I was simply suggesting that you add exactly that ip firewall rule for the 'not so experienced' users. As you say the platform is meant for professionals but the reality is that most of them ALSO don't implement this.Most of RouterBOARD products are intended for professionals. And has minimal configuration to allow easier access to the router. SOHO RouterBOARDS have default configuration that can be easily used and is more intended for not so experienced users have default rule to deny all connection from intended WAN port. That is so for several years already. If you have interest in topif of protecting your router you can look up various threads in forums and pages on wiki.mikrotik.com
Is this pro-active enough?
As it was pointed out above, default config is already secure. If user reconfigures the device to be unsecure, there is no stopping them.I think you're missing the point ....
I have no problem doing the firewalling - as we always do - I'm trying to improve usability in a product that is becoming commodity - professional does not have to equal non-user-friendly.
/ip firewall {
filter add chain=input action=accept protocol=icmp comment="default configuration"
filter add chain=input action=accept connection-state=established,related comment="default configuration"
filter add chain=input action=drop in-interface=wlan1-gateway comment="default configuration"
...
}
Yes, but not because it came from the WAN. A LAN-originated DNS request would be new as well. In the input chain, a connection is new because it originated from outside the Mikrotik's brain. A new connection is a new connection, regardless of which interface it originated from.Thanks. If I understand, a WAN DNS request would be considered a "new" connection, which would not be acted upon on the input chain, yes?
The defaults ALSO have a firewall filter to block all of this. It doesn't matter if the service is enabled if no packets can reach the service.Kind of sad that out of the box Mikrotik still has defaults that allow them to be abused.
Someone there must be incredibly stubborn to keep that checkbox checked as a default.
That makes sense. Or a second interface is added for failover.The defaults ALSO have a firewall filter to block all of this. It doesn't matter if the service is enabled if no packets can reach the service.Kind of sad that out of the box Mikrotik still has defaults that allow them to be abused.
Someone there must be incredibly stubborn to keep that checkbox checked as a default.
Probably what happens is that the defaults are set to dhcp-client, and people who have DSL will go in and manually add the pppoe client, but the Internet still doesn't work. Then they find out their nat rules need to get fixed to use the pppoe interface, and then everything starts working and they're happy and log out of the router, never to notice that they didn't go fix the filter input chain, so the router's now wide open.
If the inexperienced user had used the setup wizard to change it to pppoe mode, then the defaults would have been modified and no open resolver would be created.
There IS NO default drop in the default ip firewall in MIkroTik routers!yup most people not aware that even with default drop in input chan, if they check allow remote dns request then port 53 will opening its door from outside DNS access and they need to close it from wan side access to secure it.
ONLY when ether1 is in fact your internet connection!Just to be clear, when I reset the router back to factory defaults in January of 2016, the following rules were created by default (except for Winbox Access)
The highlighted rule takes care of outside (WAN) DNS queries on the Eth1 gatetway, but not the others.
So you can enable Allow Remote Requests safely.