Hi everybody,
I would like to share a very strange behavior of filters rules on my router today (RB2011 - ROS 6.1)
Yesterday evening I was flooded for some times by dns requests. I was out, so I see it on the graphs and from logs…
Today similar things happened, but I was in front of the monitor…
My router has always had filter rules to drop everything is unneeded and I was really surprised to see that the RB2011 was answering to DNS requests coming from internet!!!
Many IPs doing traffic (udp:53) FROM my router!!
I tried many things to understand… Even some change on filters rules, but nothing happened! It seems that the router simply ignore the rules… If I disable “allow remote requests”, of course, outbound traffic stops… But I need it, so, I reboot the router…
Magically, after reboot, the same filters rules that before doesn’t catch udp packets, now works perfect, and my router doesn’t answer to DNS requests anymore… I still see DNS requests through “torch”, but there is no answer from my router!
This is the first time I see this weird behavior on a MikroTik router, so some explanation will be welcome…
We saw exactly the same thing on an RB532 running ROS 6.1. I thought it was a rules issue, but couldn’t find the culprit. Refreshed the rules with a new set, rebooted and the problem was gone… I’m now not sure if a simple reboot would have sufficed.
I had similar problem. Setup is like this: Application in internet sends every few second UDP packet with some data to WAN interface of Mikrotik. Mikrotik contains two NAT rules to dst-nat incoming packet to production and development servers in internal LAN. Only one NAT rule is enabled, so packets are directed to production server. Few days ago I have to test new version of server so I disabled dst-nat rule to production server and enabled dst-nat rule to development server. I have found that packets were still destined to production server. Solution was simple - I had to manually delete appropriate UDP connection in firewall connection list. After this action packet started to flow to development server according to enabled dst-nat rule.
So it seems that UDP connections are somehow resistent to firewall rules changes once they are “established”.
I did not make any other experiments regarding this because my primary goal was to test server.
Thanks for your tip, but I have a “drop all” rule at the bottom of my filters rules and it works perfectly if the RouterOS do its job… as he did after the reboot…