I am seeking feedback and suggestions to improve my current MikroTik firewall filter rules setup. Below are the rules I have configured on my router according AI suggestion:
/ip/firewall/filter/print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; defconf: accept established, related, untracked
chain=input action=accept connection-state=established,related,untracked
2 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid
3 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp
4 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
5 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN
6 ;;; defconf: accept in IPsec policy
chain=forward action=accept ipsec-policy=in,ipsec
7 ;;; defconf: accept out IPsec policy
chain=forward action=accept ipsec-policy=out,ipsec
8 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related
9 ;;; defconf: accept established, related, untracked
chain=forward action=accept connection-state=established,related,untracked
10 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid
11 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN
12 ;;; accept IGMP traffic for multicast
chain=input action=accept protocol=igmp
13 ;;; accept IGMP traffic for multicast forwarding
chain=forward action=accept protocol=igmp
14 ;;; accept UDP traffic for multicast
chain=forward action=accept protocol=udp dst-address=224.0.0.0/4
15 ;;; accept UDP traffic for mDNS (Multicast DNS)
chain=input action=accept protocol=udp dst-port=5353
16 ;;; accept UDP traffic for mDNS (Multicast DNS) forwarding
chain=forward action=accept protocol=udp dst-port=5353
- My home network has a Google Chromecast, which needs to communicate smoothly within the LAN.
- I aim to balance security and functionality, ensuring essential services work without exposing the network to unnecessary risks.
I appreciate your time and expertise in reviewing my setup. Any advice or recommendations to improve these firewall rules would be greatly appreciated.