Can you please provide an example?
I am using custom chains
This is what i have in this moment:
/ip firewall filter
add action=jump chain=forward comment="=> Block Specific UDP" dst-address-list=OwnIPs in-interface=ETH1 jump-target=UDPConnections \
limit=5k,20k:packet protocol=udp src-address-list=!secured
add action=add-src-to-address-list address-list=Infractor address-list-timeout=15m chain=UDPConnections protocol=udp src-port=123,11211,3702,389
add action=add-src-to-address-list address-list=Infractor address-list-timeout=15m chain=UDPConnections dst-port=1900,80 protocol=udp
add action=return chain=UDPConnections dst-limit=5000,20000,dst-address/1m40s
add action=add-src-to-address-list address-list=Infractor address-list-timeout=15m chain=UDPConnections
Yes, that's exactly what I was talking about.
But I don't think you need limit matcher on the first jump rule.
The logic is like that:
1) all packets non in your "secured" list enter the chain.
2) some of them a filtered by port numbers and added to "infractor" list.
3) all others under the dst-limit are returned to normal processing.
4) everything over the dst-limit is added to "infractor" list.