Hi,...although my navigation and latency values are definitely sufficient I am having some problems...
Do you want to limit flooding with NTP port but you do not care about flooding for DNS or SNMP or any other "well known" service?Any possible kind of DoS attack that use this port...
Kind question: what is the voltage of the mentioned current"?... both put out current on the frame ground screw. It's the same voltage that's going in via the DC ports....
Do not forget that your router is still under attack but packets are dropped or not accepted....
I changed the Ports with a few clicks and presto no more attacks on the Mikrotik Router.
..
vortex ... please do not treat us as fools and please do not lie ... once more i see such a comment and you will be bannedI think more people would want a couple 40G ports at home than 12x 10G.
Maybe it is the answer.CCR2004-1G-12S+2XS is our router with the most powerful single-core performance so far. It provides incredible results in single tunnel (up to 3.4 Gbps) and BGP feed processing.
A. I just care. Why not?Why do you care? He started this thread.
Just test CHR https://wiki.mikrotik.com/wiki/Manual:CHR3,4) RouterOS is known to not support everything. If you want to be sure, download CD image and try to install it. It will run without any limits for 24 hours. Or there's free L1 license, it works forever, but has some stuff limited.
It is much better to check ping mikrotik.com as it checks not only Internet access but also a DNS resolver.....
And of course you must be able to reach internet from the device. So in Tools->Ping try to ping 8.8.8.8. That must work. When not, fix it first.
(check IP->Routes etc)
Shouldn't it be "conversion"?Version 6.46beta38 has been released.
......
*) console - fixed IP conversation to "num" data type;
....
For some "<>" should be usedYou are using the wrong symbol to explain to IT people, should use "!=" instead, then they will better understand![]()
Emils*) e-mail - fixed missing "from" address for sent e-mails (introduced in v6.44);
/ip firewall filter
add action=drop chain=input comment=WAN->DNS dst-port=53 in-interface=YOURWAN protocol=udp
...dst-port=!8291,22 ...