https://www.youtube.com/playlist?list=PL7tWrMZ3Gxl4Iqw5FL5g2Te1zQfR5_7qn
https://vulncheck.com/blog/mikrotik-foisted-revisited
VulnCheck develops an exploit that gets a root shell on MikroTik RouterOS.
MikroTik RouterOS comes with a default firewall configuration designed to provide basic network security. As a new user, comprehending these default firewall rules is essential to evaluate the initial level of protection for your network. In this technical guide, we will break down the default firewall rules and teach you how to interpret them to ensure your network's security is optimized.
Accessing the Firewall Configuration
To access the firewall configuration in MikroTik RouterOS, follow these steps:
Step 1: Log in to the MikroTik RouterOS Web Interface or connect via the Terminal (SSH or Telnet).
Step 2: Access the firewall settings by entering the following command in the terminal:
Interpreting Default Firewall Rules
By executing the above command, you will see a list of rules with columns representing essential parameters. Here's how to interpret the default firewall rules:
Column Headers:
Default Input Chain Rule
The default rule in the input chain ensures the router itself is protected. It allows established connections (marked as "ESTABLISHED") to be accepted, so responses to outgoing traffic are allowed. It also permits related connections (marked as "RELATED"), enabling protocols like FTP to function correctly. Finally, the rule drops all incoming traffic with an invalid state.
Example Default Input Chain Rule:
0 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface=!yourLANinterface connection-state=new
Default Forward Chain Rule
The default rule in the forward chain controls traffic traversing between different networks. It accepts established and related connections (similar to the input chain) while blocking any new connections from external sources to the router.
Example Default Forward Chain Rule:
0 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface=!yourWANinterface
Default Output Chain Rule
The default rule in the output chain allows all outgoing traffic from the router to external destinations.
Example Default Output Chain Rule:
0 ;;; defconf: accept all from LAN
chain=output action=accept out-interface=!yourLANinterface
Enhancing Firewall Rules
To enhance your network security, consider adding custom rules. For example, you can create rules to block specific incoming traffic, allow access to specific services, or implement Layer 7 protocol filtering.
Understanding the default firewall rules in MikroTik RouterOS is crucial to assess the initial level of network security. By interpreting the rules provided in the default configuration, you can evaluate and enhance your network's protection as per your specific requirements. Take advantage of custom firewall rules, connection tracking, and Layer 7 protocol filtering to strengthen your network's defenses and ensure a secure and robust network environment.
https://github.com/eworm-de/routeros-scripts
a collection of scripts for MikroTik RouterOS. Contribute to eworm-de/routeros-scripts development by creating an account on GitHub.
At this moment I have to visit the community to use the UI to block, but some communities are so extremely nsfw that I don't really want to open them to block them. It would be very handy to be able to use the option for 'create report / block user' to also include 'block community'
I know I can also block communities in the settings, but the above mentioned option would be more user friendly imho.
For those of you who have invested in a MikroTik router, have you also incorporated MikroTik wireless devices into your network setup? What has been your experience with MikroTik wireless products? Are they a good choice in terms of performance, range, and reliability? Or would you advise to look for other vendors?
@rayman30
@lemmy.world