What command is necessary to prevent access to the server at 192.168.1.10 from LAN1 devices?

Enhance your networking skills with the MikroTik Certification Exam Prep. Master concepts with flashcards and multiple choice questions, with hints and explanations. Be ready for your certification!

The command that successfully prevents access to the server at 192.168.1.10 from devices on LAN1 is constructed properly for use in the input chain of the firewall filter. The input chain is responsible for packets that are directed to the router itself, meaning that filtering here will drop any packets coming from a specific source toward the server's IP.

In this scenario, specifying the source address as 192.168.99.1 indicates that the rule is targeting traffic specifically from that IP. By using the action "drop," this command denies any attempts to reach 192.168.1.10 initiated from 192.168.99.1.

Other options provided may not properly target traffic coming from the intended network since they either use incorrect chains or more general source addressing that wouldn't adequately isolate traffic to be dropped. For instance, one of the options incorrectly focuses on forwarding traffic rather than directly addressing input traffic targeted at the server, which would compromise the goal of securing direct access to that IP destination. Additionally, there's an option that involves NAT, which is not suitable for this filtering purpose, as NAT is mainly for address translation rather than access control.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy