I thought that vlan trafic and access is totaly separated from “other” lan or vlan trafic, but I realise that’s only true for the trafic and not the access to the ip-addresses. I actually have quit a few firewall rules, I’ll copy in below. There are some references to lists I created (or scripts create them) in the address list section.
[admin@Gateway router] /ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Drop invalid connections
chain=input action=drop connection-state=invalid log=no log-prefix=""
1 ;;; Drop ICMP ping from gateway
chain=input action=drop protocol=icmp in-interface=ether1-gateway
log=no log-prefix=""
2 ;;; Drop open proxy
chain=input action=drop protocol=tcp in-interface=ether1-gateway
dst-port=8080 log=no log-prefix=""
3 ;;; Allow already established connections
chain=input action=accept connection-state=established log=no
log-prefix=""
4 ;;; Allow already related connections
chain=input action=accept connection-state=related log=no log-prefix=""
5 ;;; allow SSTP
chain=input action=accept protocol=tcp dst-port=443 log=yes
log-prefix=""
6 ;;; allow L2TP/IPSEC
chain=input action=accept protocol=udp dst-port=500,1701,4500 log=yes
log-prefix=""
7 ;;; allow ipsec-esp
chain=input action=accept protocol=ipsec-esp log=yes log-prefix=""
8 ;;; Drop blacklist entries
chain=input action=drop src-address-list=blacklist
in-interface=ether1-gateway log=yes log-prefix=""
9 ;;; WAN login tries
chain=input action=add-src-to-address-list protocol=tcp
address-list=Login_tries_wan address-list-timeout=1d
in-interface=ether1-gateway dst-port=20-23,53,8291 log=yes
log-prefix=""
10 ;;; Drop WAN login tries
chain=input action=drop src-address-list=Login_tries_wan log=yes
log-prefix=""
11 ;;; Detect Dos attack
chain=input action=add-src-to-address-list protocol=tcp
address-list=DoS address-list-timeout=1d connection-limit=10,32 log=no
log-prefix=""
12 ;;; Supress Dos attack
chain=input action=tarpit protocol=tcp src-address-list=DoS
connection-limit=3,32 log=no log-prefix=""
13 ;;; LAN login tries
chain=input action=add-src-to-address-list protocol=tcp
src-address-list=!Admin address-list=Login_tries_lan
address-list-timeout=1d in-interface=!ether1-gateway
dst-port=20-23,8291 log=yes log-prefix=""
14 ;;; Block winbox access - except support list
chain=input action=drop protocol=tcp src-address-list=!support
dst-port=8291 log=no log-prefix=""
15 ;;; Block home network --> guest wlan
chain=input action=drop src-address=192.168.88.0/24
dst-address=192.168.90.0/24 log=no log-prefix=""
16 ;;; Block guest wlan --> home network
chain=input action=drop src-address=192.168.90.0/24
dst-address=192.168.88.0/24 log=no log-prefix=""
17 ;;; Add Syn Flood IP to the list
chain=input action=add-src-to-address-list tcp-flags=syn protocol=tcp
src-address-list=!Admin address-list=Syn_Flooder
address-list-timeout=30m connection-limit=30,32 log=yes log-prefix=""
18 ;;; Drop to syn flood list
chain=input action=drop src-address-list=Syn_Flooder log=yes
log-prefix=""
19 ;;; Port Scanner Detect
chain=input action=add-src-to-address-list protocol=tcp psd=21,3s,3,1
src-address-list=!Admin address-list=Port_Scanner
address-list-timeout=1w log=yes log-prefix=""
20 ;;; FIN/PSH/URG scan
chain=input action=add-src-to-address-list
tcp-flags=fin,psh,urg,!syn,!rst,!ack protocol=tcp
src-address-list=!Admin address-list=Port_Scanner
address-list-timeout=1w log=yes log-prefix=""
21 ;;; NMAP FIN Stealth scan
chain=input action=add-src-to-address-list
tcp-flags=fin,!syn,!rst,!psh,!ack,!urg protocol=tcp
src-address-list=!Admin address-list=Port_Scanner
address-list-timeout=1w log=yes log-prefix=""
22 ;;; NMAP Null scan
chain=input action=add-src-to-address-list
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg protocol=tcp
src-address-list=!Admin address-list=Port_Scanner
address-list-timeout=1w log=yes log-prefix=""
23 ;;; ALL/ALL scan
chain=input action=add-src-to-address-list
tcp-flags=fin,syn,rst,psh,ack,urg protocol=tcp src-address-list=!Admin
address-list=Port_Scanner address-list-timeout=1w log=yes log-prefix=""
24 ;;; SYN/FIN scan
chain=input action=add-src-to-address-list tcp-flags=fin,syn
protocol=tcp src-address-list=!Admin address-list=Port_Scanner
address-list-timeout=1w log=yes log-prefix=""
25 ;;; SYN/RST scan
chain=input action=add-src-to-address-list tcp-flags=syn,rst
protocol=tcp src-address-list=!Admin address-list=Port_Scanner
address-list-timeout=1w log=yes log-prefix=""
26 ;;; Drop to port scan list
chain=input action=drop src-address-list=Port_Scanner log=yes
log-prefix=""
27 ;;; Allow broadcast traffic
chain=input action=accept dst-address-type=broadcast log=no
log-prefix=""
28 ;;; Jump to chain icmp
chain=input action=jump jump-target=ICMP protocol=icmp log=no
log-prefix=""
29 ;;; Allow internal nets
chain=input action=accept in-interface=!ether1-gateway log=no
log-prefix=""
30 ;;; Drop everything else
chain=input action=drop log=yes log-prefix="Dropped"
31 ;;; Drop invalid connection forwards
chain=forward action=drop connection-state=invalid log=no log-prefix=""
32 ;;; Allow new connections from LAN
chain=forward action=accept connection-state=new
src-address-list=internal-nets log=no log-prefix=""
33 ;;; Allow established connections from LAN
chain=forward action=accept connection-state=established log=no
log-prefix=""
34 ;;; Allow related connections from LAN
chain=forward action=accept connection-state=related log=no
log-prefix=""
35 ;;; Drop bogons
chain=forward action=drop dst-address-list=bogons log=yes
tcp-flags=fin,syn,rst,psh,ack,urg protocol=tcp src-address-list=!Admin
address-list=Port_Scanner address-list-timeout=1w log=yes log-prefix=""
36 ;;; Add Spammers to list for 3 hours
chain=forward action=add-src-to-address-list protocol=tcp
address-list=spammers address-list-timeout=3h dst-port=25,587,465
connection-limit=30,32 limit=30/1m,0 log=no log-prefix=""
37 ;;; Drop from spammers list
chain=forward action=drop protocol=tcp src-address-list=spammers
dst-port=25,587,465 log=yes log-prefix="Drop spammer"
38 ;;; Jump to icmp forward flow
chain=forward action=jump jump-target=ICMP protocol=icmp log=no
log-prefix=""
39 ;;; Jump for icmp output
chain=output action=jump jump-target=ICMP protocol=icmp log=no
log-prefix=""
40 ;;; 0:0 and limit for 5pac/s
chain=ICMP action=accept protocol=icmp icmp-options=0:0-255 limit=5,5
log=no log-prefix=""
41 ;;; 3:0-1 destination unreachable
chain=ICMP action=accept protocol=icmp icmp-options=3:0-1 log=no
log-prefix=""
42 ;;; 3:3 and limit for 5pac/s
chain=ICMP action=accept protocol=icmp icmp-options=3:3 limit=5,5
log=no log-prefix=""
43 ;;; 3:4 and limit for 5pac/s
chain=ICMP action=accept protocol=icmp icmp-options=3:4 limit=5,5
log=no log-prefix=""
44 ;;; 8:0 and limit for 5pac/s
chain=ICMP action=accept protocol=icmp icmp-options=8:0-255 limit=5,5
log=no log-prefix=""
45 ;;; 11:0 and limit for 5pac/s
chain=ICMP action=accept protocol=icmp icmp-options=11:0-255 limit=5,5
log=no log-prefix=""
46 ;;; Drop everything else
chain=ICMP action=drop protocol=icmp log=no log-prefix=""
Thanks for taking the time and trouble to “wade” through this list and help me out.