Nothing wrong with using the MT ones, I prefer a little simpler.
This is from that link but modified…
INPUT CHAIN
/ip firewall filter
add action=accept chain=input connection-state=established,related
add action=drop chain=input connection-state=invalid
add action=accept chain=input comment=protocol=icmp
add action=accept chain=input comment=“Allow ADMIN to Router” src-address-list=adminaccess &&&&
**add optional *****
add action=drop chain=input comment=“Drop All Else”
&&&&& /ip firewall address-list (to allow admin access to config the router from fixed static IPs for example on any subnet).
add address=admin-desktop_IP list=adminaccess
add address=admin-laptop_IP list=adminaccess
add address=admin-ipad_IP list=adminaccess
***** optiona**l: Provide access to lan users ONLY for any services they require that the router provides (examples):
add action=accept chain=input comment=“Allow LAN DNS queries - TCP”
connection-state=new dst-port=53 in-interface-list=LAN protocol=tcp
add action=accept chain=input comment=“Allow LAN DNS queries-UDP”
connection-state=new dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input comment=“Allow NTP service” connection-state=
new dst-port=123 in-interface-list=LAN protocol=udp src-address-list=
NTPserver
Discussion: The last rule ensures that no other traffic is permitted that wasnt explicitly allowed above, which includes for example any wan to router traffic. Ensure that the admin access rules are in place before putting in the last rule otherwise one will lock themselves out of the router.
FORWARD CHAIN
Optional 1 +++
add action=fasttrack-connection chain=forward connection-state=established,related
add action=accept chain=forward connection-state=established,related
add action=drop chain=forward connection-state=invalid
Optional 2 ###
Optional 3 ===
add action=drop chain=forward comment=“drop all else”
+++ If you do use IPSEC you will need…
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
### This is where you place traffic you wish to allow examples:
(a) allow lan to wan traffic (by subnet, by vlan, by interface etc.)
add action=accept chain=forward comment=“ENABLE HomeLAN to WAN”
in-interface=Home-LAN_V12 out-interface-list=WAN src-address=192.168.0.0/24
(b) allow subnet A to access shared printerS on subnet B
add action=accept chain=forward comment="allow VlanA Users_TO_Printers
dst-address-list=House_Printers in-interface=VLANA src-address=192.168.0.0/24
=== If you need port forwarding for any reason you can add this rule.
add action=accept chain=forward comment=“Allow Port Forwarding” connection-nat-state=dstnat
connection-state=new in-interface-list=WAN
Discussion: The last rule automatically blocks all traffic not allowed above including WAN to LAN traffic and it blocks any subnet to subnet or vlan to vlan traffic at Layer 3. For me done, no other rules are needed in the standard security config. Most other stuff is bloatware.