You don't have any firewall in place at all (or at least it's not included in the exported config you made available)! You need something fast!
Start protecting router itself by applying rules from
wiki (section Router protection).
Then proceed with something better. The code below is default firewall on my hAP ac² on ROS 6.44beta61:
/ip firewall
filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=input action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP"
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
filter add chain=forward action=accept ipsec-policy=in,ipsec comment="defconf: accept in ipsec policy"
filter add chain=forward action=accept ipsec-policy=out,ipsec comment="defconf: accept out ipsec policy"
filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack"
filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"
filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not DSTNATed"
Then you want to remove
ether02_Guest from LAN interface list [*]:
/interface list member
remove [ find interface=ether02_Guest ]
Then you can stop traffic between
ether02_Guest and the rest of LAN using the following firewall filter rule
/ip firewall filter
add action=drop chain=forward comment="drop connections from guest to LAN" in-interface=ether02_Guest out-interface-list=LAN connection-state=new
this rule can be the last filter rule if the default (as posted above) filter config is in use. The rule above will only block new connections initiated in ether02_Guest subnet but will allow connections initiated from LAN (targeting Guest subnet). If you want to block those as well, simply remove
connection-state=new from the rule.
[*] by removing ether02_Guest from LAN interface list, guests will loose access to some services, provided by router, such as DNS server ... look at all rules with
action=accept chain=input and decide which rules shoudl apply also to
ether02_Guest ... add another instance of those rules, but with
in-interface=ether02_Guest instead of in-interface-list=LAN. Place those rules above the general
action=drop chain=input in-interface-list=!LAN rule.