Have a vanilla sb750 setup with basically the default configuration and an added wireless accesspoint: I would like to lock the network down so that IoT devices can only talk to the Raspberry Pi server, and untrusted laptops are locked out of the LAN. To do this, I have organized most of the devices on the network into different static IP ranges in the 192.168.88.x subnet (I had originally tried to place devices with different levels of trust into their own 192.168.x.x subnets, but was unsuccessful, so I went back to this simpler configuration and am still failing).
My plan is to have the firewall manage internal traffic based on a device's IP. I have an untrusted laptop on the network which is given an IP of 192.168.88.252 by DHCP. To test the firewall out at the most basic level, I attempt to block ALL traffic (I can refine it later once I get this most basic task working) from this IP:
Code: Select all
add action=drop chain=forward src-address=192.168.88.252
Here is my router setup:
Code: Select all
[swallace@MikroTik] > /ip address print detail
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; defconf
address=192.168.88.1/24 network=192.168.88.0 interface=ether2-master actual-interface=ether2-master
1 D address=199.180.167.216/32 network=173.209.108.15 interface=pppoe-out1 actual-interface=pppoe-out1
[swallace@MikroTik] > /ip route print detail
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
0 ADS dst-address=0.0.0.0/0 gateway=173.209.108.15 gateway-status=173.209.108.15 reachable via pppoe-out1 distance=1 scope=30 target-scope=10
1 ADC dst-address=173.209.108.15/32 pref-src=199.180.167.216 gateway=pppoe-out1 gateway-status=pppoe-out1 reachable distance=0 scope=10
2 ADC dst-address=192.168.88.0/24 pref-src=192.168.88.1 gateway=ether2-master gateway-status=ether2-master reachable distance=0 scope=10
[swallace@MikroTik] > /interface print detail
Flags: D - dynamic, X - disabled, R - running, S - slave
0 R name="ether1" default-name="ether1" type="ether" mtu=1500 actual-mtu=1500 l2mtu=1600 max-l2mtu=4076 mac-address=D4:CA:6D:DB:7B:64 fast-path=yes
last-link-up-time=jun/30/2017 15:06:11 link-downs=0
1 R name="ether2-master" default-name="ether2" type="ether" mtu=1500 actual-mtu=1500 l2mtu=1598 max-l2mtu=2028 mac-address=D4:CA:6D:DB:7B:65 fast-path=yes
last-link-up-time=jun/30/2017 15:06:11 link-downs=0
2 RS name="ether3" default-name="ether3" type="ether" mtu=1500 actual-mtu=1500 l2mtu=1598 max-l2mtu=2028 mac-address=D4:CA:6D:DB:7B:66 fast-path=yes
last-link-up-time=jun/30/2017 15:06:11 link-downs=0
3 RS name="ether4" default-name="ether4" type="ether" mtu=1500 actual-mtu=1500 l2mtu=1598 max-l2mtu=2028 mac-address=D4:CA:6D:DB:7B:67 fast-path=yes
last-link-up-time=jun/30/2017 15:06:12 link-downs=0
4 S name="ether5" default-name="ether5" type="ether" mtu=1500 actual-mtu=1500 l2mtu=1598 max-l2mtu=2028 mac-address=D4:CA:6D:DB:7B:68 fast-path=yes link-downs=0
5 R name="pppoe-out1" type="pppoe-out" mtu=1492 actual-mtu=1492 fast-path=yes last-link-down-time=jun/30/2017 15:06:15 last-link-up-time=jun/30/2017 15:06:17 link-downs=1
[swallace@MikroTik] > /ip firewall export
# jul/01/2017 14:23:08 by RouterOS 6.39.2
# software id = SR21-JTTV
#
/ip firewall filter
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept established,related" connection-state=established,related
add action=drop chain=forward src-address=192.168.88.252
add action=drop chain=input comment="defconf: drop all from WAN" in-interface=ether1
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related" connection-state=established,related
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface=ether1
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" out-interface=pppoe-out1
[swallace@MikroTik] >
Code: Select all
Device Model:PicoStation M2
Device Name:PicoStation M2
Network Mode:Bridge
Wireless Mode:Access Point
...
Version:v6.0.4 (XM)
Many thanks