I think any update would cause this.
2023:02:19-00:31:55 utm ulogd[22524]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="47" initf="eth2" mark="0x21bd" app="445" srcmac="00:16:4d:d1:96:c4" dstmac="c0:a0:0d:77:0b:b1" srcip="162.220.167.38" dstip="107.192.142.41" proto="17" length="497" tos="0x00" prec="0x00" ttl="117" srcport="7146" dstport="5102" 2023:02:19-00:32:58 utm ulogd[22524]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0.4" srcmac="96:6b:3b:ef:56:2c" srcip="3.221.217.21" dstip="10.10.4.154" proto="6" length="40" tos="0x00" prec="0x00" ttl="64" srcport="80" dstport="36662" tcpflags="RST"
Then I found this thread through a google seearch - Lots of default drops in firewall log
iptable.filter
https://pastebin.com/dijEaPHt
ip6table.filter
https://pastebin.com/5nB7ndQ3
These go into /var/mdw/etc/iptables. Adjust the interface to reflect your wan interface.
Be sure to remove the first line of each as it identifies the file name and location. User:group is root:root, permission 644.
Reboot to complete.
This thread was automatically locked due to age.