Details, Fiction and winbox login
The 1st rule accepts packets from now recognized connections, assuming These are Risk-free to not overload the CPU. The next rule drops any packet that link tracking identifies as invalid. After that, we setup standard take policies for distinct protocols.
WinBox may be used as a Resource to moni