Firewall settings - trying to copy from MT demorouter

When setting up a firewall I thought I’d copy the settings from the MT demo router at demo2.mt.lv.
But as can be seen I get an error message when running the “ip firewall export” command. Why is that? Am I missing parts of the firewall when exporting?

[demo@demo2.mt.lv] > ip firewall export
# jul/31/2007 10:15:46 by RouterOS 3.0rc1
# software id = X9V6-YNT
#
#error exporting //ip firewall calea 
/ip firewall connection tracking 
set enabled=yes generic-timeout=10m icmp-timeout=10s tcp-close-timeout=10s tcp-close-wait-timeout=10s \
    tcp-established-timeout=1d tcp-fin-wait-timeout=10s tcp-last-ack-timeout=10s tcp-syn-received-timeout=5s \
    tcp-syn-sent-timeout=5s tcp-syncookie=no tcp-time-wait-timeout=10s udp-stream-timeout=3m udp-timeout=10s 
.
.
.

As far as I can see I get all the firewall settings visible in Winbox this way so what does the error message mean?
And what is this “Calea” thing?

you get this error because calea package is not enabled, so exporter can’t export calea firewall settings.
This isn’t anything bad because all other rules will be exported correctly.

And calea is??

Another question:
I can see that input and forward chains jump to virus chain.
But there is no return statement at the end of virus chain so how does it return to caller for packets that does not match any of the virus tests?

I post entire dump here:

[demo@demo2.mt.lv] > ip firewall export 
# jul/31/2007 12:28:46 by RouterOS 3.0rc1
# software id = X9V6-YNT
#
#error exporting //ip firewall calea 
/ip firewall connection tracking 
set enabled=yes generic-timeout=10m icmp-timeout=10s tcp-close-timeout=10s tcp-close-wait-timeout=10s \
    tcp-established-timeout=1d tcp-fin-wait-timeout=10s tcp-last-ack-timeout=10s tcp-syn-received-timeout=5s \
    tcp-syn-sent-timeout=5s tcp-syncookie=no tcp-time-wait-timeout=10s udp-stream-timeout=3m udp-timeout=10s 
/ip firewall filter 
add action=accept chain=input comment="Established connections" connection-state=established disabled=no 
add action=accept chain=input comment="Related connections" connection-state=related disabled=no 
add action=log chain=input comment="Log  invalid connections" connection-state=invalid disabled=no log-prefix="INVALID" 
add action=drop chain=input comment="Drop invalid connections" connection-state=invalid disabled=no 
add action=jump chain=input comment="!!! Check for well-known viruses !!!" disabled=no jump-target=virus 
add action=accept chain=input comment="UDP" disabled=no protocol=udp 
add action=accept chain=input comment="ICMP" disabled=no protocol=icmp 
add action=accept chain=input comment="Allow PPTP" disabled=no dst-port=1723 protocol=tcp 
add action=accept chain=input comment="Allow PPTP" disabled=no protocol=gre 
add action=accept chain=input comment="From Mikrotikls" disabled=no src-address=159.148.147.192/28 
add action=accept chain=input comment="From Mikrotikls" disabled=no src-address=159.148.172.192/28 
add action=accept chain=input comment="From local net" disabled=no src-address=10.0.0.0/8 
add action=accept chain=input comment="SSH for demo  purposes" disabled=no dst-port=22 protocol=tcp 
add action=accept chain=input comment="Telnet for  demo purposes" disabled=no dst-port=23 protocol=tcp 
add action=accept chain=input comment="http for demo  purposes" disabled=no dst-port=80 protocol=tcp 
add action=accept chain=input comment="winbox for  demo purposes" disabled=no dst-port=8291 protocol=tcp 
add action=log chain=input comment="Log everything else" disabled=no log-prefix="DROP" 
add action=drop chain=input comment="Drop everything else" disabled=no 
add action=accept chain=forward comment="Established connections" connection-state=established disabled=no 
add action=accept chain=forward comment="Related connections" connection-state=related disabled=no 
add action=log chain=forward comment="Log  invalid connections" connection-state=invalid disabled=no \
    log-prefix="INVALID" 
add action=drop chain=forward comment="Drop invalid connections" connection-state=invalid disabled=no 
add action=jump chain=forward comment="!!! Check for well-known viruses !!!" disabled=no jump-target=virus 
add action=accept chain=forward comment="UDP" disabled=no protocol=udp 
add action=accept chain=forward comment="ICMP" disabled=no protocol=icmp 
add action=accept chain=forward comment="From Mikrotikls" disabled=no src-address=159.148.147.192/28 
add action=accept chain=forward comment="From Mikrotikls" disabled=no src-address=159.148.172.192/28 
add action=accept chain=forward comment="From local net" disabled=no src-address=10.0.0.0/8 
add action=log chain=forward comment="Log everything else" disabled=no log-prefix="DROP" 
add action=drop chain=forward comment="Drop everything else" disabled=no 
add action=drop chain=virus comment="Drop Blaster Worm" disabled=no dst-port=135-139 protocol=tcp 
add action=drop chain=virus comment="Drop Messenger Worm" disabled=no dst-port=135-139 protocol=udp 
add action=drop chain=virus comment="Drop Blaster Worm" disabled=no dst-port=445 protocol=tcp 
add action=drop chain=virus comment="Drop Blaster Worm" disabled=no dst-port=445 protocol=udp 
add action=drop chain=virus comment="________" disabled=no dst-port=593 protocol=tcp 
add action=drop chain=virus comment="________" disabled=no dst-port=1024-1030 protocol=tcp 
add action=drop chain=virus comment="Drop MyDoom" disabled=no dst-port=1080 protocol=tcp 
add action=drop chain=virus comment="________" disabled=no dst-port=1214 protocol=tcp 
add action=drop chain=virus comment="ndm requester" disabled=no dst-port=1363 protocol=tcp 
add action=drop chain=virus comment="ndm server" disabled=no dst-port=1364 protocol=tcp 
add action=drop chain=virus comment="screen cast" disabled=no dst-port=1368 protocol=tcp 
add action=drop chain=virus comment="hromgrafx" disabled=no dst-port=1373 protocol=tcp 
add action=drop chain=virus comment="cichlid" disabled=no dst-port=1377 protocol=tcp 
add action=drop chain=virus comment="Worm" disabled=no dst-port=1433-1434 protocol=tcp 
add action=drop chain=virus comment="Bagle Virus" disabled=no dst-port=2745 protocol=tcp 
add action=drop chain=virus comment="Drop Dumaru.Y" disabled=no dst-port=2283 protocol=tcp 
add action=drop chain=virus comment="Drop Beagle" disabled=no dst-port=2535 protocol=tcp 
add action=drop chain=virus comment="Drop Beagle.C-K" disabled=no dst-port=2745 protocol=tcp 
add action=drop chain=virus comment="Drop MyDoom" disabled=no dst-port=3127-3128 protocol=tcp 
add action=drop chain=virus comment="Drop Backdoor OptixPro" disabled=no dst-port=3410 protocol=tcp 
add action=drop chain=virus comment="Worm" disabled=no dst-port=4444 protocol=tcp 
add action=drop chain=virus comment="Worm" disabled=no dst-port=4444 protocol=udp 
add action=drop chain=virus comment="Drop Sasser" disabled=no dst-port=5554 protocol=tcp 
add action=drop chain=virus comment="Drop Beagle.B" disabled=no dst-port=8866 protocol=tcp 
add action=drop chain=virus comment="Drop Dabber.A-B" disabled=no dst-port=9898 protocol=tcp 
add action=drop chain=virus comment="Drop Dumaru.Y" disabled=no dst-port=10000 protocol=tcp 
add action=drop chain=virus comment="Drop MyDoom.B" disabled=no dst-port=10080 protocol=tcp 
add action=drop chain=virus comment="Drop NetBus" disabled=no dst-port=12345 protocol=tcp 
add action=drop chain=virus comment="Drop Kuang2" disabled=no dst-port=17300 protocol=tcp 
add action=drop chain=virus comment="Drop SubSeven" disabled=no dst-port=27374 protocol=tcp 
add action=drop chain=virus comment="Drop PhatBot, Agobot, Gaobot" disabled=no dst-port=65506 protocol=tcp 
add action=accept chain=output comment="" connection-state=established disabled=no 
add action=accept chain=output comment="" connection-state=related disabled=no 
add action=accept chain=output comment="" disabled=no dst-port=123 protocol=udp 
add action=accept chain=output comment="To mailgw.mikrotik.com" disabled=no dst-address=159.148.147.199 dst-port=25 \
    protocol=tcp 
add action=log chain=output comment="" disabled=yes log-prefix="DROP" 
add action=drop chain=output comment="" disabled=no 
/ip firewall service-port 
set ftp disabled=no ports=21 
set tftp disabled=no ports=69 
set irc disabled=no ports=6667 
set h323 disabled=no 
set sip disabled=no 
set pptp disabled=no 
[demo@demo2.mt.lv] >

BTW, is it possible to store port numbers in a list and use it for one-line matching (one for UDP and one for TCP), instead of one line for each proto/port?

if it didn’t match any firewall rule in virus chain it automatically jumps back to forward and goes through rules after jump rule.

Calea->
http://wiki.mikrotik.com/wiki/Calea