Hey Everyone,
I am just looking for a second pair of eyes to make sure I didn't make a huge blunder or missed something important in regards to my FW ruleset
The goal is to block as much as possible and only open what I need to grant access for.
/ip firewall filter
add action=accept chain=input comment=
"defconf: accept established,related,untracked" connection-state=
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=
invalid
add action=accept chain=input comment="defconf: accept ICMP" disabled=yes
protocol=icmp
add action=accept chain=input comment="admin to Router" connection-state=""
dst-address-list=router in-interface-list=LAN src-address-list=
"admin access"
add action=accept chain=input dst-address-list=router_bgp dst-port=179
in-interface-list=LAN protocol=tcp src-address-list=K8-BGP
add action=drop chain=input
add action=accept chain=forward comment="defconf: accept in ipsec policy"
disabled=yes ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy"
disabled=yes ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack"
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
"defconf: accept established, related, untracked" connection-state=
established,related,untracked
add action=drop chain=forward comment="Drop invalid" connection-state=invalid
add action=accept chain=forward comment="admin to management"
dst-address-list="infrastructure and management" src-address-list=
"admin access"
add action=accept chain=forward comment=
"Allow vlans to reach udp port 53 on local dns" dst-address-list=pi-hole
dst-port=53 protocol=udp src-address-list=local_networks
add action=accept chain=forward comment=
"Allow vlans to reach tcp port 53 on local dns" dst-address-list=pi-hole
dst-port=53 protocol=tcp src-address-list=local_networks
add action=accept chain=forward comment=
"Allow Internal DNS server to querry external DNS 53/tcp" dst-port=53
protocol=udp src-address-list=bind9
add action=accept chain=forward comment=
"Allow Internal DNS server to querry external DNS 53/udp" dst-port=53
protocol=tcp src-address-list=bind9
add action=drop chain=forward comment=
"Drop all other DNS requests to external network" dst-port=53 protocol=tcp
add action=drop chain=forward comment=
"Drop all other DNS requests to external network" dst-port=53 protocol=udp
add action=accept chain=forward comment="Allow Data to access HomeAssistant"
dst-address-list=homeassistant src-address-list=data
add action=accept chain=forward comment="Data to SMB share on Cortex"
dst-address-list=cortex dst-port=445 protocol=tcp src-address-list=data
add action=accept chain=forward comment="allow LAN to WAN traffic"
connection-state="" in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="Ha -> K8KVM icmp check"
connection-state=new dst-address=xx.xx.xx.xx/31 protocol=icmp
src-address=xx.xx.xx.xx
add action=accept chain=forward comment="nginx test" dst-address=xx.xx.xx.xx
src-address-list=data
add action=drop chain=forward comment="drop all else"
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=WAN
/ip firewall service-port
set ftp disabled=yes
set pptp disabled=yes
Thanks for any input that will make my nw and the internet safer!
Br
L