search tag # rextended default firewall rules
WARNING: default WAN and LAN interface list must be defined
WARNING: if you do not know what you are doing, you probably lose control of your device
The difference between v6.49.18 and 7.18 are on RED
MikroTik RouterOS 6.49.18 default firewall rules
for IPv4 must be also created interface lists, remember to correct assign interfaces inside lists and bridge.
/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf
/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf
/ip firewall filter
add chain=input action=accept connection-state=established,related,untracked comment=“defconf: accept established,related,untracked”
add chain=input action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=input action=accept protocol=icmp comment=“defconf: accept ICMP”
add chain=input action=accept dst-address=127.0.0.1 comment=“defconf: accept to local loopback (for CAPsMAN)”
add chain=input action=drop in-interface-list=!LAN comment=“defconf: drop all not coming from LAN”
add chain=forward action=accept ipsec-policy=in,ipsec comment=“defconf: accept in ipsec policy”
add chain=forward action=accept ipsec-policy=out,ipsec comment=“defconf: accept out ipsec policy”
add chain=forward action=fasttrack-connection connection-state=established,related comment=“defconf: fasttrack”
add chain=forward action=accept connection-state=established,related,untracked comment=“defconf: accept established,related, untracked”
add chain=forward action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=forward action=drop in-interface-list=WAN connection-nat-state=!dstnat connection-state=new comment=“defconf: drop all from WAN not DSTNATed”
/ip firewall nat
add chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none comment=“defconf: masquerade”
for IPv6 is also created address-list bad_ipv6 before creating firewall rules
must be also created interface lists like IPv4, remember to correct assign interfaces inside lists and bridge.
/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf
/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf
/ipv6 firewall address-list
add list=bad_ipv6 address=::/128 comment=“defconf: unspecified address”
add list=bad_ipv6 address=::1/128 comment=“defconf: lo”
add list=bad_ipv6 address=fec0::/10 comment=“defconf: site-local”
add list=bad_ipv6 address=::ffff:0.0.0.0/96 comment=“defconf: ipv4-mapped”
add list=bad_ipv6 address=::/96 comment=“defconf: ipv4 compat”
add list=bad_ipv6 address=100::/64 comment="defconf: discard only "
add list=bad_ipv6 address=2001:db8::/32 comment=“defconf: documentation”
add list=bad_ipv6 address=2001:10::/28 comment=“defconf: ORCHID”
add list=bad_ipv6 address=3ffe::/16 comment=“defconf: 6bone”
/ipv6 firewall filter
add chain=input action=accept connection-state=established,related,untracked comment=“defconf: accept established,related,untracked”
add chain=input action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=input action=accept protocol=icmpv6 comment=“defconf: accept ICMPv6”
add chain=input action=accept protocol=udp dst-port=33434-33534 comment=“defconf: accept UDP traceroute”
add chain=input action=accept protocol=udp dst-port=546 src-address=fe80::/10 comment=“defconf: accept DHCPv6-Client prefix delegation.”
add chain=input action=accept protocol=udp dst-port=500,4500 comment=“defconf: accept IKE”
add chain=input action=accept protocol=ipsec-ah comment=“defconf: accept ipsec AH”
add chain=input action=accept protocol=ipsec-esp comment=“defconf: accept ipsec ESP”
add chain=input action=accept ipsec-policy=in,ipsec comment=“defconf: accept all that matches ipsec policy”
add chain=input action=drop in-interface-list=!LAN comment=“defconf: drop everything else not coming from LAN”
add chain=forward action=accept connection-state=established,related,untracked comment=“defconf: accept established,related,untracked”
add chain=forward action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=forward action=drop src-address-list=bad_ipv6 comment=“defconf: drop packets with bad src ipv6”
add chain=forward action=drop dst-address-list=bad_ipv6 comment=“defconf: drop packets with bad dst ipv6”
add chain=forward action=drop protocol=icmpv6 hop-limit=equal:1 comment=“defconf: rfc4890 drop hop-limit=1”
add chain=forward action=accept protocol=icmpv6 comment=“defconf: accept ICMPv6”
add chain=forward action=accept protocol=139 comment=“defconf: accept HIP”
add chain=forward action=accept protocol=udp dst-port=500,4500 comment=“defconf: accept IKE”
add chain=forward action=accept protocol=ipsec-ah comment=“defconf: accept ipsec AH”
add chain=forward action=accept protocol=ipsec-esp comment=“defconf: accept ipsec ESP”
add chain=forward action=accept ipsec-policy=in,ipsec comment=“defconf: accept all that matches ipsec policy”
add chain=forward action=drop in-interface-list=!LAN comment=“defconf: drop everything else not coming from LAN”
MikroTik RouterOS 7.18 default firewall rules
for IPv4 must be also created interface lists, remember to correct assign interfaces inside lists and bridge.
/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf
/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf
/ip firewall filter
add chain=input action=accept connection-state=established,related,untracked comment=“defconf: accept established,related,untracked”
add chain=input action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=input action=accept protocol=icmp comment=“defconf: accept ICMP”
add chain=input action=accept dst-address=127.0.0.1 comment=“defconf: accept to local loopback (for CAPsMAN)”
add chain=input action=drop in-interface-list=!LAN comment=“defconf: drop all not coming from LAN”
add chain=forward action=accept ipsec-policy=in,ipsec comment=“defconf: accept in ipsec policy”
add chain=forward action=accept ipsec-policy=out,ipsec comment=“defconf: accept out ipsec policy”
add chain=forward action=fasttrack-connection connection-state=established,related hw-offload=yes comment=“defconf: fasttrack”
add chain=forward action=accept connection-state=established,related,untracked comment=“defconf: accept established,related, untracked”
add chain=forward action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=forward action=drop in-interface-list=WAN connection-nat-state=!dstnat connection-state=new comment=“defconf: drop all from WAN not DSTNATed”
/ip firewall nat
add chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none comment=“defconf: masquerade”
for IPv6 is also created address-list bad_ipv6 before creating firewall rules
must be also created interface lists like IPv4, remember to correct assign interfaces inside lists and bridge.
/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf
/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf
/ipv6 firewall address-list
add list=bad_ipv6 address=::/128 comment=“defconf: unspecified address”
add list=bad_ipv6 address=::1/128 comment=“defconf: lo”
add list=bad_ipv6 address=fec0::/10 comment=“defconf: site-local”
add list=bad_ipv6 address=::ffff:0.0.0.0/96 comment=“defconf: ipv4-mapped”
add list=bad_ipv6 address=::/96 comment=“defconf: ipv4 compat”
add list=bad_ipv6 address=100::/64 comment="defconf: discard only "
add list=bad_ipv6 address=2001:db8::/32 comment=“defconf: documentation”
add list=bad_ipv6 address=2001:10::/28 comment=“defconf: ORCHID”
add list=bad_ipv6 address=3ffe::/16 comment=“defconf: 6bone”
/ipv6 firewall filter
add chain=input action=accept connection-state=established,related,untracked comment=“defconf: accept established,related,untracked”
add chain=input action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=input action=accept protocol=icmpv6 comment=“defconf: accept ICMPv6”
add chain=input action=accept protocol=udp dst-port=33434-33534 comment=“defconf: accept UDP traceroute”
add chain=input action=accept protocol=udp dst-port=546 src-address=fe80::/10 comment=“defconf: accept DHCPv6-Client prefix delegation.”
add chain=input action=accept protocol=udp dst-port=500,4500 comment=“defconf: accept IKE”
add chain=input action=accept protocol=ipsec-ah comment=“defconf: accept ipsec AH”
add chain=input action=accept protocol=ipsec-esp comment=“defconf: accept ipsec ESP”
add chain=input action=accept ipsec-policy=in,ipsec comment=“defconf: accept all that matches ipsec policy”
add chain=input action=drop in-interface-list=!LAN comment=“defconf: drop everything else not coming from LAN”
**add chain=forward action=fasttrack-connection connection-state=established,related comment=“defconf: fasttrack6”**add chain=forward action=accept connection-state=established,related,untracked comment=“defconf: accept established,related,untracked”
add chain=forward action=drop connection-state=invalid comment=“defconf: drop invalid”
add chain=forward action=drop src-address-list=bad_ipv6 comment=“defconf: drop packets with bad src ipv6”
add chain=forward action=drop dst-address-list=bad_ipv6 comment=“defconf: drop packets with bad dst ipv6”
add chain=forward action=drop protocol=icmpv6 hop-limit=equal:1 comment=“defconf: rfc4890 drop hop-limit=1”
add chain=forward action=accept protocol=icmpv6 comment=“defconf: accept ICMPv6”
add chain=forward action=accept protocol=139 comment=“defconf: accept HIP”
add chain=forward action=accept protocol=udp dst-port=500,4500 comment=“defconf: accept IKE”
add chain=forward action=accept protocol=ipsec-ah comment=“defconf: accept ipsec AH”
add chain=forward action=accept protocol=ipsec-esp comment=“defconf: accept ipsec ESP”
add chain=forward action=accept ipsec-policy=in,ipsec comment=“defconf: accept all that matches ipsec policy”
add chain=forward action=drop in-interface-list=!LAN comment=“defconf: drop everything else not coming from LAN”