# model: RBcAPGi-5acD2nD # serial-number: HFJ09F86242 # firmware-type: ipq4000L # current-firmware: 6.49.10 # installed-version: 7.15.2 # Flags: U - UNDOABLE # Columns: ACTION, POLICY, TIME, TRACE # ACTION POLICY TIME TRACE # U led settings changed write 2024-07-18 09:43:22 script:dark-mode # U led settings changed write 2024-07-18 09:43:16 script:dark-mode # # software id = 38BC-HMAA # # model = RBcAPGi-5acD2nD # serial number = HFJ09F86242 /interface bridge add admin-mac=78:9A:18:F1:20:1B auto-mac=no comment=defconf name=bridge port-cost-mode=short /interface wireless set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=MikroTik-F1201C wireless-protocol=802.11 set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-XXXX disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=MikroTik-F1201D wireless-protocol=802.11 /interface wireguard add listen-port=49926 mtu=1420 name=wg1 private-key="GK9aCQM0C98sqq/AKtgoVIHBhjkm2+SZhsuffnxsknc=" /interface list add comment=defconf name=WAN add comment=defconf name=LAN add name=VPN /interface lte apn set [ find default=yes ] ip-type=ipv4 use-network-apn=no /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik /ip pool add name=default-dhcp ranges=192.168.88.10-192.168.88.254 /ip dhcp-server add address-pool=default-dhcp interface=bridge lease-time=10m name=defconf /interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10 add bridge=bridge comment=defconf ingress-filtering=no interface=wlan1 internal-path-cost=10 path-cost=10 add bridge=bridge comment=defconf ingress-filtering=no interface=wlan2 internal-path-cost=10 path-cost=10 /ip firewall connection tracking set udp-timeout=10s /ip neighbor discovery-settings set discover-interface-list=LAN /ip settings set max-neighbor-entries=8192 /ipv6 settings set disable-ipv6=yes max-neighbor-entries=8192 /interface list member add comment=defconf interface=bridge list=LAN add comment=defconf interface=ether1 list=WAN add interface=wg1 list=VPN /interface ovpn-server server set auth=sha1,md5 /interface wireguard peers add allowed-address=100.68.5.0/24 endpoint-address=vpn.anli.house endpoint-port=445 interface=wg1 name=vpn-scandi-robots persistent-keepalive=10s public-key="ehllgunrfaaA/Gp7afIGln79N37qAmzFgOEGAuw770k=" /ip address add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0 add address=100.68.5.3/24 interface=wg1 network=100.68.5.0 /ip dhcp-client add comment=defconf interface=ether1 /ip dhcp-server network add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1 /ip dns set allow-remote-requests=yes servers=1.1.1.1,8.8.8.8 /ip dns static add address=192.168.88.1 comment=defconf name=router.lan /ip firewall filter add action=accept chain=input in-interface-list=VPN add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1 add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN /ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN /ip hotspot profile set [ find default=yes ] html-directory=hotspot /routing bfd configuration add disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5 /system clock set time-zone-name=Europe/Riga /system identity set name=gipsa-iela.ap1 /system note set show-at-login=no /system routerboard mode-button set enabled=yes on-event=dark-mode /system routerboard settings set cpu-frequency=716MHz /system script add comment=defconf dont-require-permissions=no name=dark-mode owner=*sys policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="\r\n :if ([system leds settings get all-leds-off] = \"never\") do={\r\n /system leds settings set all-leds-off=immediate \r\n } else={\r\n /system leds settings set all-leds-off=never \r\n }\r\n " /tool mac-server set allowed-interface-list=LAN /tool mac-server mac-winbox set allowed-interface-list=LAN