Router OS v 7.11.2
LTE6 version: R11e-LTE6_V036
Failure to connect to Winbox after disable then enable firewall in Quick Set, can be reproduced by:
- Reset LHG to defaults
- Connect to Winbox OK
- No WAN IP at this stage (0.0.0.0)
- Disable Firewall in Quick Set
- Connect to Winbox OK
- Enable firewall
- Restart Winbox
- Fail to connect, also no neighbour discovery
I’ve noted the FW rules are not re-created equally between the initial default rules and when the FW button is disabled then re-enabled. Not a FW rule guru by any imagination, but suspect due to the significant differences something is causing the issue.
TBH quite frustrating as a newcomer, but finally tracked it down.
FW rules from default config:
# 2023-11-03 17:04:57 by RouterOS 7.11.2
# software id =
#
# model = RBLHGR
# serial number =
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
And these after the FW feature is disabled, then re-enabled from Quick set:
# 2023-11-03 17:10:29 by RouterOS 7.11.2
# software id =
#
# model = RBLHGR
# serial number =
/ip firewall filter
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=input protocol=icmp
add action=accept chain=input connection-state=established
add action=accept chain=input connection-state=related
add action=drop chain=input in-interface-list=!LAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
Cheers
Lea