diff options
author | Arianit Kukaj <arianit@hax.al> | 2025-05-26 20:43:31 +0000 |
---|---|---|
committer | Arianit Kukaj <arianit@hax.al> | 2025-05-26 20:43:31 +0000 |
commit | 2041ea36be5e346e923f7aadcbf48375ea70e725 (patch) | |
tree | 307093cdd2471a97f99b111663cc851b159069f3 | |
download | Mikrotik Bulk-2041ea36be5e346e923f7aadcbf48375ea70e725.tar.gz Mikrotik Bulk-2041ea36be5e346e923f7aadcbf48375ea70e725.zip |
.
-rw-r--r-- | Download and put it directley to script.md | 8 | ||||
-rw-r--r-- | Ignore iproutes.md | 9 | ||||
-rw-r--r-- | MD.rsc | 8 | ||||
-rw-r--r-- | Mikrotik dst nat port forward.md | 11 | ||||
-rw-r--r-- | Wireguard Client.md | 119 | ||||
-rw-r--r-- | vpnsetup.sh | 324 | ||||
-rw-r--r-- | wg-easy.sh | 19 |
7 files changed, 498 insertions, 0 deletions
diff --git a/Download and put it directley to script.md b/Download and put it directley to script.md new file mode 100644 index 0000000..1154891 --- /dev/null +++ b/Download and put it directley to script.md @@ -0,0 +1,8 @@ +:do { /system script add name=dedo1 source=([ /tool fetch url="http://url/dedo1.rsc" output=user as-value ]->"data"); } on-error={ :put "Failed to download/import script"; } + + + +How to run script: + +/system script run dedo1; + diff --git a/Ignore iproutes.md b/Ignore iproutes.md new file mode 100644 index 0000000..54568ef --- /dev/null +++ b/Ignore iproutes.md @@ -0,0 +1,9 @@ +# Add default route for WireGuard +/ip route add dst-address=0.0.0.0/0 gateway=10.8.0.1 scope=30 comment="Route all traffic through WireGuard" + +# Update NAT for WireGuard traffic +/ip firewall nat add chain=srcnat out-interface=wg1 action=masquerade comment="Masquerade WireGuard traffic" + +# Block direct WAN traffic (optional) +/ip firewall filter add chain=forward out-interface=ether1 action=drop comment="Block direct WAN traffic" + @@ -0,0 +1,8 @@ +For exporting script: + +export compact file=simplebackup + +For importing: + +import file=samplebackup.rsc + diff --git a/Mikrotik dst nat port forward.md b/Mikrotik dst nat port forward.md new file mode 100644 index 0000000..8accd22 --- /dev/null +++ b/Mikrotik dst nat port forward.md @@ -0,0 +1,11 @@ +/ip firewall nat +add action=dst-nat chain=dstnat comment="HikVison Http" dst-address=\ + 185.188.217.42 dst-port=80 protocol=tcp to-addresses=10.10.0.34 to-ports=\ + 80 +add action=dst-nat chain=dstnat comment="HikVison APP" dst-address=\ + 185.188.217.42 dst-port=8000 protocol=tcp to-addresses=10.10.0.34 \ + to-ports=8000 +add action=dst-nat chain=dstnat comment=hikvison443 dst-address=\ + 185.188.217.42 dst-port=443 protocol=tcp to-addresses=10.10.0.34 \ + to-ports=443 + diff --git a/Wireguard Client.md b/Wireguard Client.md new file mode 100644 index 0000000..9cb7d7a --- /dev/null +++ b/Wireguard Client.md @@ -0,0 +1,119 @@ +1. **Create the WireGuard interface:** + + +/interface wireguard add name=wg1 private-key="6JZgG9OmOZJ/8KU2CnmTOUYMy05IcmEusoFjuQv6eG4=" listen-port=51820 + +2. **Assign an IP address to the WireGuard interface:** + + +/ip address add address=10.8.0.4/24 interface=wg1 + +3. **Set the DNS server:** + +/ip dns set servers=1.1.1.1 + + +### Step 2: Add the Peer Configuration + +1. **Add the peer configuration:** + +/interface wireguard peers add interface=wg1 public-key="P2MPrD7vvp+YsyoDvLmTNz6BukiAMs1lWnnyUq3aXUE=" preshared-key="FUZoZx+xD1uhwGQhDBOYpPHUtETDSmAwltHgQN/+2J4=" allowed-address=0.0.0.0/0 endpoint-address=202.61.253.193 endpoint-port=51820 persistent-keepalive=1s + + +### Step 3: Configure Firewall Rules + +1. **Allow WireGuard traffic (UDP 51820):** + +/ip firewall filter add chain=input protocol=udp dst-port=51820 action=accept comment="Allow WireGuard" + +2. **Allow traffic from the WireGuard interface to the LAN:** + +/ip firewall filter add chain=forward in-interface=wg1 out-interface=bridge action=accept comment="Allow WireGuard to LAN" + +3. **Masquerade traffic from the WireGuard interface:** + +/ip firewall nat add chain=srcnat src-address=10.8.0.0/24 out-interface=ether1 action=masquerade comment="Masquerade WireGuard traffic" + + +### Step 4: Enable the WireGuard Interface + +1. **Enable the WireGuard interface:** + +/interface wireguard set wg1 disabled=no + + +### Step 5: Verify the Configuration + +1. **Check the WireGuard interface status:** + +/interface wireguard print + +2. **Check the peer status:** + +/interface wireguard peers print + +3. **Check the firewall rules:** + +/ip firewall filter print +/ip firewall nat print + + +### Summary of Commands: + + /interface wireguard add name=wg1 private-key="6JZgG9OmOZJ/8KU2CnmTOUYMy05IcmEusoFjuQv6eG4=" listen-port=51820 + /ip address add address=10.8.0.4/24 interface=wg1 + /ip dns set servers=1.1.1.1 + /interface wireguard peers add interface=wg1 public-key="P2MPrD7vvp+YsyoDvLmTNz6BukiAMs1lWnnyUq3aXUE=" preshared-key="FUZoZx+xD1uhwGQhDBOYpPHUtETDSmAwltHgQN/+2J4=" allowed-address=0.0.0.0/0 endpoint-address=202.61.253.193 endpoint-port=51820 persistent-keepalive=1s + /ip firewall filter add chain=input protocol=udp dst-port=51820 action=accept comment="Allow WireGuard" + /ip firewall filter add chain=forward in-interface=wg1 out-interface=bridge action=accept comment="Allow WireGuard to LAN" + /ip firewall nat add chain=srcnat src-address=10.8.0.0/24 out-interface=ether1 action=masquerade comment="Masquerade WireGuard traffic" + /interface wireguard set wg1 disabled=no + /interface wireguard print + /interface wireguard peers print + /ip firewall filter print + /ip firewall nat print + +This configuration will set up a WireGuard VPN on your MikroTik RouterOS v7, including the necessary firewall rules to allow traffic through the VPN. Make sure to replace `ether1` with the actual interface name that connects to your WAN. + + +6. Enable masquerade for that interface + +Note: This setup assumes that you are using the default local network address used by MikroTik. If you have changed this, use that address for scr-address= instead. + +``` +/ip firewall nat +add action=masquerade chain=srcnat out-interface=wireguard-inet src-address=192.168.88.0/24 +7. Redirect all internet traffic through WireGuard +``` +``` +/ip route +add disabled=no distance=1 dst-address=0.0.0.0/1 gateway=10.2.0.1 pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10 +add disabled=no distance=1 dst-address=128.0.0.0/1 gateway=10.2.0.1 pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10 +``` + +8. Configure DNS settings +``` +/ip dns +set servers=10.2.0.1 +/ip dhcp-client +set 0 use-peer-dns=no +``` + +Duhet me kriju edhe Routing > Tables:: + +``` +/routing table add comment=percka disabled=no fib name=emri +``` + +Mangle :::: +``` +/ip firewall mangle add chain=prerouting src-address=192.1 +68.88.0/24 action=mark-routing new-routing-mark=emri passthrough=no +``` + +After:: +``` +/ip route add dst-address=0.0.0.0/0 gateway=40.44.44.1 rou +ting-mark=emri +``` + diff --git a/vpnsetup.sh b/vpnsetup.sh new file mode 100644 index 0000000..ef8f4ae --- /dev/null +++ b/vpnsetup.sh @@ -0,0 +1,324 @@ +#!/bin/sh +# +# Script for automatic setup of an IPsec VPN server on Ubuntu, Debian, CentOS/RHEL, +# Rocky Linux, AlmaLinux, Oracle Linux, Amazon Linux 2 and Alpine Linux +# +# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! +# +# The latest version of this script is available at: +# https://github.com/hwdsl2/setup-ipsec-vpn +# +# Copyright (C) 2021-2025 Lin Song <linsongui@gmail.com> +# +# This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 +# Unported License: http://creativecommons.org/licenses/by-sa/3.0/ +# +# Attribution required: please include my name in any derivative and let me +# know how you have improved it! + +# ===================================================== + +# Define your own values for these variables +# - IPsec pre-shared key, VPN username and password +# - All values MUST be placed inside 'single quotes' +# - DO NOT use these special characters within values: \ " ' + +YOUR_IPSEC_PSK='' +YOUR_USERNAME='' +YOUR_PASSWORD='' + +# ===================================================== + +export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" + +exiterr() { echo "Error: $1" >&2; exit 1; } + +check_ip() { + IP_REGEX='^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$' + printf '%s' "$1" | tr -d '\n' | grep -Eq "$IP_REGEX" +} + +check_dns_name() { + FQDN_REGEX='^([a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,}$' + printf '%s' "$1" | tr -d '\n' | grep -Eq "$FQDN_REGEX" +} + +check_root() { + if [ "$(id -u)" != 0 ]; then + exiterr "Script must be run as root. Try 'sudo sh $0'" + fi +} + +check_vz() { + if [ -f /proc/user_beancounters ]; then + exiterr "OpenVZ VPS is not supported." + fi +} + +check_lxc() { + # shellcheck disable=SC2154 + if [ "$container" = "lxc" ] && [ ! -e /dev/ppp ]; then +cat 1>&2 <<'EOF' +Error: /dev/ppp is missing. LXC containers require configuration. + See: https://github.com/hwdsl2/setup-ipsec-vpn/issues/1014 +EOF + exit 1 + fi +} + +check_os() { + rh_file="/etc/redhat-release" + if [ -f "$rh_file" ]; then + os_type=centos + if grep -q "Red Hat" "$rh_file"; then + os_type=rhel + fi + [ -f /etc/oracle-release ] && os_type=ol + grep -qi rocky "$rh_file" && os_type=rocky + grep -qi alma "$rh_file" && os_type=alma + if grep -q "release 7" "$rh_file"; then + os_ver=7 + elif grep -q "release 8" "$rh_file"; then + os_ver=8 + grep -qi stream "$rh_file" && os_ver=8s + elif grep -q "release 9" "$rh_file"; then + os_ver=9 + grep -qi stream "$rh_file" && os_ver=9s + else + exiterr "This script only supports CentOS/RHEL 7-9." + fi + if [ "$os_type" = "centos" ] \ + && { [ "$os_ver" = 7 ] || [ "$os_ver" = 8 ] || [ "$os_ver" = 8s ]; }; then + exiterr "CentOS Linux $os_ver is EOL and not supported." + fi + elif grep -qs "Amazon Linux release 2 " /etc/system-release; then + os_type=amzn + os_ver=2 + elif grep -qs "Amazon Linux release 2023" /etc/system-release; then + exiterr "Amazon Linux 2023 is not supported." + else + os_type=$(lsb_release -si 2>/dev/null) + [ -z "$os_type" ] && [ -f /etc/os-release ] && os_type=$(. /etc/os-release && printf '%s' "$ID") + case $os_type in + [Uu]buntu) + os_type=ubuntu + ;; + [Dd]ebian|[Kk]ali) + os_type=debian + ;; + [Rr]aspbian) + os_type=raspbian + ;; + [Aa]lpine) + os_type=alpine + ;; + *) +cat 1>&2 <<'EOF' +Error: This script only supports one of the following OS: + Ubuntu, Debian, CentOS/RHEL, Rocky Linux, AlmaLinux, + Oracle Linux, Amazon Linux 2 or Alpine Linux +EOF + exit 1 + ;; + esac + if [ "$os_type" = "alpine" ]; then + os_ver=$(. /etc/os-release && printf '%s' "$VERSION_ID" | cut -d '.' -f 1,2) + if [ "$os_ver" != "3.20" ] && [ "$os_ver" != "3.21" ]; then + exiterr "This script only supports Alpine Linux 3.20/3.21." + fi + else + os_ver=$(sed 's/\..*//' /etc/debian_version | tr -dc 'A-Za-z0-9') + if [ "$os_ver" = 8 ] || [ "$os_ver" = 9 ] || [ "$os_ver" = "stretchsid" ] \ + || [ "$os_ver" = "bustersid" ]; then +cat 1>&2 <<EOF +Error: This script requires Debian >= 10 or Ubuntu >= 20.04. + This version of Ubuntu/Debian is too old and not supported. +EOF + exit 1 + fi + if [ "$os_ver" = "trixiesid" ] && [ -f /etc/os-release ] \ + && [ "$(. /etc/os-release && printf '%s' "$VERSION_ID")" = "24.10" ]; then +cat 1>&2 <<EOF +Error: This script does not support Ubuntu 24.10. + You may use e.g. Ubuntu 24.04 LTS instead. +EOF + exit 1 + fi + fi + fi +} + +check_iface() { + def_iface=$(route 2>/dev/null | grep -m 1 '^default' | grep -o '[^ ]*$') + if [ "$os_type" != "alpine" ]; then + [ -z "$def_iface" ] && def_iface=$(ip -4 route list 0/0 2>/dev/null | grep -m 1 -Po '(?<=dev )(\S+)') + fi + def_state=$(cat "/sys/class/net/$def_iface/operstate" 2>/dev/null) + check_wl=0 + if [ -n "$def_state" ] && [ "$def_state" != "down" ]; then + if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then + if ! uname -m | grep -qi -e '^arm' -e '^aarch64'; then + check_wl=1 + fi + else + check_wl=1 + fi + fi + if [ "$check_wl" = 1 ]; then + case $def_iface in + wl*) + exiterr "Wireless interface '$def_iface' detected. DO NOT run this script on your PC or Mac!" + ;; + esac + fi +} + +check_creds() { + [ -n "$YOUR_IPSEC_PSK" ] && VPN_IPSEC_PSK="$YOUR_IPSEC_PSK" + [ -n "$YOUR_USERNAME" ] && VPN_USER="$YOUR_USERNAME" + [ -n "$YOUR_PASSWORD" ] && VPN_PASSWORD="$YOUR_PASSWORD" + if [ -z "$VPN_IPSEC_PSK" ] && [ -z "$VPN_USER" ] && [ -z "$VPN_PASSWORD" ]; then + return 0 + fi + if [ -z "$VPN_IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then + exiterr "All VPN credentials must be specified. Edit the script and re-enter them." + fi + if printf '%s' "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then + exiterr "VPN credentials must not contain non-ASCII characters." + fi + case "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" in + *[\\\"\']*) + exiterr "VPN credentials must not contain these special characters: \\ \" '" + ;; + esac +} + +check_dns() { + if { [ -n "$VPN_DNS_SRV1" ] && ! check_ip "$VPN_DNS_SRV1"; } \ + || { [ -n "$VPN_DNS_SRV2" ] && ! check_ip "$VPN_DNS_SRV2"; }; then + exiterr "The DNS server specified is invalid." + fi +} + +check_server_dns() { + if [ -n "$VPN_DNS_NAME" ] && ! check_dns_name "$VPN_DNS_NAME"; then + exiterr "Invalid DNS name. 'VPN_DNS_NAME' must be a fully qualified domain name (FQDN)." + fi +} + +check_client_name() { + if [ -n "$VPN_CLIENT_NAME" ]; then + name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)" + if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \ + || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then + exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'." + fi + fi +} + +wait_for_apt() { + count=0 + apt_lk=/var/lib/apt/lists/lock + pkg_lk=/var/lib/dpkg/lock + while fuser "$apt_lk" "$pkg_lk" >/dev/null 2>&1 \ + || lsof "$apt_lk" >/dev/null 2>&1 || lsof "$pkg_lk" >/dev/null 2>&1; do + [ "$count" = 0 ] && echo "## Waiting for apt to be available..." + [ "$count" -ge 100 ] && exiterr "Could not get apt/dpkg lock." + count=$((count+1)) + printf '%s' '.' + sleep 3 + done +} + +install_pkgs() { + if ! command -v wget >/dev/null 2>&1; then + if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then + wait_for_apt + export DEBIAN_FRONTEND=noninteractive + ( + set -x + apt-get -yqq update || apt-get -yqq update + ) || exiterr "'apt-get update' failed." + ( + set -x + apt-get -yqq install wget >/dev/null || apt-get -yqq install wget >/dev/null + ) || exiterr "'apt-get install wget' failed." + elif [ "$os_type" != "alpine" ]; then + ( + set -x + yum -y -q install wget >/dev/null || yum -y -q install wget >/dev/null + ) || exiterr "'yum install wget' failed." + fi + fi + if [ "$os_type" = "alpine" ]; then + ( + set -x + apk add -U -q bash coreutils grep net-tools sed wget + ) || exiterr "'apk add' failed." + fi +} + +get_setup_url() { + base_url1="https://raw.githubusercontent.com/hwdsl2/setup-ipsec-vpn/master" + base_url2="https://gitlab.com/hwdsl2/setup-ipsec-vpn/-/raw/master" + sh_file="vpnsetup_ubuntu.sh" + if [ "$os_type" = "centos" ] || [ "$os_type" = "rhel" ] || [ "$os_type" = "rocky" ] \ + || [ "$os_type" = "alma" ] || [ "$os_type" = "ol" ]; then + sh_file="vpnsetup_centos.sh" + elif [ "$os_type" = "amzn" ]; then + sh_file="vpnsetup_amzn.sh" + elif [ "$os_type" = "alpine" ]; then + sh_file="vpnsetup_alpine.sh" + fi + setup_url1="$base_url1/$sh_file" + setup_url2="$base_url2/$sh_file" +} + +run_setup() { + status=0 + if tmpdir=$(mktemp --tmpdir -d vpn.XXXXX 2>/dev/null); then + if ( set -x; wget -t 3 -T 30 -q -O "$tmpdir/vpn.sh" "$setup_url1" \ + || wget -t 3 -T 30 -q -O "$tmpdir/vpn.sh" "$setup_url2" \ + || curl -m 30 -fsL "$setup_url1" -o "$tmpdir/vpn.sh" 2>/dev/null ); then + VPN_IPSEC_PSK="$VPN_IPSEC_PSK" VPN_USER="$VPN_USER" \ + VPN_PASSWORD="$VPN_PASSWORD" \ + VPN_PUBLIC_IP="$VPN_PUBLIC_IP" VPN_L2TP_NET="$VPN_L2TP_NET" \ + VPN_L2TP_LOCAL="$VPN_L2TP_LOCAL" VPN_L2TP_POOL="$VPN_L2TP_POOL" \ + VPN_XAUTH_NET="$VPN_XAUTH_NET" VPN_XAUTH_POOL="$VPN_XAUTH_POOL" \ + VPN_DNS_SRV1="$VPN_DNS_SRV1" VPN_DNS_SRV2="$VPN_DNS_SRV2" \ + VPN_DNS_NAME="$VPN_DNS_NAME" VPN_CLIENT_NAME="$VPN_CLIENT_NAME" \ + VPN_PROTECT_CONFIG="$VPN_PROTECT_CONFIG" \ + VPN_CLIENT_VALIDITY="$VPN_CLIENT_VALIDITY" \ + VPN_SKIP_IKEV2="$VPN_SKIP_IKEV2" VPN_SWAN_VER="$VPN_SWAN_VER" \ + /bin/bash "$tmpdir/vpn.sh" || status=1 + else + status=1 + echo "Error: Could not download VPN setup script." >&2 + fi + /bin/rm -f "$tmpdir/vpn.sh" + /bin/rmdir "$tmpdir" + else + exiterr "Could not create temporary directory." + fi +} + +vpnsetup() { + check_root + check_vz + check_lxc + check_os + check_iface + check_creds + check_dns + check_server_dns + check_client_name + install_pkgs + get_setup_url + run_setup +} + +## Defer setup until we have the complete script +vpnsetup "$@" + +exit "$status" + diff --git a/wg-easy.sh b/wg-easy.sh new file mode 100644 index 0000000..4528af1 --- /dev/null +++ b/wg-easy.sh @@ -0,0 +1,19 @@ +#!/bin/bash +docker run -d --restart unless-stopped \ + --name=wg-easy \ + -e LANG=en \ + -e WG_HOST=0.0.0.0SHKRUJEIPESRV \ + -e PASSWORD_HASH='$2a$12$6QrXK/Zc5IQ1ZkCgWp7yXOi/iyxlxIrud4jez./8jtSWNM/ffS4Zy' \ + -e PORT=51821 \ + -e WG_PORT=51820 \ + -e WG_DEFAULT_ADDRESS=20.20.0.x \ + -v ~/.wg-easy:/etc/wireguard \ + -p 51820:51820/udp \ + -p 51821:51821/tcp \ + --cap-add=NET_ADMIN \ + --cap-add=SYS_MODULE \ + --sysctl="net.ipv4.conf.all.src_valid_mark=1" \ + --sysctl="net.ipv4.ip_forward=1" \ + --restart unless-stopped \ + ghcr.io/wg-easy/wg-easy + |