Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


mentalinc

3384 posts

Uber Geek
+1 received by user: 1023

Trusted

#318641 6-Feb-2025 12:42
Send private message

Hi All

 

I'm looking to retire my EdgeRouter 4, and replace it with my existing CRS305-1g-4s+ which was previously running my 10Gbit network.

 

The issue I'm having is when I reset the router there are no default IPv4 or IPv6 firewall rules being created.
I'm running the latest version 7.17.1.

 

Using winbox (v3.41), resetting via the System -> Reset Configuration (nothing is ticked), then click reset. Also tried resetting via the "Quick Set" reset config button.

 

Thanks
mentalinc





CPU: AMD 5900x | RAM: GSKILL Trident Z Neo RGB F4-3600C16D-32GTZNC-32-GB | MB:  Asus X570-E | GFX: EVGA FTW3 Ultra RTX 3080Ti| Monitor: LG 27GL850-B 2560x1440

 

Quic: https://account.quic.nz/refer/473833 R473833EQKIBX 


Filter this topic showing only the reply marked as answer Create new topic
RunningMan
9185 posts

Uber Geek
+1 received by user: 4838


  #3339871 6-Feb-2025 12:58
Send private message

There's normally only a firewall config at default settings on consumer type models - i.e smaller routers and APs.




nzkc
1634 posts

Uber Geek
+1 received by user: 1041


  #3339873 6-Feb-2025 13:01
Send private message

Googling took me to this forum thread: https://forum.mikrotik.com/viewtopic.php?t=175459

 

And in it is a reference to the command: /system default-configuration print

 

On my RB5009 this dumps out the default configuration for it including default firewall rules.

 

Its quite a long script with some options. I'm happy to send it to you if you want. That said the default firewall rules/commands are:

 

 

 

                     /interface list member add list=LAN interface=bridge comment="defconf"                                                                                          

 

/interface list member add list=WAN interface=ether1 comment="defconf"

 

/ip firewall nat add chain=srcnat out-interface-list=WAN ipsec-policy=out,none action=masquerade comment="defconf: masquerade"

 

/ip firewall {

 

filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"

 

filter add chain=input action=drop connection-state=invalid comment="defconf: drop invalid"

 

filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP"

 

filter add chain=input action=accept dst-address=127.0.0.1 comment="defconf: accept to local loopback (for CAPsMAN)"

 

filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"

 

filter add chain=forward action=accept ipsec-policy=in,ipsec comment="defconf: accept in ipsec policy"

 

filter add chain=forward action=accept ipsec-policy=out,ipsec comment="defconf: accept out ipsec policy"

 

filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack"

 

filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"

 

filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"

 

filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not DSTNATed"

 

}

 

/ipv6 firewall {

 

address-list add list=bad_ipv6 address=::/128 comment="defconf: unspecified address"

 

address-list add list=bad_ipv6 address=::1 comment="defconf: lo"

 

address-list add list=bad_ipv6 address=fec0::/10 comment="defconf: site-local"

 

address-list add list=bad_ipv6 address=::ffff:0:0/96 comment="defconf: ipv4-mapped"

 

address-list add list=bad_ipv6 address=::/96 comment="defconf: ipv4 compat"

 

address-list add list=bad_ipv6 address=100::/64 comment="defconf: discard only "

 

address-list add list=bad_ipv6 address=2001:db8::/32 comment="defconf: documentation"

 

address-list add list=bad_ipv6 address=2001:10::/28 comment="defconf: ORCHID"

 

address-list add list=bad_ipv6 address=3ffe::/16 comment="defconf: 6bone"

 

filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"

 

filter add chain=input action=drop connection-state=invalid comment="defconf: drop invalid"

 

filter add chain=input action=accept protocol=icmpv6 comment="defconf: accept ICMPv6"

 

filter add chain=input action=accept protocol=udp dst-port=33434-33534 comment="defconf: accept UDP traceroute"

 

filter add chain=input action=accept protocol=udp dst-port=546 src-address=fe80::/10 comment="defconf: accept DHCPv6-Client prefix delegation."

 

filter add chain=input action=accept protocol=udp dst-port=500,4500 comment="defconf: accept IKE"

 

filter add chain=input action=accept protocol=ipsec-ah comment="defconf: accept ipsec AH"

 

filter add chain=input action=accept protocol=ipsec-esp comment="defconf: accept ipsec ESP"

 

filter add chain=input action=accept ipsec-policy=in,ipsec comment="defconf: accept all that matches ipsec policy"

 

filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop everything else not coming from LAN"

 

filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"

 

filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"

 

filter add chain=forward action=drop src-address-list=bad_ipv6 comment="defconf: drop packets with bad src ipv6"

 

filter add chain=forward action=drop dst-address-list=bad_ipv6 comment="defconf: drop packets with bad dst ipv6"

 

filter add chain=forward action=drop protocol=icmpv6 hop-limit=equal:1 comment="defconf: rfc4890 drop hop-limit=1"

 

filter add chain=forward action=accept protocol=icmpv6 comment="defconf: accept ICMPv6"

 

filter add chain=forward action=accept protocol=139 comment="defconf: accept HIP"

 

filter add chain=forward action=accept protocol=udp dst-port=500,4500 comment="defconf: accept IKE"

 

filter add chain=forward action=accept protocol=ipsec-ah comment="defconf: accept ipsec AH"

 

filter add chain=forward action=accept protocol=ipsec-esp comment="defconf: accept ipsec ESP"

 

filter add chain=forward action=accept ipsec-policy=in,ipsec comment="defconf: accept all that matches ipsec policy"

 

filter add chain=forward action=drop in-interface-list=!LAN comment="defconf: drop everything else not coming from LAN"

 

}

 


RunningMan
9185 posts

Uber Geek
+1 received by user: 4838


  #3339875 6-Feb-2025 13:02
Send private message

Also, that model doesn't have a particularly high powered CPU. IPv4 has fasttrack but this isn't available yet for IPv6 (coming in OS 7.18). Depends on your needs though - lots of firewall rules, queues etc present a higher CPU load.




mentalinc

3384 posts

Uber Geek
+1 received by user: 1023

Trusted

  #3339878 6-Feb-2025 13:07
Send private message

Awesome!

 

@nzkc yes please, are you able to pm a link for me?

 

Only running 300/100, so expect it should be fine for that purpose?

 

Will run a few VLANs and couple of DHCP servers per interface (normal lan, 10G lan and vlan for a wifi network).

 

 





CPU: AMD 5900x | RAM: GSKILL Trident Z Neo RGB F4-3600C16D-32GTZNC-32-GB | MB:  Asus X570-E | GFX: EVGA FTW3 Ultra RTX 3080Ti| Monitor: LG 27GL850-B 2560x1440

 

Quic: https://account.quic.nz/refer/473833 R473833EQKIBX 


nzkc
1634 posts

Uber Geek
+1 received by user: 1041


  #3339879 6-Feb-2025 13:13
Send private message

mentalinc:

 

Awesome!

 

@nzkc yes please, are you able to pm a link for me?

 

 

PM'd ya.


RunningMan
9185 posts

Uber Geek
+1 received by user: 4838


  #3339884 6-Feb-2025 13:17
Send private message

mentalinc:

 

Only running 300/100, so expect it should be fine for that purpose?

 

 

Yep should be perfectly happy for that, unless you go completely crazy with firewall rules etc. The even lesser powered 600MHz MIPSBE models like the RB2011 series are fine on that speed connection. IPv6 fasttrack is scheduled for the next major release (7.18) so not that far off.


 
 
 
 

Shop now for Dell laptops and other devices (affiliate link).

saf

saf
221 posts

Master Geek
+1 received by user: 533

ID Verified
Trusted
Vetta Group
Subscriber

  #3339904 6-Feb-2025 15:29
Send private message

Because the CRS series are intended as switches, not routers. While they can be used as routers, their CPU is not grunty for anything intensive. 





My views are as unique as a unicorn riding a unicycle. They do not reflect the opinions of my employer, my cat, or the sentient coffee machine in the break room.


mentalinc

3384 posts

Uber Geek
+1 received by user: 1023

Trusted

  #3340806 9-Feb-2025 17:59
Send private message




CPU: AMD 5900x | RAM: GSKILL Trident Z Neo RGB F4-3600C16D-32GTZNC-32-GB | MB:  Asus X570-E | GFX: EVGA FTW3 Ultra RTX 3080Ti| Monitor: LG 27GL850-B 2560x1440

 

Quic: https://account.quic.nz/refer/473833 R473833EQKIBX 


Filter this topic showing only the reply marked as answer Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.