Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 pppoe-out1 1
1 ADC 172.16.100.50/32 81.17.88.25 pppoe-out1 0
2 ADC 192.168.10.0/24 192.168.10.1 bridge1_LAN 0
3 ADC 192.168.11.0/24 192.168.11.1 bridge2_WiFi 0
/ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; AcceptEstablishedRelated
chain=input action=accept connection-state=established,related log=no log-prefix=""
2 ;;; DropInvalid
chain=input action=drop connection-state=invalid log=no log-prefix=""
3 X ;;; AcceptICMP
chain=input action=accept protocol=icmp log=no log-prefix=""
4 ;;; DropAllNotComingFromLAN
chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
5 ;;; DropInvalid
chain=forward action=drop connection-state=invalid log=no log-prefix=""
6 ;;; AcceptEstablishedRelated
chain=forward action=accept connection-state=established,related log=no log-prefix=""
7 ;;; DropIncomingFromInternetWhichNotPublicIP
chain=forward action=drop src-address-list=not_in_internet in-interface=pppoe-out1 log=yes log-prefix="!public"
8 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface=pppoe-out1
9 ;;; Drop incoming packets that are not NATted
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface=pppoe-out1 log=yes log-prefix="!NAT"
10 ;;; AcceptInIPSECpolicy
chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec
11 ;;; AcceptOutIPSECpolicy
chain=forward action=accept log=no log-prefix="" ipsec-policy=out,ipsec
12 ;;; Fasttrack
chain=forward action=fasttrack-connection connection-state=established,related log=no log-prefix=""
13 ;;; AllowAccessToRouterFromBridge1
chain=input action=accept src-address-list=allowed_to_router log=no log-prefix=""
14 ;;; DropAllOtherTrafficToRouter
chain=input action=drop log=no log-prefix=""
/ip firewall address-list print
allowed_to_router 192.168.10.1-192.168.10.254
not_in_internet- lists from the manual for securing your router