# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 188.64.***.* 1
1 ADC 188.64.***.*/24 188.64.***.** ether1-WAN 0
2 ADC 192.168.0.0/24 192.168.0.1 dm.local.bridge 0
3 ADC 192.168.0.171/32 192.168.0.93 <l2tp-krr.offic... 0
4 ADC 192.168.0.173/32 192.168.0.33 <l2tp-loginova-1> 0
5 A S 192.168.1.0/24 192.168.200.2 1
6 A S 192.168.2.0/24 192.168.200.3 1
7 S 192.168.3.0/24 pptp-in-zdorovie 1
8 A S 192.168.11.0/24 pptp-out-kemerovo 1
9 ADC 192.168.20.30/32 192.168.20.31 pptp-out-kemerovo 0
10 ADC 192.168.200.2/32 192.168.200.1 <pptp-pptp_krr> 0
11 ADC 192.168.200.3/32 192.168.200.1 <pptp-pptp_rov-1> 0
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 10.73.***.** 0
1 ADC 10.73.***.**/32 46.147.**.*** pppoe-out1 0
2 A S 192.168.0.0/24 192.168.200.1 1
3 ADC 192.168.2.0/24 192.168.2.1 rov.local.bridge 0
4 ADC 192.168.200.1/32 192.168.200.3 pptp-out-msk 0
/ip firewall filter
add chain=input comment="accept remote winbox" disabled=yes in-interface=ether1-WAN port=8291,80 protocol=tc
add chain=input in-interface=<pptp-pptp_rov-1>
add chain=input comment="accept PPTP tunels" dst-port=1723 protocol=tcp
add chain=input protocol=gre
add chain=input comment="accept l2tp tunels" port=1701,500,4500 protocol=udp
add chain=input protocol=ipsec-esp
add action=drop chain=input comment="drop invalid connections" connection-state=invalid
add chain=input comment="allow related connections" connection-state=related
add chain=input comment="allow established connections" connection-state=established
add chain=input in-interface=!ether1-WAN src-address=192.168.0.0/24
add chain=output comment="accept everything to internet" out-interface=ether1-WAN
add chain=output comment="accept everything to non internet" out-interface=!ether1-WAN
add chain=output comment="accept everything"
add action=drop chain=forward comment="drop invalid connections" connection-state=invalid
add chain=forward comment="allow already established connections" connection-state=established
add chain=forward comment="allow related connections" connection-state=related
add action=drop chain=forward src-address=0.0.0.0/8
add action=drop chain=forward dst-address=0.0.0.0/8
add action=drop chain=forward src-address=127.0.0.0/8
add action=drop chain=forward dst-address=127.0.0.0/8
add action=drop chain=forward src-address=224.0.0.0/3
add action=drop chain=forward dst-address=224.0.0.0/3
add action=jump chain=forward jump-target=tcp protocol=tcp
add action=jump chain=forward jump-target=udp protocol=udp
add action=jump chain=forward jump-target=icmp protocol=icmp
add action=drop chain=input comment="drop everything else"
/ip firewall nat
add action=masquerade chain=srcnat comment=wan src-address=192.168.0.0/24
add action=masquerade chain=srcnat comment=Masquerade disabled=yes out-interface=ether1-WAN
/ip firewall filter
add chain=input comment="accept remote Winbox" in-interface=pppoe-out1 port=8291 protocol=tcp
add chain=output comment="accept everything to internet" out-interface=ether1-WAN
add chain=output comment="accept everything to non internet" out-interface=!ether1-WAN
add chain=output comment="accept everything"
add action=drop chain=forward comment="drop invalid connections" connection-state=invalid
add chain=forward comment="allow already established connections" connection-state=established
add chain=forward comment="allow related connections" connection-state=related
add action=drop chain=forward src-address=0.0.0.0/8
add action=drop chain=forward dst-address=0.0.0.0/8
add action=drop chain=forward src-address=127.0.0.0/8
add action=drop chain=forward dst-address=127.0.0.0/8
add action=drop chain=forward src-address=224.0.0.0/3
add action=drop chain=forward dst-address=224.0.0.0/3
add action=jump chain=forward jump-target=tcp protocol=tcp
add action=jump chain=forward jump-target=udp protocol=udp
add action=jump chain=forward jump-target=icmp protocol=icmp
add chain=input protocol=icmp
add chain=input connection-state=established
add chain=input connection-state=related
add action=drop chain=input in-interface=pppoe-out1
/ip firewall nat
add action=masquerade chain=srcnat comment=wan src-address=192.168.2.0/24
add action=masquerade chain=srcnat comment=Masquerade disabled=yes out-interface=pppoe-out1
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 10.73.***.** 0
1 ADC 10.73.***.**/32 46.147.**.*** pppoe-out1 0
2 A S 192.168.0.0/24 192.168.200.1 1
3 ADC 192.168.1.0/24 192.168.1.1 rov.local.bridge 0
4 ADC 192.168.200.1/32 192.168.200.2 pptp-out-msk 0
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 10.73.***.*** 0
1 ADC 10.73.***.****/32 46.147.***.*** pppoe-out1 0
2 A S 192.168.0.0/24 pptp-out-msk 1
3 ADC 192.168.1.0/24 192.168.1.1 rov.local.bridge 0
4 ADC 192.168.200.1/32 192.168.200.2 pptp-out-msk 0
add action=masquerade chain=srcnat comment=Masquerade out-interface=pppoe-out1
А вот это зачем?
Добавил это правило, начали ходить пинги между маршрутизаторами, внутрь сетей пинга нет...
Цепочки для файервола появились из скрипта, который нашел где-то в интернете. Мне пока не хватает знаний для самостоятельной и осмысленной настройки файервола...
Эти правила я отключил. странно то, что я полностью отключал файервол и пинги все равно не ходили..