Mikrotik Basic Firewall Configuration
This is a basic firewall configuration used by Mikrotik with some extra's that are related to our general configuration
These are 2 rules related to LetsEncrypt for SSL related updates these rules are enabled and disabled depending on SSL certificate update.
add action=accept chain=input comment=LetsEncrypt disabled=yes dst-port=80 in-interface-list=WAN protocol=tcp src-address-list=LE
add action=accept chain=input comment=LetsEncrypt disabled=yes dst-port=80 in-interface-list=WAN protocol=tcp
This is usually only active for remote access while the initial
add action=accept chain=input comment="Remote Access" dst-port=8291 protocol=tcp
Allow Ping: there is always a debate to should you or should you not allow ping response
add action=accept chain=input protocol=icmp
These rules block IP's listed via src-address-list. This means we can block a good percentage of bad IP's via the a script we can run on the router to grab these IP blocks. click here
add action=drop chain=input in-interface-list=WAN src-address-list=SPAMHAUS_DROP
add action=drop chain=input in-interface-list=WAN src-address-list=SPAMHAUS_EDROP
add action=drop chain=input in-interface-list=WAN src-address-list=FIREHOL_LEVEL1
add action=drop chain=input in-interface-list=WAN src-address-list=FIREHOL_LEVEL2
add action=drop chain=input in-interface-list=WAN src-address-list=FIREHOL_LEVEL3
Full Firewall Rules
/ip firewall filter
add action=accept chain=input comment=LetsEncrypt disabled=yes dst-port=80 in-interface-list=WAN protocol=tcp src-address-list=LE
add action=accept chain=input comment=LetsEncrypt disabled=yes dst-port=80 in-interface-list=WAN protocol=tcp
add action=accept chain=input comment="Remote Access" dst-port=8291 protocol=tcp
add action=accept chain=input protocol=icmp
add action=drop chain=input comment="Drop Bad DNS" dst-port=53 in-interface-list=WAN protocol=udp
add action=drop chain=input in-interface-list=WAN src-address-list=SPAMHAUS_DROP
add action=drop chain=input in-interface-list=WAN src-address-list=SPAMHAUS_EDROP
add action=drop chain=input in-interface-list=WAN src-address-list=FIREHOL_LEVEL1
add action=drop chain=input in-interface-list=WAN src-address-list=FIREHOL_LEVEL2
add action=drop chain=input in-interface-list=WAN src-address-list=FIREHOL_LEVEL3
add action=accept chain=input in-interface-list=WAN protocol=gre
add action=accept chain=input in-interface-list=WAN protocol=ipsec-ah
add action=accept chain=input in-interface-list=WAN protocol=ipsec-esp
add action=accept chain=input dst-port=500 in-interface-list=WAN protocol=udp
add action=accept chain=input dst-port=1701 in-interface-list=WAN protocol=udp
add action=accept chain=input dst-port=4500 in-interface-list=WAN protocol=udp
add action=accept chain=input connection-state=established,related in-interface-list=WAN
add action=drop chain=input in-interface-list=WAN
add action=accept chain=forward ipsec-policy=in,ipsec
add action=accept chain=forward ipsec-policy=out,ipsec
add action=accept chain=forward connection-state=established,related in-interface-list=WAN out-interface-list=LAN
add action=accept chain=forward connection-state=established,related in-interface-list=LAN out-interface-list=LAN
add action=drop chain=forward connection-state=invalid in-interface-list=WAN out-interface-list=LAN
add action=drop chain=forward connection-nat-state=!dstnat connection-state=new in-interface-list=WAN out-interface-list=LAN