Here's full config.
# jan/10/2021 19:58:37 by RouterOS 6.48
# software id = SXYC-CSVI
#
# model = RBD52G-5HacD2HnD
# serial number = 92F20957FD95
/caps-man channel
add band=2ghz-g/n control-channel-width=20mhz frequency=2412,2437,2462 name=\
ch-2.4g reselect-interval=30m save-selected=yes skip-dfs-channels=yes
add band=5ghz-a/n/ac control-channel-width=20mhz frequency=\
5180,5260,5520,5620 name=ch-5g reselect-interval=30m save-selected=yes \
skip-dfs-channels=no
add band=5ghz-a/n/ac control-channel-width=20mhz name=ch-5g-no-dfs \
reselect-interval=30m save-selected=yes skip-dfs-channels=yes
/caps-man datapath
add client-to-client-forwarding=yes local-forwarding=yes name=dp-v10-home \
vlan-id=10 vlan-mode=use-tag
add client-to-client-forwarding=no local-forwarding=yes name=dp-v51-guest \
vlan-id=51 vlan-mode=use-tag
add client-to-client-forwarding=yes local-forwarding=yes name=dp-v-mgmt \
vlan-id=159 vlan-mode=use-tag
/interface bridge
add admin-mac=82:AA:89:4D:3A:D7 arp=reply-only auto-mac=no comment=\
"guest bridge - override MAC for DHCP" name=br-v50-guest protocol-mode=\
none
add admin-mac=CE:CC:AA:6E:75:98 arp=reply-only auto-mac=no comment=\
"guest bridge - override MAC for DHCP" name=br-v51-guest protocol-mode=\
none
add admin-mac=CE:CC:AA:63:65:01 arp=reply-only auto-mac=no comment=\
"guest bridge - override MAC for DHCP" name=br-v60-tv protocol-mode=none
add admin-mac=B8:69:F4:26:5C:30 auto-mac=no name=br1 priority=0x7000
/interface wireless
# managed by CAPsMAN
# channel: 2437/20-eC/gn(17dBm), SSID: wifi_super, local forwarding
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-Ce \
country="united kingdom" disabled=no distance=indoors frequency=2427 \
installation=indoor mode=ap-bridge ssid=wifi_super station-roaming=\
enabled vlan-id=10 vlan-mode=use-tag wireless-protocol=802.11 \
wmm-support=enabled wps-mode=disabled
# managed by CAPsMAN
# channel: 5620/20-Ceee/ac/DP(24dBm), SSID: wifi_super5, local forwarding
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=\
20/40/80mhz-Ceee country="united kingdom" disabled=no distance=indoors \
frequency=5260 installation=indoor mode=ap-bridge ssid=wifi_super5 \
station-roaming=enabled vlan-id=10 vlan-mode=use-tag wireless-protocol=\
802.11 wmm-support=enabled wps-mode=disabled
# managed by CAPsMAN
# SSID: wifi_guest, local forwarding
add disabled=no mac-address=BA:69:F4:26:5C:35 master-interface=wlan1 mode=\
station name=wlan4 station-roaming=enabled
/interface ethernet
set [ find default-name=ether1 ] name=e1-trunk
set [ find default-name=ether2 ] name=e2-nas
set [ find default-name=ether3 ] name=e3-tv
set [ find default-name=ether4 ] name=e4-ps3
set [ find default-name=ether5 ] name=e5-wan
/interface pppoe-client
add add-default-route=yes disabled=no interface=e5-wan name=pppoe-wan user=\
bthomehub@btbroadband.com
/interface vlan
add interface=br1 name=v10-home vlan-id=10
add interface=br1 name=v50-guest vlan-id=50
add interface=br1 name=v51-guest vlan-id=51
add interface=br1 name=v60-tv vlan-id=60
add interface=br1 name=vlan-mgmt vlan-id=159
/caps-man rates
add basic=6Mbps name="GN standard" supported=\
6Mbps,9Mbps,12Mbps,18Mbps,24Mbps,36Mbps,48Mbps,54Mbps
add basic=12Mbps name="GN faster" supported=\
12Mbps,18Mbps,24Mbps,36Mbps,48Mbps,54Mbps
/caps-man security
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm \
group-encryption=aes-ccm group-key-update=5m name=wifi_super
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm \
group-encryption=aes-ccm group-key-update=5m name=wifi_guest
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm \
group-encryption=aes-ccm group-key-update=5m name=mgmt
/caps-man configuration
add channel=ch-2.4g country="united kingdom" datapath=dp-v10-home distance=\
indoors installation=indoor name=wifi_super rates="GN faster" security=\
wifi_super ssid=wifi_super
add channel=ch-5g country="united kingdom" datapath=dp-v10-home distance=\
indoors installation=indoor name=wifi_super5 rates="GN faster" \
security=wifi_super ssid=wifi_super5
add channel=ch-2.4g country="united kingdom" datapath=dp-v51-guest distance=\
indoors installation=indoor mode=ap name=wifi_guest rates="GN faster" \
security=wifi_guest ssid=wifi_guest
add channel=ch-2.4g country="united kingdom" datapath=dp-v-mgmt distance=\
indoors installation=indoor mode=ap name=MGMT rates="GN faster" security=\
mgmt ssid=mgmt
/caps-man interface
add channel.frequency=2412,2437,2462 configuration=wifi_super disabled=no \
l2mtu=1600 mac-address=C4:AD:34:95:10:B1 master-interface=none name=\
super-cAP radio-mac=C4:AD:34:95:10:B1 radio-name=C4AD349510B1
add channel.frequency=2412,2437,2462 configuration=wifi_guest disabled=no \
l2mtu=1600 mac-address=C6:AD:34:95:10:B1 master-interface=super-cAP name=\
super-cAP-guest radio-mac=00:00:00:00:00:00 radio-name=C6AD349510B1
add channel.frequency=2412,2437,2462 configuration=wifi_super disabled=no \
l2mtu=1600 mac-address=B8:69:F4:26:5C:34 master-interface=none name=\
super-hAP radio-mac=B8:69:F4:26:5C:34 radio-name=B869F4265C34
add channel.frequency=5180,5260,5520,5620 configuration=wifi_super5 \
disabled=no l2mtu=1600 mac-address=C4:AD:34:95:10:B2 master-interface=\
none name=super5-cAP radio-mac=C4:AD:34:95:10:B2 radio-name=C4AD349510B2
add channel.frequency=5180,5260,5520,5620 configuration=wifi_super5 \
disabled=no l2mtu=1600 mac-address=B8:69:F4:26:5C:35 master-interface=\
none name=super5-hAP radio-mac=B8:69:F4:26:5C:35 radio-name=B869F4265C35
add channel.frequency=2412,2437,2462 configuration=wifi_guest disabled=no \
l2mtu=1600 mac-address=BA:69:F4:26:5C:35 master-interface=super-hAP name=\
sup-guest radio-mac=00:00:00:00:00:00 radio-name=BA69F4265C35
add channel.frequency=2412,2437,2462 configuration=MGMT disabled=yes l2mtu=\
1600 mac-address=BA:69:F4:26:5C:34 master-interface=super-hAP name=\
sup-mgmt radio-mac=00:00:00:00:00:00 radio-name=BA69F4265C34
/interface ethernet switch port
set 0 vlan-mode=secure
set 1 default-vlan-id=10 vlan-header=always-strip vlan-mode=secure
set 2 default-vlan-id=60 vlan-header=always-strip vlan-mode=secure
set 3 default-vlan-id=50 vlan-header=always-strip vlan-mode=secure
set 5 vlan-mode=secure
/interface list
add name=WAN
add name=MGMT
add name=VPNs
add name=VLANs
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk disable-pmkid=yes \
eap-methods="" mode=dynamic-keys supplicant-identity=MikroTik
add authentication-types=wpa2-psk disable-pmkid=yes eap-methods="" \
management-protection=allowed mode=dynamic-keys name=guest \
supplicant-identity=""
add authentication-types=wpa2-psk disable-pmkid=yes eap-methods="" \
management-protection=allowed mode=dynamic-keys name=mgmt \
supplicant-identity=MikroTik
/interface wireless
add mac-address=BA:69:F4:26:5C:34 master-interface=wlan1 mode=station name=\
wlan3 security-profile=guest ssid=wifi_guest station-roaming=enabled
/ip dhcp-server option
add code=43 name=disable_netbios value=0x010400000002
/ip pool
add name=guest50 ranges=10.10.50.100-10.10.50.200
add name=home ranges=10.10.10.100-10.10.10.200
add name=guest51 ranges=10.10.51.100-10.10.51.200
add name=mgmt ranges=192.168.89.100-192.168.89.200
add name=guest60 ranges=10.10.60.100-10.10.60.200
add name=vpn-clients ranges=10.10.20.100-10.10.20.200
/ip dhcp-server
add add-arp=yes address-pool=guest50 disabled=no interface=br-v50-guest \
lease-time=30m name=guest50
add add-arp=yes address-pool=home disabled=no interface=v10-home lease-time=\
30m name=home
add add-arp=yes address-pool=guest51 disabled=no interface=br-v51-guest \
lease-time=30m name=guest51
add add-arp=yes address-pool=mgmt disabled=no interface=vlan-mgmt lease-time=\
30m name=mgmg
add add-arp=yes address-pool=guest60 disabled=no interface=br-v60-tv \
lease-time=30m name=tv60
/ipv6 pool
add name=site-ula prefix=fd87:8a71:b907::/48 prefix-length=64
/ppp profile
add address-list=vpn_connected_clients change-tcp-mss=yes interface-list=VPNs \
local-address=10.10.20.1 name=ovpn remote-address=vpn-clients \
use-encryption=required use-ipv6=no
/queue type
add kind=pcq name=misc-up pcq-classifier=\
src-address,dst-address,src-port,dst-port pcq-limit=500KiB \
pcq-total-limit=15000KiB
add kind=sfq name=default-up
add kind=red name=default-dwn red-avg-packet=1400
/queue simple
add disabled=yes name=queue1 target=pppoe-wan total-queue=default
/queue tree
add bucket-size=0.005 max-limit=30M name=UP parent=pppoe-wan queue=default
add bucket-size=0.005 name=OTHER packet-mark=no-mark parent=UP priority=2 \
queue=misc-up
add limit-at=5M max-limit=26M name=VPN_throttled packet-mark=VPN_likely \
parent=UP priority=6 queue=default-up
add bucket-size=0.005 disabled=yes max-limit=153M name=DOWN parent=br1 queue=\
default-dwn
add bucket-size=0.005 name=VOIP packet-mark=VOIP parent=UP priority=1 queue=\
default-up
add bucket-size=0.005 name=DNS packet-mark=DNS parent=UP priority=1 queue=\
default-up
add bucket-size=0.005 name=ACK packet-mark=ACK parent=UP priority=1 queue=\
default-up
add bucket-size=0.005 name=ICMP packet-mark=ICMP parent=UP priority=1 queue=\
default-up
add bucket-size=0.005 disabled=yes name=H_DOWN packet-mark=VOIP,DNS,ACK,ICMP \
parent=DOWN priority=1 queue=default-dwn
add bucket-size=0.005 disabled=yes name=L_DOWN packet-mark=VPN_likely,no-mark \
parent=DOWN priority=2 queue=default-dwn
/system logging action
set 3 remote=10.10.10.21
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas\
sword,web,sniff,sensitive,api,romon,dude,tikapp"
/caps-man access-list
add allow-signal-out-of-range=10s client-to-client-forwarding=no comment=\
"Roku stick" disabled=no mac-address=10:59:32:02:B4:D2 ssid-regexp="" \
vlan-id=60 vlan-mode=use-tag
add allow-signal-out-of-range=10s client-to-client-forwarding=no comment=\
"Artem's google tv" disabled=no mac-address=B0:E4:D5:A0:FF:33 \
ssid-regexp="" vlan-id=60 vlan-mode=use-tag
/caps-man manager
set ca-certificate=LocalCA certificate=CAPsMAN-server enabled=yes \
require-peer-certificate=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface=vlan-mgmt
/caps-man provisioning
add action=create-disabled hw-supported-modes=ac master-configuration=\
wifi_super5 name-format=prefix-identity name-prefix=super5
add action=create-disabled hw-supported-modes=g identity-regexp=hAP.* \
master-configuration=wifi_super name-format=prefix-identity \
name-prefix=super slave-configurations=MGMT,wifi_guest
add action=create-disabled hw-supported-modes=g master-configuration=\
wifi_super name-format=prefix-identity name-prefix=super \
slave-configurations=wifi_guest
/interface bridge port
add bridge=br1 interface=e2-nas
add bridge=br1 interface=e3-tv
add bridge=br1 interface=e4-ps3
add bridge=br-v50-guest interface=v50-guest
add bridge=br-v51-guest interface=v51-guest
add bridge=br-v60-tv interface=v60-tv
add bridge=br1 interface=e1-trunk
/ip neighbor discovery-settings
set discover-interface-list=MGMT
/ip settings
set rp-filter=strict
/interface ethernet switch rule
add new-dst-ports=switch1-cpu ports=e1-trunk,e2-nas,e3-tv,e4-ps3 switch=\
switch1 vlan-id=50
add new-dst-ports=switch1-cpu ports=e1-trunk,e2-nas,e3-tv,e4-ps3 switch=\
switch1 vlan-id=51
/interface ethernet switch vlan
add independent-learning=yes ports=switch1-cpu,e2-nas,e1-trunk switch=switch1 \
vlan-id=10
add independent-learning=yes ports=switch1-cpu,e2-nas,e4-ps3,e1-trunk switch=\
switch1 vlan-id=50
add independent-learning=yes ports=switch1-cpu,e1-trunk switch=switch1 \
vlan-id=51
add independent-learning=yes ports=switch1-cpu,e2-nas,e3-tv switch=switch1 \
vlan-id=60
add independent-learning=yes ports=switch1-cpu,e1-trunk switch=switch1 \
vlan-id=159
/interface l2tp-server server
set authentication=mschap2 use-ipsec=required
/interface list member
add interface=e5-wan list=WAN
add interface=v10-home list=MGMT
add interface=vlan-mgmt list=MGMT
add interface=v10-home list=VLANs
add interface=br-v50-guest list=VLANs
add interface=br-v51-guest list=VLANs
add interface=br-v60-tv list=VLANs
add interface=vlan-mgmt list=VLANs
add interface=v50-guest list=VLANs
add interface=v51-guest list=VLANs
add interface=v60-tv list=VLANs
add interface=pppoe-wan list=WAN
/interface ovpn-server server
set auth=sha1 certificate=OpenVPN-server cipher=aes128,aes192,aes256 \
default-profile=ovpn port=11944 require-client-certificate=yes
/interface wireless cap
#
set bridge=br1 caps-man-addresses=127.0.0.1 certificate=cap-tv enabled=yes \
interfaces=wlan1,wlan2 static-virtual=yes
/ip address
add address=10.10.50.1/24 interface=br-v50-guest network=10.10.50.0
add address=10.10.10.1/24 interface=v10-home network=10.10.10.0
add address=10.10.51.1/24 interface=br-v51-guest network=10.10.51.0
add address=192.168.89.1/24 interface=vlan-mgmt network=192.168.89.0
add address=10.10.60.1/24 interface=br-v60-tv network=10.10.60.0
/ip cloud
set update-time=no
/ip dhcp-client
add !dhcp-options interface=e5-wan use-peer-dns=no use-peer-ntp=no
/ip dhcp-server network
add address=10.10.10.0/24 dns-server=10.10.10.8 domain=lan gateway=10.10.10.1
add address=10.10.50.0/24 dhcp-option=disable_netbios dns-server=10.10.10.8 \
gateway=10.10.50.1
add address=10.10.51.0/24 dhcp-option=disable_netbios dns-server=10.10.10.8 \
gateway=10.10.51.1
add address=10.10.60.0/24 dhcp-option=disable_netbios dns-server=10.10.60.8 \
gateway=10.10.60.1
add address=192.168.89.0/24 dhcp-option=disable_netbios gateway=192.168.89.1
/ip dns
set allow-remote-requests=yes servers=\
10.10.10.8,208.67.222.222,208.67.220.220
/ip firewall address-list
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment="6to4 relay Anycast [RFC 3068]" list=\
not_in_internet
add address=10.10.10.0/24 list=internal_addresses
add address=10.10.50.0/24 list=internal_addresses
add address=192.168.89.0/24 comment=\
"Used by stuff in MGMT network (switches) to look for updates, etc." \
list=internal_addresses
add address=192.168.0.1 disabled=yes list=superhub
add address=192.168.100.1 disabled=yes list=superhub
add address=10.10.51.0/24 list=internal_addresses
add address=10.10.60.0/24 list=internal_addresses
add address=10.10.20.0/24 comment="Used by OpenVPN server" list=internal_ovpn
add address=10.10.50.200 list=voip_hosts
add address=10.10.10.21 list=vpn_candidate_hosts
add address=192.168.1.254 list=superhub
/ip firewall filter
add action=accept chain=input comment="accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid" connection-state=invalid
add action=drop chain=input comment="drop spoofed packets to locahost" \
dst-address=127.0.0.0/8 in-interface-list=all
add action=drop chain=input comment="drop spoofed packets from locahost" \
in-interface-list=all src-address=127.0.0.0/8
add action=accept chain=input comment=\
"accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="accept DHCP" dst-port=67 \
in-interface-list=!WAN protocol=udp
add action=accept chain=input comment="MGMT access: mac winbox (counter)" \
dst-port=20561 in-interface-list=MGMT protocol=udp
add action=accept chain=input comment=\
"MGMT access: winbox, discovery (counter)" dst-port=5678,8291 \
in-interface-list=MGMT protocol=tcp
add action=accept chain=input comment="accept ICMP" protocol=icmp
add action=accept chain=input comment="only MGMT can access router itself" \
in-interface-list=MGMT
add action=accept chain=input comment="accept OpenVPN server" disabled=yes \
dst-port=11944 in-interface-list=WAN protocol=tcp
add action=drop chain=input comment=\
"drop everything else (from WAN), keep separate count" in-interface-list=\
WAN
add action=drop chain=input comment="drop everything else"
add action=fasttrack-connection chain=forward comment=\
"only fasttrack local connections, need to shape outbound traffic" \
connection-state=established,related in-interface-list=VLANs \
out-interface-list=VLANs
add action=accept chain=forward comment=\
"accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=forward comment="Allow DNS requests to pihole" \
dst-address=10.10.10.8 dst-port=53 in-interface-list=VLANs protocol=udp
add action=accept chain=forward comment="Allow DNS requests to pihole" \
dst-address=10.10.10.8 dst-port=53 in-interface-list=VLANs protocol=tcp
add action=accept chain=forward comment="Allow DNS requests to pihole" \
dst-address=10.10.10.8 dst-port=53 in-interface-list=VPNs protocol=udp
add action=accept chain=forward comment="Allow DNS requests to pihole" \
dst-address=10.10.10.8 dst-port=53 in-interface-list=VPNs protocol=tcp
add action=drop chain=forward comment="drop invalid" connection-state=invalid
add action=reject chain=forward comment=\
"early drop - no forwarding between VLANs" in-interface-list=VLANs \
log-prefix=fwd-rej-vlans out-interface-list=VLANs reject-with=\
icmp-admin-prohibited
add action=drop chain=forward comment=\
"early drop - no forwarding between WANs" in-interface-list=WAN \
out-interface-list=WAN
add action=drop chain=forward comment="early drop - incoming form WAN with inc\
orrect src address (likely not needed due to NAT)" in-interface-list=WAN \
src-address-list=not_in_internet
add action=drop chain=forward comment=\
"early drop - incoming form WAN with spoofed src address" \
in-interface-list=WAN src-address-list=internal_addresses
add action=drop chain=forward comment=\
"early drop - incoming form WAN with spoofed src address" \
in-interface-list=WAN src-address-list=internal_ovpn
add action=reject chain=forward comment=\
"early drop - basically rp_filter for VLANs" in-interface-list=VLANs \
reject-with=icmp-admin-prohibited src-address-list=!internal_addresses
add action=reject chain=forward comment=\
"early drop - basically rp_filter for VPNs" in-interface-list=VPNs \
reject-with=icmp-admin-prohibited src-address-list=!vpn_connected_clients
add action=accept chain=forward comment="accept connections out to Internet" \
dst-address-list=!not_in_internet out-interface-list=WAN
add action=accept chain=forward comment="allow VPN to access lan" disabled=\
yes in-interface-list=VPNs out-interface=v10-home
add action=accept chain=forward comment="allow VPN to access lan" disabled=\
yes in-interface=v10-home out-interface-list=VPNs
add action=accept chain=forward comment="Allow connections to Superhub" \
dst-address-list=superhub in-interface-list=MGMT out-interface-list=WAN
add action=accept chain=forward comment="accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=accept chain=forward comment="allow from WAN DSTNATed" \
connection-nat-state=dstnat in-interface-list=WAN
add action=reject chain=forward comment="reject everything else" log-prefix=\
fwd-rej-other reject-with=icmp-network-unreachable
/ip firewall mangle
add action=mark-connection chain=input comment="openvpn for artem" \
connection-mark=no-mark disabled=yes dst-port=11944 new-connection-mark=\
VPN_likely passthrough=no protocol=tcp
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.56 connection-mark=\
no-mark dscp=56 dst-address-list=!voip_hosts out-interface-list=WAN
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.40 connection-mark=\
no-mark dscp=40 dst-address-list=!voip_hosts out-interface-list=WAN
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.46 connection-mark=\
no-mark dscp=46 dst-address-list=!voip_hosts out-interface-list=WAN
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.48 connection-mark=\
no-mark dscp=48 dst-address-list=!voip_hosts out-interface-list=WAN
add action=mark-connection chain=forward comment=dns connection-mark=no-mark \
dst-port=53 new-connection-mark=DNS passthrough=no protocol=udp
add action=mark-connection chain=forward comment=VOIP connection-mark=no-mark \
new-connection-mark=VOIP passthrough=no src-address-list=voip_hosts
add action=mark-connection chain=forward comment=\
"vpn connection for torrents" connection-mark=no-mark dst-port=80,443 \
new-connection-mark=VPN_candidate passthrough=no protocol=tcp \
src-address-list=vpn_candidate_hosts
add action=mark-connection chain=forward comment="nebula vpn" \
connection-mark=no-mark dst-port=5454 new-connection-mark=VPN_likely \
passthrough=yes protocol=udp
add action=mark-packet chain=forward comment="small ACK's" new-packet-mark=\
ACK packet-size=0-200 passthrough=no protocol=tcp tcp-flags=ack
add action=mark-packet chain=forward comment=DNS connection-bytes=0-5000000 \
connection-mark=DNS new-packet-mark=DNS passthrough=no
add action=mark-packet chain=forward comment="VPN using DNS ports\?" \
connection-bytes=5000000-0 connection-mark=DNS new-packet-mark=VPN_likely \
passthrough=no
add action=mark-packet chain=forward comment=ICMP new-packet-mark=ICMP \
passthrough=no protocol=icmp
add action=mark-packet chain=forward comment=VOIP connection-mark=VOIP \
new-packet-mark=VOIP passthrough=no
add action=passthrough chain=forward comment="VPN_candidate all" \
connection-mark=VPN_candidate
add action=passthrough chain=forward comment="VPN_candidate small" \
connection-bytes=0-100000000 connection-mark=VPN_candidate
add action=mark-packet chain=forward comment="VPN_candidate large" \
connection-bytes=100000000-0 connection-mark=VPN_candidate \
new-packet-mark=VPN_likely passthrough=no
add action=mark-packet chain=forward comment=VPN connection-mark=VPN_likely \
new-packet-mark=VPN_likely passthrough=no
add action=mark-packet chain=output comment=VPN connection-mark=VPN_likely \
new-packet-mark=VPN_likely passthrough=no
/ip firewall nat
add action=masquerade chain=srcnat comment=masquerade ipsec-policy=out,none \
out-interface-list=WAN
add action=dst-nat chain=dstnat disabled=yes dst-port=80 in-interface-list=\
WAN protocol=tcp to-addresses=10.10.10.21
add action=dst-nat chain=dstnat disabled=yes dst-port=443 in-interface-list=\
WAN protocol=tcp to-addresses=10.10.10.21
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set www-ssl certificate=Webfix-HAP disabled=no
set api disabled=yes
set api-ssl disabled=yes
/ip ssh
set strong-crypto=yes
/ipv6 address
# address pool error: pool not found: bt-pool (4)
add address=::1 from-pool=bt-pool interface=v10-home
# address pool error: pool not found: bt-pool (4)
add address=::1 from-pool=bt-pool interface=br-v50-guest
# address pool error: pool not found: bt-pool (4)
add address=::1 from-pool=bt-pool interface=br-v51-guest
# address pool error: pool not found: bt-pool (4)
add address=::1 from-pool=bt-pool interface=br-v60-tv
add address=::1:0:0:1 from-pool=site-ula interface=v10-home
add address=::1:0:0:1 from-pool=site-ula interface=br-v50-guest
add address=::1:0:0:1 from-pool=site-ula interface=br-v51-guest
add address=::1:0:0:1 from-pool=site-ula interface=br-v60-tv
/ipv6 dhcp-client
add add-default-route=yes disabled=yes interface=pppoe-wan pool-name=bt-pool \
prefix-hint=2a00:23c7:c59e:2200::/56 request=prefix use-peer-dns=no
/ipv6 firewall address-list
add address=::/128 comment="unspecified address" list=bad_ipv6
add address=::1/128 comment=lo list=bad_ipv6
add address=fec0::/10 comment=site-local list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment=ipv4-mapped list=bad_ipv6
add address=::/96 comment="ipv4 compat" list=bad_ipv6
add address=100::/64 comment="discard only " list=bad_ipv6
add address=2001:db8::/32 comment=documentation list=bad_ipv6
add address=2001:10::/28 comment=ORCHID list=bad_ipv6
add address=3ffe::/16 comment=6bone list=bad_ipv6
add address=::224.0.0.0/100 comment=other list=bad_ipv6
add address=::127.0.0.0/104 comment=other list=bad_ipv6
add address=::/104 comment=other list=bad_ipv6
add address=::255.0.0.0/104 comment=other list=bad_ipv6
add address=ff00::/8 comment="multicast (as src)" list=bad_ipv6_src
add address=fd87:8a71:b907::/48 list=internal_addresses
add address=2a00:23c7:c59e:2200::/56 comment="seems BT is changing ipv6 prefix\
, add it instead from dhcp client script" disabled=yes list=\
internal_addresses
/ipv6 firewall filter
add action=drop chain=input disabled=yes in-interface-list=WAN
add action=drop chain=forward disabled=yes in-interface-list=WAN
add action=accept chain=input comment="accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid" connection-state=invalid
add action=drop chain=input comment="drop spoofed packets to localhost" \
dst-address=::1/128 in-interface-list=all
add action=drop chain=input comment="drop spoofed packets from localhost" \
in-interface-list=all src-address=::1/128
add action=accept chain=input comment="accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp \
src-address=fe80::/10
add action=drop chain=input comment="drop LL from WAN" in-interface-list=WAN \
src-address=fe80::/10
add action=accept chain=input comment="accept IKE" disabled=yes dst-port=\
500,4500 protocol=udp
add action=accept chain=input comment="accept ipsec AH" disabled=yes \
protocol=ipsec-ah
add action=accept chain=input comment="accept ipsec ESP" disabled=yes \
protocol=ipsec-esp
add action=accept chain=input comment="accept all that matches ipsec policy" \
disabled=yes ipsec-policy=in,ipsec
add action=accept chain=input comment="MGMT access: mac winbox (counter)" \
dst-port=20561 in-interface-list=MGMT protocol=udp
add action=accept chain=input comment=\
"MGMT access: winbox, discovery (counter)" dst-port=5678,8291 \
in-interface-list=MGMT protocol=tcp
add action=accept chain=input comment="only MGMT can access router itself" \
in-interface-list=MGMT
add action=drop chain=input comment=\
"drop everything else (from WAN), keep separate count" in-interface-list=\
WAN
add action=drop chain=input comment="drop everything else"
add action=accept chain=forward comment=\
"accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="drop invalid" connection-state=invalid
add action=drop chain=forward comment=\
"early drop - no forwarding between VLANs" in-interface-list=VLANs \
out-interface-list=VLANs
add action=drop chain=forward comment=\
"early drop - no forwarding between WANs" in-interface-list=WAN \
out-interface-list=WAN
add action=drop chain=forward comment=\
"early drop - incoming from WAN with spoofed src address" \
in-interface-list=WAN src-address-list=internal_addresses
add action=drop chain=forward comment="drop packets with bad src ipv6" \
src-address-list=bad_ipv6
add action=drop chain=forward comment="drop packets with bad src ipv6" \
src-address-list=bad_ipv6_src
add action=drop chain=forward comment="drop packets with bad dst ipv6" \
dst-address-list=bad_ipv6
add action=drop chain=forward comment="rfc4890 drop hop-limit=1" hop-limit=\
equal:1 protocol=icmpv6
add action=reject chain=forward comment=\
"early drop - basically rp_filter for VLANs" in-interface-list=VLANs \
reject-with=icmp-admin-prohibited src-address-list=!internal_addresses
add action=accept chain=forward comment="accept connections out to internet" \
out-interface-list=WAN
add action=accept chain=forward comment="accept ICMPv6" limit=5,5:packet \
protocol=icmpv6
add action=accept chain=forward comment="accept HIP" disabled=yes protocol=\
139
add action=accept chain=forward comment="accept IKE" disabled=yes dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="accept ipsec AH" disabled=yes \
protocol=ipsec-ah
add action=accept chain=forward comment="accept ipsec ESP" disabled=yes \
protocol=ipsec-esp
add action=accept chain=forward comment=\
"accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="drop unsolicited from WAN" \
in-interface-list=WAN
add action=reject chain=forward comment="reject everything else" reject-with=\
icmp-no-route
/ipv6 firewall mangle
add action=mark-packet chain=forward comment="small ACK's" new-packet-mark=\
ACK packet-size=0-200 passthrough=no protocol=tcp tcp-flags=ack
add action=mark-connection chain=forward comment=dns dst-port=53 \
new-connection-mark=DNS passthrough=yes protocol=udp
add action=mark-packet chain=forward connection-bytes=0-5000000 \
connection-mark=DNS new-packet-mark=DNS passthrough=no
add action=mark-packet chain=forward comment="VPN using DNS ports\?" \
connection-bytes=5000000-0 connection-mark=DNS new-packet-mark=VPN_likely \
passthrough=no
add action=mark-packet chain=forward comment=icmp new-packet-mark=ICMP \
passthrough=no protocol=icmpv6
add action=mark-connection chain=forward comment=VOIP new-connection-mark=\
VOIP passthrough=yes src-address-list=voip_hosts
add action=mark-packet chain=forward connection-mark=VOIP new-packet-mark=\
VOIP passthrough=no
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.56 connection-mark=\
no-mark dscp=56 dst-address-list=!voip_hosts out-interface-list=WAN
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.40 connection-mark=\
no-mark dscp=40 dst-address-list=!voip_hosts out-interface-list=WAN
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.46 connection-mark=\
no-mark dscp=46 dst-address-list=!voip_hosts out-interface-list=WAN
add action=add-dst-to-address-list address-list=voip_hosts \
address-list-timeout=1h chain=forward comment=dscp.48 connection-mark=\
no-mark dscp=48 dst-address-list=!voip_hosts out-interface-list=WAN
/ipv6 nd prefix default
set preferred-lifetime=12h valid-lifetime=20h
/snmp
set enabled=yes
/system clock
set time-zone-name=Europe/London
/system identity
set name="hAP AC2"
/system logging
add action=remote topics=info
add action=remote topics=critical
add action=remote topics=error
add action=remote topics=warning
/system ntp client
set enabled=yes server-dns-names=\
0.uk.pool.ntp.org,1.uk.pool.ntp.org,2.uk.pool.ntp.org,3.uk.pool.ntp.org
/system routerboard settings
set auto-upgrade=yes
/system routerboard mode-button
set on-event=toggle-mgmt-wifi
/tool bandwidth-server
set enabled=no
/tool graphing interface
add interface=e1-trunk
add interface=e2-nas
add interface=e3-tv
add interface=e5-wan
add interface=pppoe-wan
/tool graphing resource
add
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=MGMT
/tool sniffer
set filter-interface=e1-trunk