Yes provide a decent network diagram, to show what are the two or maybe more clients connecting to the server...............
If any MT devices are involved, provide the config.
/export file=anynameyouwish ( minus router serial # and any public WANIP information keys etc.......)
/interface wireguard
add listen-port=51820 mtu=1420 name=WG-BAGNARIA
/interface list
add name=WAN
add name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec profile
add dh-group=modp1024 dpd-interval=30s enc-algorithm=3des name=profile_1 \
nat-traversal=no
/ip ipsec peer
add address=x.x.x.x/32 disabled=yes name=peer1 profile=profile_1
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha1,md5 enc-algorithms=3des
/ip pool
add name=dhcp ranges=192.168.2.101-192.168.2.190
/ip dhcp-server
add address-pool=dhcp interface=ether2-lan name=dhcp1
/port
set 0 name=serial0
/ppp profile
add local-address=10.0.0.2 name=TUNNEL remote-address=10.0.0.1
add local-address=10.0.11.11 name=Tunnel-gonars remote-address=10.0.11.1
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
/system logging action
set 0 memory-lines=100
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/ip settings
set allow-fast-path=no tcp-syncookies=yes
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface list member
add interface=ether1-wan list=WAN
add interface=ovpn-gonars list=LAN
add interface=WG-BAGNARIA list=LAN
add interface=ether2-lan list=LAN
/interface ovpn-server server
set auth="" certificate=CLIENT-GONARS cipher=aes256 \
require-client-certificate=yes
/interface wireguard peers
add allowed-address=10.0.8.3/32 comment=PORTATILE endpoint-port=51820 \
interface=WG-BAGNARIA persistent-keepalive=20s public-key=\
"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
add allowed-address=10.0.8.1/32,192.168.1.0/24 comment="TUNNEL GONARS" \
endpoint-address=x.x.x.x endpoint-port=51820 interface=WG-BAGNARIA \
persistent-keepalive=20s public-key=\
"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
/ip address
add address=192.168.10.10/24 interface=ether1-wan network=192.168.10.0
add address=192.168.2.250/24 interface=ether2-lan network=192.168.2.0
add address=10.0.8.2/30 interface=WG-BAGNARIA network=10.0.8.0
/ip dhcp-server network
add address=192.168.2.0/24 gateway=192.168.2.250
/ip dns
set allow-remote-requests=yes servers=208.67.220.220,208.67.222.222
/ip firewall filter
add action=drop chain=input comment="Block DNS Wan" dst-port=53 \
in-interface-list=WAN protocol=tcp
add action=drop chain=input comment="Block DNS Wan" dst-port=53 \
in-interface-list=WAN protocol=udp
add action=drop chain=input comment="Block DNS Wan" dst-port=23 \
in-interface-list=WAN protocol=tcp
add action=drop chain=input comment="Block DNS Wan" dst-port=23 \
in-interface-list=WAN protocol=udp
add action=drop chain=input comment="Squild Blacklist: SBL Blocklist.de." \
in-interface=ether1-wan log=yes log-prefix="BL_sbl blocklist.de" \
src-address-list="sbl blocklist.de"
add action=drop chain=input comment="Squild Blacklist: SBL DShield." \
in-interface=ether1-wan log=yes log-prefix="BL_sbl dshield" \
src-address-list="sbl dshield"
add action=drop chain=input comment="Squild Blacklist: SBL Spamhaus." \
in-interface=ether1-wan log=yes log-prefix="BL_sbl spamhaus" \
src-address-list="sbl spamhaus"
add action=drop chain=forward comment="Squild Blacklist: SBL Blocklist.de." \
dst-address-list="sbl blocklist.de" log=yes log-prefix=\
"BL_sbl blocklist.de" out-interface=ether1-wan
add action=drop chain=forward comment="Squild Blacklist: SBL DShield." \
dst-address-list="sbl dshield" log=yes log-prefix="BL_sbl dshield" \
out-interface=ether1-wan
add action=drop chain=forward comment="Squild Blacklist: SBL Spamhaus." \
dst-address-list="sbl spamhaus" log=yes log-prefix="BL_sbl spamhaus" \
out-interface=ether1-wan
add action=drop chain=forward comment="Bloccare IP addresses BOGON" \
src-address=0.0.0.0/8
add action=drop chain=forward comment="Bloccare IP addresses BOGON" \
dst-address=0.0.0.0/8
add action=drop chain=forward comment="Bloccare IP addresses BOGON" \
src-address=127.0.0.0/8
add action=drop chain=forward comment="Bloccare IP addresses BOGON" \
dst-address=127.0.0.0/8
add action=drop chain=forward comment="Bloccare IP addresses BOGON" \
src-address=224.0.0.0/3
add action=drop chain=forward comment="Bloccare IP addresses BOGON" \
dst-address=224.0.0.0/3
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="Port scanners to list " \
protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP FIN Stealth scan" \
protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan" protocol=tcp \
tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan" protocol=tcp \
tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG scan" protocol=\
tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan" protocol=tcp \
tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL scan" protocol=tcp \
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment=\
"BLOCK TRACEROUTE TRAFFIC Disable ICMP ping" icmp-options=8:0 \
in-interface-list=WAN protocol=icmp
add action=drop chain=forward comment="BLOCK TRACEROUTE TRAFFIC Traceroute" \
icmp-options=11:0 protocol=icmp
add action=drop chain=forward comment="BLOCK TRACEROUTE TRAFFIC" \
icmp-options=3:3 protocol=icmp
add action=add-src-to-address-list address-list=DoS_Attacked \
address-list-timeout=5m chain=input comment=DoS_Attacked \
connection-limit=32,32 protocol=tcp
add action=tarpit chain=input comment=DoS_Attacked connection-limit=10,32 \
protocol=tcp src-address-list=DoS_Attacked
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 \
protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_blacklist \
address-list-timeout=1w3d chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage3
add action=add-src-to-address-list address-list=ssh_stage3 \
address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 \
address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 \
address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp
add action=drop chain=input comment="drop ftp brute forcers" dst-port=21 \
protocol=tcp src-address-list=ftp_blacklist
add action=accept chain=input comment="block to WAN" in-interface-list=!WAN \
src-address=192.168.2.0/24
add action=accept chain=output content="530 Login incorrect" dst-limit=\
1/1m,9,dst-address/1m protocol=tcp
add action=add-dst-to-address-list address-list=ftp_blacklist \
address-list-timeout=3h chain=output content="530 Login incorrect" \
protocol=tcp
add action=accept chain=input comment="Allow OpenVPN" disabled=yes dst-port=\
1180 protocol=tcp
add action=accept chain=input comment=WIREGUARD dst-port=51820 protocol=udp
add action=accept chain=input comment="Allow winbox da OpenVPN" dst-port=1170 \
protocol=tcp
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
/ip firewall mangle
add action=add-src-to-address-list address-list=Worm-Infected-p445 \
address-list-timeout=1h chain=prerouting connection-state=new dst-port=\
445 limit=5,10:packet protocol=tcp
add action=change-ttl chain=prerouting new-ttl=increment:1
/ip firewall nat
add action=dst-nat chain=dstnat comment="Force using DNS" dst-port=53 \
protocol=udp to-addresses=192.168.2.250 to-ports=53
add action=dst-nat chain=dstnat comment="Force using DNS" dst-port=53 \
protocol=tcp to-addresses=192.168.2.250 to-ports=53
add action=masquerade chain=srcnat comment="TUNNEL OPENVPN" disabled=yes \
dst-address=192.168.1.170 out-interface=WG-BAGNARIA protocol=tcp
add action=masquerade chain=srcnat comment="TUNNEL OPENVPN" disabled=yes \
dst-address=192.168.1.200 out-interface=WG-BAGNARIA protocol=tcp
add action=masquerade chain=srcnat comment="TUNNEL OPENVPN" disabled=yes \
dst-address=192.168.1.0/24 out-interface=WG-BAGNARIA protocol=tcp
add action=dst-nat chain=dstnat comment="NAT DVR" dst-port=37777 protocol=tcp \
to-addresses=192.168.2.88 to-ports=37777
add action=masquerade chain=srcnat out-interface-list=WAN
/ip firewall raw
add action=drop chain=prerouting comment="dropping port scanners" \
src-address-list="port scanners"
add action=drop chain=prerouting dst-address=!192.168.1.200 dst-port=445 \
protocol=tcp src-address-list=Worm-Infected-p445
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip ipsec identity
add notrack-chain=prerouting peer=peer1
/ip ipsec policy
set 0 protocol=ipsec-esp
/ip route
add check-gateway=ping disabled=no dst-address=0.0.0.0/0 gateway=192.168.10.1
add disabled=no distance=2 dst-address=192.168.1.0/24 gateway=WG-BAGNARIA \
pref-src="" routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set winbox address=192.168.2.0/24,192.168.1.0/24,10.0.8.0/24 port=1170
set api-ssl disabled=yes
/ip ssh
set allow-none-crypto=yes forwarding-enabled=remote