In the firewall the first 5 rules are
#1 input ICMP accept
#2 input established accept
#3 input related accept
#4 input OpenVPN UDP/port accept
#5 input any drop & log
I am getting 100K dropped packets from rule #5 within 12 hours. The majority of them seems to be TCP RST, TCP FIN from NAT transactions destination at my WAN address higher ports(1024+). The source IP addresses looks like CDN nodes. My guess would be the NAT entry has been removed (I can see similar connections to those IP/ports so they are actually legitimate traffic) on RouterOS but the server still thinks they are alive. Is this behavior normal or something is misconfigured?