/ip firewall filter
add action=accept chain=---------- comment=\
".::>>>>>>>>>> INPUT <<<<<<<<<<::." disabled=yes
add action=accept chain=input comment=".::INP::. ack icmp in" disabled=yes \
in-interface-list=Wan protocol=icmp
add action=drop chain=input comment=".::INP::. drop invalid conn" \
connection-state=invalid disabled=yes log-prefix=invalid
add action=accept chain=input comment=\
".::INP::. estabelecidas & relacionadas" connection-state=\
established,related disabled=yes
add action=accept chain=input comment=".::INP::. dns" disabled=yes dst-port=\
53 protocol=udp
add action=accept chain=input comment=".::INP::. dhcp" disabled=yes dst-port=\
67 protocol=udp
add action=accept chain=input comment=\
".::INP::. Winbox Mikrotik (from knock knock list)" disabled=yes \
dst-port=52123 protocol=tcp src-address-list=Winbox
add action=add-src-to-address-list address-list=Winbox address-list-timeout=\
8h chain=input comment=".::INP::. Knock Knock Winbox" disabled=yes \
dst-port=63321 protocol=tcp
add action=drop chain=input comment=".::INP::. drop all" disabled=yes \
log-prefix=INPUT_DROP