On 01/27/2014 03:09 PM, Jerry Roy wrote:
This look right? I already have a implicit drop rule at the very bottom of
the /ip firewall filter but I added the drop to the input chain directly
below the forward chain. What does this rule offer above my implicit drop
rule? It works with or without the 8443 drop rule. Just trying to
understand if this is more secure or just redundant. BTW, I greatly
appreciate your input. :)

/ip firewall address-list
add address=68.106.72.0/26 disabled=no list="Netgear Switch Access"
add address=162.93.0.0/16 disabled=no list="Netgear Switch Access"
add address=216.231.195.0/24 disabled=no list="Netgear Switch Access"
add address=216.231.198.0/24 disabled=no list="Netgear Switch Access"
add address=216.231.207.0/24 disabled=no list="Netgear Switch Access"

/ip firewall filter
add action=accept chain=forward comment="Netgear Switch access" disabled=no
src-address-list="Netgear Switch Access"
add action=drop chain=input disabled=no dst-port=8443 protocol=tcp

These 2 rules are not working in tandem if that was your goal. The forward chain is for traffic passing through the router, while input is for traffic TO the router. I didn't read through the entire ruleset, but this just jumped off the page at me. If the goal is to allow that list to manage the router (winbox, http, ssh, etc.), then you need to change the first rule to chain=input, then the second rule would drop all traffic destined to port TCP/8443 (not sure what that is).

--
Butch Evans
702-537-0979
Network Support and Engineering
http://store.wispgear.net/
http://www.butchevans.com/
_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to