All of the offices can communicate with the server and vice versa.
The IT Office can communicate to server and all offices also but I don’t want the Sales Office and Admin to communicate to each other.
Once you have your bridge and vlans, the firewall rules are easy…
For example…
ONE ONLY HAS TO ADD ALLOW RULES HERE ************************* Everything else will be dropped automatically by the last rule.
Order is important within a chain!!
Organized sets of chains, make reading and troubleshooting issues easier!!
/ip firewall filter
{ Input Chain }
(default rules to keep)
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
(user rules)
add action=accept chain=input in-interface-list=LAN
add action=drop chain=input comment=“drop all else” { this rule should the last rule added }
{ Forward Chain }
(default rules to keep)
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
(user rules)
add action=accept chain=forward comment=“internet traffic” in-interface-list=LAN out-interface-list=WAN
*******************************
add action=accept chain=forward comment=“port forwarding” connection-nat-state=dstnat disabled=yes { enable if required }
add action=drop chain=forward comment=“drop all else”