Community discussions

MikroTik App
 
User avatar
jitdor
just joined
Topic Author
Posts: 8
Joined: Tue Jul 07, 2015 9:17 pm

Firewall chain for virtual interfaces of tunnels

Wed May 08, 2019 8:50 am

I have subscribed to a VPN service and configured multiple virtual interfaces as PPTP clients on the Mikrotik for various rule-based routing purposes. Since the VPN is a shared service, other customers connecting to the same VPN gateways would be placed in the same private subnet as my virtual interfaces.

I am wondering if the Input chain of my existing firewall rules would also apply to these virtual interfaces? Or do I need to setup sepcific rules under the forward chain to filter unwanted incoming traffic from these VPN tunnels? It is difficult to determine if the existing rules are in effect as there are not a lot of unsolicited packets hitting the virtual interfaces.

Many thanks!
 
User avatar
sebastia
Forum Guru
Forum Guru
Posts: 1782
Joined: Tue Oct 12, 2010 3:23 am
Location: Antwerp, BE

Re: Firewall chain for virtual interfaces of tunnels  [SOLVED]

Wed May 08, 2019 11:04 am

Input chain is for any packet coming INTO router, from any available interface.
forward chain is for packets passing through router, so from one interface of router to another.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10560
Joined: Mon Jun 08, 2015 12:09 pm

Re: Firewall chain for virtual interfaces of tunnels

Wed May 08, 2019 11:27 am

The input chain of your firewall should be configured to accept the outer packets of the VPN, in this case TCP port 1723 and protocol 47 (GRE).
The forward chain of your firewall should be configured for the payload of the packets, the traffic from your clients to the remainder of the network.

(this assumes that your clients do not have to access the router itself. if they do, e.g. for use of the DNS resolver, input rules to accept that payload have to be made as well)