This article is a mirror article of machine translation, please click here to jump to the original article.

View: 1948|Reply: 0

[Tips] MikroTik (2) prohibits a device from accessing the external network, only internal network access

[Copy link]
Posted on 11/3/2024 7:35:21 PM | | | |
Requirements: Since the device is a third party and cannot enter the internal system, for data security considerations, it is necessary to prohibit the device from accessing the external network (Internet), and only need to transmit traffic with the LAN device.

Option 1 (not tested):

To establish two rules, you need to pay attention to the order of priority, as follows:

Option 2 (recommended):

A combination command is done as follows:



Both scenarios require IP binding to be non-static, and MAC address settings are recommended for dynamic assignmentsrc-mac-address

In RouterOS, when you manually configure firewall rules, such as drop rules, to block certain traffic, these rules usually only affect newly established connections. For connections that already exist, RouterOS continues to allow packets from those connections to pass through until they are terminated or time out naturally.

This is because firewall rules typically act on new connection requests (i.e., packets in a new state), whileConnections that have already been established are not immediately interrupted(i.e., the package in the established state). This design is to ensure the stability and reliability of the network, avoiding sudden disruptions to existing services and applications.

If you wish to terminate all connections that have already been established immediately, you need to intervene manually. For example:



(End)





Previous:Two commonly used data sets for object detection, COCO and VOC
Next:Docker installs RedisInsight to execute Redis commands using the web
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com