# may/20/2021 09:03:19 by RouterOS 6.48.2
# software id = 5Z18-6CDI
#
# model = 750GL
# serial number = xxxxx
/interface bridge
add admin-mac=D4:CA:6D:16:94:80 auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] name="ether2 - to 3rd floor"
set [ find default-name=ether3 ] name="ether3 - to 1st floor"
set [ find default-name=ether4 ] name="ether4 - wifi 2nd floor"
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 max-mru=1480 max-mtu=\
1480 name=VNPT password=xxxxxxxx service-name=VNPT use-peer-dns=yes user=\
tuthanhxx
/interface vlan
add interface=bridge name=iot vlan-id=68
add interface=bridge name=mgmt vlan-id=50
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=dhcp ranges=192.168.100.10-192.168.100.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/ppp profile
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/interface bridge port
add bridge=bridge comment=defconf interface="ether2 - to 3rd floor"
add bridge=bridge comment=defconf interface="ether3 - to 1st floor"
add bridge=bridge comment=defconf interface="ether4 - wifi t2"
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set enabled=yes ipsec-secret=xxxxx use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=VNPT list=WAN
/interface pptp-server server
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
add address=192.168.100.1/24 comment=defconf interface=bridge network=\
192.168.100.0
add address=192.168.50.1/24 interface=mgmt network=192.168.50.0
add address=192.168.68.1/24 interface=iot network=192.168.68.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server lease
add address=192.168.100.21 client-id=1:94:b4:f:c7:33:88 mac-address=\
94:B4:0F:C7:33:88 server=defconf
add address=192.168.100.29 client-id=1:48:2:2e:1:4c:65 mac-address=\
48:02:2E:01:4C:65 server=defconf
add address=192.168.100.58 client-id=1:fc:6b:f0:56:d3:5c mac-address=\
FC:6B:F0:56:D3:5C server=defconf
add address=192.168.100.22 client-id=1:ec:35:86:c9:dc:e0 mac-address=\
EC:35:86:C9:DC:E0 server=defconf
/ip dhcp-server network
add address=192.168.100.0/24 comment=defconf dns-server=8.8.8.8 gateway=\
192.168.100.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=192.168.100.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-port=5001 in-interface=VNPT log=yes \
protocol=tcp to-addresses=192.168.100.16 to-ports=5001
add action=dst-nat chain=dstnat dst-port=5000 in-interface=VNPT protocol=tcp \
to-addresses=192.168.100.16 to-ports=5000
add action=dst-nat chain=dstnat dst-port=6690 in-interface=VNPT protocol=tcp \
to-addresses=192.168.100.16 to-ports=6690
add action=dst-nat chain=dstnat dst-port=80 protocol=tcp to-addresses=\
192.168.100.16 to-ports=80
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
192.168.89.0/24
/ip service
set www port=8080
/ppp secret
add name=vpn password=xxxxxx
/system clock
set time-zone-name=Asia/Bangkok
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN