[admin@hometik] /ip> export hide-sensitive
# mar/04/2020 12:58:26 by RouterOS 6.45.8
# software id = 5Z4J-31GG
#
# model = RBD52G-5HacD2HnD
# serial number = BEEB0BAxxxxB
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=dhcp_pool1 ranges=192.168.3.2-192.168.3.254
/ip dhcp-server
add address-pool=dhcp_pool1 disabled=no interface=bridge name=dhcp1
/ip address
add address=192.168.3.1/24 comment=defconf interface=bridge network=192.168.3.0
add address=192.168.1.11/24 interface=wlan1 network=192.168.1.0
add address=192.168.50.1 comment=pfsense interface=ether3 network=192.168.50.0
/ip dhcp-client
add interface=wlan1
/ip dhcp-server lease
add address=192.168.3.100 client-id=1:0:17:31:89:96:87 comment="My Desktop PC" mac-address=\
00:17:xx:89:xx:xx server=dhcp1
add address=192.168.3.124 client-id=1:0:a:cd:38:a6:f mac-address=00:0A:CD:38:A6:0F server=dhcp1
/ip dhcp-server network
add address=192.168.3.0/24 comment=defconf dns-server=192.168.3.1,1.1.1.1 gateway=192.168.3.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,8.8.8.8
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=\
127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=\
established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" \
connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=\
!dstnat connection-state=new in-interface-list=WAN
add action=accept chain=input comment="permetti OpenVPN" dst-port=1194 protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none \
out-interface-list=WAN
# lte1 not ready
add action=masquerade chain=srcnat out-interface=*A
add action=dst-nat chain=dstnat comment="OpenVPN su pfsense" disabled=yes dst-port=1194 protocol=udp \
to-addresses=192.168.3.124 to-ports=1194
add action=dst-nat chain=dstnat comment="redirect to pihole" disabled=yes dst-port=53 protocol=udp \
src-address=192.168.3.0/24 to-addresses=192.168.3.66 to-ports=53
add action=dst-nat chain=dstnat comment="redirect to pihole" disabled=yes dst-port=53 protocol=tcp \
src-address=192.168.3.0/24 to-addresses=192.168.3.66 to-ports=53
add action=dst-nat chain=dstnat comment="TCP Emule" dst-port=22448 protocol=tcp to-addresses=\
192.168.3.100 to-ports=22448
add action=dst-nat chain=dstnat comment="UDP Emule" dst-port=14922 protocol=udp to-addresses=\
192.168.3.100 to-ports=14922
/ip route
add check-gateway=ping distance=1 gateway=1.1.1.1
add distance=1 gateway=192.168.1.1
add check-gateway=ping distance=2 gateway=8.8.4.4
add distance=1 dst-address=1.1.1.1/32 gateway=192.168.1.1 scope=10
add distance=1 dst-address=8.8.4.4/32 gateway=192.168.42.129 scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes