/ip firewall address-list add address=172.22.0.0/16 comment="Voneus VPN" list=allow-management add address=185.134.196.128/28 comment=FAELIX list=allow-management add address=46.227.200.128/28 comment=FAELIX list=allow-management add address=100.64.0.0/10 comment=RFC6598 list=customer-private add address=46.227.207.251 comment=core.librenms.lon.faelix.twh.voneus.net list=allow-snmp add address=46.227.207.250 comment=fttp.librenms.lon.faelix.twh.voneus.net list=allow-snmp add address=46.227.203.248 comment=fwa.librenms.lon.faelix.twh.voneus.net list=allow-snmp add address=46.227.203.91 comment=librenms01.man.faelix.man.voneus.net list=allow-snmp add address=185.134.197.214 comment=oob.librenms.gen.faelix.che.voneus.net list=allow-snmp add address=185.134.197.197 comment=overlord.librenms.gen.faelix.che.voneus.net list=allow-snmp add address=46.227.203.249 comment=systems.librenms.lon.faelix.twh.voneus.net list=allow-snmp add address=46.227.202.238 comment=vnms.librenms.man.faelix.man.voneus.net list=allow-snmp add address=192.0.2.1 comment=placeholder disabled=yes list=no-cgnat-to add address=192.0.2.2 comment=example disabled=yes list=provisioning /ipv6 firewall address-list add address=2001:db9::/32 comment="Voneus VPN" disabled=yes list=allow-management add address=2a01:9e00:a217:fa00::/56 comment=FAELIX list=allow-management add address=2a01:9e01:a217:fa00::/56 comment=FAELIX list=allow-management add address=2001:db9::/32 comment="Voneus VPN" disabled=yes list=allow-management {% for prefix in 'accept-ipv6-40-48-from-aggregation'|get_netbox_tagged_prefixes %}{% if prefix.prefix|ipv6 %} add address={{ prefix.prefix }} comment="{{ prefix.description }}" list=customer-public {% endif %}{% endfor %} {% for prefix in 'accept-ipv6-40-48-from-aggregation'|get_netbox_tagged_aggregates %}{% if prefix.prefix|ipv6 %} add address={{ prefix.prefix }} comment="{{ prefix.description }}" list=customer-public {% endif %}{% endfor %} {% for prefix in 'accept-ipv6-48-52-from-aggregation'|get_netbox_tagged_prefixes %}{% if prefix.prefix|ipv6 %} add address={{ prefix.prefix }} comment="{{ prefix.description }}" list=customer-public {% endif %}{% endfor %} {% for prefix in 'accept-ipv6-48-52-from-aggregation'|get_netbox_tagged_aggregates %}{% if prefix.prefix|ipv6 %} add address={{ prefix.prefix }} comment="{{ prefix.description }}" list=customer-public {% endif %}{% endfor %} add address=2001:db9::/32 comment=example disabled=yes list=provisioning /ip firewall filter add action=fasttrack-connection chain=forward comment="forward existing connections" connection-state=established,related hw-offload=yes add action=accept chain=forward comment="forward existing connections" connection-state=established,related add action=accept chain=forward comment="forward customer traffic to uplinks and linknets" in-interface-list=customer-and-linknet out-interface-list=uplink-and-linknet add action=accept chain=forward comment="forward traffic arriving from management interfaces" in-interface-list=mgmt add action=accept chain=forward comment="forward IPsec encapsulated traffic" disabled=yes in-interface-list=uplink-and-linknet ipsec-policy=in,ipsec add action=accept chain=forward comment="forward DNAT traffic" connection-nat-state=dstnat disabled=yes in-interface-list=uplink-and-linknet add action=drop chain=forward comment="prevent customers from reaching protected subnets" in-interface-list=customer-and-linknet src-address-list=block-customer add action=drop chain=forward comment="prevent customers from reaching protected subnets" dst-address-list=block-customer in-interface-list=customer-and-linknet add chain=forward comment="forward traffic between linknets" in-interface-list=linknet out-interface-list=linknet add action=drop chain=forward comment="block traffic from uplinks and linknets" in-interface-list=uplink-and-linknet add action=fasttrack-connection chain=input comment="allow established connections to router's control plane" connection-state=established,related hw-offload=yes add action=accept chain=input comment="allow established connections to router's control plane" connection-state=established,related add action=accept chain=input comment="allow DNS" dst-port=53 in-interface-list=customer-and-linknet-and-provisioning-cpe protocol=tcp add action=accept chain=input comment="allow DNS" dst-port=53 in-interface-list=customer-and-linknet-and-provisioning-cpe protocol=udp add action=accept chain=input comment="allow SNMP" dst-port=161 in-interface-list=uplink-and-linknet protocol=udp src-address-list=allow-snmp add action=accept chain=input comment="allow NTP" dst-port=123 in-interface-list=customer-and-linknet-and-provisioning-cpe protocol=udp add action=accept chain=input comment="allow management interfaces to access router's control plane" in-interface-list=mgmt add action=accept chain=input comment="allow public management IPs access to router's control plane" in-interface-list=uplink-and-linknet src-address-list=allow-management add action=accept chain=input comment="allow IPsec" disabled=yes in-interface-list=uplink-and-linknet protocol=ipsec-esp src-address-list=allow-ipsec add action=accept chain=input comment="allow IPsec" disabled=yes dst-port=500,4500 in-interface-list=uplink-and-linknet protocol=udp src-address-list=allow-ipsec add action=accept chain=input comment="allow IPsec" disabled=yes in-interface-list=uplink-and-linknet ipsec-policy=in,ipsec add action=accept chain=input comment="allow BGP on uplinks and linknets" dst-port=179 in-interface-list=uplink-and-linknet protocol=tcp add action=accept chain=input comment="allow ICMP" protocol=icmp add action=accept chain=input comment="allow UDP traceroute" port=33434-33534 protocol=udp add action=drop chain=input comment="protect router's control plane" /ip firewall nat add action=return chain=srcnat src-address-list=public-addresses add action=return chain=srcnat dst-address-list=no-cgnat-to add action=same chain=srcnat out-interface-list=uplink same-not-by-dst=yes src-address-list=customer-private to-addresses=185.66.206.1-185.66.206.3 add action=masquerade chain=srcnat out-interface-list=uplink src-address-list=customer-private add chain=dstnat comment="redirect NTP to local NTP server for provisioning" dst-port=123 protocol=udp src-address-list=provisioning to-addresses=127.0.0.1 /ipv6 firewall filter add action=accept chain=forward comment="forward existing connections" connection-state=established,related add action=accept chain=forward comment="forward customer traffic to uplinks and linknets" in-interface-list=customer-and-linknet out-interface-list=uplink-and-linknet add action=accept chain=forward comment="forward traffic arriving from management interfaces" in-interface-list=mgmt add action=accept chain=forward comment="forward IPsec encapsulated traffic" disabled=yes in-interface-list=uplink-and-linknet ipsec-policy=in,ipsec add action=drop chain=forward comment="prevent customers from reaching protected subnets" in-interface-list=customer-and-linknet src-address-list=block-customer add action=drop chain=forward comment="prevent customers from reaching protected subnets" dst-address-list=block-customer in-interface-list=customer-and-linknet add chain=forward comment="forward traffic between linknets" in-interface-list=linknet out-interface-list=linknet add action=accept chain=forward comment="forward ICMPv6" protocol=icmp add action=drop chain=forward comment="block traffic from uplinks and linknets" in-interface-list=uplink-and-linknet add action=accept chain=input comment="allow established connections to router's control plane" connection-state=established,related add action=accept chain=input comment="allow DNS" dst-port=53 in-interface-list=customer-and-linknet protocol=tcp add action=accept chain=input comment="allow DNS" dst-port=53 in-interface-list=customer-and-linknet protocol=udp add action=accept chain=input comment="allow SNMP" dst-port=161 in-interface-list=uplink-and-linknet protocol=udp src-address-list=allow-snmp add action=accept chain=input comment="allow NTP" dst-port=123 in-interface-list=customer-and-linknet protocol=udp add action=accept chain=input comment="allow management interfaces to access router's control plane" in-interface-list=mgmt add action=accept chain=input comment="allow public management IPs access to router's control plane" in-interface-list=uplink-and-linknet src-address-list=allow-management add action=accept chain=input comment="allow IPsec" disabled=yes in-interface-list=uplink-and-linknet protocol=ipsec-esp src-address-list=allow-ipsec add action=accept chain=input comment="allow IPsec" disabled=yes dst-port=500,4500 in-interface-list=uplink-and-linknet protocol=udp src-address-list=allow-ipsec add action=accept chain=input comment="allow IPsec" disabled=yes in-interface-list=uplink-and-linknet ipsec-policy=in,ipsec add action=accept chain=input comment="allow BGP on uplinks and linknets" dst-port=179 in-interface-list=uplink-and-linknet protocol=tcp add action=accept chain=input comment="allow ICMP" protocol=icmpv6 add action=accept chain=input comment="allow UDP traceroute" port=33434-33534 protocol=udp add action=drop chain=input comment="protect router's control plane"