Добрый день! Вот что то наваялось, хотел проконсультироваться, все ли верно, дырки, очередность правил и т.п. На втором тоже самое, только без проброса портов... # 2025-03-10 15:07:40 by RouterOS 7.18.2 # software id = TFFU-1USB # # model = RBD52G-5HacD2HnD # serial number = /interface bridge add admin-mac=D4:01:C3:3A:AF:85 auto-mac=no comment=defconf name=bridge /interface eoip add allow-fast-path=no comment=Office local-address=192.168.100.1 \ mac-address=02:85:BA:E3:87:69 name=eoip-tunnel1 remote-address=\ 192.168.100.2 tunnel-id=5 /interface list add comment=defconf name=WAN add comment=defconf name=LAN /ip hotspot profile set [ find default=yes ] html-directory=hotspot /ip pool add name=dhcp ranges=192.168.1.100-192.168.1.120 /ip dhcp-server add address-pool=dhcp interface=bridge name=defconf /disk settings set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes /interface bridge port add bridge=bridge comment=defconf interface=ether2 add bridge=bridge comment=defconf interface=ether3 add bridge=bridge comment=defconf interface=ether4 add bridge=bridge comment=defconf interface=ether5 add bridge=bridge interface=eoip-tunnel1 /ip neighbor discovery-settings set discover-interface-list=LAN /interface list member add comment=defconf interface=bridge list=LAN add comment=defconf interface=ether1 list=WAN add comment=EOIP interface=eoip-tunnel1 list=LAN /ip address add address=192.168.1.1/24 comment=defconf interface=bridge network=\ 192.168.1.0 add address=192.168.100.1/24 interface=ether1 network=192.168.100.0 /ip dhcp-client add comment=defconf disabled=yes interface=ether1 /ip dhcp-server network add address=192.168.1.0/24 comment=defconf dns-server=192.168.1.1 gateway=\ 192.168.1.1 netmask=24 /ip dns set allow-remote-requests=yes /ip dns static add address=192.168.1.1 comment=defconf name=router.lan type=A /ip firewall filter add action=accept chain=input comment="Management Access" dst-port=8291,22 \ in-interface=bridge protocol=tcp add action=accept chain=input comment="IPsec ESP" protocol=ipsec-esp add action=accept chain=input comment="IPsec AH" protocol=ipsec-ah add action=accept chain=input comment="IPsec IKE" dst-port=500,4500 protocol=\ udp add action=accept chain=input comment="accept input matching IPsec policy" \ ipsec-policy=in,ipsec add action=accept chain=input comment="accept EoIP" protocol=gre add action=accept chain=input comment="Allow ICMP" protocol=icmp add action=accept chain=forward comment="Port Forwarding" dst-port=8000,443 \ in-interface=ether1 out-interface=bridge protocol=tcp add action=drop chain=input comment="defconf: drop all not coming from LAN" \ in-interface-list=!LAN add action=drop chain=input comment="Block All Input" add action=accept chain=forward comment="Bridge Traffic" in-interface=bridge \ out-interface=bridge add action=accept chain=forward comment="Allow Established" connection-state=\ established,related add action=drop chain=forward comment="Block All Forward" /ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WAN add action=dst-nat chain=dstnat comment="Video Surveillance Port 8000" \ dst-port=8000 in-interface=ether1 protocol=tcp to-addresses=192.168.1.121 \ to-ports=8000 add action=dst-nat chain=dstnat comment="HTTPS Port 443" dst-port=443 \ in-interface=ether1 protocol=tcp to-addresses=192.168.1.90 /ip service set telnet disabled=yes set ftp disabled=yes set www disabled=yes set ssh disabled=yes set api disabled=yes set api-ssl disabled=yes /ipv6 firewall address-list add address=::/128 comment="defconf: unspecified address" list=bad_ipv6 add address=::1/128 comment="defconf: lo" list=bad_ipv6 add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6 add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6 add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6 add address=100::/64 comment="defconf: discard only " list=bad_ipv6 add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6 add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6 add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6 /ipv6 firewall filter add action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalid add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\ icmpv6 add action=accept chain=input comment="defconf: accept UDP traceroute" \ dst-port=33434-33534 protocol=udp add action=accept chain=input comment=\ "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\ udp src-address=fe80::/10 add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \ protocol=udp add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\ ipsec-ah add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\ ipsec-esp add action=accept chain=input comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec add action=drop chain=input comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LAN add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \ connection-state=established,related add action=accept chain=forward comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalid add action=drop chain=forward comment=\ "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6 add action=drop chain=forward comment=\ "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6 add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \ hop-limit=equal:1 protocol=icmpv6 add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\ icmpv6 add action=accept chain=forward comment="defconf: accept HIP" protocol=139 add action=accept chain=forward comment="defconf: accept IKE" dst-port=\ 500,4500 protocol=udp add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\ ipsec-ah add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\ ipsec-esp add action=accept chain=forward comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec add action=drop chain=forward comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LAN /system note set show-at-login=no /tool mac-server set allowed-interface-list=LAN /tool mac-server mac-winbox set allowed-interface-list=LAN
Вообщем туннель заработал, несколько дней не удавалось, потом выяснилось что билайн, не любит микротики, или наоборот Вообщем пока не взял настройки правильные у провайдера, ничего не заработало. Сейчас работает,, но проблема в DNS, видимо теряются... когда без тунеля, все хорошо... тунель поднимаешь и все.. при чем не на всех компах.. Хотя у всех стоит статический адрес, в качестве шлюза первый роутер 192.168.1.1 DNS 8.8.8.8 и все равно затыки.