Quote: It depends on what you'll be hosting in MT
I do not know if I completely understand the question, but when it comes to some ftp or sharing files with other household members, it's absolutely NOTHING of these things.
You moved an interesting thing that bothers me, you wrote
Quote: for example, INPUT, in order
- allow all established
- allow all related
- allow new winbox eth1
- allow DNS from ether *
- allow DHCP from ether *
...
- drop everything
Why, in this case, I can log in to mikrotik at all, since before the rule 11 "drop everything" there is nowhere to allow access to router from ether2 etc.?
From what I see, you let go, you block everything else, and I think I have the opposite, blocks selected ones, I release everything else ... and I do not want to ...
A colleague from another forum wrote a firewall for me, for my needs.
Ja bym to widział tak:
/ip firewall filter
# najpierw INPUTy.
add chain=input comment="Zezwalaj na established i related" connection-state=established,related
add action=drop chain=input comment="Dropuj polaczenia typu invalid" connection-state=invalid
add action=drop chain=input comment="Dropuj zapytania DNS od strony WAN" dst-port=53 in-interface=ether1 protocol=udp //Chociaż u Ciebie jest zbędne, bo z tego co widzę nie używasz DNS-Cache.
add action=drop chain=input in-interface=ether1 // ja bym tego nie stosował, bo pozbawisz się możliwości pingowania na zew z routera, traceroutów, pobierania aktualizacji MT itd. Jeżeli wszystkie usługi masz wyłączone, to nie widzę sensu robienia blokady na inpucie na wszystko.
# forwardy
add chain=forward comment="Zezwalaj na established i related" connection-state=established,related
add action=drop chain=forward comment="Dropuj polaczenia typu invalid" connection-state=invalid
add action=drop chain=forward comment="Dropuj polaczenia new inne niz syn" connection-state=new protocol=tcp tcp-flags=!syn
add action=drop chain=forward comment="Dropuj skanowanie portow" protocol=tcp tcp-flags=fin,syn,rst,ack
add action=drop chain=forward in-interface=bridge1 log=yes out-interface=bridge2 comment="Blokada ruchu forward z bridge1 do bridge2"
add action=drop chain=forward in-interface=bridge2 log=yes out-interface=bridge1 comment="Blokada ruchu forward z bridge2 do bridge1"
# To sobie możesz zostawić, nie przeszkadza w niczym
add action=tarpit chain=input comment="suppress DoS attack" connection-limit=3,32 log=yes protocol=tcp src-address-list=black_list
add action=add-src-to-address-list address-list=black_list address-list-timeout=1d chain=input comment="detect DoS attack" connection-limit=10,32 log=yes protocol=tcp
add action=drop chain=forward comment="Drop Blaster Worm" dst-port=135-139 protocol=tcp
add action=drop chain=forward comment="Drop Blaster Worm" dst-port=445 protocol=tcp
add action=drop chain=forward comment="Drop Blaster Worm" dst-port=445 protocol=udp
add action=drop chain=forward comment="Drop Messenger Worm" dst-port=135-139 protocol=udp
add action=drop chain=forward comment=________ dst-port=593 protocol=tcp
add action=drop chain=forward comment=________ dst-port=1024-1030 protocol=tcp
add action=drop chain=forward comment="Drop MyDoom" dst-port=1080 protocol=tcp
add action=drop chain=forward comment=________ dst-port=1214 protocol=tcp
add action=drop chain=forward comment="ndm requester" dst-port=1363 protocol=tcp
add action=drop chain=forward comment="ndm server" dst-port=1364 protocol=tcp
add action=drop chain=forward comment="screen cast" dst-port=1368 protocol=tcp
add action=drop chain=forward comment=hromgrafx dst-port=1373 protocol=tcp
add action=drop chain=forward comment=cichlid dst-port=1377 protocol=tcp
add action=drop chain=forward comment=Worm dst-port=1433-1434 protocol=tcp
add action=drop chain=forward comment="Bagle Virus" dst-port=2745 protocol=tcp
add action=drop chain=forward comment="Drop Dumaru.Y" dst-port=2283 protocol=tcp
add action=drop chain=forward comment="Drop Beagle" dst-port=2535 protocol=tcp
add action=drop chain=forward comment="Drop Beagle.C-K" dst-port=2745 protocol=tcp
add action=drop chain=forward comment="Drop MyDoom" dst-port=3127-3128 protocol=tcp
add action=drop chain=forward comment="Drop Backdoor OptixPro" dst-port=3410 protocol=tcp
add action=drop chain=forward comment=Worm dst-port=4444 protocol=tcp
add action=drop chain=forward comment=Worm dst-port=4444 protocol=udp
add action=drop chain=forward comment="Drop Sasser" dst-port=5554 protocol=tcp
add action=drop chain=forward comment="Drop Beagle.B" dst-port=8866 protocol=tcp
add action=drop chain=forward comment="Drop Dabber.A-B" dst-port=9898 protocol=tcp
add action=drop chain=forward comment="Drop Dumaru.Y" dst-port=10000 protocol=tcp
add action=drop chain=forward comment="Drop MyDoom.B" dst-port=10080 protocol=tcp
add action=drop chain=forward comment="Drop NetBus" dst-port=12345 protocol=tcp
add action=drop chain=forward comment="Drop Kuang2" dst-port=17300 protocol=tcp
add action=drop chain=forward comment="Drop SubSeven" dst-port=27374 protocol=tcp
add action=drop chain=forward comment="Drop PhatBot, Agobot, Gaobot" dst-port=65506 protocol=tcp
W IP->Services widzę masz wyłączone wszystko poza winboxem. W ustawieniach tego wpisu ustal sobie z jakich adresów IP możesz mieć dostęp.
Upewnij się jeszcze, że SNMP masz wyłączone jeżeli nie potrzebujesz (IP->SNMP)
And I have a question about what he wrote here "add action = drop chain = input in-interface = ether1 // I would not use it, because you will not be able to ping from the router, tracerouts, download MT updates, etc. If you have all the services turned off, I do not see the point of making a lock on an injection for everything. "
Why in this case, having this rule as 11, I can still download the update, etc.