I have configured an MK device with PCC type Balancer configuration with 4 WAN, I had not noticed that in all the configurations they put, it does not mention or rather I have not seen that they put FILTER rules in the balancers, I understand that if there are no rules in the firewal filter there is no protection to the networks and to the same router, my question would be, in my case, I need to have a firewall + pcc balancer, is it possible?
If so, what would be the basic rules to protect the filter with the balancer and not affect my package markings that I already have?
In my case it is a balancer, I need to have access to my network to some web cameras by port 8080 for example (web) as well as winbox access (winbox api mobile) to some of my wan (wan2) that has public ip.
Do I have to open the ports in the filter as mentioned? or in what way would it be?
If it’s forwarded ports using dstnat, all you need is that rule with connection-nat-state=dstnat. For access to router itself, add accept rules in input chain.
It’s probably not the best idea to allow WinBox access from internet. In theory it should be safe with strong passwords, but there were already some ugly bugs in the past, so the less you open, the better.
And if you decide to use my example, be careful. Before you add the last unconditional drop rule, add unconditional log rule first, make sure that it won’t log anything when you connect to router again, and only then add drop rule, to avoid locking yourself out.
Order of rules matters, they are processed from top to bottom. You added unconditional drop rule in forward chain, but you also have other rules after - no packet will ever reach those.
The same idea (accept established & friends, drop invalid, accept what you want to open, drop the rest) is also valid for input chain. Default action is accept, so now everything you didn’t block is allowed. If you have it enabled, everyone can connect to WinBox, WebFig, etc. It’s not the only way, but wouldn’t it be more clear if nothing would be accessible from internet, except the things you allow? Another popular thing is anti-bruteforce on ssh, but do you need it accessible from internet at all? Maybe you do, but many people don’t, so it’s easier to have it closed completely.
Your chain=virus and chain=Virus (it’s two different chains btw) are useless, because nothing jumps to them.
But none of this blocks access to camera. What exactly happens depends on other rules. If WAN2 is not your primary connection, you need proper mangle rules to send responses back to WAN2, as you can see in PCC example: https://wiki.mikrotik.com/wiki/Manual:PCC
Its explanation is very logical, I will have to accommodate the filter rules with its example and the mangroves with the example of a PCC of Mikrotik’s web.
That’s what happens when people just copy/paste rules and stuff from the web, even the wiki without reading. as one of the correspondents stated, order is important.