Hi.
I have this set of filters in firewall:
[admin@MikroTik] > ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Drop Invalid connections
chain=input in-interface=External connection-state=invalid action=drop
1 ;;; Allow inbound SSH
chain=input in-interface=External protocol=tcp dst-port=22
action=accept
2 ;;; Allow Established connections
chain=input in-interface=External connection-state=established
action=accept
3 ;;; Allow UDP DNS
chain=input in-interface=External protocol=udp src-port=53 action=accept
4 ;;; Allow ICMP
chain=input in-interface=External protocol=icmp action=accept
5 ;;; Drop anything else
chain=input in-interface=External action=drop
6 ;;; drop invalid connections
chain=forward protocol=tcp connection-state=invalid action=drop
7 ;;; allow related connections
chain=forward connection-state=established action=accept
8 chain=forward in-interface=External action=drop
For me this looks like everything ok in this. But when I tried to scan from external host I've found some ports opened.
For example 53 udp. Now I can set it as nameserver on external host and Mikrotik returning me results of DNS requests. I want it to serve only internal clients. What I'm doing wrong?