Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [ubnt@CWN CORE (CCR2004 12S)] > /export
- # jul/09/2022 23:14:52 by RouterOS 7.3.1
- # software id = 06NJ-PKRI
- #
- # model = CCR2004-1G-12S+2XS
- # serial number = F0710FB52A35
- /interface bridge
- add name=MAIN
- /interface ethernet
- set [ find default-name=sfp-sfpplus1 ] auto-negotiation=no name="WAN 1 (SFP+)"
- set [ find default-name=sfp-sfpplus2 ] auto-negotiation=no
- set [ find default-name=sfp-sfpplus3 ] auto-negotiation=no
- /interface pppoe-client
- add disabled=no interface=sfp-sfpplus2 name="WAN BTS (SFP+ 2)" user=BTS625064
- /interface vlan
- add interface=MAIN name="VLAN - DEVICE CNFIG 0.1" vlan-id=8
- add interface=MAIN name="VLAN - DEVICE CNFIG 1.1" vlan-id=7
- add interface=MAIN name="VLAN - GUEST" vlan-id=2
- add interface=MAIN name="VLAN - IP CAMERA" vlan-id=4
- add interface=MAIN name="VLAN - IoT" vlan-id=3
- add interface=MAIN name="VLAN - VOICE" vlan-id=5
- /interface list
- add name=LOCAL
- /interface wireless security-profiles
- set [ find default=yes ] supplicant-identity=MikroTik
- /ip pool
- add name=VOICE ranges=10.4.0.2-10.4.63.254
- add name="IoT " ranges=10.2.0.2-10.2.63.254
- add name=GUEST ranges=10.1.0.10-10.1.63.254
- add name="IP CAMERAS" ranges=10.3.0.2-10.3.63.254
- add name="CONFIG 0.1" ranges=192.168.0.2-192.168.0.254
- add name="CONFIG 1.1" ranges=192.168.1.2-192.168.1.254
- add name=MAIN ranges=10.0.0.101-10.0.63.254
- /ip dhcp-server
- add address-pool=VOICE interface="VLAN - VOICE" name=dhcp2
- add address-pool="IoT " interface="VLAN - IoT" name=dhcp3
- add address-pool=GUEST interface="VLAN - GUEST" name=dhcp4
- add address-pool="IP CAMERAS" interface="VLAN - IP CAMERA" name=dhcp5
- add address-pool="CONFIG 0.1" interface="VLAN - DEVICE CNFIG 0.1" name=dhcp6
- add address-pool="CONFIG 1.1" interface="VLAN - DEVICE CNFIG 1.1" name=dhcp7
- add address-pool=MAIN interface=MAIN name=dhcp1
- /port
- set 0 name=serial0
- set 1 name=serial1
- /queue simple
- add disabled=yes max-limit=10M/10M name="queue GUEST " target="VLAN - GUEST"
- add max-limit=15M/15M name="queue WAN 1" queue=\
- pcq-upload-default/pcq-download-default target="WAN 1 (SFP+)"
- add max-limit=115M/115M name="queue WAN 2" queue=\
- pcq-upload-default/pcq-download-default target="WAN BTS (SFP+ 2)"
- /routing table
- add disabled=no fib name=LOCAL
- add disabled=no fib name="TO WAN 1"
- add disabled=no fib name="TO WAN 2"
- /zerotier
- set zt1 comment="ZeroTier Central controller - https://my.zerotier.com/" \
- identity="(i dont know if this is sensitive or not but justr remove it because why not)" name=zt1 port=9993
- /zerotier interface
- add allow-default=yes allow-global=no allow-managed=yes disabled=no instance=\
- zt1 name=zerotier1 network=(zt numbers and letters)
- /interface bridge port
- add bridge=MAIN interface=ether1
- add bridge=MAIN interface=sfp-sfpplus11
- /ip neighbor discovery-settings
- set discover-interface-list=!LOCAL
- /interface list member
- add interface=MAIN list=LOCAL
- add interface="VLAN - DEVICE CNFIG 0.1" list=LOCAL
- add interface="VLAN - DEVICE CNFIG 1.1" list=LOCAL
- add interface="VLAN - GUEST" list=LOCAL
- add interface="VLAN - IP CAMERA" list=LOCAL
- add interface="VLAN - IoT" list=LOCAL
- add interface="VLAN - VOICE" list=LOCAL
- /interface ovpn-server server
- set auth=sha1,md5
- /ip address
- add address=10.0.0.1/18 interface=MAIN network=10.0.0.0
- add address=10.1.0.1/18 interface="VLAN - GUEST" network=10.1.0.0
- add address=10.2.0.1/18 interface="VLAN - IoT" network=10.2.0.0
- add address=10.3.0.1/18 interface="VLAN - IP CAMERA" network=10.3.0.0
- add address=10.4.0.1/18 interface="VLAN - VOICE" network=10.4.0.0
- add address=192.168.0.1/24 interface="VLAN - DEVICE CNFIG 0.1" network=\
- 192.168.0.0
- add address=192.168.1.1/24 interface="VLAN - DEVICE CNFIG 1.1" network=\
- 192.168.1.0
- add address=100.90.0.8/28 interface="WAN 1 (SFP+)" network=100.90.0.0
- add address=10.0.0.1/13 interface=MAIN network=10.0.0.0
- /ip arp
- add address=10.0.0.10 interface=MAIN mac-address=84:16:F9:8C:30:0C
- /ip dhcp-client
- add interface=sfp-sfpplus3
- /ip dhcp-server network
- add address=10.0.0.0/18 dns-server=10.0.0.11,1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4 \
- gateway=10.0.0.1
- add address=10.1.0.0/18 dns-server=10.0.0.11,1.1.1.1,8.8.8.8,8.8.4.4,1.0.0.1 \
- gateway=10.1.0.1
- add address=10.2.0.0/18 dns-server=10.0.0.11,1.1.1.1,8.8.8.8,8.8.4.4,1.0.0.1 \
- gateway=10.2.0.1
- add address=10.3.0.0/18 dns-server=10.0.0.11,1.1.1.1,8.8.8.8,8.8.4.4,1.0.0.1 \
- gateway=10.3.0.1
- add address=10.4.0.0/18 dns-server=10.0.0.11,1.1.1.1,8.8.8.8,8.8.4.4,1.0.0.1 \
- gateway=10.4.0.1
- add address=192.168.0.0/24 dns-server=10.0.0.11,1.1.1.1,8.8.8.8,8.8.4.4,1.0.0.1 \
- gateway=192.168.0.1
- add address=192.168.1.0/24 dns-server=10.0.0.11,1.1.1.1,8.8.8.8,8.8.4.4,1.0.0.1 \
- gateway=192.168.1.1
- /ip dns
- set allow-remote-requests=yes servers=1.0.0.1,1.1.1.1,8.8.8.8,8.8.4.4
- /ip firewall address-list
- add address=10.0.0.0/18 list=LAN
- add address=10.1.0.0/18 list="LAN + GUEST"
- add address=10.2.0.0/18 list=LAN
- add address=10.3.0.0/18 list=LAN
- add address=10.4.0.0/18 list=LAN
- add address=10.0.0.0/18 list="LAN + GUEST"
- add address=10.2.0.0/18 list="LAN + GUEST"
- add address=10.3.0.0/18 list="LAN + GUEST"
- add address=10.4.0.0/18 list="LAN + GUEST"
- add address=10.1.0.2-10.1.63.254 list="GUEST CLIENT"
- add address=100.90.0.0/28 list=WAN
- add address=10.9.0.1 list=WAN
- /ip firewall filter
- add action=passthrough chain=unused-hs-chain comment="place hotspot rules here" \
- disabled=yes
- add action=drop chain=input comment="GUEST BLOCK 1" dst-address=10.1.0.1 \
- dst-port=22,2000,8450 protocol=tcp src-address-list="GUEST USERS"
- add action=drop chain=input comment="GUEST BLOCK 1" dst-address-list=LAN \
- src-address-list="GUEST USERS"
- add action=accept chain=forward in-interface="WAN 1 (SFP+)" protocol=icmp
- add action=accept chain=input disabled=yes dst-port=8450 protocol=tcp
- /ip firewall mangle
- add action=accept chain=prerouting dst-address=10.8.0.0/13 src-address-list=LAN
- add action=accept chain=prerouting dst-address=10.9.0.1
- add action=accept chain=prerouting dst-address=100.90.0.1
- add action=accept chain=prerouting dst-address-list="LAN + GUEST"
- add action=mark-connection chain=prerouting in-interface="WAN 1 (SFP+)" \
- new-connection-mark="WAN 1" passthrough=yes
- add action=mark-connection chain=prerouting in-interface="WAN BTS (SFP+ 2)" \
- new-connection-mark="WAN 2" passthrough=yes
- add action=mark-connection chain=prerouting in-interface-list=LOCAL \
- new-connection-mark="WAN 2" passthrough=yes per-connection-classifier=\
- both-addresses-and-ports:3/0
- add action=mark-connection chain=prerouting in-interface-list=LOCAL \
- new-connection-mark="WAN 2" passthrough=yes per-connection-classifier=\
- both-addresses-and-ports:3/2
- add action=mark-connection chain=prerouting in-interface-list=LOCAL \
- new-connection-mark="WAN 1" passthrough=yes per-connection-classifier=\
- both-addresses-and-ports:3/1
- add action=mark-routing chain=prerouting connection-mark="WAN 1" \
- in-interface-list=LOCAL new-routing-mark="TO WAN 1" passthrough=yes
- add action=mark-routing chain=prerouting connection-mark="WAN 2" \
- in-interface-list=LOCAL new-routing-mark="TO WAN 2" passthrough=yes
- add action=mark-routing chain=output connection-mark="WAN 1" new-routing-mark=\
- "TO WAN 1" passthrough=yes
- add action=mark-routing chain=output connection-mark="WAN 2" new-routing-mark=\
- "TO WAN 2" passthrough=yes
- /ip firewall nat
- add action=masquerade chain=srcnat out-interface="WAN 1 (SFP+)"
- add action=masquerade chain=srcnat out-interface=zerotier1
- add action=masquerade chain=srcnat out-interface="WAN BTS (SFP+ 2)"
- add action=dst-nat chain=dstnat dst-address=100.90.0.8 dst-port=5050 protocol=\
- tcp to-addresses=10.3.0.10 to-ports=5050
- add action=dst-nat chain=dstnat dst-address=100.90.0.8 dst-port=5051 protocol=\
- tcp to-addresses=10.13.0.10 to-ports=5051
- add action=dst-nat chain=dstnat dst-address=100.90.0.8 dst-port=25570,25580 \
- protocol=tcp to-addresses=10.0.0.16
- add action=dst-nat chain=dstnat dst-address=100.90.0.8 dst-port=5051 protocol=\
- udp to-addresses=10.13.0.10 to-ports=5051
- add action=dst-nat chain=dstnat dst-address=100.90.0.8 dst-port=5050 protocol=\
- udp to-addresses=10.3.0.10 to-ports=5050
- add action=dst-nat chain=dstnat dst-address=100.90.0.8 dst-port=25570,25580 \
- protocol=udp to-addresses=10.0.0.16
- add action=src-nat chain=srcnat out-interface="WAN 1 (SFP+)" src-address=\
- 10.13.0.10 to-addresses=100.90.0.8
- add action=masquerade chain=srcnat dst-address=10.13.0.10 out-interface=MAIN \
- src-address-list=LAN
- add action=masquerade chain=srcnat dst-address=10.0.0.16 out-interface=MAIN \
- src-address-list=LAN
- add action=masquerade chain=srcnat dst-address=10.3.0.10 out-interface=MAIN \
- src-address-list=LAN
- /ip route
- add check-gateway=ping comment="PCC WAN 2 MAIN" disabled=no distance=1 \
- dst-address=0.0.0.0/0 gateway=10.9.0.1 pref-src="" routing-table="TO WAN 2" \
- scope=30 suppress-hw-offload=no target-scope=10
- add comment="PCC WAN 1 MAIN" disabled=no distance=1 dst-address=0.0.0.0/0 \
- gateway=100.90.0.1 pref-src=0.0.0.0 routing-table="TO WAN 1" scope=30 \
- suppress-hw-offload=no target-scope=10
- add check-gateway=ping comment="PCC WAN 2 SEC" disabled=no distance=2 \
- dst-address=0.0.0.0/0 gateway=100.90.0.1 pref-src=0.0.0.0 routing-table=\
- "TO WAN 2" scope=30 suppress-hw-offload=no target-scope=10
- add check-gateway=ping comment="PCC WAN 1 SEC" disabled=no distance=2 \
- dst-address=0.0.0.0/0 gateway=10.9.0.1 pref-src=0.0.0.0 routing-table=\
- "TO WAN 1" scope=30 suppress-hw-offload=no target-scope=10
- add check-gateway=ping comment="ZEROTIER WAN 2" disabled=no distance=1 \
- dst-address=0.0.0.0/0 gateway=10.9.0.1 pref-src=0.0.0.0 routing-table=main \
- scope=30 suppress-hw-offload=no target-scope=10
- add check-gateway=ping comment="ZEROTIER WAN 1" disabled=no distance=2 \
- dst-address=0.0.0.0/0 gateway=100.90.0.1 pref-src=0.0.0.0 routing-table=\
- main scope=30 suppress-hw-offload=no target-scope=10
- add disabled=no distance=1 dst-address=192.168.169.40/29 gateway=100.90.0.1 \
- pref-src=100.90.0.8 routing-table=main scope=30 suppress-hw-offload=no \
- target-scope=10
- /ip service
- set telnet disabled=yes
- set ftp disabled=yes
- set www disabled=yes
- set api disabled=yes
- set winbox port=8450
- set api-ssl disabled=yes
- /system clock
- set time-zone-name=Asia
- /system identity
- set name="CWN CORE (CCR2004 12S)"
- /tool graphing resource
- add
- [ubnt@CWN CORE (CCR2004 12S)]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement