summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArianit Kukaj <arianit@hax.al>2025-05-26 20:43:31 +0000
committerArianit Kukaj <arianit@hax.al>2025-05-26 20:43:31 +0000
commit2041ea36be5e346e923f7aadcbf48375ea70e725 (patch)
tree307093cdd2471a97f99b111663cc851b159069f3
downloadMikrotik Bulk-2041ea36be5e346e923f7aadcbf48375ea70e725.tar.gz
Mikrotik Bulk-2041ea36be5e346e923f7aadcbf48375ea70e725.zip
.
-rw-r--r--Download and put it directley to script.md8
-rw-r--r--Ignore iproutes.md9
-rw-r--r--MD.rsc8
-rw-r--r--Mikrotik dst nat port forward.md11
-rw-r--r--Wireguard Client.md119
-rw-r--r--vpnsetup.sh324
-rw-r--r--wg-easy.sh19
7 files changed, 498 insertions, 0 deletions
diff --git a/Download and put it directley to script.md b/Download and put it directley to script.md
new file mode 100644
index 0000000..1154891
--- /dev/null
+++ b/Download and put it directley to script.md
@@ -0,0 +1,8 @@
+:do { /system script add name=dedo1 source=([ /tool fetch url="http://url/dedo1.rsc" output=user as-value ]->"data"); } on-error={ :put "Failed to download/import script"; }
+
+
+
+How to run script:
+
+/system script run dedo1;
+
diff --git a/Ignore iproutes.md b/Ignore iproutes.md
new file mode 100644
index 0000000..54568ef
--- /dev/null
+++ b/Ignore iproutes.md
@@ -0,0 +1,9 @@
+# Add default route for WireGuard
+/ip route add dst-address=0.0.0.0/0 gateway=10.8.0.1 scope=30 comment="Route all traffic through WireGuard"
+
+# Update NAT for WireGuard traffic
+/ip firewall nat add chain=srcnat out-interface=wg1 action=masquerade comment="Masquerade WireGuard traffic"
+
+# Block direct WAN traffic (optional)
+/ip firewall filter add chain=forward out-interface=ether1 action=drop comment="Block direct WAN traffic"
+
diff --git a/MD.rsc b/MD.rsc
new file mode 100644
index 0000000..704a26e
--- /dev/null
+++ b/MD.rsc
@@ -0,0 +1,8 @@
+For exporting script:
+
+export compact file=simplebackup
+
+For importing:
+
+import file=samplebackup.rsc
+
diff --git a/Mikrotik dst nat port forward.md b/Mikrotik dst nat port forward.md
new file mode 100644
index 0000000..8accd22
--- /dev/null
+++ b/Mikrotik dst nat port forward.md
@@ -0,0 +1,11 @@
+/ip firewall nat
+add action=dst-nat chain=dstnat comment="HikVison Http" dst-address=\
+ 185.188.217.42 dst-port=80 protocol=tcp to-addresses=10.10.0.34 to-ports=\
+ 80
+add action=dst-nat chain=dstnat comment="HikVison APP" dst-address=\
+ 185.188.217.42 dst-port=8000 protocol=tcp to-addresses=10.10.0.34 \
+ to-ports=8000
+add action=dst-nat chain=dstnat comment=hikvison443 dst-address=\
+ 185.188.217.42 dst-port=443 protocol=tcp to-addresses=10.10.0.34 \
+ to-ports=443
+
diff --git a/Wireguard Client.md b/Wireguard Client.md
new file mode 100644
index 0000000..9cb7d7a
--- /dev/null
+++ b/Wireguard Client.md
@@ -0,0 +1,119 @@
+1. **Create the WireGuard interface:**
+
+
+/interface wireguard add name=wg1 private-key="6JZgG9OmOZJ/8KU2CnmTOUYMy05IcmEusoFjuQv6eG4=" listen-port=51820
+
+2. **Assign an IP address to the WireGuard interface:**
+
+
+/ip address add address=10.8.0.4/24 interface=wg1
+
+3. **Set the DNS server:**
+
+/ip dns set servers=1.1.1.1
+
+
+### Step 2: Add the Peer Configuration
+
+1. **Add the peer configuration:**
+
+/interface wireguard peers add interface=wg1 public-key="P2MPrD7vvp+YsyoDvLmTNz6BukiAMs1lWnnyUq3aXUE=" preshared-key="FUZoZx+xD1uhwGQhDBOYpPHUtETDSmAwltHgQN/+2J4=" allowed-address=0.0.0.0/0 endpoint-address=202.61.253.193 endpoint-port=51820 persistent-keepalive=1s
+
+
+### Step 3: Configure Firewall Rules
+
+1. **Allow WireGuard traffic (UDP 51820):**
+
+/ip firewall filter add chain=input protocol=udp dst-port=51820 action=accept comment="Allow WireGuard"
+
+2. **Allow traffic from the WireGuard interface to the LAN:**
+
+/ip firewall filter add chain=forward in-interface=wg1 out-interface=bridge action=accept comment="Allow WireGuard to LAN"
+
+3. **Masquerade traffic from the WireGuard interface:**
+
+/ip firewall nat add chain=srcnat src-address=10.8.0.0/24 out-interface=ether1 action=masquerade comment="Masquerade WireGuard traffic"
+
+
+### Step 4: Enable the WireGuard Interface
+
+1. **Enable the WireGuard interface:**
+
+/interface wireguard set wg1 disabled=no
+
+
+### Step 5: Verify the Configuration
+
+1. **Check the WireGuard interface status:**
+
+/interface wireguard print
+
+2. **Check the peer status:**
+
+/interface wireguard peers print
+
+3. **Check the firewall rules:**
+
+/ip firewall filter print
+/ip firewall nat print
+
+
+### Summary of Commands:
+
+ /interface wireguard add name=wg1 private-key="6JZgG9OmOZJ/8KU2CnmTOUYMy05IcmEusoFjuQv6eG4=" listen-port=51820
+ /ip address add address=10.8.0.4/24 interface=wg1
+ /ip dns set servers=1.1.1.1
+ /interface wireguard peers add interface=wg1 public-key="P2MPrD7vvp+YsyoDvLmTNz6BukiAMs1lWnnyUq3aXUE=" preshared-key="FUZoZx+xD1uhwGQhDBOYpPHUtETDSmAwltHgQN/+2J4=" allowed-address=0.0.0.0/0 endpoint-address=202.61.253.193 endpoint-port=51820 persistent-keepalive=1s
+ /ip firewall filter add chain=input protocol=udp dst-port=51820 action=accept comment="Allow WireGuard"
+ /ip firewall filter add chain=forward in-interface=wg1 out-interface=bridge action=accept comment="Allow WireGuard to LAN"
+ /ip firewall nat add chain=srcnat src-address=10.8.0.0/24 out-interface=ether1 action=masquerade comment="Masquerade WireGuard traffic"
+ /interface wireguard set wg1 disabled=no
+ /interface wireguard print
+ /interface wireguard peers print
+ /ip firewall filter print
+ /ip firewall nat print
+
+This configuration will set up a WireGuard VPN on your MikroTik RouterOS v7, including the necessary firewall rules to allow traffic through the VPN. Make sure to replace `ether1` with the actual interface name that connects to your WAN.
+
+
+6. Enable masquerade for that interface
+
+Note: This setup assumes that you are using the default local network address used by MikroTik. If you have changed this, use that address for scr-address= instead.
+
+```
+/ip firewall nat
+add action=masquerade chain=srcnat out-interface=wireguard-inet src-address=192.168.88.0/24
+7. Redirect all internet traffic through WireGuard
+```
+```
+/ip route
+add disabled=no distance=1 dst-address=0.0.0.0/1 gateway=10.2.0.1 pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10
+add disabled=no distance=1 dst-address=128.0.0.0/1 gateway=10.2.0.1 pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10
+```
+
+8. Configure DNS settings
+```
+/ip dns
+set servers=10.2.0.1
+/ip dhcp-client
+set 0 use-peer-dns=no
+```
+
+Duhet me kriju edhe Routing > Tables::
+
+```
+/routing table add comment=percka disabled=no fib name=emri
+```
+
+Mangle ::::
+```
+/ip firewall mangle add chain=prerouting src-address=192.1
+68.88.0/24 action=mark-routing new-routing-mark=emri passthrough=no
+```
+
+After::
+```
+/ip route add dst-address=0.0.0.0/0 gateway=40.44.44.1 rou
+ting-mark=emri
+```
+
diff --git a/vpnsetup.sh b/vpnsetup.sh
new file mode 100644
index 0000000..ef8f4ae
--- /dev/null
+++ b/vpnsetup.sh
@@ -0,0 +1,324 @@
+#!/bin/sh
+#
+# Script for automatic setup of an IPsec VPN server on Ubuntu, Debian, CentOS/RHEL,
+# Rocky Linux, AlmaLinux, Oracle Linux, Amazon Linux 2 and Alpine Linux
+#
+# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
+#
+# The latest version of this script is available at:
+# https://github.com/hwdsl2/setup-ipsec-vpn
+#
+# Copyright (C) 2021-2025 Lin Song <linsongui@gmail.com>
+#
+# This work is licensed under the Creative Commons Attribution-ShareAlike 3.0
+# Unported License: http://creativecommons.org/licenses/by-sa/3.0/
+#
+# Attribution required: please include my name in any derivative and let me
+# know how you have improved it!
+
+# =====================================================
+
+# Define your own values for these variables
+# - IPsec pre-shared key, VPN username and password
+# - All values MUST be placed inside 'single quotes'
+# - DO NOT use these special characters within values: \ " '
+
+YOUR_IPSEC_PSK=''
+YOUR_USERNAME=''
+YOUR_PASSWORD=''
+
+# =====================================================
+
+export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
+
+exiterr() { echo "Error: $1" >&2; exit 1; }
+
+check_ip() {
+ IP_REGEX='^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$'
+ printf '%s' "$1" | tr -d '\n' | grep -Eq "$IP_REGEX"
+}
+
+check_dns_name() {
+ FQDN_REGEX='^([a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,}$'
+ printf '%s' "$1" | tr -d '\n' | grep -Eq "$FQDN_REGEX"
+}
+
+check_root() {
+ if [ "$(id -u)" != 0 ]; then
+ exiterr "Script must be run as root. Try 'sudo sh $0'"
+ fi
+}
+
+check_vz() {
+ if [ -f /proc/user_beancounters ]; then
+ exiterr "OpenVZ VPS is not supported."
+ fi
+}
+
+check_lxc() {
+ # shellcheck disable=SC2154
+ if [ "$container" = "lxc" ] && [ ! -e /dev/ppp ]; then
+cat 1>&2 <<'EOF'
+Error: /dev/ppp is missing. LXC containers require configuration.
+ See: https://github.com/hwdsl2/setup-ipsec-vpn/issues/1014
+EOF
+ exit 1
+ fi
+}
+
+check_os() {
+ rh_file="/etc/redhat-release"
+ if [ -f "$rh_file" ]; then
+ os_type=centos
+ if grep -q "Red Hat" "$rh_file"; then
+ os_type=rhel
+ fi
+ [ -f /etc/oracle-release ] && os_type=ol
+ grep -qi rocky "$rh_file" && os_type=rocky
+ grep -qi alma "$rh_file" && os_type=alma
+ if grep -q "release 7" "$rh_file"; then
+ os_ver=7
+ elif grep -q "release 8" "$rh_file"; then
+ os_ver=8
+ grep -qi stream "$rh_file" && os_ver=8s
+ elif grep -q "release 9" "$rh_file"; then
+ os_ver=9
+ grep -qi stream "$rh_file" && os_ver=9s
+ else
+ exiterr "This script only supports CentOS/RHEL 7-9."
+ fi
+ if [ "$os_type" = "centos" ] \
+ && { [ "$os_ver" = 7 ] || [ "$os_ver" = 8 ] || [ "$os_ver" = 8s ]; }; then
+ exiterr "CentOS Linux $os_ver is EOL and not supported."
+ fi
+ elif grep -qs "Amazon Linux release 2 " /etc/system-release; then
+ os_type=amzn
+ os_ver=2
+ elif grep -qs "Amazon Linux release 2023" /etc/system-release; then
+ exiterr "Amazon Linux 2023 is not supported."
+ else
+ os_type=$(lsb_release -si 2>/dev/null)
+ [ -z "$os_type" ] && [ -f /etc/os-release ] && os_type=$(. /etc/os-release && printf '%s' "$ID")
+ case $os_type in
+ [Uu]buntu)
+ os_type=ubuntu
+ ;;
+ [Dd]ebian|[Kk]ali)
+ os_type=debian
+ ;;
+ [Rr]aspbian)
+ os_type=raspbian
+ ;;
+ [Aa]lpine)
+ os_type=alpine
+ ;;
+ *)
+cat 1>&2 <<'EOF'
+Error: This script only supports one of the following OS:
+ Ubuntu, Debian, CentOS/RHEL, Rocky Linux, AlmaLinux,
+ Oracle Linux, Amazon Linux 2 or Alpine Linux
+EOF
+ exit 1
+ ;;
+ esac
+ if [ "$os_type" = "alpine" ]; then
+ os_ver=$(. /etc/os-release && printf '%s' "$VERSION_ID" | cut -d '.' -f 1,2)
+ if [ "$os_ver" != "3.20" ] && [ "$os_ver" != "3.21" ]; then
+ exiterr "This script only supports Alpine Linux 3.20/3.21."
+ fi
+ else
+ os_ver=$(sed 's/\..*//' /etc/debian_version | tr -dc 'A-Za-z0-9')
+ if [ "$os_ver" = 8 ] || [ "$os_ver" = 9 ] || [ "$os_ver" = "stretchsid" ] \
+ || [ "$os_ver" = "bustersid" ]; then
+cat 1>&2 <<EOF
+Error: This script requires Debian >= 10 or Ubuntu >= 20.04.
+ This version of Ubuntu/Debian is too old and not supported.
+EOF
+ exit 1
+ fi
+ if [ "$os_ver" = "trixiesid" ] && [ -f /etc/os-release ] \
+ && [ "$(. /etc/os-release && printf '%s' "$VERSION_ID")" = "24.10" ]; then
+cat 1>&2 <<EOF
+Error: This script does not support Ubuntu 24.10.
+ You may use e.g. Ubuntu 24.04 LTS instead.
+EOF
+ exit 1
+ fi
+ fi
+ fi
+}
+
+check_iface() {
+ def_iface=$(route 2>/dev/null | grep -m 1 '^default' | grep -o '[^ ]*$')
+ if [ "$os_type" != "alpine" ]; then
+ [ -z "$def_iface" ] && def_iface=$(ip -4 route list 0/0 2>/dev/null | grep -m 1 -Po '(?<=dev )(\S+)')
+ fi
+ def_state=$(cat "/sys/class/net/$def_iface/operstate" 2>/dev/null)
+ check_wl=0
+ if [ -n "$def_state" ] && [ "$def_state" != "down" ]; then
+ if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
+ if ! uname -m | grep -qi -e '^arm' -e '^aarch64'; then
+ check_wl=1
+ fi
+ else
+ check_wl=1
+ fi
+ fi
+ if [ "$check_wl" = 1 ]; then
+ case $def_iface in
+ wl*)
+ exiterr "Wireless interface '$def_iface' detected. DO NOT run this script on your PC or Mac!"
+ ;;
+ esac
+ fi
+}
+
+check_creds() {
+ [ -n "$YOUR_IPSEC_PSK" ] && VPN_IPSEC_PSK="$YOUR_IPSEC_PSK"
+ [ -n "$YOUR_USERNAME" ] && VPN_USER="$YOUR_USERNAME"
+ [ -n "$YOUR_PASSWORD" ] && VPN_PASSWORD="$YOUR_PASSWORD"
+ if [ -z "$VPN_IPSEC_PSK" ] && [ -z "$VPN_USER" ] && [ -z "$VPN_PASSWORD" ]; then
+ return 0
+ fi
+ if [ -z "$VPN_IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
+ exiterr "All VPN credentials must be specified. Edit the script and re-enter them."
+ fi
+ if printf '%s' "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then
+ exiterr "VPN credentials must not contain non-ASCII characters."
+ fi
+ case "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" in
+ *[\\\"\']*)
+ exiterr "VPN credentials must not contain these special characters: \\ \" '"
+ ;;
+ esac
+}
+
+check_dns() {
+ if { [ -n "$VPN_DNS_SRV1" ] && ! check_ip "$VPN_DNS_SRV1"; } \
+ || { [ -n "$VPN_DNS_SRV2" ] && ! check_ip "$VPN_DNS_SRV2"; }; then
+ exiterr "The DNS server specified is invalid."
+ fi
+}
+
+check_server_dns() {
+ if [ -n "$VPN_DNS_NAME" ] && ! check_dns_name "$VPN_DNS_NAME"; then
+ exiterr "Invalid DNS name. 'VPN_DNS_NAME' must be a fully qualified domain name (FQDN)."
+ fi
+}
+
+check_client_name() {
+ if [ -n "$VPN_CLIENT_NAME" ]; then
+ name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
+ if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
+ || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
+ exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
+ fi
+ fi
+}
+
+wait_for_apt() {
+ count=0
+ apt_lk=/var/lib/apt/lists/lock
+ pkg_lk=/var/lib/dpkg/lock
+ while fuser "$apt_lk" "$pkg_lk" >/dev/null 2>&1 \
+ || lsof "$apt_lk" >/dev/null 2>&1 || lsof "$pkg_lk" >/dev/null 2>&1; do
+ [ "$count" = 0 ] && echo "## Waiting for apt to be available..."
+ [ "$count" -ge 100 ] && exiterr "Could not get apt/dpkg lock."
+ count=$((count+1))
+ printf '%s' '.'
+ sleep 3
+ done
+}
+
+install_pkgs() {
+ if ! command -v wget >/dev/null 2>&1; then
+ if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
+ wait_for_apt
+ export DEBIAN_FRONTEND=noninteractive
+ (
+ set -x
+ apt-get -yqq update || apt-get -yqq update
+ ) || exiterr "'apt-get update' failed."
+ (
+ set -x
+ apt-get -yqq install wget >/dev/null || apt-get -yqq install wget >/dev/null
+ ) || exiterr "'apt-get install wget' failed."
+ elif [ "$os_type" != "alpine" ]; then
+ (
+ set -x
+ yum -y -q install wget >/dev/null || yum -y -q install wget >/dev/null
+ ) || exiterr "'yum install wget' failed."
+ fi
+ fi
+ if [ "$os_type" = "alpine" ]; then
+ (
+ set -x
+ apk add -U -q bash coreutils grep net-tools sed wget
+ ) || exiterr "'apk add' failed."
+ fi
+}
+
+get_setup_url() {
+ base_url1="https://raw.githubusercontent.com/hwdsl2/setup-ipsec-vpn/master"
+ base_url2="https://gitlab.com/hwdsl2/setup-ipsec-vpn/-/raw/master"
+ sh_file="vpnsetup_ubuntu.sh"
+ if [ "$os_type" = "centos" ] || [ "$os_type" = "rhel" ] || [ "$os_type" = "rocky" ] \
+ || [ "$os_type" = "alma" ] || [ "$os_type" = "ol" ]; then
+ sh_file="vpnsetup_centos.sh"
+ elif [ "$os_type" = "amzn" ]; then
+ sh_file="vpnsetup_amzn.sh"
+ elif [ "$os_type" = "alpine" ]; then
+ sh_file="vpnsetup_alpine.sh"
+ fi
+ setup_url1="$base_url1/$sh_file"
+ setup_url2="$base_url2/$sh_file"
+}
+
+run_setup() {
+ status=0
+ if tmpdir=$(mktemp --tmpdir -d vpn.XXXXX 2>/dev/null); then
+ if ( set -x; wget -t 3 -T 30 -q -O "$tmpdir/vpn.sh" "$setup_url1" \
+ || wget -t 3 -T 30 -q -O "$tmpdir/vpn.sh" "$setup_url2" \
+ || curl -m 30 -fsL "$setup_url1" -o "$tmpdir/vpn.sh" 2>/dev/null ); then
+ VPN_IPSEC_PSK="$VPN_IPSEC_PSK" VPN_USER="$VPN_USER" \
+ VPN_PASSWORD="$VPN_PASSWORD" \
+ VPN_PUBLIC_IP="$VPN_PUBLIC_IP" VPN_L2TP_NET="$VPN_L2TP_NET" \
+ VPN_L2TP_LOCAL="$VPN_L2TP_LOCAL" VPN_L2TP_POOL="$VPN_L2TP_POOL" \
+ VPN_XAUTH_NET="$VPN_XAUTH_NET" VPN_XAUTH_POOL="$VPN_XAUTH_POOL" \
+ VPN_DNS_SRV1="$VPN_DNS_SRV1" VPN_DNS_SRV2="$VPN_DNS_SRV2" \
+ VPN_DNS_NAME="$VPN_DNS_NAME" VPN_CLIENT_NAME="$VPN_CLIENT_NAME" \
+ VPN_PROTECT_CONFIG="$VPN_PROTECT_CONFIG" \
+ VPN_CLIENT_VALIDITY="$VPN_CLIENT_VALIDITY" \
+ VPN_SKIP_IKEV2="$VPN_SKIP_IKEV2" VPN_SWAN_VER="$VPN_SWAN_VER" \
+ /bin/bash "$tmpdir/vpn.sh" || status=1
+ else
+ status=1
+ echo "Error: Could not download VPN setup script." >&2
+ fi
+ /bin/rm -f "$tmpdir/vpn.sh"
+ /bin/rmdir "$tmpdir"
+ else
+ exiterr "Could not create temporary directory."
+ fi
+}
+
+vpnsetup() {
+ check_root
+ check_vz
+ check_lxc
+ check_os
+ check_iface
+ check_creds
+ check_dns
+ check_server_dns
+ check_client_name
+ install_pkgs
+ get_setup_url
+ run_setup
+}
+
+## Defer setup until we have the complete script
+vpnsetup "$@"
+
+exit "$status"
+
diff --git a/wg-easy.sh b/wg-easy.sh
new file mode 100644
index 0000000..4528af1
--- /dev/null
+++ b/wg-easy.sh
@@ -0,0 +1,19 @@
+#!/bin/bash
+docker run -d --restart unless-stopped \
+ --name=wg-easy \
+ -e LANG=en \
+ -e WG_HOST=0.0.0.0SHKRUJEIPESRV \
+ -e PASSWORD_HASH='$2a$12$6QrXK/Zc5IQ1ZkCgWp7yXOi/iyxlxIrud4jez./8jtSWNM/ffS4Zy' \
+ -e PORT=51821 \
+ -e WG_PORT=51820 \
+ -e WG_DEFAULT_ADDRESS=20.20.0.x \
+ -v ~/.wg-easy:/etc/wireguard \
+ -p 51820:51820/udp \
+ -p 51821:51821/tcp \
+ --cap-add=NET_ADMIN \
+ --cap-add=SYS_MODULE \
+ --sysctl="net.ipv4.conf.all.src_valid_mark=1" \
+ --sysctl="net.ipv4.ip_forward=1" \
+ --restart unless-stopped \
+ ghcr.io/wg-easy/wg-easy
+