Ill take a stab at it..

This being a Forward rule means that anything that passes through the router or interface.

Every packet out of the SFP interface except public ips coming to the SFP.

So if a packet that has a rfc1918 in it destined to the sfp to be natted or dest- natted then drop.


if your worried about rfc1918 space trying to route then use this

add action=drop chain=forward comment="Drop ip fragmentation" connection-state=invalid



On 4/25/2017 6:38 PM, Jason McKemie wrote:
Can anyone see why this firewall rule would just be dropping all traffic?

add action=drop chain=forward comment="Drop Spoofed Traffic" disabled=yes \
    out-interface=sfp1 src-address-list=!Public-IPs

It's disabled here obviously, but other than that...

--

Reply via email to