The rule I posted was to see if I could catch the DHCP server traffic FROM
the router. It was exploratory only. I was curious if a rule like:

add action=drop chain=forward disabled=no protocol=udp src-port=67

would catch traffic FROM the DHCP server on the router. I didn't think it
would but I was curious. That got me to thinking about where exactly that
traffic CAN be managed and when I didn't see it with a filter rule in the
Output chain I was curious.

-Ty


On Fri, Jan 24, 2014 at 10:10 AM, Sam Tetherow <[email protected]> wrote:

> If you are trying to catch traffic not originating on the MT, wouldn't the
> chain need to be forward and not output?
>
>
> On 01/24/2014 08:54 AM, Ty Featherling wrote:
>
>> Chupaka and Butch. This rule is on a router that has a bridge for LAN
>> ports
>> and the DHCP server is run on that bridge. Use IP Filter is enabled for
>> the
>> bridge as well. I am glad you are seeing the same lack of result I did
>> Butch. In my case I want to act on DHCP server traffic that does NOT
>> originate from the router, ie Rogue DHCP traffic. To that end I don't
>> really need to catch the legit server traffic but I was trying to prove
>> where it was or wasn't so I could write my rules accordingly.
>>
>> "For others that answered, the rule that Ty posted IS the right format and
>> in the right chain."
>> - Wel I did learn from the best... ;)
>>
>> -Ty
>>
>>
>> On Fri, Jan 24, 2014 at 3:00 AM, Chupaka <[email protected]> wrote:
>>
>>  Afair, DHCP uses something like RAW_SOCKET or even more low-level
>>> functions, so the only way to catch its packets is to create a bridge
>>> (with
>>> a single port - necessary interface) and use bridge filter (or enable
>>> 'use-ip-firewall').
>>>
>>> --
>>> Подпись:
>>> (добавляется в конце всех исходящих писем)
>>>
>>>
>>> 2014/1/24 Butch Evans <[email protected]>
>>>
>>>  On 01/23/2014 11:13 AM, Ty Featherling wrote:
>>>>
>>>>  Can someone confirm that you CANNOT manage traffic FROM the DHCP Server
>>>>>
>>>> on
>>>
>>>> a Mikrotik with IP Firewall?
>>>>>
>>>>> To test this I added the rule:
>>>>>
>>>>> add action=log chain=output disabled=no protocol=udp src-port=67
>>>>>
>>>>>  DHCP Conversation looks like this:
>>>>
>>>> DHCPDISCOVER
>>>> client: UDP src-addr 0.0.0.0 sport=68
>>>>              dst-addr 255.255.255.255 dport=67
>>>>
>>>> DHCPOFFER
>>>> DHCP server:
>>>> UDP src-addr server.ip.addr sport=67
>>>>      dst-addr 255.255.255.255 dport=68
>>>>
>>>> DHCPREQUEST -
>>>>  From client, just like discover
>>>>
>>>> DHCPACK -
>>>>  From server, just like offer
>>>>
>>>> SO, your rule should show the DHCPOFFER and the DHCPACK traffic.  My
>>>>
>>> first
>>>
>>>> guess about why it isn't showing up would be if the interface in
>>>> question
>>>> is on a bridge and the "use-ip-firewall" option isn't on for the bridge.
>>>>   Barring that, I suspect you should be able to see the traffic in the
>>>>
>>> logs.
>>>
>>>>   I just did a test on a router here and it didn't show up there,
>>>> either.
>>>>   Very odd.  Perhaps a bit more research on my part is in order.  Maybe,
>>>> because the traffic is all broadcast type, the IP firewall isn't seeing
>>>>
>>> the
>>>
>>>> traffic?  I don't know.  I'll play with this a bit more and see what I
>>>>
>>> can
>>>
>>>> discover.
>>>>
>>>> For others that answered, the rule that Ty posted IS the right format
>>>> and
>>>> in the right chain.
>>>>
>>>>
>>>> --
>>>> Butch Evans
>>>> 702-537-0979
>>>> Network Support and Engineering
>>>> http://store.wispgear.net/
>>>> http://www.butchevans.com/
>>>>
>>>> _______________________________________________
>>>> Mikrotik mailing list
>>>> [email protected]
>>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>>>
>>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>>> RouterOS
>>>>
>>>>  -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <
>>> http://mail.butchevans.com/pipermail/mikrotik/
>>> attachments/20140124/14c5f2ff/attachment.html
>>> _______________________________________________
>>> Mikrotik mailing list
>>> [email protected]
>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>>
>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>> RouterOS
>>>
>>>  -------------- next part --------------
>> An HTML attachment was scrubbed...
>> URL: <http://mail.butchevans.com/pipermail/mikrotik/
>> attachments/20140124/84ce8634/attachment.html>
>>
>> _______________________________________________
>> Mikrotik mailing list
>> [email protected]
>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>
>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>> RouterOS
>>
>
> _______________________________________________
> Mikrotik mailing list
> [email protected]
> http://mail.butchevans.com/mailman/listinfo/mikrotik
>
> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
> RouterOS
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.butchevans.com/pipermail/mikrotik/attachments/20140124/07c5561f/attachment.html>
_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to