Have you encountered any specific challenges or interesting use cases while configuring MikroTik firewalls? Share your experiences and insights with the community! 👇 Additionally, if you have any specific firewall topics you'd like us to cover in future videos, feel free to suggest them. We're here to help you learn and master MikroTik firewall configurations. Your input and questions are valuable to us! 🔥💻"
@mikkio5371 Жыл бұрын
The order of processing looks like ACL or route map in cisco . Proccesing will continue until a satisfactory condition has been met . Thank you Mr Wilmar
@TheNetworkTrip Жыл бұрын
You got it! Same logic than ACLs in Cisco.
@chris2pple1 Жыл бұрын
Very good explanation of the default MikrotikRouter firewall
@TheNetworkTrip Жыл бұрын
Thank you!
@srh_btk Жыл бұрын
Really useful lessons for refreshing my knowledge. Thank you, Wilmer.
@TheNetworkTrip Жыл бұрын
Glad to hear that!
@JasonsLabVideos Жыл бұрын
Good video sir !! thanks !!
@TheNetworkTrip Жыл бұрын
Thank you Jason!
@rodneymoore46511 ай бұрын
This is very properly explained thank you, I have a problem with the (drop everything else firewall) if you have customers with PPPoE connections and your routers goes off and on again it will block your PPPoE connections
@TheNetworkTrip11 ай бұрын
Hi! The PPPoE connections will be established without any problem.
@luhu1884 ай бұрын
very good! a chinese fans!
@tallyharry370411 ай бұрын
I love you sir... Thank you so much..
@TheNetworkTrip10 ай бұрын
All the best
@MrRobotDevelop Жыл бұрын
great video... could you allow also dhcp requests from the clients or not needed?
@TheNetworkTrip Жыл бұрын
Hello! That’s not required. That traffic won’t be affected by the rules under filter.
@Smoothy0911 Жыл бұрын
Hi and many thanks for this very interesting video series. I already had the point you mentioned at the end of the video in my head and was wondering how we can allow external access as "trusted"....? Because we cannot create a “trusted mac list”, similar to the “trusted IP list”, since the mac addresses cannot be recognized from outside access. I'm looking forward to the solution in the next video :)
@TheNetworkTrip Жыл бұрын
Thanks! It’s interesting how we can deal with that. The video is coming tomorrow 😀
@TheNetworkTrip Жыл бұрын
Video ready 😃: Port Knocking & Scanner Detection - Mikrotik Firewall Ep 3 kzbin.info/www/bejne/iqWoiaGnidh8Y7c
@remixedMind7 ай бұрын
thanks for all the videos, do you plan on making one for CAPsMAN
@sebastiendeliedekerke5251 Жыл бұрын
Similar to what you recommend for DNS, if the router acts as DHCP server, should an accept rule also be added for DHCP requests received from the LAN?
@TheNetworkTrip Жыл бұрын
Hello! DHCP traffic won’t be affected by the rules under Filter.
@aperson11819 ай бұрын
which router would you recommend for home use? What is a good authorized seller in the USA?
@sergioantoniohernandezestr7728 Жыл бұрын
Hola @Wilmer Almazan hay alguna forma de implementar OSPF con PBR. Ahorita me funciona con ruteo estático. Pero me gustaría cambiarme a ruteo donamico.
@TheNetworkTrip Жыл бұрын
Hola! Sin problema. Solo coloque arriba de las reglas del PBR en el mangle una regla aceptando el trágico OSPF. Saludos!
@mrraulmeneses9 ай бұрын
Can I please get your opinion on these rules: /ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp add action=accept chain=input src-address-list=Local-LAN comment="Config Access" add action=accept chain=input comment=L2TP dst-port=500,1701,4500 \ in-interface-list=WAN protocol=udp add action=accept chain=input comment="IKE IPSec" in-interface-list=WAN \ protocol=ipsec-esp add action=drop chain=input comment="drop all else" add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid add action=accept chain=forward comment="Access Internet From LAN" \ in-interface-list=LAN out-interface-list=WAN add action=accept chain=forward comment="Access Internet From LAN2" \ in-interface-list=LAN2 out-interface-list=WAN add action=accept chain=forward comment=VPN dst-address-list=Local-LAN \ src-address-list=VPN add action=accept chain=forward dst-port=25 protocol=tcp src-address-list=\ BarracudaIP-SMTP add action=accept chain=forward dst-port=25 out-interface=WAN protocol=tcp add action=accept chain=forward comment="allow dst-nat from both WAN and LAN (including port forwarding)" connection-nat-state=dstnat add action=drop chain=forward comment="drop all else" Thanks!