Sat Jan 05, 2019 11:42 pm
Well, I use explicit drop rule at the end of my forward chain so If I dont allow specific traffic it is always dropped - easy and secure.
Assuming you want this traffic to go out to the internet.
Thus for me it simply be a matter of.........
/ip firewall filter
add action=accept chain=forward src-address=192.168.1.10 protocol=tcp destination port=465 out-interface=WAN
If you do not use a drop all else rule in your setup then you could do it two ways.
one, an allow rule followed by a drop rule
Two, a combined rule.
1
/ip firewall filter
add action=accept chain=forward src-address=192.168.1.10 protocol=tcp destination port=465 out-interface=WAN
add action=drop chain=forward src-address=192.168.1.10 out-interface=WAN
2
/ip firewall filter
add action=drop chain=forward src-address=192.168.1.10 protocol=tcp destination port=!465 out-interface=WAN
(the filter will drop all traffic from the web cam, headed out the wan to all ports except port 465)