What is going on here?

I mean all these connections originating from port 4809?

My guess would be P2P. Do you have access to that machine to check it out?

-Louis

No, it’s a client computer on an open hotspot in a harbour.

My guess is also P2P.
A large number of connections, rather constant use of bandwidth, IP addresses unable to reverse-DNS makes me believe this.

But I have added firewall rules for P2P.
This is my forward chain:

add chain=forward action=log connection-state=invalid log-prefix="INVALID" \
    comment="Log  invalid connections" disabled=no 
add chain=forward action=drop connection-state=invalid comment="Drop invalid \
    connections" disabled=no 
add chain=forward action=accept connection-state=established \
    comment="Established connections" disabled=no 
add chain=forward action=accept connection-state=related comment="Related \
    connections" disabled=no 
add chain=forward action=jump jump-target=virus comment="!!! Check for \
    well-known viruses !!!" disabled=no 
add chain=forward action=log p2p=all-p2p log-prefix="DROP P2P" comment="Log \
    P2P" disabled=no 
add chain=forward action=drop p2p=all-p2p comment="Drop P2P" disabled=no 
add chain=forward action=accept protocol=icmp comment="ICMP" disabled=no 
add chain=forward action=log connection-state=new connection-mark=YouTube \
    log-prefix="*YOUTUBE*" comment="YOUTUBE" disabled=no 
add chain=forward action=jump jump-target=service comment="Check for valid \
    services" disabled=no 
add chain=forward action=log log-prefix="DROP Forward" comment="Log everything \
    else" disabled=no 
add chain=forward action=drop comment="Drop everything else" disabled=no

..and this is my services chain, allowing only specific services:

add chain=service action=accept dst-port=20 protocol=tcp comment="FTP" \
    disabled=no 
add chain=service action=accept dst-port=21 protocol=tcp comment="FTP" \
    disabled=no 
add chain=service action=accept dst-port=22 protocol=tcp comment="SSH,SFTP" \
    disabled=no 
add chain=service action=accept dst-port=23 protocol=tcp comment="TELNET" \
    disabled=no 
add chain=service action=accept dst-port=53 protocol=tcp comment="DNS" \
    disabled=no 
add chain=service action=accept dst-port=80 protocol=tcp comment="HTTP" \
    disabled=no 
add chain=service action=accept dst-port=179 protocol=tcp comment="BGP" \
    disabled=yes 
add chain=service action=accept dst-port=443 protocol=tcp comment="SHTTP" \
    disabled=no 
add chain=service action=accept dst-port=1080 protocol=tcp comment="SOCKS \
    HOTSPOT" disabled=yes 
add chain=service action=accept dst-port=1719 protocol=tcp comment="H232 \
    Telephony" disabled=yes 
add chain=service action=accept dst-port=1720 protocol=tcp comment="H232 \
    Telephony" disabled=yes 
add chain=service action=accept dst-port=1723 protocol=tcp comment="PPTP" \
    disabled=no 
add chain=service action=accept dst-port=1731 protocol=tcp comment="H323" \
    disabled=no 
add chain=service action=accept dst-port=2000 protocol=tcp comment="Bandwidth \
    server" disabled=yes 
add chain=service action=accept dst-port=2350 protocol=tcp comment="Service \
    port 2350 Fj rholmen" disabled=no 
add chain=service action=accept dst-port=2828 protocol=tcp comment="uPnP" \
    disabled=yes 
add chain=service action=accept dst-port=3128 protocol=tcp comment="WEB proxy" \
    disabled=yes 
add chain=service action=accept dst-port=3986 protocol=tcp comment="Winbox \
    proxy" disabled=yes 
add chain=service action=accept dst-port=3987 protocol=tcp comment="Winbox SSL \
    proxy" disabled=yes 
add chain=service action=accept dst-port=8080 protocol=tcp comment="Web proxy \
    test" disabled=no 
add chain=service action=accept dst-port=8291 protocol=tcp comment="Winbox" \
    disabled=no 
add chain=service action=accept dst-port=53 protocol=udp comment="DNS" \
    disabled=no 
add chain=service action=accept dst-port=67 protocol=udp comment="DHCP server" \
    disabled=yes 
add chain=service action=accept dst-port=68 protocol=udp comment="DHCP client" \
    disabled=yes 
add chain=service action=accept dst-port=123 protocol=udp comment="NTP" \
    disabled=no 
add chain=service action=accept dst-port=161 protocol=udp comment="SNMP" \
    disabled=no 
add chain=service action=accept dst-port=500 protocol=udp comment="IPSec" \
    disabled=no 
add chain=service action=accept dst-port=520 protocol=udp comment="RIP" \
    disabled=no 
add chain=service action=accept dst-port=521 protocol=udp comment="RIP" \
    disabled=no 
add chain=service action=accept dst-port=1701 protocol=udp comment="L2TP" \
    disabled=no 
add chain=service action=accept dst-port=1718 protocol=udp comment="H232 \
    Telephony" disabled=yes 
add chain=service action=accept dst-port=1900 protocol=udp comment="uPnP" \
    disabled=yes 
add chain=service action=accept dst-port=5000 protocol=udp comment="H232 \
    Telephony" disabled=yes 
add chain=service action=accept dst-port=5678 protocol=udp comment="Neighbour \
    discovery" disabled=yes 
add chain=service action=accept dst-port=20561 protocol=udp comment="MAC \
    Winbox" disabled=yes 
add chain=service action=accept dst-port=4 comment="ipip" disabled=no 
/ ip firewall address-list

I’m wondering: Is it possible that the traffic I’m observing is running on established or related connections already allowed by “legal” service ports?

Will it be a good idea to put the P2P rule at the beginning, right after the “drop invalid” rule, like this:

add chain=forward action=log connection-state=invalid log-prefix="INVALID" \
    comment="Log  invalid connections" disabled=no 
add chain=forward action=drop connection-state=invalid comment="Drop invalid \
    connections" disabled=no 
add chain=forward action=log p2p=all-p2p log-prefix="DROP P2P" comment="Log \
    P2P" disabled=no 
add chain=forward action=drop p2p=all-p2p comment="Drop P2P" disabled=no 
add chain=forward action=accept connection-state=established \
    comment="Established connections" disabled=no 
add chain=forward action=accept connection-state=related comment="Related \
    connections" disabled=no 
add chain=forward action=jump jump-target=virus comment="!!! Check for \
    well-known viruses !!!" disabled=no

Do you think that the P2P rule then will detect it as P2P?
I have no idea about how the P2P rule matches packet, is it by packet contents?

u have to put your p2p drop rule on the very top so it works

Ok, thanks!

Then I’ll put the P2P rule right after “drop invalid” as I suggested above.