Do you have an allow established rule before this rule?
Having the allow established rule will continue to allow those bad
connections until you move the drop rule above it or restart the
router.

-Louis

On Tue, Dec 17, 2013 at 11:19 AM, Rory McCann <[email protected]> wrote:
> Can someone explain to me why the following firewall rule isn't working:
>
> /add action=drop chain=forward comment="SQL Access" dst-address=1.2.3.4
> dst-port=1433 protocol=tcp src-address-list=!SQL/
>
> From what I understand, this rule should drop SQL traffic from any address
> not in the SQL address list, correct?
>
> My corresponding NAT rule is this:
>
> /add action=dst-nat chain=dstnat comment="My Farm Records - SQL Access"
> dst-address=1.2.3.4 dst-port=1433 protocol=tcp to-addresses=10.2.7.7
> to-ports=1433/
>
> It seems as though the NAT rule was taking precedence over the Firewall
> rule. My SQL server was getting hammered with invalid logins until I added a
> src-addrerss-list entry to the NAT rule as well.
>
> This is on ROS v6.7
>
> --
> Rory McCann
> MKAP Technology Solutions
> Web: www.mkap.net
>
>
> _______________________________________________
> Mikrotik mailing list
> [email protected]
> http://mail.butchevans.com/mailman/listinfo/mikrotik
>
> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS
>
>
>



-- 
-Louis

NTInet
O: 803-533-1660 X 207
C: 803-997-0004
_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to