The problem is, that traffic to the PC is not matching by firewall (chain input), it’s looks like traffic is bypassing via firewall.
I created rule, which drop all connections to PC but I can still connect via RDP. I can’t see any logs on firewall.
Everything works, when I created drop rules for main IP ( 1.1.1.1 )
Yes, I saw that works but why input chain dosen’t work in the first step ?
I understand that it works:
Traffinc from Internet to 1.1.1.2 —> chain Input → chain forward → dst-nat —> 172.16.1.10
Ok, so, if i want to get access by my main IP (assigned to the router) winbox, ssh, i have to configure ACL on input chain
but If i have NAT forwarding, i have to configure ACL on forward chain. Is it ?
To understand, I made a test and created 2 filter rules:
input chain drop 1.1.1.2
forward chain drop 1.1.1.2
and next, i have configured NAT forwarding from 1.1.1.2 to 172.16.1.10
When NAT forwading was enable, all traffic match to 1.1.1.2, went to forward chain, then drop
When NAT forwading was disable, all traffic match to 1.1.1.2, went to input chain, then drop
I was convinced, that input chain is for all traffic incoming to interface, forward chain is for all traffic between interface inside the router.