Thanks guys! I've honestly tried everything above mentioned, putting the IP address on the bridge-wan as opposed to the combo port, and I've tried to use the IP firewall on the bridge settings too. Also those three firewall rules is just me testing by the time I exported the config.
Either way, with that said, I will do all the changes again tonight and post my config here (hopefully this will get fixed!).
What's tripping me off though is that I have the same exact mikrotik with the same exact config in another location and everything there is working fine there. Here is the config for the other mikrotik. See also attached the pic that shows the amount of traffic generated in the bridge-wan interface - just like how's supposed to be.
# may/08/2019 07:28:16 by RouterOS 6.43.4
# software id = 2RR8-49EL
#
# model = CCR1009-7G-1C-1S+
# serial number = 7AEW0101D74B
/interface bridge
add fast-forward=no name=bridge-lan
add fast-forward=no name=bridge-mgm
add fast-forward=no name=bridge-wan
/interface ethernet
set [ find default-name=ether1 ] comment=comcast-paloalto speed=100Mbps
set [ find default-name=ether2 ] comment=paloalto-comcast-lan-test speed=100Mbps
set [ find default-name=ether3 ] comment=cisco-voip-sw speed=100Mbps
set [ find default-name=ether4 ] comment=paloalto-towerstream-redundancy speed=100Mbps
set [ find default-name=ether5 ] comment=test-cradlepoint speed=100Mbps
set [ find default-name=ether6 ] comment=palo-alto-management speed=100Mbps
set [ find default-name=ether7 ] comment=mikrotik-backup-net speed=100Mbps
set [ find default-name=sfp-sfpplus1 ] advertise=10M-full,100M-full,1000M-full
set [ find default-name=combo1 ] comment=comcast name=sfp1-eth0-combo
/interface vlan
add comment=switches interface=bridge-lan name=management vlan-id=15
add interface=ether7 name=mgm vlan-id=15
add interface=ether7 name=scanprint vlan-id=17
add interface=ether7 name=tablets vlan-id=16
add interface=ether7 name=timeclocks vlan-id=18
add interface=ether7 name=users vlan-id=10
add comment=phones interface=bridge-lan name=voip vlan-id=12
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip dhcp-server option
add code=66 name=DHCP66
/ip pool
add name=dhcp_voip ranges=10.10.12.20-10.10.12.240
add name=dhcp_management ranges=10.10.15.240-10.10.15.245
add name=dhcp_pool7 ranges=10.10.1.254
add name=dhcp_pool8 ranges=10.10.1.2-10.10.1.254
add name=dhcp_pool9 ranges=10.10.10.20-10.10.11.220
add name=dhcp_pool10 ranges=10.10.15.200-10.10.15.254
add name=dhcp_pool11 ranges=10.10.16.2-10.10.16.254
add name=dhcp_pool12 ranges=10.10.17.2-10.10.17.254
add name=dhcp_pool13 ranges=10.10.18.200-10.10.18.254
/ip dhcp-server
add address-pool=dhcp_management disabled=no interface=management lease-time=2m name=dhcp2
add address-pool=dhcp_voip disabled=no interface=voip name=dhcp1
add address-pool=dhcp_pool8 disabled=no interface=bridge-mgm name=dhcp3
add address-pool=dhcp_pool9 disabled=no interface=users name=dhcp4
add address-pool=dhcp_pool10 disabled=no interface=mgm name=dhcp5
add address-pool=dhcp_pool11 disabled=no interface=tablets name=dhcp6
add address-pool=dhcp_pool12 disabled=no interface=scanprint name=dhcp7
add address-pool=dhcp_pool13 disabled=no interface=timeclocks name=dhcp8
/queue tree
add max-limit=200M name=parent_download parent=bridge-lan priority=1
add max-limit=200M name=parent_upload parent=bridge-wan priority=1
add max-limit=20M name=1.child_rtp_in packet-mark=PBX_RTP_IN parent=parent_download \
priority=1
add max-limit=5M name=2.child_sip_in packet-mark=PBX_SIP_IN parent=parent_download \
priority=2
add max-limit=20M name=1.child_rtp_out packet-mark=PBX_RTP_OUT parent=parent_upload \
priority=1
add max-limit=5M name=2.child_sip_out packet-mark=PBX_SIP_OUT parent=parent_upload \
priority=2
add max-limit=170M name=3.child_all_other_traffic_in packet-mark=ALL_TRAFFIC_IN parent=\
parent_download
add max-limit=170M name="3. child_all_other_traffic_out" packet-mark=ALL_TRAFFIC_OUT \
parent=parent_upload
/interface bridge port
add bridge=bridge-wan interface=sfp1-eth0-combo
add bridge=bridge-lan interface=ether3
add bridge=bridge-wan interface=ether1
add bridge=bridge-wan hw=no interface=ether5
add bridge=bridge-wan interface=ether2
add bridge=bridge-mgm interface=ether6
/ip address
add address=70.134.175.42/30 interface=sfp1-eth0-combo network=70.134.175.40
add address=50.217.129.190/28 interface=ether1 network=50.217.129.176
add address=10.10.1.1/24 interface=bridge-mgm network=10.10.1.0
add address=10.10.12.1/24 interface=voip network=10.10.12.0
add address=10.10.15.1/24 interface=management network=10.10.15.0
add address=10.10.10.1/23 interface=users network=10.10.10.0
add address=10.10.15.1/24 disabled=yes interface=mgm network=10.10.15.0
add address=10.10.17.1/24 interface=scanprint network=10.10.17.0
add address=10.10.16.1/24 interface=tablets network=10.10.16.0
add address=10.10.18.1/24 interface=timeclocks network=10.10.18.0
/ip dhcp-server network
add address=10.10.1.0/24 gateway=10.10.1.1
add address=10.10.10.0/23 gateway=10.10.10.1
add address=10.10.12.0/24 dns-server=10.10.12.1 gateway=10.10.12.1
add address=10.10.15.0/24 dns-server=10.10.15.1 gateway=10.10.15.1
add address=10.10.16.0/24 dns-server=10.10.16.1 gateway=10.10.16.1
add address=10.10.17.0/24 dns-server=8.8.8.8 gateway=10.10.17.1
add address=10.10.18.0/24 dns-server=8.8.8.8 gateway=10.10.18.1
/ip dns
set allow-remote-requests=yes servers=208.67.222.222,69.38.184.2,75.75.75.75,8.8.8.8
/ip firewall address-list
add address=112.211.41.119 comment=freePBX list=voip-server
/ip firewall filter
add action=accept chain=input comment="Allow all Traffic from DNS" src-address-list=\
allow-DNS
add action=accept chain=forward comment="Allow all Traffic from DNS" src-address-list=\
allow-DNS
add action=accept chain=output comment="Allow all Traffic from DNS" src-address-list=\
allow-DNS
add action=accept chain=input comment="Allow all PBX Traffic" src-address=112.211.41.119
add action=accept chain=forward comment="Allow all PBX Traffic" src-address=112.211.41.119
add action=accept chain=output comment="Allow all PBX Traffic" dst-address=112.211.41.119
add action=drop chain=input comment="Drop Malicious IPs" src-address-list=blocked-ips
add action=drop chain=forward comment="Drop Malicious IPs" src-address-list=blocked-ips
add action=drop chain=output comment="Drop Malicious IPs" src-address-list=blocked-ips
add action=accept chain=input comment="Allow admin SSH Requests" dst-port=22 protocol=tcp \
src-address=28.38.102.191
add action=accept chain=input comment="Allow admin SSH Requests" dst-port=22 protocol=udp \
src-address=28.38.102.191
add action=drop chain=input comment="Drop all SSH Requests" dst-port=22 protocol=tcp
add action=drop chain=input comment="Drop all SSH Requests" dst-port=22 protocol=udp
add action=drop chain=input comment="Drop all Input DNS Requests" dst-port=53 in-interface=\
bridge-wan protocol=tcp
add action=drop chain=input comment="Drop all Input DNS Requests" dst-port=53 in-interface=\
bridge-wan protocol=udp
add action=accept chain=input comment="Allow WinBox from Corp IP - Only!" dst-port=3189 \
protocol=tcp src-address=28.38.102.191
add action=drop chain=input comment="Drop all other WinBox Requests" dst-port=3189 \
protocol=tcp
add action=accept chain=input comment="Allow all Site24x7 ICMP" protocol=icmp \
src-address-list=site24x7
add action=accept chain=input comment="Allow all mikrotik ICMP" protocol=icmp \
src-address-list=mikrotik
add action=drop chain=input comment="Drop all other ICMP" in-interface=bridge-wan protocol=\
icmp
add action=accept chain=input comment="Permit established connections" connection-state=\
established
add action=accept chain=input comment="Permit related connections" connection-state=related
add action=accept chain=input comment="Allow whitelisted sources" src-address-list=\
Whitelist
add action=drop chain=input comment="WAN - default deny" in-interface=bridge-wan
add action=add-src-to-address-list address-list=blocked-addr address-list-timeout=1d chain=\
input connection-limit=40000,32 protocol=tcp
add action=tarpit chain=input connection-limit=3,32 protocol=tcp src-address-list=\
blocked-addr
add action=jump chain=forward comment="SYN Flood protect" connection-state=new jump-target=\
SYN-Protect protocol=tcp tcp-flags=syn
add action=accept chain=SYN-Protect connection-state=new limit=400,5:packet protocol=tcp \
tcp-flags=syn
add action=drop chain=SYN-Protect connection-state=new protocol=tcp tcp-flags=syn
add action=accept chain=forward comment="Allow Established Forwarding Requests" \
connection-state=established,related
add action=accept chain=input comment="Allow Established Input Requests" connection-state=\
established,related
add action=drop chain=input connection-state=invalid in-interface=bridge-lan
add action=drop chain=forward comment="Drop Forward Invalid Packets" connection-state=\
invalid
add action=drop chain=forward connection-nat-state=!dstnat connection-state=new \
in-interface=bridge-lan
/ip firewall mangle
add action=mark-packet chain=prerouting comment=pbx-rtp-in in-interface=bridge-wan \
new-packet-mark=PBX_RTP_IN passthrough=no protocol=udp src-address=112.211.41.119 \
src-port=!5060
add action=mark-packet chain=prerouting comment=pbx-sip-in in-interface=bridge-wan \
new-packet-mark=PBX_SIP_IN passthrough=no protocol=udp src-address=112.211.41.119 \
src-port=5060
add action=mark-packet chain=prerouting comment=all-traffic in-interface=bridge-wan \
new-packet-mark=ALL_TRAFFIC_IN passthrough=no src-address=!112.211.41.119
add action=mark-packet chain=postrouting comment=pbx-rtp-out dst-address=112.211.41.119 \
dst-port=!5060 new-packet-mark=PBX_RTP_OUT out-interface=bridge-wan passthrough=no \
protocol=udp
add action=mark-packet chain=postrouting comment=pbx-sip-out dst-address=112.211.41.119 \
dst-port=5060 new-packet-mark=PBX_SIP_OUT out-interface=bridge-wan passthrough=no \
protocol=udp
add action=mark-packet chain=postrouting comment=all-traffic-out dst-address=\
!112.211.41.119 new-packet-mark=ALL_TRAFFIC_OUT out-interface=bridge-wan passthrough=no
/ip firewall nat
add action=src-nat chain=srcnat comment=nat-voip-to-comcast-business out-interface=\
bridge-wan src-address=10.10.0.0/16 to-addresses=70.134.175.41
add action=dst-nat chain=dstnat disabled=yes dst-address=70.134.175.41 dst-port=8080 \
protocol=tcp src-address=28.38.102.191 to-addresses=10.10.12.214 to-ports=80
add action=dst-nat chain=dstnat disabled=yes dst-address=70.134.175.41 dst-port=8081 \
protocol=tcp src-address=28.38.102.191 to-addresses=10.10.15.11 to-ports=80
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set sip disabled=yes ports=5060
set pptp disabled=yes
/ip route
add distance=1 gateway=70.134.175.41
add distance=2 gateway=29.18.182.57
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh address=28.38.102.191/32
set api disabled=yes
set winbox address=28.38.102.191/32 port=3189
set api-ssl disabled=yes
/system clock
set time-zone-name=America/Los_Angeles
/system identity
set name=mikrotik_Bensenville
/system logging
add topics=firewall
/system routerboard settings
set silent-boot=no
/tool sniffer
set file-limit=10000KiB file-name=sweet_phone filter-interface=bridge-lan \
filter-ip-address=10.10.12.221/32
@pe1chl I am not using the IP firewall on this mikrotik either, but the brige traffic is working correctly.
You do not have the required permissions to view the files attached to this post.