Thu Jul 15, 2021 8:34 pm
Better security can be afforded by a better understanding.
(1) Therefore, via winbox, go to IP Menu Item and select IP SERVICES.
Here you can disable all the services the router provides users or access to the router for
api, api-ssi, ftp,ssh,telnet,www, www-ssl. THE ONLY ONE YOU SHOULD KEEP ACTIVE is winbox
Its default port is usually 8291 I believe, and that should be changed once you have a stable setup.
(2) Then go to IP Firewall selection and choose SEVICE PORTS on the top bar of the firewall popup.
Here to one should disable all services, not required (from dccp to udplite).
Therefore you have closed most if not all the services and ports that do not need to be accessible.
(3) Go to Firewall Rules and make sure
that
a. the only access to the INPUT CHAIN is the trusted network/interface the admin uses and even better, an additional firewall address list on that rule, identifying which IPs are allowed to access the router (admin laptop, desktop; ipad, smartphone etc......)
b. Ensure other access required by LAN users is allowed aka DNS port 53, NTP etc.................
c. Then add a drop rule at the end of the input chain.
b. Access to the Forward chain is adequately handled by default rules but it is incomplete when one starts making changes to the config. It only blocks wan to lan traffic.
one should do the following conceptually block all unwanted lan to lan, lan to wan, and wan to lan traffic.
This is accomplished by a simple drop; all rule at the end of the forward chain.
This means that you will need to do the following before the last drop all rule.
add a lan users to WAN rule for those permitted internet traffic,
add a single generic port forwarding rule if you plan on having accessible servers (actual server rules are done in the IP NAT subsection).
- one may need to add shared devices between different subnets etc.......
4a. Ensure the trusted interface list that you identify in input chain for access to the router is noted in the TOOLS MAC WINMAC SERVER entry for allowed interface!
b.. Disable the more generic TOOLS MAC MAC SERVER... set interface allowed to NONE.
5.On System USers, Change default admin ID and password to something unique.
6. On both the passwords setting and IP Service list for winbox one can identify the trusted network (as per the input chain rule)
So now you have layered defense.
unique user password and access limited based upon login ---> User settings
limited access based upon winbox settings. -----> Tools MAC settings and IP service Settings
limited access based upon input chain rules -----> Firewall Rules
All other access avenues (ports, services) are cut off.
WAN to ROUTER, LAN to ROUTER traffic is controlled by the admin
WAN to LAN, LAN to WAN, LAN to LAN traffic is limited to what is allowed by the OP.