I know that this is the mikrotik philosophy, and I'm absolutely ok with that, just to be clear. BUT: if the examples in the documentation would work out of the box, there would be no need for such discussions in the first place. The idea of concepts is certainly the right approach in theory, but the reality, as I understand it, is different. In the end, the question remains as to what is more important to me: a secure device that can navigate the Internet reasonably safely, with a user who may not have fully understood the firewall rules, or a user who, despite all the warnings, simply copy/pastes the rules and thinks he/she is safe.
Seeing that anav also chimed in on the discussion (thanks a lot for your effort!) I will leave it at rest. All questions answered and I don't want to start or restart a discussion that already took place in the past. I can understand and accept, that the mikrotik approach is different to my own.![Smile :)]()
Thanks again to everyone here trying to get stuff done and helping, even with supposedly stupid questions.![Wink ;-)]()
Seeing that anav also chimed in on the discussion (thanks a lot for your effort!) I will leave it at rest. All questions answered and I don't want to start or restart a discussion that already took place in the past. I can understand and accept, that the mikrotik approach is different to my own.

Thanks again to everyone here trying to get stuff done and helping, even with supposedly stupid questions.

Statistics: Posted by Lumpy — Mon Feb 26, 2024 1:42 pm