Buying - RB1100AHx4 Dude Edition - Questions about Firewall

search tag # rextended default firewall rules

WARNING: default WAN and LAN interface list must be defined

WARNING: if you do not know what you are doing, you probably lose control of your device

The difference between v6.49.18 and 7.18 are on RED

MikroTik RouterOS 6.49.18 default firewall rules
for IPv4 must be also created interface lists, remember to correct assign interfaces inside lists and bridge.

/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf

/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf

/ip firewall filter
add chain=input   action=accept               connection-state=established,related,untracked                          comment="defconf: accept established,related,untracked"
add chain=input   action=drop                 connection-state=invalid                                                comment="defconf: drop invalid"
add chain=input   action=accept               protocol=icmp                                                           comment="defconf: accept ICMP"
add chain=input   action=accept               dst-address=127.0.0.1                                                   comment="defconf: accept to local loopback (for CAPsMAN)"
add chain=input   action=drop                 in-interface-list=!LAN                                                  comment="defconf: drop all not coming from LAN"
add chain=forward action=accept               ipsec-policy=in,ipsec                                                   comment="defconf: accept in ipsec policy"
add chain=forward action=accept               ipsec-policy=out,ipsec                                                  comment="defconf: accept out ipsec policy"
add chain=forward action=fasttrack-connection connection-state=established,related                                    comment="defconf: fasttrack"
add chain=forward action=accept               connection-state=established,related,untracked                          comment="defconf: accept established,related, untracked"
add chain=forward action=drop                 connection-state=invalid                                                comment="defconf: drop invalid"
add chain=forward action=drop                 in-interface-list=WAN connection-nat-state=!dstnat connection-state=new comment="defconf: drop all from WAN not DSTNATed"

/ip firewall nat
add chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none comment="defconf: masquerade"

for IPv6 is also created address-list bad_ipv6 before creating firewall rules
must be also created interface lists like IPv4, remember to correct assign interfaces inside lists and bridge.

/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf

/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf

/ipv6 firewall address-list
add list=bad_ipv6 address=::/128            comment="defconf: unspecified address"
add list=bad_ipv6 address=::1/128           comment="defconf: lo"
add list=bad_ipv6 address=fec0::/10         comment="defconf: site-local"
add list=bad_ipv6 address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped"
add list=bad_ipv6 address=::/96             comment="defconf: ipv4 compat"
add list=bad_ipv6 address=100::/64          comment="defconf: discard only "
add list=bad_ipv6 address=2001:db8::/32     comment="defconf: documentation"
add list=bad_ipv6 address=2001:10::/28      comment="defconf: ORCHID"
add list=bad_ipv6 address=3ffe::/16         comment="defconf: 6bone"

/ipv6 firewall filter
add chain=input   action=accept               connection-state=established,related,untracked   comment="defconf: accept established,related,untracked"
add chain=input   action=drop                 connection-state=invalid                         comment="defconf: drop invalid"
add chain=input   action=accept               protocol=icmpv6                                  comment="defconf: accept ICMPv6"
add chain=input   action=accept               protocol=udp dst-port=33434-33534                comment="defconf: accept UDP traceroute"
add chain=input   action=accept               protocol=udp dst-port=546 src-address=fe80::/10  comment="defconf: accept DHCPv6-Client prefix delegation."
add chain=input   action=accept               protocol=udp dst-port=500,4500                   comment="defconf: accept IKE"
add chain=input   action=accept               protocol=ipsec-ah                                comment="defconf: accept ipsec AH"
add chain=input   action=accept               protocol=ipsec-esp                               comment="defconf: accept ipsec ESP"
add chain=input   action=accept               ipsec-policy=in,ipsec                            comment="defconf: accept all that matches ipsec policy"
add chain=input   action=drop                 in-interface-list=!LAN                           comment="defconf: drop everything else not coming from LAN"
add chain=forward action=accept               connection-state=established,related,untracked   comment="defconf: accept established,related,untracked" 
add chain=forward action=drop                 connection-state=invalid                         comment="defconf: drop invalid"
add chain=forward action=drop                 src-address-list=bad_ipv6                        comment="defconf: drop packets with bad src ipv6"
add chain=forward action=drop                 dst-address-list=bad_ipv6                        comment="defconf: drop packets with bad dst ipv6"
add chain=forward action=drop                 protocol=icmpv6 hop-limit=equal:1                comment="defconf: rfc4890 drop hop-limit=1"
add chain=forward action=accept               protocol=icmpv6                                  comment="defconf: accept ICMPv6"
add chain=forward action=accept               protocol=139                                     comment="defconf: accept HIP"
add chain=forward action=accept               protocol=udp dst-port=500,4500                   comment="defconf: accept IKE"
add chain=forward action=accept               protocol=ipsec-ah                                comment="defconf: accept ipsec AH"
add chain=forward action=accept               protocol=ipsec-esp                               comment="defconf: accept ipsec ESP"
add chain=forward action=accept               ipsec-policy=in,ipsec                            comment="defconf: accept all that matches ipsec policy"
add chain=forward action=drop                 in-interface-list=!LAN                           comment="defconf: drop everything else not coming from LAN"



MikroTik RouterOS 7.18 default firewall rules
for IPv4 must be also created interface lists, remember to correct assign interfaces inside lists and bridge.

/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf

/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf

/ip firewall filter
add chain=input   action=accept               connection-state=established,related,untracked                          comment="defconf: accept established,related,untracked"
add chain=input   action=drop                 connection-state=invalid                                                comment="defconf: drop invalid"
add chain=input   action=accept               protocol=icmp                                                           comment="defconf: accept ICMP"
add chain=input   action=accept               dst-address=127.0.0.1                                                   comment="defconf: accept to local loopback (for CAPsMAN)"
add chain=input   action=drop                 in-interface-list=!LAN                                                  comment="defconf: drop all not coming from LAN"
add chain=forward action=accept               ipsec-policy=in,ipsec                                                   comment="defconf: accept in ipsec policy"
add chain=forward action=accept               ipsec-policy=out,ipsec                                                  comment="defconf: accept out ipsec policy"
# hw-offload=yes only on 7.18+
add chain=forward action=fasttrack-connection connection-state=established,related               hw-offload=yes       comment="defconf: fasttrack"
add chain=forward action=accept               connection-state=established,related,untracked                          comment="defconf: accept established,related, untracked"
add chain=forward action=drop                 connection-state=invalid                                                comment="defconf: drop invalid"
add chain=forward action=drop                 in-interface-list=WAN connection-nat-state=!dstnat connection-state=new comment="defconf: drop all from WAN not DSTNATed"

/ip firewall nat
add chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none comment="defconf: masquerade"

for IPv6 is also created address-list bad_ipv6 before creating firewall rules
must be also created interface lists like IPv4, remember to correct assign interfaces inside lists and bridge.

/interface list
add name=WAN comment=defconf
add name=LAN comment=defconf

/interface list member
add list=WAN interface=ether1 comment=defconf
add list=LAN interface=bridge comment=defconf

/ipv6 firewall address-list
add list=bad_ipv6 address=::/128            comment="defconf: unspecified address"
add list=bad_ipv6 address=::1/128           comment="defconf: lo"
add list=bad_ipv6 address=fec0::/10         comment="defconf: site-local"
add list=bad_ipv6 address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped"
add list=bad_ipv6 address=::/96             comment="defconf: ipv4 compat"
add list=bad_ipv6 address=100::/64          comment="defconf: discard only "
add list=bad_ipv6 address=2001:db8::/32     comment="defconf: documentation"
add list=bad_ipv6 address=2001:10::/28      comment="defconf: ORCHID"
add list=bad_ipv6 address=3ffe::/16         comment="defconf: 6bone"

/ipv6 firewall filter
add chain=input   action=accept               connection-state=established,related,untracked   comment="defconf: accept established,related,untracked"
add chain=input   action=drop                 connection-state=invalid                         comment="defconf: drop invalid"
add chain=input   action=accept               protocol=icmpv6                                  comment="defconf: accept ICMPv6"
add chain=input   action=accept               protocol=udp dst-port=33434-33534                comment="defconf: accept UDP traceroute"
add chain=input   action=accept               protocol=udp dst-port=546 src-address=fe80::/10  comment="defconf: accept DHCPv6-Client prefix delegation."
add chain=input   action=accept               protocol=udp dst-port=500,4500                   comment="defconf: accept IKE"
add chain=input   action=accept               protocol=ipsec-ah                                comment="defconf: accept ipsec AH"
add chain=input   action=accept               protocol=ipsec-esp                               comment="defconf: accept ipsec ESP"
add chain=input   action=accept               ipsec-policy=in,ipsec                            comment="defconf: accept all that matches ipsec policy"
add chain=input   action=drop                 in-interface-list=!LAN                           comment="defconf: drop everything else not coming from LAN"
# fasttrack6 only on 7.18+
add chain=forward action=fasttrack-connection connection-state=established,related             comment="defconf: fasttrack6"
add chain=forward action=accept               connection-state=established,related,untracked   comment="defconf: accept established,related,untracked" 
add chain=forward action=drop                 connection-state=invalid                         comment="defconf: drop invalid"
add chain=forward action=drop                 src-address-list=bad_ipv6                        comment="defconf: drop packets with bad src ipv6"
add chain=forward action=drop                 dst-address-list=bad_ipv6                        comment="defconf: drop packets with bad dst ipv6"
add chain=forward action=drop                 protocol=icmpv6 hop-limit=equal:1                comment="defconf: rfc4890 drop hop-limit=1"
add chain=forward action=accept               protocol=icmpv6                                  comment="defconf: accept ICMPv6"
add chain=forward action=accept               protocol=139                                     comment="defconf: accept HIP"
add chain=forward action=accept               protocol=udp dst-port=500,4500                   comment="defconf: accept IKE"
add chain=forward action=accept               protocol=ipsec-ah                                comment="defconf: accept ipsec AH"
add chain=forward action=accept               protocol=ipsec-esp                               comment="defconf: accept ipsec ESP"
add chain=forward action=accept               ipsec-policy=in,ipsec                            comment="defconf: accept all that matches ipsec policy"
add chain=forward action=drop                 in-interface-list=!LAN                           comment="defconf: drop everything else not coming from LAN"
2 Likes