Hi,
So if i understood corectlly you want to connect to your gr750 from outside via PPTP and have internet connection from PPTP tunnel but in the same time not to interference with local lan network.
Here is an idea:
a. you should use one ether especially for this. Remove ether5 from master-bridge ether1
in interface list, double-click ether5 and in General tab on MASTER PORT select "none" ( instead of ether1 )
Open 'New Terminal':
b. assign an ip address/network to ether5
/ip address
add address=192.168.100.1/24 interface=ether5 network=192.168.100.0
PPTP server stuff
1. activate pptp service-port ( or make sure it is activated already )
/ ip firewall service-port
set pptp disabled=no
2. create a pptp dhcp pool
/ ip pool
add name="pool-pptp" ranges=192.168.100.220-192.168.100.230
3. create pptp profile
/ppp profile
add change-tcp-mss=yes dns-server=8.8.8.8 local-address=192.168.100.1 \
name=pptp-in only-one=yes remote-address=pool-pptp use-encryption=\
required use-upnp=no
* local-address=192.168.100.1 -> ether5 ip address as gateway
* remote-address=pool-pptp -> pptp pool addresses created at step 2
4. activate PPTP Server
/interface pptp-server server
set authentication=mschap1,mschap2 default-profile=pptp-in enabled=yes max-mru=1460 max-mtu=1460
* authentication=mschap1,mschap2 -> only accept those protocols for security;
in windows when you create VPN profile into Security tab at "data encryption" select last option "maximum strength..."
and at "Authentication" on Allow these protocols -> check only Microsot CHAP version 2
5. define user/password for pptp sessions
/ppp secret
add name=user1 password=password1 profile=pptp-in service=pptp
* profile: pptp profile name created at step 3
* service: only pptp service allowed
6. do not forget to add accept rule into firewall before any drop rule ( specially if you have a drop-input all last rule ):
/ip firewall filter
add action=accept chain=input comment="PPTP inside" dst-port=1723 in-interface=pppoe-xs4all log=yes log-prefix=PPTP-IN protocol=tcp
7. masquerade pptp network range
/ip firewall nat
add action=masquerade chain=srcnat comment="NATing pptp" log=yes log-prefix=NAT-PPTP out-interface=pppoe-xs4all src-address=192.168.100.0/24
8. drop forward traffic between local lan and pptp
/ip firewall filter
add action=drop chain=forward comment="isolate local lan and pptp" dst-address=192.168.100.0/24 in-interface=ether1 log=yes out-interface=ether5 \
src-address={ether1-lan-network-space}
add action=drop chain=forward dst-address={ether1-lan-network-space} in-interface=ether5 log=yes out-interface=ether1 src-address=192.168.100.0/24
* {ether1-lan-network-space} = your local lan address range, Ex.: 192.168.0.0/24
Hope it helps,
kind regards