Yeah, sorry, my brain was only half working, export never includes dynamic stuff. The print thing sounds like a bug you should report to MikroTik support.
See their disclaimer from the top of the front page - “Notice: For support from Mikrotik staff, write to support@mikrotik.com - Mikrotik does not generally offer support on the forum, this is a user forum” Also see - http://www.mikrotik.com/support.html
I’ve always been a bit surprised that they don’t have some kind of web based bug reporting/tracking system for users, but email seems to be the only way.
I have sent the following to support@mikrotik.com and from which I obtained Ticket#2012020566000092:
Subject: RouterOS v5.12 Bug Report: TCP Flags and Hotspot firewall settings cannot be viewed from CLI.
This mail is to inform you of a bug in RouterOS v5.12. I have not used any previous version and so I am unable to say whether it exists also in those versions.
I have an RB750GL with ROS v5.12.
One other forum poster has confirmed that he too has the same issue.
Description
It is not possibile from the cli to print or export the firewall settings for Advanced: TCP flags and Extra: Hotspot. Filter, NAT, and Mangle are all impacted. Other settings may also be affected.
This means that verification of the firewall rules can only be done via Winbox and clicking on each and every rule and then on each tab within the rule.
Evidence
The bug can be reproduced by creating manually via Winbox a Firewall rule of filter, NAT or mangle and, where applicable, setting the following:
Advanced: TCP flags
Extra: Hotspot
These settings are can not be shown from the command line when using export, print detail, print all, etc
I first noticed the problem by examining the dynamic firewall rules created by the Hotspot wizard. Without seeing the Hotspot settings they are incomprehensible. Here are the first few lines:
[admin@MikroTik] /ip firewall filter> print dynamic
Flags: X - disabled, I - invalid, D - dynamic
0 D chain=forward action=jump jump-target=hs-unauth
1 D chain=forward action=jump jump-target=hs-unauth-to
From /ip firewall filter print dynamic command, you can get something like this (comments follow after each of the rules):
0 D chain=forward action=jump jump-target=hs-unauth hotspot=from-client,!auth