Model Switch Chip CPU Wireless SFP+ port AccessControlList Jumbo Frame(Bytes)
CRS125-24G-1S QCA-8513L 600MHz - - - 4064
>
See also https://mum.mikrotik.com/presentations/EU17/presentation_4068_1491395690.pdf
Maybe you can use this method instead:
http://forum.mikrotik.com/t/switchport-port-security-maximum-1-for-mikrotik/112862/1
Yes, ACL on the CRS125 not possible.
Method /interface bridge filter add action=drop chain=input in-interface=ether3 src-mac-address=!D0:BF:9C:9B:70:07/FF:FF:FF:FF:FF:FF does not work.
In order to work, you need to disable hw=yes on the port, but the connection on the port completely disappears. http://forum.mikrotik.com/t/port-security/135169/1
Although this scheme works on CRS326, but not on CRS125.
Help me how to prohibit any traffic on the port other than traffic from the mac 07:07:07:07:07:07, to make it work on CRS125
Did you replace the above MAC address with your 07:07… MAC address?
And is it the ether3 interface that you want to apply this? If it is another interface then of course you have to change “ether3” as well… (in your original posting you used ether4).
Ie.
/interface bridge filter add action=drop chain=input in-interface=ether4 src-mac-address=!07:07:07:07:07:07/FF:FF:FF:FF:FF:FF
And do you have configured these settings → see docs: