You are absolutely correct, "dropping port scanners" worked only for computers in LAN, it did not function on ip scanners outside my netwrok. Changing rule order solved this problem.
I also added missing "drop invalid connections" rule, have no idea how it got deleted, probably I was messing with some configuration and accidentally removed it.. 
Network I want to setup is fairly simple, here is the structure:

basic idea is to have different IP address pools for VPN, Local and DMZ networks. I should have access to DMZ and VPN from Local network but not the other way around. I'm still struggling to set up a DMZ so the work is still in progress.
following information was returned using "/ip firewall filter print file=filter" command:
feb/17/2013 21:57:28 by RouterOS 5.16
software id = 12YS-YBRY
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; default configuration
chain=input action=accept protocol=icmp
1 ;;; default configuration
chain=input action=accept connection-state=related
2 ;;; Drop invalid connections
chain=input action=drop connection-state=invalid
3 ;;; default configuration
chain=input action=accept connection-state=established
4 ;;; Port scanners to list
chain=input action=add-src-to-address-list protocol=tcp psd=21,3s,3,1
address-list=port scanners address-list-timeout=2w
5 ;;; NMAP FIN Stealth scan
chain=input action=add-src-to-address-list
tcp-flags=fin,!syn,!rst,!psh,!ack,!urg protocol=tcp
address-list=port scanners address-list-timeout=2w
6 ;;; SYN/FIN scan
chain=input action=add-src-to-address-list tcp-flags=fin,syn
protocol=tcp address-list=port scanners address-list-timeout=2w
7 ;;; SYN/RST scan
chain=input action=add-src-to-address-list tcp-flags=syn,rst
protocol=tcp address-list=port scanners address-list-timeout=2w
8 ;;; FIN/PSH/URG scan
chain=input action=add-src-to-address-list
tcp-flags=fin,psh,urg,!syn,!rst,!ack protocol=tcp
address-list=port scanners address-list-timeout=2w
9 ;;; ALL/ALL scan
chain=input action=add-src-to-address-list
tcp-flags=fin,syn,rst,psh,ack,urg protocol=tcp
address-list=port scanners address-list-timeout=2w
10 ;;; NMAP NULL scan
chain=input action=add-src-to-address-list
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg protocol=tcp
address-list=port scanners address-list-timeout=2w
11 ;;; dropping port scanners
chain=input action=drop src-address-list=port scanners
12 ;;; VPN GRE protocol
chain=input action=accept protocol=gre
13 ;;; PPTP port
chain=input action=accept protocol=tcp dst-port=1723
14 chain=input action=accept protocol=tcp dst-port=21
15 ;;; default configuration
chain=input action=drop in-interface=ether1-gateway
16 ;;; Drop invalid connections
chain=input action=drop connection-state=invalid