Wow, this has turned into a very interestin and informative thread -- thank you all!
首先,我仍然在起步阶段我的勒arning.
I think what happened is this:
I added a firewall ALLOW rule for winbox traffic in (port 8291). Then I read that doing this was a security risk.
Then I added a firewall ALLOW rule for all traffic from the public IP of the main site I am usually at. It's been pointed out that this is a security risk also.
Then I added a firewall ALLOW rule for the private IP range used at the main site I am usually thinking the VPN will protect me.
I then proceeded to disable each of these and tested it again from my main location and winbox continued to work. I suspect because it was allowed through as an existing connection.
Now that it has been a few days, it doesn't work.
What I did not have is is the interface wireguard1 aed to the LAN list of interfaces so that the winbox would allow it.
/interface list member add comment=defconf interface=bridge list=LAN add comment=defconf interface=ether1 list=WAN
So, I think that is what happened.
As for what to do now:
The location has no wired devices and only a handful of wifi-connected devices, mostly cell phones, tablets and maybe a laptop. None of these items are owned by or controlled by me. Nor are they controlled by anyone with enough computer skill to install winbox, connect to the hAP and make a change.
Should I enable RoMon as a backdoor for next time I mess up?
I thought about a Ras-Pi as a backdoor but it would probably take ahigher level of security skill to protect the environment while still giving me a way in than I possess.
I don't understand the webproxy approach or the wifi path (if I'm within wifi distance, I can easily plug in a laptop in my case).
So, looks like a trip is in my near future.