Some adviced me to set a firewall rule that drops and log packages with connections state “invalid”.
It seems logic to me to drop invalid traffic as close as possible to the source which in my case is at the CPE.
Its done at the forward chain.
But now I set same rule in an AP and suddenly I can’t reach my CPE’s anymore by winbox! Huh! Why not?
Since when is my winbox session an ‘invalid state’ connection?
AP has its ethernet and wlan bridged;
0 ;;; jump to forward allow chain
chain=forward action=jump jump-target=forward-allow log=no log-prefix=""
1 ;;; allow new connections
chain=forward-allow action=accept connection-state=new log=no log-prefix=""
2 ;;; allow established connections
chain=forward-allow action=accept connection-state=established log=no log-prefix=""
3 ;;; allow related connections
chain=forward-allow action=accept connection-state=related log=no log-prefix=""
4 X ;;; drop passing through invalid connections and log them
chain=forward action=drop connection-state=invalid out-interface=bridge1 log=yes log-prefix="fwd invalid"
5 ;;; accept established connections
chain=input action=accept connection-state=established log=no log-prefix=""
6 ;;; accept related connections
chain=input action=accept connection-state=related log=no log-prefix=""
7 ;;; allow access to router from known network
chain=input action=accept src-address-list=safe log=no log-prefix=""
8 ;;; drop everything else
chain=input action=drop log=no log-prefix=""
9 ;;; drop invalid outgoing connections and log them
chain=output action=drop connection-state=invalid out-interface=bridge1 log=yes log-prefix="out invalid"
Enable no.4 rule and no more winbox access to CPEs…