You could simply drop the traffic, but the TCP Reset option will immediately dump the client to an error screen, and not just leave the browser retrying the connection over and over.
It sounds like piseth168 wants to filter by originating user as well as destination.
So the answer is half the solution needed, and just needs a src-address or src-address-list which covers the machines that you’re interested in limiting.
This solution just gives you a false sense of security. It’s too easy to circumvent by going to https://facebook.com (because https is encrypted so you can’t read the host headers and it won’t get caught).
The best way to do this with mikrotik is to block based on content to port 53udp (DNS), this way it can’t even look it up. you should also transparently reroute all dns traffic to the mikrotik, so users can’t use their own dns settings and get around it.
Of course, they could edit their host file and still get to facebook. This is one bad limitation of mikrotik that cisco can easily do. Mikrotik can’t firewall based on url, but cisco can. That would be great if it could!!!
Otherwise, it’s impossible to block websites because of the https issue.
That is a HORRIBLE thing to do. You will end up blocking LOTS of other websites! (I just tried it, and several websites that have a facebook button on them would not load, or woud halfway load). Any website that has facebook code built in (“like us on facebook, etc”). Those pages will load until they get to the facebook code, then they will hang while waiting for facebook to build the “like” link.
This is one bad limitation of mikrotik that cisco can easily do. Mikrotik can’t firewall based on url, but cisco can. That would be great if it could!!!
Guys, any news on the topic? Maybe there’s already a Feature Request for the firewall based url content filtering?