Ros are used in Input chain, Forward and output chain.
Input and Forward circuits are used everywhere, but very rarely anyone uses an “Output” circuit.
Is a firewall enough if I use Input and Forward chain? If we look at the Mikrotik wiki - wiki.mikrotik.com/wiki/Manual:Packet_Flow, we see the sequence - ‘’ prerouting, input, forward, output and postrouting. I read in the forums that the output traffic can be “intercepted” and it is not safe. I don’t know if it is, but I’ve been using this output circuit for a long time. Maybe I don’t understand? What is your experience?
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop \
comment="drop ssh brute forcers" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist \
address-list-timeout=10d comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_stage2 action=add-src-to-address-list address-list=ssh_stage3 \
address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage1 \
action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new action=add-src-to-address-list \
address-list=ssh_stage1 address-list-timeout=1m comment="" disabled=no
add action=accept chain=input comment=L2TP connection-state=new dst-port=\
500,1701,4500 in-interface=WAN protocol=udp
add action=accept chain=input comment="IKE IPSec" protocol=ipsec-esp
add action=accept chain=input comment="Allow access to router from known network" in-interface-list=!WAN \
src-address=192.168.88.0/24
add action=drop chain=input comment="Drop " in-interface-list=!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=\
add action=accept chain=forward comment="Allow Pings" protocol=icmp
add action=accept chain=forward comment="Accept from local to internet" in-interface-list=!WAN \
out-interface-list=WAN
add action=accept chain=output comment=Output out-interface-list=WAN
add action=accept chain=output comment=Output out-interface-list=!WAN
add action=accept chain=output comment=Output
add action=drop chain=forward comment="Drop everything else" connection-nat-state=!dstnat connection-state=new \
in-interface-list=WAN