocol=icmp
add action=drop chain=icmp4 comment="defconf: drop other" protocol=icmp
add action=drop chain=bad-tcp comment="defconf: TCP flag filter" protocol=tcp \
tcp-flags=!fin,!syn,!rst,!ack
add action=drop chain=bad-tcp comment="defconf: drop fin,syn" protocol=tcp \
tcp-flags=fin,syn
add action=drop chain=bad-tcp comment="defconf: drop fin,rst" protocol=tcp \
tcp-flags=fin,rst
add action=drop chain=bad-tcp comment="defconf: drop fin,!ack" protocol=tcp \
tcp-flags=fin,!ack
add action=drop chain=bad-tcp comment="defconf: drop fin,urg" protocol=tcp \
tcp-flags=fin,urg
add action=drop chain=bad-tcp comment="defconf: drop syn,rst" protocol=tcp \
tcp-flags=syn,rst
add action=drop chain=bad-tcp comment="defconf: drop rst,urg" protocol=tcp \
tcp-flags=rst,urg
add action=drop chain=bad-tcp comment="defconf: TCP port 0 drop" port=0 \
protocol=tcp
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip route
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.57.36/32 \
gateway=delta-vlan100 pref-src="" routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta VoIP" disabled=no distance=1 dst-address=62.45.58.162/32 \
gateway=10.224.192.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta VoIP" disabled=no distance=1 dst-address=62.45.58.180/32 \
gateway=10.224.192.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta VoIP" disabled=no distance=1 dst-address=62.45.59.36/32 \
gateway=10.224.192.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta VoIP" disabled=no distance=1 dst-address=62.45.59.50/32 \
gateway=10.224.192.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta VoIP" disabled=no distance=1 dst-address=62.45.60.3/32 \
gateway=10.224.192.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta VoIP" disabled=no distance=1 dst-address=62.45.60.2/32 \
gateway=10.224.192.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no dst-address=62.45.57.34/32 gateway=\
10.188.168.1 routing-table=main suppress-hw-offload=no
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.57.0/24 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.61.64/28 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.76.0/24 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.58.226/32 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.45.150/32 \
gateway=10.188.168.1 pref-src="" routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.49.0/24 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=212.115.196.0/25 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=217.63.90.128/25 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.61.16/28 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=62.45.61.32/27 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no distance=1 dst-address=217.102.255.57/32 \
gateway=10.188.168.1 pref-src=0.0.0.0 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV" disabled=no dst-address=217.63.91.0/26 gateway=\
10.188.168.1 routing-table=main suppress-hw-offload=no
add comment="Delta IPTV" disabled=no dst-address=62.45.59.0/24 gateway=\
10.188.168.1 routing-table=main suppress-hw-offload=no
add comment="Delta IPTV (Undocumented)" disabled=no distance=1 dst-address=\
62.45.158.17/32 gateway=10.188.168.1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV (Undocumented)" disabled=no distance=1 dst-address=\
62.45.158.29/32 gateway=10.188.168.1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV (Undocumented)" disabled=no distance=1 dst-address=\
62.45.158.13/32 gateway=10.188.168.1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV (Undocumented)" disabled=no distance=1 dst-address=\
62.45.158.15/32 gateway=10.188.168.1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV (Undocumented)" disabled=no distance=1 dst-address=\
62.45.158.27/32 gateway=10.188.168.1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
add comment="Delta IPTV (Undocumented)" disabled=no distance=1 dst-address=\
62.45.158.11/32 gateway=10.188.168.1 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.1.0/24
set www-ssl address=192.168.1.0/24 certificate=webfig disabled=no
set api address=192.168.1.0/24,192.168.3.0/24,192.168.0.0/24
set winbox address=192.168.1.0/24,192.168.0.0/24,192.168.254.0/24
set api-ssl address=10.0.0.0/8,192.168.1.0/24 certificate=*10 disabled=yes
/ip smb shares
set [ find default=yes ] directory=/pub
/radius
add address=192.168.0.7 service=login
/routing igmp-proxy
set quick-leave=yes
/routing rule
add action=lookup-only-in-table disabled=yes src-address=192.168.5.241/32 \
table=*400
/snmp
set enabled=yes trap-version=3
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Amsterdam
/system health settings
set fan-control-interval=10s fan-min-speed-percent=0% fan-target-temp=60C
/system identity
set name=CCR2004-1G-12S+2XS
/system logging
set 0 topics=info,!dhcp
set 3 action=memory
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp server
set local-clock-stratum=3
/system ntp client servers
add address=192.168.0.7
/system resource irq rps
set mgmt disabled=no
/system routerboard settings
set boot-delay=1s
/tool bandwidth-server
set authenticate=no enabled=no
/tool graphing
set store-every=24hours
/tool netwatch
add comment=CRS317-1G-16S+ disabled=no down-script="" host=192.168.0.2 \
http-codes="" interval=1m test-script="" timeout=1s type=simple up-script=\
""
add comment=CRS326-24G-2S+ disabled=no down-script="" host=192.168.0.3 \
http-codes="" interval=1m test-script="" timeout=1s type=simple up-script=\
""
add comment="AP Attic" disabled=no down-script="" host=192.168.0.5 http-codes=\
"" interval=1m packet-count=4 packet-interval=20ms test-script="" timeout=\
1s type=simple up-script=""
add comment="AP Parents" disabled=no down-script="" host=192.168.0.6 \
http-codes="" interval=1m test-script="" thr-loss-percent=50% timeout=1s \
type=simple up-script=""
add comment=RB5009UG+S+ disabled=no down-script="" host=192.168.0.7 http-codes=\
"" interval=1m test-script="" timeout=1s type=simple up-script=""
add comment="Switch Bedroom" disabled=no down-script="" host=192.168.0.9 \
http-codes="" interval=1m test-script="" timeout=1s type=simple up-script=\
""
/tool romon
set enabled=yes id=2C:C8:1B:39:8D:BD
/tool sniffer
set filter-interface=vlan1005 filter-mac-address=\
5C:0F:FB:0D:09:08/FF:FF:FF:FF:FF:FF filter-operator-between-entries=and \
filter-stream=yes memory-limit=10000KiB streaming-server=192.168.1.2
/user aaa
set default-group=disallow use-radius=yes
CRS317:
# 2025-02-09 09:44:29 by RouterOS 7.14.2
# software id = REDACTED
#
# model = CRS317-1G-16S+
# serial number = REDACTED
/interface bridge
add admin-mac=2C:C8:1B:2F:B9:CB auto-mac=no ingress-filtering=no name=bridge port-cost-mode=short vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] l2mtu=1592
set [ find default-name=sfp-sfpplus1 ] comment=CCR2004-1G-12S+2XS l2mtu=1592
set [ find default-name=sfp-sfpplus2 ] comment=CRS326-24G-2S+ l2mtu=1592
set [ find default-name=sfp-sfpplus3 ] comment=Richthoven l2mtu=1592
set [ find default-name=sfp-sfpplus4 ] comment=Isoroku l2mtu=1592
set [ find default-name=sfp-sfpplus5 ] comment=RB5009UG+S+IN l2mtu=1592
set [ find default-name=sfp-sfpplus6 ] l2mtu=1592
set [ find default-name=sfp-sfpplus7 ] l2mtu=1592
set [ find default-name=sfp-sfpplus8 ] l2mtu=1592
set [ find default-name=sfp-sfpplus9 ] l2mtu=1592
set [ find default-name=sfp-sfpplus10 ] l2mtu=1592
set [ find default-name=sfp-sfpplus11 ] l2mtu=1592
set [ find default-name=sfp-sfpplus12 ] l2mtu=1592
set [ find default-name=sfp-sfpplus13 ] l2mtu=1592
set [ find default-name=sfp-sfpplus14 ] l2mtu=1592
set [ find default-name=sfp-sfpplus15 ] l2mtu=1592
set [ find default-name=sfp-sfpplus16 ] l2mtu=1592
/interface vlan
add interface=bridge name=vlan1000 vlan-id=1000
/interface ethernet switch
set 0 l3-hw-offloading=yes
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip smb users
set [ find default=yes ] disabled=yes
/port
set 0 name=serial0
/user group
add name=mktxp policy=read,api,!local,!telnet,!ssh,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!web,!sniff,!sensitive,!romon,!rest-api
add name=disallow
/interface bridge port
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp-sfpplus1 internal-path-cost=10 path-cost=10 trusted=yes
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp-sfpplus2 internal-path-cost=10 path-cost=10 trusted=yes
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=no interface=sfp-sfpplus3 internal-path-cost=10 path-cost=10 pvid=1001
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp-sfpplus4 internal-path-cost=10 path-cost=10 pvid=1003
add bridge=bridge comment=defconf interface=sfp-sfpplus5 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus6 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus7 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus8 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus9 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus10 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus11 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus12 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus13 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus14 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus15 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus16 internal-path-cost=10 path-cost=10
/ip firewall connection tracking
set enabled=no udp-timeout=10s
/interface bridge vlan
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus3 untagged=sfp-sfpplus4 vlan-ids=1003
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus5 vlan-ids=1002
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus5 vlan-ids=1005
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus5 vlan-ids=1255
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus4,sfp-sfpplus5 untagged=sfp-sfpplus3 vlan-ids=1001
add bridge=bridge tagged=sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus5,bridge vlan-ids=1000
/ip dhcp-client
add interface=vlan1000
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set api-ssl disabled=yes
/ip smb shares
set [ find default=yes ] directory=/flash/pub
/radius
add address=192.168.0.7 service=login
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Amsterdam
/system health settings
set fan-control-interval=5s fan-min-speed-percent=0% fan-target-temp=60C
/system identity
set name=CRS317-1G-16S+
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system routerboard settings
set boot-os=router-os
/system swos
set allow-from-ports=p1,p2 allow-from-vlan=99 identity=CRS317-1G-16S+ static-ip-address=192.168.0.2
/tool bandwidth-server
set authenticate=no enabled=no
/tool romon
set enabled=yes id=2C:C8:1B:2F:B9:CB
/tool sniffer
set filter-vlan=10
/user aaa
set default-group=disallow use-radius=yes
CRS326:
# 2025-02-09 09:46:53 by RouterOS 7.14.2
# software id = REDACTED
#
# model = CRS326-24G-2S+
# serial number = REDACTED
/interface bridge
add admin-mac=B8:69:F4:8C:A1:06 auto-mac=no ingress-filtering=no name=bridge port-cost-mode=short vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] comment=bonding1-slave
set [ find default-name=ether2 ] comment=bonding1-slave
set [ find default-name=ether3 ] comment="Richthoven (MOBO1)"
set [ find default-name=ether4 ] comment=finlay-aspire3
set [ find default-name=ether5 ] comment="Isoroku IPMI"
set [ find default-name=ether6 ] comment=RB5009UG+S+IN
set [ find default-name=ether7 ] comment="Local DNS"
set [ find default-name=ether8 ] comment="User Manager"
set [ find default-name=ether9 ] comment="AP Attic"
set [ find default-name=ether10 ] comment="AP Parents"
set [ find default-name=ether11 ] comment="Switch Bedroom"
set [ find default-name=sfp-sfpplus1 ] comment=CCR2004-1G-12S+2XS
set [ find default-name=sfp-sfpplus2 ] comment=CRS317-1G-16S+
/interface vlan
add interface=bridge name=vlan1000 vlan-id=1000
/interface bonding
add comment="Isoroku (gigabit + mgmt)" mode=802.3ad name=bonding1 slaves=ether1,ether2 transmit-hash-policy=layer-2-and-3
/interface ethernet switch
set 0 l3-hw-offloading=yes
/interface list
add name=Neighbours
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip smb users
set [ find default=yes ] disabled=yes
/port
set 0 name=serial0
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
/user group
add name=mktxp policy=read,api,!local,!telnet,!ssh,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!web,!sniff,!sensitive,!romon,!rest-api
add name=disallow
/interface bridge port
add bridge=bridge comment=defconf disabled=yes ingress-filtering=no interface=ether1 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf disabled=yes ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=no interface=ether3 internal-path-cost=10 path-cost=10 pvid=1001
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=no interface=ether4 internal-path-cost=10 path-cost=10 pvid=1001
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=no interface=ether5 internal-path-cost=10 path-cost=10 pvid=1001
add bridge=bridge comment=defconf ingress-filtering=no interface=ether6 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether7 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether8 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether9 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether10 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether11 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether12 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether13 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether14 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether15 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether16 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether17 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether18 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether19 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether20 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=no interface=ether21 internal-path-cost=10 path-cost=10 pvid=1005
add bridge=bridge comment=defconf ingress-filtering=no interface=ether22 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether23 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=ether24 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp-sfpplus1 internal-path-cost=10 path-cost=10
add bridge=bridge comment=defconf ingress-filtering=no interface=sfp-sfpplus2 internal-path-cost=10 path-cost=10
add bridge=bridge ingress-filtering=no interface=bonding1 internal-path-cost=10 path-cost=10 pvid=1003
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=Neighbours
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set disable-ipv6=yes
/interface bridge vlan
add bridge=bridge tagged=sfp-sfpplus1,sfp-sfpplus2,bridge,ether9,ether10,ether11 vlan-ids=1005
add bridge=bridge tagged=sfp-sfpplus1,sfp-sfpplus2,bridge untagged=bonding1 vlan-ids=1003
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,ether9,ether10 vlan-ids=1002
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,ether9,ether10 vlan-ids=1255
add bridge=bridge tagged=sfp-sfpplus1,sfp-sfpplus2,bridge,bonding1,ether9,ether10 untagged=ether4,ether5,ether3 vlan-ids=1001
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus2,ether6,ether7,ether8,ether9,ether10,ether11 vlan-ids=1000
/interface list member
add interface=vlan1000 list=Neighbours
/ip dhcp-client
add interface=vlan1000
/ip smb shares
set [ find default=yes ] directory=/flash/pub
/radius
add address=192.168.0.7 service=login
/routing bfd configuration
add disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Amsterdam
/system identity
set name=CRS326-24G-2S+
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system routerboard settings
set boot-os=router-os
/system swos
set allow-from-ports=p25,p26 identity=CRS326-24G-2S+ static-ip-address=192.168.0.3
/tool romon
set enabled=yes id=B8:69:F4:8C:A1:06
/tool sniffer
set filter-mac-address=D0:50:99:F1:92:82/FF:FF:FF:FF:FF:FF
/user aaa
set default-group=disallow use-radius=yes
What do you want to focus on next?
Not quite sure.
I mostly just want to get ready to migrate to the new topology (and figure out how to do that).
The configs don't have to be perfect, just good enough for a smooth-ish migration without
major issues.