Hi Jaclaz, my intention was generic, thanks for pointing that out, in which case the OP only needs to allow local/vpn admin associated IPs to the input chain from the LAN side.@anav
In the OP's current config the DNS server Is on another device, 192.168.1.9.
I hope I get at least 20 tries before getting locked out ( counting my toe prints)EAP? One unique fingerprint per device. Yay!
Hi Ammo, cant recall did it long ago but on a 1gig connection on either end same city same provider, rb4011 to RB450G maybe,????? while ago....You get what you measure...
Your post makes no sense, suspect language barrier, try google translate next time.@Mesquite - remember Your kind words the next time you ask for help at a car repair shop, or at a birthday present, or when painting your room...
Would require open minds and forward thinking business planning! Will see if both exist.
MikroTik and CloudFlare business relationship would be a good idea. Even on a limited level with ClouldFlare Free plain. It would be a start.
Oh no question, I was giving you the FACTS, the bible so to speak.
Now, @anav: what was you question in the post above?
+1Ah. This we agree upon: it's past time they shove it behind some Cloudfare or whatnot.I meant before MT gives in and adds a third-party DDoS protection service.
Your loss and I guess some folks can't handle the truth. I find honest no BS answers refreshing and they are irrefutable when back up by technical acumen.I am always open to new information, but due to your initial approach, I am closed to any information from you.
One would think MT would use its own advice --->>>https://help.mikrotik.com/docs/spaces/R ... ProtectionMight be time to try out a frontend like Cloudflare or similar to get rid of the DDoS attacks.