Quantcast
Channel: MikroTik
Viewing all articles
Browse latest Browse all 15133

General • Re: Individual firewall and Node-RED port problem

$
0
0
Code:
/ip firewall address-listadd address=192.168.68.49 comment=Solid-Aurora list=adminadd address=192.168.68.50 comment=Rapid-Monster list=admin/ip firewall connection trackingset udp-timeout=10s/ip firewall filteradd action=accept chain=input comment=\    "accept established,related,untracked" connection-state=\    established,related,untrackedadd action=drop chain=input comment="drop invalid" connection-state=\    invalidadd action=accept chain=input comment="accept ICMP" protocol=icmpadd action=accept chain=input comment=\    "accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=accept chain=input comment="Config Access" src-address-list=\    adminadd action=accept chain=input comment="Allow LAN DNS queries-UDP" \    dst-port=53 in-interface-list=LAN protocol=udpadd action=accept chain=input comment="Allow LAN DNS queries - TCP" \    dst-port=53 in-interface-list=LAN protocol=tcpadd action=drop chain=input comment="drop all else"add action=drop chain=input comment="drop all not coming from LAN" \    disabled=yes in-interface-list=!LANadd action=accept chain=forward comment="accept in ipsec policy" \    ipsec-policy=in,ipsecadd action=accept chain=forward comment="accept out ipsec policy" \    ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment=fasttrack \    connection-state=established,related hw-offload=yesadd action=accept chain=forward comment=\    "accept established,related, untracked" connection-state=\    established,related,untrackedadd action=drop chain=forward comment="drop invalid" connection-state=\    invalidadd action=drop chain=forward comment="drop all from WAN not DSTNATed" \    connection-nat-state=!dstnat connection-state=new disabled=yes \    in-interface-list=WANadd action=accept chain=forward comment="allow internet traffic" \    in-interface-list=LAN out-interface-list=WANadd action=accept chain=forward comment="port forwarding" \    connection-nat-state=dstnatadd action=accept chain=forward comment="allow Smart Home access" \    dst-address=192.168.69.0/24 src-address=192.168.68.0/24add action=drop chain=forward comment="drop all else"/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" \    ipsec-policy=out,none out-interface-list=WAN
@anav
Can you tell me what rule to add in the default firewall to make VLAN Guest work? Completely fails to connect to DNS.

Statistics: Posted by SecureInsect — Thu Dec 28, 2023 4:58 pm



Viewing all articles
Browse latest Browse all 15133

Trending Articles