The setup is as follows, Windows physical NIC : public IP 23.23.23.90 / gateway: 23.23.23.1 .
Went on and connected CHR’s ethernet 1 to Vmware’s : Network connection: Bridged (Automatic) and powered on the CHR, went to IP/address and gave 23.23.23.91/24 (assigned to me by the provider, have 6 in total) and in IP/routes dst. Address = 0.0.0.0 , gateway 23.23.23.1
The CHR, as expected has access to Internet and can be ping-ed from the Internet.
What would be a good set of firewall rules to secure it from attacks since there is no NAT (nor ISP modem or other firewall) involved while allowing at the same time L2TP/IPsec connections?
In other MT’s behind NAT and ISP modems, I have rules like the ones bellow but am unsure if they are enough to offer good/dissent protection.
Code: Select all
/ip firewall filter
add action=accept chain=input dst-port=500,1701,4500 protocol=udp
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log=yes
viewtopic.php?f=2&t=175285#p859705