This is my firewall config:
/ip firewall address-list
add address=192.168.5.0/24 list=management
/ip firewall connection tracking
set udp-timeout=10s
/ip firewall filter
add action=fasttrack-connection chain=forward comment="fasttrack connection" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="fasttrack connection" \
connection-state=established,related
add action=drop chain=forward comment="block nexus 7 internet" disabled=yes \
out-interface=ether1 src-address=192.168.5.45
add action=accept chain=input dst-port=21 protocol=tcp src-address-list=\
management
add action=accept chain=input dst-port=22 protocol=tcp src-address-list=\
management
add action=accept chain=input dst-port=2000 protocol=tcp src-address-list=\
management
add action=accept chain=input dst-port=80 protocol=tcp src-address-list=\
management
add action=accept chain=input dst-port=8291 protocol=tcp src-address-list=\
management
add action=accept chain=input dst-port=8728 protocol=tcp src-address-list=\
management
add action=accept chain=input dst-port=23 protocol=tcp src-address-list=\
management
add action=accept chain=forward comment="nas to maika android stb" disabled=\
yes dst-address=192.168.5.2 src-address=192.168.10.99
add action=accept chain=forward comment="nas to maika android stb" disabled=\
yes dst-address=192.168.10.99 src-address=192.168.5.2
add action=accept chain=forward comment="maika dns pihole" disabled=yes \
dst-address=192.168.5.16 src-address=192.168.10.0/24
add action=accept chain=forward comment="maika dns pihole" disabled=yes \
dst-address=192.168.10.0/24 src-address=192.168.5.16
add action=accept chain=forward comment="otdelqne 5 ot 10 mreja izkluchenia" \
dst-address=192.168.5.0/24 dst-address-list="home trusted" src-address=\
192.168.10.0/24
add action=accept chain=forward comment="otdelqne 10 ot 5 mreja izkluchenia" \
dst-address=192.168.10.0/24 src-address=192.168.5.0/24 src-address-list=\
"home trusted"
add action=accept chain=forward comment="otdelqne 5 ot 20 mreja izkluchenia" \
disabled=yes dst-address=192.168.5.0/24 dst-address-list="home trusted" \
src-address=192.168.20.0/24
add action=accept chain=forward comment="otdelqne 20 ot 5 mreja izkluchenia" \
disabled=yes dst-address=192.168.20.0/24 src-address=192.168.5.0/24 \
src-address-list="home trusted"
add action=accept chain=forward comment="nas fasttack exclude" \
connection-state=established,related disabled=yes dst-address=192.168.5.2
add action=accept chain=forward comment="nas fasttack exclude" disabled=yes \
src-address=192.168.5.2
add action=accept chain=forward comment="guest fasttrack exclude" \
connection-state=established,related dst-address=10.1.10.0/24
add action=accept chain=forward comment="guest fasttrack exclude" \
src-address=10.1.10.0/24
add action=accept chain=forward comment="maika fasttrack exclude" \
connection-state=established,related dst-address=192.168.10.0/24
add action=accept chain=forward comment="maika fasttrack exclude" \
src-address=192.168.10.0/24
add action=accept chain=forward comment="vlan20 fasttrack exclude" \
connection-state=established,related dst-address=192.168.20.0/24
add action=accept chain=forward comment="vlan20 fasttrack exclude" \
src-address=192.168.20.0/24
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment=\
"Port scanners list - exclude sam s10e" protocol=tcp psd=21,3s,3,1 \
src-address=!192.168.5.36
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="Port scanners to list " \
protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment=\
"Add NMAP NULL scan to Port Scanners address list" in-interface=ether1 \
protocol=tcp src-address-list=!allowed_ip tcp-flags=\
!fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP FIN Stealth scan" \
protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan" protocol=tcp \
tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan" protocol=tcp \
tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG scan" protocol=\
tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan" protocol=tcp \
tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL scan" protocol=tcp \
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=forward comment="otdelqne 10.1.10.0 ot 5 mreja" \
dst-address=10.1.10.0/24 src-address=192.168.5.0/24
add action=drop chain=forward comment="otdelqne 10.1.10.0 ot 5 mreja" \
dst-address=192.168.5.0/24 src-address=10.1.10.0/24
add action=drop chain=forward comment="otdelqne 5 ot 10 mreja" dst-address=\
192.168.5.0/24 src-address=192.168.10.0/24
add action=drop chain=forward comment="otdelqne 10 ot 5 mreja" dst-address=\
192.168.10.0/24 src-address=192.168.5.0/24
add action=drop chain=forward comment="otdelqne 5 ot 20 mreja" dst-address=\
192.168.5.0/24 src-address=192.168.20.0/24
add action=drop chain=forward comment="otdelqne 20 ot 5 mreja" dst-address=\
192.168.20.0/24 src-address=192.168.5.0/24
add action=drop chain=forward comment="ps4 update" dst-address-list=blocked
add action=drop chain=input comment="dropping port scanners" \
src-address-list="port scanners"
add action=drop chain=input dst-port=21 protocol=tcp
add action=drop chain=input dst-port=22 protocol=tcp
add action=drop chain=input dst-port=23 protocol=tcp
add action=drop chain=input dst-port=80 protocol=tcp
add action=drop chain=input dst-port=443 protocol=tcp
add action=drop chain=input dst-port=2000 protocol=tcp
add action=drop chain=input dst-port=8291 protocol=tcp
add action=drop chain=input dst-port=8728 protocol=tcp
add action=drop chain=forward comment="BLOCK GoogleADS doubleclick.net-v.2" \
content=doubleclick.net dst-port=80,443 protocol=tcp
add action=drop chain=output comment="BLOCK GoogleADS doubleclick.net-v.2" \
content=doubleclick.net dst-port=80,443 protocol=tcp
add action=drop chain=forward comment="BLOCK GoogleADS ggpht.com-v.2" \
content=ggpht.com dst-port=80,443 protocol=tcp
add action=drop chain=output comment="BLOCK GoogleADS ggpht.com-v.2" content=\
ggpht.com dst-port=80,443 protocol=tcp
add action=drop chain=forward comment="BLOCK YOUTUBE ADS-v.2" content=&ctier \
dst-port=80,443 protocol=tcp
add action=drop chain=output comment="BLOCK YOUTUBE ADS-v.2" content=&ctier \
dst-port=80,443 protocol=tcp
add action=drop chain=forward comment="fasttrack connection" \
connection-state=invalid
add action=drop chain=input comment="Block DdosAtack" dst-port=53 \
in-interface=ether1 protocol=udp
add action=drop chain=input comment="Block DdosAtack" dst-port=53 \
in-interface=ether1 protocol=tcp
add action=jump chain=forward comment="Block DdosAtack" connection-state=new \
disabled=yes jump-target=detect-ddos
add action=return chain=detect-ddos comment="Block DdosAtack" disabled=yes \
dst-limit=32,32,src-and-dst-addresses/10s
add action=add-dst-to-address-list address-list=ddosed address-list-timeout=\
10m chain=detect-ddos comment="Block DdosAtack" disabled=yes
add action=add-src-to-address-list address-list=ddoser address-list-timeout=\
10m chain=detect-ddos comment="Block DdosAtack" disabled=yes
add action=drop chain=forward comment="Block DdosAtack" connection-state=new \
disabled=yes dst-address-list=ddosed src-address-list=ddoser
add action=drop chain=input comment="block gate" disabled=yes src-address=\
91.139.192.1
add action=drop chain=forward comment="block facebook" content=facebook \
disabled=yes dst-port=80,443 protocol=tcp src-address=192.168.5.0/24
add action=drop chain=forward comment="block unknown dhcp i network" \
disabled=yes dst-port=68 protocol=udp src-address=!192.168.5.1 src-port=\
67
/ip firewall mangle
add action=jump chain=forward comment="tcp, mss" disabled=yes jump-target=mss
add action=change-mss chain=mss comment="tcp, mss fixation" disabled=yes \
new-mss=1440 passthrough=yes protocol=tcp tcp-flags=syn tcp-mss=!536-1460
add action=change-mss chain=mss comment="tcp, mss 1440 for mtu 1492" \
disabled=yes new-mss=1440 passthrough=yes protocol=tcp tcp-flags=syn \
tcp-mss=1453-65535
add action=change-mss chain=mss comment="tcp,mss clamp-to-pmtu" disabled=yes \
new-mss=clamp-to-pmtu passthrough=yes protocol=tcp tcp-flags=syn
add action=log chain=prerouting comment="fragmenting iptv loggging" disabled=\
yes fragment=yes log-prefix=mangle-pre-fragment
add action=mark-connection chain=prerouting dst-port=80 new-connection-mark=\
http_conn passthrough=yes protocol=tcp
add action=mark-packet chain=prerouting connection-mark=http_conn \
new-packet-mark=http passthrough=no
add action=mark-connection chain=prerouting new-connection-mark=other_conn \
passthrough=yes
add action=mark-packet chain=prerouting connection-mark=other_conn \
new-packet-mark=other passthrough=no
add action=mark-packet chain=prerouting comment="ms list dst" disabled=yes \
layer7-protocol=*1 new-packet-mark=ms passthrough=no
/ip firewall raw
add action=log chain=prerouting comment="fragmenting iptv loggging" disabled=\
yes fragment=yes log-prefix=raw-fragment
add action=drop chain=prerouting dst-port=53 in-interface=ether1 protocol=tcp
add action=drop chain=prerouting dst-port=53 in-interface=ether1 protocol=udp
/ip firewall service-port
set sip disabled=yes
This 2 rules:
add action=drop chain=forward comment=“otdelqne 10.1.10.0 ot 5 mreja”
dst-address=10.1.10.0/24 src-address=192.168.5.0/24
add action=drop chain=forward comment=“otdelqne 10.1.10.0 ot 5 mreja”
dst-address=192.168.5.0/24 src-address=10.1.10.0/24
Don’t work, i have icmp between host’s in 2 subnets. Please help to solve this.