ryba884 wrote: Even if he sets his address hard, the network will not work for him. The rest is a proper firewall.
I have a site-to-site tunnel configured between the headquarters and the branch in Mikrotiki and I connect to both places via client-to-site 2TP + IPSEC.
The branch connects to the headquarters using RDP and printers transferred in the session. Users at the headquarters and in the branch are to have access to the Internet, below I paste the firewall rules analogous to the headquarters and branches. I would like to ask for help in securing both networks, I would like to do it on the principle of letting in what needs to be done and cutting out the rest.
The rules I have are:
/ip firewall filter
add action=accept chain=input comment="akceptuj WinBox z zewnatrz" dst-port=\ 8291 in-interface="ether1 WAN" protocol=tcp - tutaj oczywiście nie koniecznie bo mogę wejść na Winboxa lokalnie po podłączeniu się przez VNP client-to-site
add chain=input in-interface="ether1 WAN" src-address=xx.xx.xx.xx - tutaj adres filii i analogicznie adres centrali w ruterze filii
add action=accept chain=input comment="akceptuj L2TP" dst-port=1701 \ in-interface="ether1 WAN" protocol=udp
add action=accept chain=input comment="akceptuj IPsec" dst-port=500 \ in-interface="ether1 WAN" protocol=udp
add action=accept chain=input comment="akceptuj IP sec VPN" dst-port=4500 \ in-interface="ether1 WAN" protocol=udp
add action=accept chain=input comment="defconf: accept ICMP" in-interface=\ "ether1 WAN" protocol=icmp
add action=accept chain=input comment="defconf: accept established,related" \
connection-state=established,related in-interface="ether1 WAN"
add action=accept chain=forward comment="defconf: accept established,related" \
connection-state=established,related in-interface="ether1 WAN"
add action=drop chain=input comment="defconf: drop all from WAN" \
in-interface="ether1 WAN"
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid in-interface="ether1 WAN"
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface="ether1 WAN"
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
out-interface="ether1 WAN"
I don't have much experience with rules, could you please advise me based on the above?
Thank you in advance for your help.