{"id":2943,"date":"2020-01-10T16:01:46","date_gmt":"2020-01-10T22:01:46","guid":{"rendered":"http:\/\/www.incredigeek.com\/home\/?p=2943"},"modified":"2020-01-10T16:02:50","modified_gmt":"2020-01-10T22:02:50","slug":"mikrotik-routeros-drop-all-from-wan-not-dstnated","status":"publish","type":"post","link":"https:\/\/www.incredigeek.com\/home\/mikrotik-routeros-drop-all-from-wan-not-dstnated\/","title":{"rendered":"Mikrotik RouterOS &#8211; &#8220;drop all from WAN not DSTNATed&#8221;"},"content":{"rendered":"\n<p>The default DSTNATed firewall rule keeps traffic from the WAN accessing LAN side IP addresses.<\/p>\n\n\n\n<p>More info <a href=\"https:\/\/wiki.mikrotik.com\/wiki\/Tips_and_Tricks_for_Beginners_and_Experienced_Users_of_RouterOS#Protect_local_network_against_attacks_from_public_internet\">here<\/a><\/p>\n\n\n\n<p>Printing the rules on a router with the default config should show the following.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">;;; defconf: drop all from WAN not DSTNATed\nchain=forward action=drop connection-nat-state=!dstnat in-interface=ether1<\/pre>\n\n\n\n<p>If you are wanting to add the rule to a router, you can copy and past the following command.  Replace in-interface=ether with your in interface.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\/ip firewall add action=drop chain=forward comment=\\ \"defconf: drop all from WAN not DSTNATed\" connection-nat-state=!dstnat in-interface=ether1<\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The default DSTNATed firewall rule keeps traffic from the WAN accessing LAN side IP addresses. More info here Printing the rules on a router with the default config should show the following. ;;; defconf: drop all from WAN not DSTNATed &hellip; <a href=\"https:\/\/www.incredigeek.com\/home\/mikrotik-routeros-drop-all-from-wan-not-dstnated\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[452],"tags":[864,160,619,301,863,388],"class_list":["post-2943","post","type-post","status-publish","format-standard","hentry","category-mikrotik","tag-dstnat","tag-firewall","tag-ip","tag-mikrotik","tag-nat","tag-routeros"],"_links":{"self":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/2943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/comments?post=2943"}],"version-history":[{"count":3,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/2943\/revisions"}],"predecessor-version":[{"id":2946,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/2943\/revisions\/2946"}],"wp:attachment":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/media?parent=2943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/categories?post=2943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/tags?post=2943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}