We can ignore PING for now. I have several web server that is hosted in VLAN2 and with the firewall filter in place to drop the connection, I was still able to browse those webpages via IP address.
Here is my entire setup.
/interface bridge
add ingress-filtering=no name=bridge vlan-filtering=yes
/interface ethernet
set [ find default-name=qsfpplus1-1 ] name=qsfpplus1-1-nas
set [ find default-name=qsfpplus2-1 ] name=qsfpplus2-1-nas
set [ find default-name=sfp-sfpplus1 ] name=eth1-WAN
set [ find default-name=sfp-sfpplus2 ] name=sfp2-downstairs-netgeear
set [ find default-name=sfp-sfpplus3 ] name=sfp3-upstairs-netgear
set [ find default-name=sfp-sfpplus4 ] name=sfp4-workstation-hub
set [ find default-name=sfp-sfpplus5 ] name=sfp5-desktopComputer
set [ find default-name=sfp-sfpplus6 ] name=sfp6-pve
set [ find default-name=sfp-sfpplus7 ] name=sfp7-pve
set [ find default-name=sfp-sfpplus8 ] name=sfp8-pve
set [ find default-name=sfp-sfpplus9 ] name=sfp9-pve
set [ find default-name=sfp-sfpplus10 ] name=sfp10-pve
set [ find default-name=sfp-sfpplus11 ] name=sfp11-pve
set [ find default-name=sfp-sfpplus12 ] name=sfp12
/interface vlan
add interface=bridge name=VLAN2 vlan-id=2
add interface=bridge name=VLAN3 vlan-id=3
add interface=bridge name=VLAN4 vlan-id=4
add interface=bridge name=VLAN5-Kids vlan-id=5
add interface=bridge name=VLAN6 vlan-id=6
/interface bonding
add mode=802.3ad name=40G-Bond slaves=qsfpplus1-1-nas,qsfpplus2-1-nas transmit-hash-policy=layer-2-and-3
/interface ethernet switch
set 0 l3-hw-offloading=yes
/interface ethernet switch port
set 1 l3-hw-offloading=no
/interface list
add name=WAN
add name=LAN
add name=Guest
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip pool
add name=dhcp_pool0 ranges=192.168.3.2-192.168.3.254
add name=dhcp_pool1 ranges=192.168.2.2-192.168.2.254
add name=dhcp_pool2 ranges=192.168.4.2-192.168.4.254
add name=dhcp_pool3 ranges=192.168.5.2-192.168.5.254
add name=dhcp_pool4 ranges=192.168.6.2-192.168.6.254
/ip dhcp-server
add address-pool=dhcp_pool0 interface=VLAN3 name=dhcp1
add address-pool=dhcp_pool1 interface=VLAN2 name=dhcp2
add address-pool=dhcp_pool2 interface=VLAN4 name=dhcp3
add address-pool=dhcp_pool4 interface=VLAN6 name=dhcp5
add address-pool=dhcp_pool3 interface=VLAN5-Kids name=dhcp4
/port
set 0 name=serial0
/interface bridge port
add bridge=bridge interface=sfp6-pve pvid=2
add bridge=bridge interface=sfp2-downstairs-netgeear pvid=100
add bridge=bridge interface=sfp3-upstairs-netgear pvid=100
add bridge=bridge interface=sfp7-pve pvid=2
add bridge=bridge interface=sfp8-pve pvid=2
add bridge=bridge interface=sfp9-pve pvid=2
add bridge=bridge interface=sfp10-pve pvid=2
add bridge=bridge interface=sfp11-pve pvid=2
add bridge=bridge interface=sfp4-workstation-hub pvid=3
add bridge=bridge interface=sfp5-desktopComputer pvid=3
add bridge=bridge interface=40G-Bond pvid=2
/interface bridge vlan
add bridge=bridge tagged=bridge,sfp2-downstairs-netgeear,sfp3-upstairs-netgear,sfp6-pve,sfp7-pve,sfp8-pve,sfp9-pve,sfp10-pve,sfp11-pve untagged=sfp4-workstation-hub,sfp5-desktopComputer vlan-ids=3
add bridge=bridge tagged=bridge,sfp3-upstairs-netgear,sfp2-downstairs-netgeear untagged=40G-Bond,sfp6-pve,sfp7-pve,sfp8-pve,sfp9-pve,sfp10-pve,sfp11-pve vlan-ids=2
add bridge=bridge tagged=bridge,sfp2-downstairs-netgeear,sfp3-upstairs-netgear vlan-ids=4
add bridge=bridge tagged=bridge,sfp2-downstairs-netgeear,sfp3-upstairs-netgear vlan-ids=5
add bridge=bridge tagged=bridge,sfp2-downstairs-netgeear,sfp3-upstairs-netgear vlan-ids=6
/interface list member
add interface=eth1-WAN list=WAN
add interface=VLAN2 list=LAN
add interface=VLAN3 list=LAN
add interface=VLAN4 list=LAN
add interface=VLAN6 list=LAN
add interface=VLAN5-Kids list=Guest
/ip address
add address=192.168.3.1/24 interface=VLAN3 network=192.168.3.0
add address=xx.xx.xx.xx/29 interface=eth1-WAN network=xx.xx.xx.xx
add address=192.168.2.1/24 interface=VLAN2 network=192.168.2.0
add address=192.168.4.1/24 interface=VLAN4 network=192.168.4.0
add address=192.168.5.1/24 interface=VLAN5-kids network=192.168.5.0
add address=192.168.6.1/24 interface=VLAN6 network=192.168.6.0
/ip dhcp-server network
add address=192.168.2.0/24 dns-server=192.168.2.1 gateway=192.168.2.1
add address=192.168.3.0/24 dns-server=192.168.3.1 gateway=192.168.3.1
add address=192.168.4.0/24 dns-server=192.168.4.1 gateway=192.168.4.1
add address=192.168.6.0/24 dns-server=192.168.6.1 gateway=192.168.6.1
add address=192.168.5.0/24 dns-server=192.168.5.1 gateway=192.168.5.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1
/ip firewall address-list
add address=192.168.2.0/24 list=“LAN”
add address=192.168.3.0/24 list=“LAN”
add address=192.168.4.0/24 list=“LAN”
add address=192.168.6.0/24 list=“LAN”
add address=192.168.5.0/24 list=“Guest”
add address=xx.xx.xx.xx list=WAN
/ip firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“Block Guest From LAN” in-interface=VLAN5-Kids out-interface-list=LAN
add action=accept chain=forward comment=“Allow Guest to Internet” in-interface=VLAN5-Kids out-interface-list=!LAN
add action=drop chain=input comment=“defconf: drop all not coming from LAN” in-interface-list=!LAN
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=forward comment=“defconf: accept in ipsec policy” ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy” ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=drop chain=input comment=“Drop if DNS Query Coming From Internet” in-interface=eth1-WAN protocol=tcp src-port=53
add action=drop chain=input in-interface=eth1-WAN protocol=udp src-port=53
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=mark-connection chain=prerouting comment=“Mark connections for hairpin NAT” dst-address-list=WAN new-connection-mark=“Hairpin NAT” passthrough=yes src-address-list=“Internal LAN”
/ip firewall nat
add action=masquerade chain=srcnat comment=“Hairpin NAT)” connection-mark=“Hairpin NAT”
add action=masquerade chain=srcnat comment=“NAT to Internet” out-interface-list=WAN
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=xx.xx.xx.xx pref-src=“” routing-table=main scope=30 suppress-hw-offload=no target-scope=10 vrf-interface=eth1-WAN