There are my firewall rules:
/ip firewall filter
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=4w2d chain=input comment="Port scanners to list " protocol=tcp \
psd=21,3s,3,1
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=4w2d chain=input comment="NMAP FIN Stealth scan" protocol=tcp \
tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment="dropping port scanner" src-address-list=port_scanners
add action=tarpit chain=input comment="suppress DoS attack" connection-limit=3,32 protocol=tcp src-address-list=black_list
add action=add-src-to-address-list address-list=black_list address-list-timeout=1d chain=input comment=\
"detect DoS attack(10 connections/ip from internet)" connection-limit=10,32 in-interface=ether1 protocol=tcp
add action=add-src-to-address-list address-list=black_list address-list-timeout=1d chain=input comment="DOS attack protection(50 connections/ip)" \
connection-limit=50,32 protocol=tcp
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 protocol=tcp src-address-list=ssh_blacklist
add action=drop chain=forward comment="drop ssh brute downstream" dst-port=22 protocol=tcp src-address-list=ssh_blacklist
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=input comment="defconf: accept established,related, untracked" connection-state=established,related,untracked in-interface=\
ether1
add action=accept chain=input connection-state="" dst-port=80,5000,5001 protocol=tcp
add action=accept chain=input comment=SSH dst-port=26 in-interface-list=WAN protocol=tcp
add action=accept chain=input comment=DNS dst-port=53 in-interface-list=LAN protocol=udp
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=\
WAN
add action=drop chain=input
/ip firewall nat
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface-list=WAN
add action=netmap chain=dstnat dst-port=80,5000,5001 in-interface-list=WAN protocol=tcp to-addresses=192.168.1.3
add action=dst-nat chain=dstnat disabled=yes dst-port=38008,38443,8008,8443,6690 protocol=tcp to-addresses=192.168.1.3
I assume, that DNS should be available:
add action=accept chain=input comment=DNS dst-port=53 in-interface-list=LAN protocol=udp
DHCP:
add address-pool=dhcp disabled=no interface=bridge name=dhcp
add add-arp=yes address-pool=poolforWIfi disabled=no interface=bGuest name=dhcpWforWifi
/ip dhcp-server lease
add address=192.168.1.2 always-broadcast=yes client-id=1:* comment=PC mac-address=D8* server=dhcp
add address=192.168.1.3 always-broadcast=yes client-id=1:* comment=DS mac-address=00* server=dhcp
add address=192.168.1.4 client-id=1:* comment="phone" mac-address=00* server=dhcp
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=192.168.1.1,8.8.8.8,4.4.4.4 gateway=192.168.1.1 netmask=24 ntp-server=192.168.1.1 wins-server=192.168.1.3
add address=192.168.80.0/24 dns-server=192.168.80.1,8.8.8.8,4.4.4.4 gateway=192.168.80.1 netmask=24 ntp-server=192.168.80.1
What else could I look to?
Yes, I hide my real ip and domain because I don’t want to get addresses grubbed by some bots.