Hi @sindy ,
here is the code for the export on the main branch :
/export hide-sensitive
# may/26/2019 HIDDEN by RouterOS 6.43.12
# software id = SMRR-9LV5
#
# model = 951G-2HnD
# serial number = HIDDEN
/interface bridge
add admin-mac=HIDDEN auto-mac=no comment=defconf name=bridge
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-Ce country="HIDDEN" disabled=no distance=indoors \
frequency=2427 mode=ap-bridge ssid="HIDDEN" wireless-protocol=802.11
/interface ethernet
set [ find default-name=ether1 ] speed=100Mbps
set [ find default-name=ether2 ] name=ether2-master speed=100Mbps
set [ find default-name=ether3 ] speed=100Mbps
set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether5 ] speed=100Mbps
/interface pppoe-client
add add-default-route=yes interface=ether1 name=pppoe-out1 use-peer-dns=yes user=HIDDEN
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add exclude=dynamic name=discover
add name=mactel
add name=mac-winbox
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/ip ipsec peer profile
set [ find default=yes ] enc-algorithm=aes-256,aes-192,aes-128,3des nat-traversal=no
/ip pool
add name=dhcp ranges=192.168.2.10-192.168.2.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2-master
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge interface=ether3
add bridge=bridge interface=ether4
add bridge=bridge interface=ether5
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=wlan1 list=discover
add interface=ether2-master list=discover
add interface=ether3 list=discover
add interface=ether4 list=discover
add interface=ether5 list=discover
add interface=bridge list=discover
add interface=pppoe-out1 list=discover
add interface=bridge list=mactel
add interface=bridge list=mac-winbox
/ip address
add address=192.168.2.1/24 comment=defconf interface=ether2-master network=192.168.2.0
add address=192.168.1.108/24 interface=ether1 network=192.168.1.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid interface=ether1
/ip dhcp-server network
add address=192.168.2.0/24 comment=defconf gateway=192.168.2.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=192.168.1.1,HIDDEN
/ip dns static
add address=192.168.2.1 name=router.lan
/ip firewall filter
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid disabled=yes
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new \
disabled=yes in-interface-list=WAN
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage3
add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp
add action=drop chain=input comment="drop telnet brute forcers" dst-port=23 protocol=tcp src-address-list=black_list
add action=add-src-to-address-list address-list=black_list address-list-timeout=1w3d chain=input connection-state=new dst-port=23 \
protocol=tcp src-address-list=telnet_stage3
add action=add-src-to-address-list address-list=telnet_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=23 \
protocol=tcp src-address-list=telnet_stage2
add action=add-src-to-address-list address-list=telnet_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=23 \
protocol=tcp src-address-list=telnet_stage1
add action=add-src-to-address-list address-list=telnet_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=23 \
protocol=tcp
/ip firewall nat
add action=accept chain=srcnat comment="NAT Bypass 1" dst-address=192.168.0.0/24 src-address=192.168.2.0/24
add action=accept chain=srcnat comment="NAT Bypass 2" dst-address=192.168.3.0/24 src-address=192.168.2.0/24
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip ipsec peer
add address=HIDDEN comment="Branch 1"
add address=HIDDEN comment="Branch 2"
/ip ipsec policy
add comment="Main Branch to Branch 1" dst-address=192.168.3.0/24 sa-dst-address=HIDDEN sa-src-address=192.168.1.108 src-address=\
192.168.2.0/24 tunnel=yes
add comment="Main Branch to Branch 2" dst-address=192.168.0.0/24 sa-dst-address=HIDDEN sa-src-address=192.168.1.108 src-address=\
192.168.2.0/24 tunnel=yes
set 2 disabled=yes
/ip route
add distance=1 gateway=192.168.1.1
/ip service
set www-ssl disabled=no
/system clock
set time-zone-name=HIDDEN
/system identity
set name=MAIN BRANCH
Here is the Ipsec export on Main Branch:
/ip ipsec installed-sa print
Flags: H - hw-aead, A - AH, E - ESP
0 E spi=0xC0C2917 src-address=HIDDEN dst-address=192.168.1.108 state=mature auth-algorithm=sha1 enc-algorithm=aes-cbc
enc-key-size=256 auth-key="HIDDEN"
enc-key="HIDDEN" addtime=may/26/2019 17:40:28 expires-in=14m41s
add-lifetime=24m/30m current-bytes=54300 current-packets=905 replay=128
1 E spi=0x271439D src-address=192.168.1.108 dst-address=HIDDEN state=mature auth-algorithm=sha1 enc-algorithm=aes-cbc
enc-key-size=256 auth-key="HIDDEN"
enc-key="HIDDEN" addtime=may/26/2019 HIDDEN expires-in=14m41s
add-lifetime=24m/30m current-bytes=54300 current-packets=905 replay=128
2 E spi=0x4502DA4 src-address=HIDDEN dst-address=192.168.1.108 state=mature auth-algorithm=sha1 enc-algorithm=aes-cbc
enc-key-size=256 auth-key="HIDDEN"
enc-key="HIDDEN" addtime=may/26/2019 17:40:32 expires-in=14m45s
add-lifetime=24m/30m current-bytes=53700 current-packets=895 replay=128
3 E spi=0x592C1B6 src-address=192.168.1.108 dst-address=HIDDEN state=mature auth-algorithm=sha1 enc-algorithm=aes-cbc
enc-key-size=256 auth-key="HIDDEN"
enc-key="HIDDEN" addtime=may/26/2019 17:40:32 expires-in=14m45s
add-lifetime=24m/30m current-bytes=53820 current-packets=897 replay=128
Here is the export for branch 1:
/export hide-sensitive
# may/26/2019 HIDDEN by RouterOS 6.43.12
# software id = LD3U-NM8Q
#
# model = 951G-2HnD
# serial number = HIDDEN
/interface bridge
add admin-mac=HIDDEN auto-mac=no comment=defconf name=bridge
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-Ce country="HIDDEN" distance=indoors frequency=auto \
mode=ap-bridge ssid="HIDDEN" wireless-protocol=802.11
/interface ethernet
set [ find default-name=ether1 ] speed=100Mbps
set [ find default-name=ether2 ] name=ether2-master speed=100Mbps
set [ find default-name=ether3 ] speed=100Mbps
set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether5 ] speed=100Mbps
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 use-peer-dns=yes user=HIDDEN
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add exclude=dynamic name=discover
add name=mactel
add name=mac-winbox
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/ip ipsec peer profile
set [ find default=yes ] enc-algorithm=aes-256,aes-192,aes-128,3des nat-traversal=no
/ip pool
add name=dhcp ranges=192.168.3.10-192.168.3.254
add name=dhcp_pool1 ranges=192.168.3.2-192.168.3.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2-master
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge interface=ether3
add bridge=bridge interface=ether4
add bridge=bridge interface=ether5
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=wlan1 list=discover
add interface=ether2-master list=discover
add interface=ether3 list=discover
add interface=ether4 list=discover
add interface=ether5 list=discover
add interface=bridge list=discover
add interface=pppoe-out1 list=discover
add interface=ether2-master list=mactel
add interface=wlan1 list=mactel
add interface=ether2-master list=mac-winbox
add interface=wlan1 list=mac-winbox
add interface=pppoe-out1 list=WAN
/ip address
add address=192.168.3.1/24 comment=defconf interface=ether2-master network=192.168.3.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid interface=ether1
/ip dhcp-server network
add address=192.168.3.0/24 comment=defconf gateway=192.168.3.1 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.3.1 name=router.lan
/ip firewall filter
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new \
in-interface-list=WAN
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage3
add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=\
tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=\
tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=\
tcp
add action=drop chain=input comment="drop telnet brute forcers" dst-port=23 protocol=tcp src-address-list=black_list
add action=add-src-to-address-list address-list=black_list address-list-timeout=1w3d chain=input connection-state=new dst-port=23 \
protocol=tcp src-address-list=telnet_stage3
add action=add-src-to-address-list address-list=telnet_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=23 \
protocol=tcp src-address-list=telnet_stage2
add action=add-src-to-address-list address-list=telnet_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=23 \
protocol=tcp src-address-list=telnet_stage1
add action=add-src-to-address-list address-list=telnet_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=23 \
protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=accept chain=srcnat comment="NAT Bypass BRANCH 1 TO MAIN BRANCH" dst-address=192.168.2.0/24 src-address=192.168.3.0/24
/ip ipsec peer
add address=HIDDEN comment="BRANCH 1"
/ip ipsec policy
add comment="BRANCH 1 TO MAIN BRANCH" dst-address=192.168.2.0/24 sa-dst-address=HIDDEN sa-src-address=HIDDEN src-address=192.168.3.0/24 \
tunnel=yes
set 1 disabled=yes
/ip service
set www-ssl disabled=no
/system clock
set time-zone-name=HIDDEN
/system identity
set name=HIDDEN
/system package update
set channel=long-term
branch 1 ipsec export :
/ip ipsec installed-sa print
Flags: H - hw-aead, A - AH, E - ESP
0 E spi=0x271439D src-address=Hidden dst-address=Hidden
state=mature auth-algorithm=sha1 enc-algorithm=aes-cbc enc-key-size=256
auth-key="Hidden"
enc-key="Hidden"
addtime=may/26/2019 17:40:13 expires-in=11m46s add-lifetime=24m/30m
current-bytes=64620 current-packets=1077 replay=128
1 E spi=0xC0C2917 src-address=Hidden dst-address=Hidden
state=mature auth-algorithm=sha1 enc-algorithm=aes-cbc enc-key-size=256
auth-key="Hidden"
enc-key="Hidden"
addtime=may/26/2019 17:40:13 expires-in=11m46s add-lifetime=24m/30m
current-bytes=64620 current-packets=1077 replay=128
Hopefully I didnt miss hiding any info. In regards to your question, in the main branch on the ISP device, we opened a range of ports from within the device, as before this it would not work. So yes, I can confirm the ip forwarding is correct.
Thanks.