I asked a week ago about trying to let through some scans for PCI compliance. Someone suggested I do a catch all rule to see if it was being dropped. Since I had firewall rules up already, I just put logging on the rules I saw traffic in and low and behold I found which rule was dropping the traffic.
Below is a snippet of my firewall rules. The rule that is disabled (log prefix is drop2test) is the one that was causing the problem.
My question to you is this; Do I need this rule? I don’t want to open us up to attacks if it’s something that is helpful. It doesn’t really drop that much from what I can tell, so I’m not sure it’s all that helpful.
thanks
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid log=yes log-prefix=\
Droptest
add action=drop chain=input comment="defconf: drop all not coming from LAN" disabled=yes \
in-interface-list=!LAN log=yes log-prefix=drop2test
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=\
established,related log-prefix=forwardtest
add action=accept chain=forward comment="defconf: accept established,related, untracked" \
connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=\
!dstnat connection-state=new in-interface-list=WAN