Firewall Filter Rules
[admin@MikroTik] > /ip firewall filter print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked log=no log-prefix=“”
2 chain=input action=accept protocol=udp in-interface=ether1 dst-port=1701,500,4500 log=no log-prefix=“”
3 chain=input action=accept protocol=ipsec-esp log=no log-prefix=“”
4 chain=input action=accept protocol=udp dst-port=4500 log=no log-prefix=“”
5 chain=input action=accept protocol=udp dst-port=500 log=no log-prefix=“”
6 chain=input action=accept protocol=udp dst-port=1701 log=no log-prefix=“”
7 ;;; allow l2tp
chain=input action=accept protocol=ipsec-esp log=no log-prefix=“”
8 ;;; bret added
chain=forward action=accept protocol=ipsec-ah log=no log-prefix=“”
9 chain=input action=accept connection-state=established protocol=tcp src-address=vpn-peer-ip(hidden) connection-type=“” log=no
log-prefix=“”
10 chain=forward action=accept protocol=tcp src-address=vpn-peer-ip(hidden) log=no log-prefix=“”
11 13 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid log=no log-prefix=“”
14 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp
15 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
16 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN log=no log-prefix=“”
chain=forward action=accept ipsec-policy=in,ipsec
18 ;;; defconf: accept out ipsec policy
chain=forward action=accept ipsec-policy=out,ipsec
19 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related
20 ;;; defconf: accept established,related, untracked
chain=forward action=accept connection-state=established,related,untracked
21 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid
22 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN