MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
Firewall Rules Configuration Explained

Firewall Rules Configuration Explained

Firewall rules are essential for controlling network traffic and ensuring security on a MikroTik router. Understanding how to configure these rules is crucial for the MikroTik Certified Network Associate (MTCNA) certification.

Key Concepts

1. Firewall Chains

Firewall chains are sequences of rules that determine how packets are processed. Common chains include:

2. Rule Actions

Rule actions define what happens to packets that match a rule. Common actions include:

3. Rule Criteria

Rule criteria specify the conditions under which a rule is applied. Common criteria include:

4. Rule Order

The order of rules is crucial, as the first matching rule determines the packet's fate. Rules are processed in the order they are listed, from top to bottom.

5. Logging

Logging allows you to record packets that match specific rules. This is useful for monitoring and troubleshooting network traffic.

6. Default Policies

Default policies are applied when no rule matches a packet. Common default policies include:

Detailed Explanation

Firewall Chains

To configure a firewall chain on a MikroTik router, you would use the command:

/ip firewall filter add chain=input

This command creates a new rule in the input chain, which processes packets destined for the router itself.

Rule Actions

To configure a rule action on a MikroTik router, you would use the command:

/ip firewall filter add chain=forward action=drop

This command creates a rule in the forward chain that drops packets passing through the router.

Rule Criteria

To configure rule criteria on a MikroTik router, you would use the command:

/ip firewall filter add chain=output src-address=192.168.1.10 protocol=tcp port=80

This command creates a rule in the output chain that applies to packets originating from the IP address 192.168.1.10 using the TCP protocol on port 80.

Rule Order

To change the order of rules on a MikroTik router, you would use the command:

/ip firewall filter move [find where chain=input] before=1

This command moves the first matching rule in the input chain to the top of the list.

Logging

To enable logging for a rule on a MikroTik router, you would use the command:

/ip firewall filter add chain=forward action=accept log=yes

This command creates a rule in the forward chain that logs accepted packets.

Default Policies

To configure default policies on a MikroTik router, you would use the command:

/ip firewall filter set [find where chain=input] action=drop

This command sets the default policy for the input chain to drop unmatched packets.

Examples and Analogies

Example: Firewall Chains

Think of firewall chains as conveyor belts in a factory. Each belt (chain) processes items (packets) in a specific way, depending on their destination (input, forward, output).

Example: Rule Actions

Consider rule actions as traffic lights. Green (accept) allows traffic to pass, red (drop) stops traffic, and yellow (reject) stops traffic with a warning.

Example: Rule Criteria

Imagine rule criteria as filters in a water purification system. Each filter (criteria) removes specific impurities (conditions) from the water (packets).

Example: Rule Order

Think of rule order as a checklist. The first item (rule) on the list is checked first, and if it matches, the rest are ignored.

Example: Logging

Consider logging as a security camera. It records (logs) all activities (packets) that match specific conditions (rules).

Example: Default Policies

Imagine default policies as the final step in a manufacturing process. If an item (packet) doesn't meet any specific criteria (rules), it is processed according to the default policy (accept or drop).

By mastering firewall rules configuration, you can effectively control network traffic and enhance security on your MikroTik router.