Get rid of bloatware
/ip firewall filter
add action=drop chain=input comment=“BLOCK BLACK LIST” src-address-list=pingBlacklist
add action=drop chain=input src-address-list=winboxBlacklist
add action=drop chain=input src-address-list=telnetBlacklist
add action=drop chain=input src-address-list=dnsBlacklist
add action=drop chain=input src-address-list=webBlacklist
add action=drop chain=input src-address-list=sshBlacklist
add action=drop chain=input src-address-list=rdpBlacklist
add action=drop chain=input src-address-list=ntpBlacklist
add action=drop chain=input src-address-list=pop3Blacklist
add action=drop chain=input src-address-list=imapBlacklist
add action=drop chain=input src-address-list=ftpBlacklist
add action=drop chain=input src-address-list=tftpBlacklist
add action=drop chain=input src-address-list=smtpBlacklist
add action=drop chain=input src-address-list=vncBlacklist
add action=drop chain=input src-address-list=443Blacklist
add action=drop chain=input src-address-list=sqlBlacklist
add action=add-src-to-address-list address-list=pingBlacklist address-list-timeout=2w chain=input comment=“CREATE BLACK LIST” protocol=icmp
add action=add-src-to-address-list address-list=pingBlacklist address-list-timeout=2w chain=input dst-port=8291 protocol=tcp
add action=add-src-to-address-list address-list=pingBlacklist address-list-timeout=2w chain=input dst-port=23,2323 protocol=tcp
add action=add-src-to-address-list address-list=dnsBlacklist address-list-timeout=2w chain=input dst-port=53 protocol=tcp
add action=add-src-to-address-list address-list=dnsBlacklist address-list-timeout=2w chain=input dst-port=53 protocol=udp
add action=add-src-to-address-list address-list=webBlacklist address-list-timeout=2w chain=input dst-port=80,8080,8880 protocol=tcp
add action=add-src-to-address-list address-list=sshBlacklist address-list-timeout=2w chain=input dst-port=22 protocol=tcp
add action=add-src-to-address-list address-list=rdpBlacklist address-list-timeout=2w chain=input dst-port=3389 protocol=tcp
add action=add-src-to-address-list address-list=ntpBlacklist address-list-timeout=2w chain=input dst-port=123 protocol=tcp
add action=add-src-to-address-list address-list=pop3Blacklist address-list-timeout=2w chain=input dst-port=110,995 protocol=tcp
add action=add-src-to-address-list address-list=imapBlacklist address-list-timeout=2w chain=input dst-port=143,220,993 protocol=tcp
add action=add-src-to-address-list address-list=ftpBlacklist address-list-timeout=2w chain=input dst-port=20,21 protocol=tcp
add action=add-src-to-address-list address-list=tftpBlacklist address-list-timeout=2w chain=input dst-port=69 protocol=tcp
add action=add-src-to-address-list address-list=smtpBlacklist address-list-timeout=2w chain=input dst-port=25,465,587 protocol=tcp
add action=add-src-to-address-list address-list=vncBlacklist address-list-timeout=2w chain=input dst-port=5500,5800,5900 protocol=tcp
add action=add-src-to-address-list address-list=443Blacklist address-list-timeout=2w chain=input dst-port=443 protocol=tcp
add action=add-src-to-address-list address-list=sqlBlacklist address-list-timeout=2w chain=input dst-port=3306 protocol=tcp
add action=drop chain=input comment=“DROP AT ONE” protocol=icmp
add action=drop chain=input dst-port=8291 protocol=tcp
add action=drop chain=input dst-port=23,2323 protocol=tcp
add action=drop chain=input dst-port=53 protocol=tcp
add action=drop chain=input dst-port=53 protocol=udp
add action=drop chain=input dst-port=80,8080,8880 protocol=tcp
add action=drop chain=input dst-port=22 protocol=tcp
add action=drop chain=input dst-port=3389 protocol=tcp
add action=drop chain=input dst-port=3389 protocol=udp
add action=drop chain=input dst-port=123 protocol=udp
add action=drop chain=input dst-port=110,995 protocol=tcp
add action=drop chain=input dst-port=143,220,993 protocol=tcp
add action=drop chain=input dst-port=20,21 protocol=tcp
add action=drop chain=input dst-port=69 protocol=tcp
add action=drop chain=input dst-port=25,465,587 protocol=tcp
add action=drop chain=input dst-port=5500,5800,5900 protocol=tcp
add action=drop chain=input dst-port=443 protocol=tcp
add action=drop chain=input dst-port=3306 protocol=tcp
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment="Port scanners to list " protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“NMAP FIN Stealth scan” protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“SYN/FIN scan” protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“SYN/RST scan” protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“FIN/PSH/URG scan” protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“ALL/ALL scan” protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“NMAP NULL scan” protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment=“dropping port scanners” src-address-list=“port scanners”
add action=accept chain=forward comment=“ADSL 1” in-interface=pppoe-out1
add action=accept chain=output out-interface=pppoe-out1
add action=accept chain=input in-interface=pppoe-out1
add action=accept chain=forward comment=“ADSL 2” in-interface=pppoe-out2
add action=accept chain=output out-interface=pppoe-out2
add action=accept chain=input in-interface=pppoe-out2
add action=accept chain=forward comment=“ADSL 3 FIXED” in-interface=ether3_FIXED
add action=accept chain=output out-interface=ether3_FIXED
add action=accept chain=input connection-state=established,related
add action=accept chain=forward connection-state=established,related
add action=drop chain=forward connection-state=invalid
add action=drop chain=input connection-state=invalid
Keep the basic default firewall for the most part,
Ensure you keep your chains together, ( all input, then all forward ) much easier to read AND troubleshoo
/ip firewall filter
{Input Chain}
(default rules to keep)
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
(user rules)
add action=accept chain=input comment="Admin Access" src-address-list=Authorized
add action=accept chain=input comment="Allow LAN DNS queries-UDP" \
dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow LAN DNS queries - TCP" \
dst-port=53 in-interface-list=LAN protocol=tcp
add action=drop chain=input comment="drop all else" { add this rule last, as the Authorized rule and associated address list needs to be in place first }
{forward chain}
(default rules to keep)
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
(user rules)
add action=accept chain=forward comment="allow internet traffic" in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="port forwarding" connection-nat-state=dstnat
******
add action=drop chain=forward comment="drop all else"
…
Note1:
/ip firewall address-list { static leases }
add address=Admin-IP1 list=Authorized comment=“admin desktop”
add address=Admin-IP2 list=Authorized comment=“admin laptop”
add address=Admin-IP3 list=Authorized comment=“admin smartphone”
Note:2
For any additional allow traffic rules on the forward chain put them just before the drop rule → *******