MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
8.4 Filtering Rules Explained

8.4 Filtering Rules Explained

Key Concepts

1. Filtering Rules

Filtering rules are used to control and manage network traffic by specifying conditions under which packets are allowed or denied. These rules help in securing the network by blocking unwanted traffic and allowing only authorized traffic to pass through.

Example: Think of filtering rules as a security guard at a gated community. Just as the guard allows residents and their guests to enter while keeping out strangers, filtering rules allow authorized traffic while blocking unauthorized traffic.

2. Match Criteria

Match criteria define the conditions that packets must meet to be affected by a filtering rule. These criteria can include parameters such as source IP address, destination IP address, protocol type, port number, and more. Matching the correct criteria ensures that the rule is applied accurately.

Example: Consider match criteria as a set of instructions for a security guard. Just as the guard checks for a valid ID and vehicle pass, match criteria check for specific parameters in the packets to determine if they should be allowed or denied.

3. Action Types

Action types define what happens to the packets that match the filtering criteria. Common actions include allowing the packet to pass, dropping the packet, or rejecting the packet with an error message. The choice of action depends on the network policy and the desired outcome.

Example: Think of action types as different responses to a security breach. Just as a security guard can allow entry, deny entry, or call for backup, action types can allow packets, drop packets, or reject packets with an error message.

4. Logging

Logging involves recording the actions taken by the filtering rules, such as which packets were allowed, denied, or dropped. This information is useful for monitoring network activity, troubleshooting issues, and ensuring compliance with security policies.

Example: Consider logging as a surveillance system in a gated community. Just as the surveillance system records who enters and exits, logging records which packets are allowed or denied, providing a record for future reference.

5. Configuration and Implementation

Configuring and implementing filtering rules on a MikroTik router involves several steps:

Example: Configuring filtering rules is like setting up a security system. You need to define the criteria for entry (match criteria), decide the response to unauthorized access (action types), record the activities (logging), apply the rules to the appropriate areas (interfaces), and test the system to ensure it works correctly.