Code:
/ip firewall address-listadd address=192.168.68.49 comment=Solid-Aurora list=adminadd address=192.168.68.50 comment=Rapid-Monster list=admin/ip firewall connection trackingset udp-timeout=10s/ip firewall filteradd action=accept chain=input comment=\ "accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=input comment="drop invalid" connection-state=\ invalidadd action=accept chain=input comment="accept ICMP" protocol=icmpadd action=accept chain=input comment=\ "accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=accept chain=input comment="Config Access" src-address-list=\ adminadd action=accept chain=input comment="Allow LAN DNS queries-UDP" \ dst-port=53 in-interface-list=LAN protocol=udpadd action=accept chain=input comment="Allow LAN DNS queries - TCP" \ dst-port=53 in-interface-list=LAN protocol=tcpadd action=drop chain=input comment="drop all else"add action=drop chain=input comment="drop all not coming from LAN" \ disabled=yes in-interface-list=!LANadd action=accept chain=forward comment="accept in ipsec policy" \ ipsec-policy=in,ipsecadd action=accept chain=forward comment="accept out ipsec policy" \ ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment=fasttrack \ connection-state=established,related hw-offload=yesadd action=accept chain=forward comment=\ "accept established,related, untracked" connection-state=\ established,related,untrackedadd action=drop chain=forward comment="drop invalid" connection-state=\ invalidadd action=drop chain=forward comment="drop all from WAN not DSTNATed" \ connection-nat-state=!dstnat connection-state=new disabled=yes \ in-interface-list=WANadd action=accept chain=forward comment="allow internet traffic" \ in-interface-list=LAN out-interface-list=WANadd action=accept chain=forward comment="port forwarding" \ connection-nat-state=dstnatadd action=accept chain=forward comment="allow Smart Home access" \ dst-address=192.168.69.0/24 src-address=192.168.68.0/24add action=drop chain=forward comment="drop all else"/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WAN
Can you tell me what rule to add in the default firewall to make VLAN Guest work? Completely fails to connect to DNS.
Statistics: Posted by SecureInsect — Thu Dec 28, 2023 4:58 pm