Community discussions

Search found 5 matches

by alexvicol
Wed Sep 06, 2017 9:18 am
Forum: General
Topic: Default route internal network
Replies: 3
Views: 703

Re: Default route internal network

Well , it looks like it won't work. The TP-Link connects to a wireless network that has the same network ( 192.168.1.0/24 ) an receives 192.168.1.3 For his internal network it forces the change to 192.168.2.0/24 so I can't change the network back to 192.168.1.0/24 to be in the same domain. I can't m...
by alexvicol
Tue Sep 05, 2017 10:54 pm
Forum: General
Topic: Default route internal network
Replies: 3
Views: 703

Default route internal network

Hi, I have a RB2011UiAS-IN which has the WAN port on eth1 with static IP . The rest of the ports are bridged with 192.168.1.1/24 . I have another router ( TP-Link ) in WISP mode conected through WIFI to another ISP and has the internal network ( 192.168.2.1/24 ) connected through wired connection to...
by alexvicol
Fri Nov 04, 2016 1:34 pm
Forum: General
Topic: DDoS story, or WARNING: use 'conection-limit' with caution!
Replies: 112
Views: 63060

Re: DDoS story, or WARNING: use 'conection-limit' with caution!

In torch if I run with the Ip of the dns in src. address it displays the traffic.
I have no other firewall rules, just these ones.
How can I check if the adresses are returned from forward before detect-dos chain?
by alexvicol
Fri Nov 04, 2016 11:41 am
Forum: General
Topic: DDoS story, or WARNING: use 'conection-limit' with caution!
Replies: 112
Views: 63060

Re: DDoS story, or WARNING: use 'conection-limit' with caution!

Hi, Already tried that. Same thing: 1 chain=forward action=jump jump-target=detect-ddos connection-state=new log=no log-prefix="" 2 chain=detect-ddos action=return dst-address-list=exceptions log=no log-prefix="" 3 chain=detect-ddos action=return dst-limit=32,32,src-and-dst-addresses/10s log=no log-...
by alexvicol
Thu Nov 03, 2016 10:54 pm
Forum: General
Topic: DDoS story, or WARNING: use 'conection-limit' with caution!
Replies: 112
Views: 63060

Re: DDoS story, or WARNING: use 'conection-limit' with caution!

Hi, I have: 1 chain=forward action=jump jump-target=detect-ddos connection-state=new log=no log-prefix="" 2 chain=detect-ddos action=return src-address-list=exceptions log=no log-prefix="" 3 chain=detect-ddos action=return dst-limit=32,32,src-and-dst-addresses/10s log=no log-prefix="" 4 chain=detect...