Hello,
I’m trying to make my system more secure. Wanted to block one ip from talking to other devices in the local network. Tried first to block just two ip’s:
/ip firewall filter add chain=forward action=drop src-address=192.168.88.87 dst-address=192.168.88.86
/ip firewall filter add chain=forward action=drop src-address=192.168.88.86 dst-address=192.168.88.87
Still, when executing a ping from 192.168.88.86 to .192.168.88.87 it goes through. Is there any reason that the rule does not work? (Tried it in safe mode)
Here is my full configuration just in case (without the two rules above).
# sep/29/2021 13:05:01 by RouterOS 6.47.10
# software id = RKPD-G2FL
#
# model = RB4011iGS+
# serial number = F0380E36CDBF
/interface bridge
add admin-mac=2C:C8:1B:46:39:96 auto-mac=no comment=defconf name=bridge
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 \
use-peer-dns=yes user=xxxxxxx@xxx.com
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=none
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=ether2 network=\
192.168.88.0
/ip arp
add address=192.168.88.103 interface=bridge mac-address=3C:78:0E:59:5C:BA
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server lease
add address=192.168.88.111 client-id=1:a0:8c:fd:d8:c:1f mac-address=\
A0:8C:FD:D8:0C:1F server=defconf
add address=dhcp mac-address=2C:41:78:4F:BB:6D server=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=forward dst-address=192.168.88.102 protocol=rdp
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-port=774 in-interface=pppoe-out1 \
protocol=tcp src-port="" to-addresses=192.168.88.102 to-ports=3389
add action=dst-nat chain=dstnat dst-port=776 protocol=tcp to-addresses=\
192.168.88.102 to-ports=776
add action=dst-nat chain=dstnat dst-port=775 protocol=tcp to-addresses=\
192.168.88.249 to-ports=5601
add action=masquerade chain=srcnat src-address=192.168.88.102
add action=masquerade chain=srcnat src-address=192.168.88.249
add action=dst-nat chain=dstnat dst-port=774 in-interface=pppoe-out1 \
protocol=udp to-addresses=192.168.88.102 to-ports=3389
add action=dst-nat chain=dstnat disabled=yes dst-port=443 in-interface=\
pppoe-out1 protocol=tcp to-addresses=192.168.88.87 to-ports=443
add action=dst-nat chain=dstnat disabled=yes dst-port=443 in-interface=\
pppoe-out1 protocol=tcp to-addresses=192.168.88.87 to-ports=443
add action=dst-nat chain=dstnat disabled=yes dst-port=443 in-interface=\
pppoe-out1 protocol=tcp to-addresses=192.168.88.87 to-ports=444
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set sip disabled=yes
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.88.0/24
set ssh disabled=yes
set api disabled=yes
set winbox address=192.168.88.0/24
set api-ssl disabled=yes
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Thanks for Any hint!