Please help me to find what I’m doing wrong with ipv6 firewall configuration.
After nmap scanning ipv6 address I have still open some ports like : 111,139,161,445,548,587
In my firewall filter rules I have drop for this port but this is not working and after nmap scanning I dont see on this 0) rule any traffic.
you are applying drop action on the INPUT chain, so traffic going to the router itself and you are allowing all the traffic to go to anything behind the router. Looking at the ports you are scanning they look like services you would run on a server, not on the router. What I’m trying to say is: shouldn’t you put drop action on FORWARD chain?
Thank’s for advise. I have few devices behind which have own ipv6 address.
For this ipv6 addresses I need to limit connections on ports.
For example limit ports to one of my ipv6 device 2001:…:aaaa 111,139,161,445,548,587
You have lots of things in your firewall that do not make sense at all…
Do you understand how the firewall rules work? Please read http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/Filter
(it is for IPv4 but the principles are the same and the IPv6 manual is severely lacking)