While configuring the firewall I locked out myself from the device
.
I don’t know which of the rules has caused this.
Device IP is 192.168.88.1 in network 192.168.0.0/17
It’s this device https://mikrotik.com/product/CRS326-24G-2SplusRM with RouterOS in Bridge Mode.
My last steps were:
- importing an address list (bogon_IPs) into emptied list, s.b.
- importing a firewall script file (not a real script, just a text file) into emptied rules list, s.b.
- and printing them after the imports succeeded, s.b.
So, which of the rules below was the culprit?
##########
[admin2@MikroTik] /ip/firewall/filter> /ip firewall/address-list/print
Columns: LIST, ADDRESS, CREATION-TIMELIST ADDRESS CREATION-TIME
;;; RFC6890
0 bogon_IPs 0.0.0.0/8 apr/29/2020 14:33:28
;;; RFC6890
1 bogon_IPs 172.16.0.0/12 apr/29/2020 14:33:28
;;; RFC6890
2 bogon_IPs 192.168.0.0/16 apr/29/2020 14:33:28
;;; RFC6890
3 bogon_IPs 10.0.0.0/8 apr/29/2020 14:33:28
;;; RFC6890
4 bogon_IPs 169.254.0.0/16 apr/29/2020 14:33:28
;;; Multicast
5 bogon_IPs 224.0.0.0/4 apr/29/2020 14:33:28
;;; RFC6890
6 bogon_IPs 198.18.0.0/15 apr/29/2020 14:33:28
;;; RFC6890
7 bogon_IPs 192.0.0.0/24 apr/29/2020 14:33:28
;;; RFC6890
8 bogon_IPs 192.0.2.0/24 apr/29/2020 14:33:28
;;; RFC6890
9 bogon_IPs 198.51.100.0/24 apr/29/2020 14:33:28
;;; RFC6890
10 bogon_IPs 203.0.113.0/24 apr/29/2020 14:33:28
;;; RFC6890
11 bogon_IPs 100.64.0.0/10 apr/29/2020 14:33:28
;;; RFC6890
12 bogon_IPs 240.0.0.0/4 apr/29/2020 14:33:28
;;; 6to4 relay Anycast [RFC 3068]
13 bogon_IPs 192.88.99.0/24 apr/29/2020 14:33:28
[admin2@MikroTik] /ip/firewall/filter> /ip firewall/filter/print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough1 chain=input action=fasttrack-connection connection-state=established,related
2 ;;; untracked can be made in raw table (optional, advanced)
chain=input action=accept connection-state=established,related,untracked3 chain=input action=drop connection-state=invalid
4 ;;; drop all from WAN not DNATed
chain=input action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN5 ;;; drop all invalid dstIPs
chain=input action=drop dst-address-list=bogon_IPs6 chain=input action=accept protocol=tcp dst-port=80
7 chain=input action=accept protocol=tcp dst-port=443
8 chain=input action=accept protocol=tcp dst-port=22
9 chain=input action=accept protocol=udp dst-port=53
10 chain=input action=accept protocol=tcp dst-port=53
11 chain=input action=accept protocol=udp dst-port=123
12 chain=input action=accept protocol=tcp dst-port=123
13 chain=input action=jump jump-target=icmp protocol=icmp
14 ;;; deny all other
chain=input action=drop15 chain=output action=fasttrack-connection connection-state=established,related
16 ;;; untracked can be made in raw table (optional, advanced)
chain=output action=accept connection-state=established,related,untracked17 chain=output action=drop connection-state=invalid
18 ;;; drop all invalid dstIPs
chain=output action=drop dst-address-list=bogon_IPs19 chain=output action=accept protocol=tcp dst-port=80
20 chain=output action=accept protocol=tcp dst-port=443
21 chain=output action=accept protocol=tcp dst-port=22
22 chain=output action=accept protocol=udp dst-port=53
23 chain=output action=accept protocol=tcp dst-port=53
24 chain=output action=accept protocol=udp dst-port=123
25 chain=output action=accept protocol=tcp dst-port=123
26 chain=output action=jump jump-target=icmp protocol=icmp
27 ;;; deny all other
chain=output action=drop28 chain=forward action=fasttrack-connection connection-state=established,related
29 ;;; untracked can be made in raw table (optional, advanced)
chain=forward action=accept connection-state=established,related,untracked30 chain=forward action=drop connection-state=invalid
31 ;;; drop other invalid dstIPs
chain=forward action=drop dst-address-list=bogon_IPs32 chain=forward action=accept protocol=tcp dst-port=80
33 chain=forward action=accept protocol=tcp dst-port=443
34 chain=forward action=accept protocol=tcp dst-port=22
35 chain=forward action=accept protocol=udp dst-port=53
36 chain=forward action=accept protocol=tcp dst-port=53
37 chain=forward action=accept protocol=udp dst-port=123
38 chain=forward action=accept protocol=tcp dst-port=123
39 chain=forward action=jump jump-target=icmp protocol=icmp
40 ;;; deny all other
chain=forward action=drop41 ;;; echo reply
chain=icmp action=accept protocol=icmp icmp-options=0:042 ;;; net unreachable
chain=icmp action=accept protocol=icmp icmp-options=3:043 ;;; host unreachable
chain=icmp action=accept protocol=icmp icmp-options=3:144 ;;; host unreachable fragmentation required
chain=icmp action=accept protocol=icmp icmp-options=3:445 ;;; allow source quench
chain=icmp action=accept protocol=icmp icmp-options=4:046 ;;; allow echo request
chain=icmp action=accept protocol=icmp icmp-options=8:047 ;;; allow time exceed
chain=icmp action=accept protocol=icmp icmp-options=11:048 ;;; allow parameter bad
chain=icmp action=accept protocol=icmp icmp-options=12:049 ;;; deny all other
chain=icmp action=drop##########