hi for all ..! i am using RB951ui and despite that i am using -as far as i think- a strong firewall rules i’ve had alot of hacking process on my router in the last few days, so please anyone can advise me
on a strong firewall rules that i can apply on my router that can make sence …?
this is my firewall rules in my router..
2-ip-services-i disable all port except the winbox port
3-Mitigate the DDOS attack (the purpose of this rule is to mitigate the number of connection)
What is this supposed to mean? lets assume you enable the rule (at the moment its disabled) it will say “if input interface is NOT ethernet1, then drop packet”. Assuming your Ether1 is WAN, then you would essentially cut off access to your router from LAN, but leave access from WAN.
Reset to default settings your routerboard and do not touch it.
About:
«3-Mitigate the DDOS attack»
You can do NOTHING, only your ISP can help you.
If you are under DDoS attack, the packes still reach your ruter regardless any rule set.
The solution is unplug the cable, or call your ISP.
******* Put this rule in last because if the allow LAN rule above that, is not in place you will lock yourself out of the router.
One problem might be that you have port forwardings.
Ensure that you use source address for the external users coming in (their public IP, or DYDNS name if their WANIP is dynamic)
very thanksful for all....!
please anyone can quide me to any document that explain the default firewall rules in mikrotik router board...?
rule by rule..
model = 951Ui-2HnD
/ip firewall filter
add action=accept chain=input comment=
"defconf: accept established,related,untracked" connection-state=
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid"
connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN"
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy"
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy"
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack"
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
"defconf: accept established,related, untracked" connection-state=
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid"
connection-state=invalid
add action=drop chain=forward comment=
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat
connection-state=new in-interface-list=WAN