Currently I'm using couple of Mikrotik devices in my internal network. The main router has two ISP connections (PPoE and Static coming from DSL model as backup). I've also set up the router with Allow-remote-requests=yes. As for now I don't have any specific rules to drop port 53 inputs but I have a rule to drop all not coming from LAN. I was wondering if I have to set up rules to allow port 53 UDP/TCP on the input chain for LAN and then specifically drop or my firewall configuration is good enough. I would appriciate any help to improve the security of my home network, here is the firewall export:
Code:Select all
/ip firewall filter add action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalid add action=accept chain=input comment="defconf: accept ICMP" \ in-interface-list=!WAN protocol=icmp add action=drop chain=input comment="defconf: drop all not coming from LAN" \ in-interface-list=!LAN add action=accept chain=forward comment="defconf: accept in ipsec policy" \ ipsec-policy=in,ipsec add action=accept chain=forward comment="defconf: accept out ipsec policy" \ ipsec-policy=out,ipsec add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \ connection-state=established,related add action=accept chain=forward comment=\ "defconf: accept established,related, untracked" connection-state=\ established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalid add action=drop chain=forward comment=\ "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \ connection-state=new in-interface-list=WAN /ip firewall nat add action=src-nat chain=srcnat comment="SRC-NAT MainLink" out-interface=\ pppoe-out1 to-addresses= ISP1 add action=src-nat chain=srcnat comment="SRC-NAT BackUp" out-interface=\ ether2-WAN2 to-addresses= ISP2