I was having link down on my wan (public ip) port, but since I add this rule / filter
/ip firewall raw add action=drop chain=prerouting dst-port=53 in-interface=ether8-WAN protocol=udp
no more link downs, but can anyone advise me / audit this ip firewall rules?
I’m a bit affraid to mess up with the rules order…
# 2024-12-16 12:07:53 by RouterOS 7.16.2
# model = RB5009UPr+S+
/ip firewall address-list add address=192.168.100.0/24 list="rede suporte"
/ip firewall address-list add address=172.29.1.0/24 list="rede suporte"
/ip firewall address-list add address=XXXXX.synology.me list="rede suporte"
/ip firewall address-list add address=XXXXXX.duckdns.org list="rede suporte"
/ip firewall address-list add address=172.27.10.0/24 list="rede suporte"
/ip firewall address-list add list=ddos-attackers
/ip firewall address-list add list=ddos-targets
/ip firewall connection tracking set udp-timeout=10s
/ip firewall filter add action=drop chain=forward connection-state=new dst-address=192.168.100.0/24 src-address=192.168.35.0/24
/ip firewall filter add action=accept chain=input comment="allow WireGuard" dst-port=31231 protocol=udp
/ip firewall filter add action=accept chain=input comment="allow WireGuard traffic" src-address=172.27.10.0/24
/ip firewall filter add action=accept chain=input connection-state=established,related
/ip firewall filter add action=accept chain=input src-address-list="rede suporte"
/ip firewall filter add action=accept chain=input limit=50,5:packet protocol=icmp
/ip firewall filter add action=add-src-to-address-list address-list="rede suporte" address-list-timeout=5h chain=input dst-port=1981 protocol=tcp
/ip firewall filter add action=return chain=detect-ddos dst-limit=32,32,src-and-dst-addresses/10s
/ip firewall filter add action=add-dst-to-address-list address-list=ddos-targets address-list-timeout=10m chain=detect-ddos
/ip firewall filter add action=add-src-to-address-list address-list=ddos-attackers address-list-timeout=10m chain=detect-ddos
/ip firewall filter add action=jump chain=input comment="Policy 3" jump-target=syn-flood protocol=tcp tcp-flags=syn
/ip firewall filter add chain=syn-flood limit=100,5
/ip firewall filter add action=drop chain=syn-flood
/ip firewall filter add action=drop chain=input
/ip firewall nat add action=masquerade chain=srcnat out-interface=ether8-WAN
/ip firewall raw add action=drop chain=prerouting dst-port=53 in-interface=ether8-WAN protocol=udp
/ip firewall raw add action=drop chain=prerouting dst-address-list=ddos-targets src-address-list=ddos-attackers
/ip firewall service-port set ftp disabled=yes