Hi,
I have configured my new HAP AC2 and it’s fantastic.
Looking for some help with a review of my Firewall rules please?
The problem I am having is that I see a lot of blocks from my Xfinity Cable internet connection on ether1 and I’m wondering how do I fix this?
These are not IP Addresses on my network, they appear to be bridging in from my Xfinity connection, which is a Motorola Modem connection to the HAP AC2 on port ether1.
04:46:53 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (RST), 108.177.111.138:443->76.25.57.137:62661, len 40
04:47:22 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (RST), 45.135.232.39:47625->76.25.57.137:1522, len 40
04:47:53 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (ACK,FIN,PSH), 17.125.250.130:443->76.25.57.137:58857, len 83
04:47:55 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (RST), 193.27.228.172:53295->76.25.57.137:17223, len 40
04:48:02 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (RST), 45.129.33.57:55506->76.25.57.137:7769, len 40
04:48:30 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (ACK,FIN,PSH), 17.125.250.130:443->76.25.57.137:58857, len 83
04:48:42 firewall,info !public_from_LAN forward: in:bridge out:ether1, src-mac bc:a8:a6:72:9d:72, proto UDP, 192.168.1.250:60112->172.29.0.1:53, len 138
04:48:42 firewall,info Invalid Input Chain FW Rule #2 : in:ether1 out:(unknown 0), src-mac 00:01:5c:74:96:46, proto TCP (RST), 45.129.33.24:53437->76.25.57.137:20713, len 40
04:48:47 firewall,info !public_from_LAN forward: in:bridge out:ether1, src-mac bc:a8:a6:72:9d:72, proto UDP, 192.168.1.250:60112->172.29.0.1:53, len 138
Here are the rules
/ip firewall address-list
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment=“6to4 relay Anycast [RFC 3068]” list=not_in_internet
/ip firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid log=yes log-prefix=“Invalid Input Chain FW Rule #2”
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp src-address=192.168.1.0/24
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
add action=drop chain=input comment=“defconf: drop all not coming from LAN” in-interface-list=!LAN src-address=192.168.1.0/24
add action=accept chain=forward comment=“defconf: accept in ipsec policy” ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy” ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid log=yes log-prefix=“Invalid Input Chain FW Rule #10”
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=fasttrack-connection chain=forward comment=“Darren added fastrack DNS rule - 10/17” dst-port=53 protocol=tcp
add action=fasttrack-connection chain=forward comment=“Darren added fastrack DNS UDP 10/17” dst-port=53 protocol=udp
add action=drop chain=forward comment=“Drop incoming from internet which is not public IP” in-interface=ether1 log=yes log-prefix=!public src-address-list=not_in_internet
add action=drop chain=forward comment=“Drop tries to reach not public addresses from LAN” dst-address-list=not_in_internet in-interface=bridge log=yes log-prefix=!public_from_LAN out-interface=!bridge
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade” ipsec-policy=out,none out-interface-list=WAN
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
Thank you for any help