Hello everyone, somebody can help me analyzing the firewall rules that currently running on my mikrotik router ?
Is there something to tweak or to change to make it better or more efficient? Or it seems OK?
As far as i know, it seems to works fine at the moment…
Thank you!
/ip firewall mangle
add action=add-src-to-address-list address-list=Worm-Infected-p445 address-list-timeout=1h chain=prerouting connection-state=new disabled=no dst-port=445 limit=5,10 protocol=tcp
/ip firewall filter
add action=drop chain=forward comment=10:89:FB:64:6D:1A src-mac-address=\
10:89:FB:64:6D:1A
add action=drop chain=input comment=10:89:FB:64:6D:1A src-mac-address=\
10:89:FB:64:6D:1A
add action=accept chain=input comment="Allow LAN DNS queries-UDP" dst-port=53 \
in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow LAN DNS queries - TCP" dst-port=\
53 in-interface-list=LAN protocol=tcp
add action=drop chain=forward comment="Drop WAN DNS queries-UDP" dst-port=53 \
in-interface-list=WAN protocol=udp
add action=drop chain=forward comment="Drop WAN DNS queries - TCP" dst-port=\
53 in-interface-list=WAN protocol=tcp
add action=accept chain=input comment="Allow IPSEC/IKE2 connections" \
disabled=yes dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="Accept in ipsec policy" disabled=yes \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="Accept out ipsec policy" disabled=\
yes ipsec-policy=out,ipsec
add action=accept chain=input comment="Allow Wireguard Trrafic" src-address=\
192.168.100.0/24
add action=accept chain=input comment="Allow Wireguard" dst-port=13231 \
protocol=udp
add action=jump chain=forward connection-state=new jump-target=block-ddos
add action=drop chain=forward connection-state=new dst-address-list=ddosed \
src-address-list=ddoser
add action=return chain=block-ddos dst-limit=50,50,src-and-dst-addresses/10s
add action=add-dst-to-address-list address-list=ddosed address-list-timeout=\
1m chain=block-ddos
add action=add-src-to-address-list address-list=ddoser address-list-timeout=\
1m chain=block-ddos
add action=drop chain=input comment="ping port scanners" src-address-list=\
"port scanners"
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2m chain=input comment="Port scanners to list " \
protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2m chain=input comment="NMAP FIN Stealth scan" \
protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2m chain=input comment="SYN/FIN scan" protocol=tcp \
tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2m chain=input comment="SYN/RST scan" protocol=tcp \
tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2m chain=input comment="FIN/PSH/URG scan" protocol=\
tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=30m chain=input comment="ALL/ALL scan" protocol=tcp \
tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2m chain=input comment="NMAP NULL scan" protocol=tcp \
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=virus comment="Blaster Worm" dst-port=135-139 protocol=\
tcp
add action=drop chain=virus comment="Blaster Worm" dst-port=445 protocol=tcp
add action=drop chain=virus comment="Messenger Worm" dst-port=135-139 \
protocol=udp
add action=drop chain=virus comment="Blaster Worm" dst-port=445 protocol=udp
add action=drop chain=virus comment=________ dst-port=593 protocol=tcp
add action=drop chain=virus comment=________ dst-port=1024-1030 protocol=tcp
add action=drop chain=virus comment=MyDoom dst-port=1080 protocol=tcp
add action=drop chain=virus comment=________ dst-port=1214 protocol=tcp
add action=drop chain=virus comment="ndm requester" dst-port=1363 protocol=\
tcp
add action=drop chain=virus comment="ndm server" dst-port=1364 protocol=tcp
add action=drop chain=virus comment="screen cast" dst-port=1368 protocol=tcp
add action=drop chain=virus comment=hromgrafx dst-port=1373 protocol=tcp
add action=drop chain=virus comment=cichlid dst-port=1377 protocol=tcp
add action=drop chain=virus comment=Worm dst-port=1433-1434 protocol=tcp
add action=drop chain=virus comment="Bagle Virus" dst-port=2745 protocol=tcp
add action=drop chain=virus comment=Dumaru.Y dst-port=2283 protocol=tcp
add action=drop chain=virus comment=Beagle dst-port=2535 protocol=tcp
add action=drop chain=virus comment=Beagle.C-K dst-port=2745 protocol=tcp
add action=drop chain=virus comment=MyDoom dst-port=3127-3128 protocol=tcp
add action=drop chain=virus comment="Backdoor OptixPro" dst-port=3410 \
protocol=tcp
add action=drop chain=virus comment=Sasser dst-port=5554 protocol=tcp
add action=drop chain=virus comment=Beagle.B dst-port=8866 protocol=tcp
add action=drop chain=virus comment=Dabber.A-B dst-port=9898 protocol=tcp
add action=drop chain=virus comment=Dumaru.Y dst-port=10000 protocol=tcp
add action=drop chain=virus comment=MyDoom.B dst-port=10080 protocol=tcp
add action=drop chain=virus comment=NetBus dst-port=12345 protocol=tcp
add action=drop chain=virus comment=Kuang2 dst-port=17300 protocol=tcp
add action=drop chain=virus comment=SubSeven dst-port=27374 protocol=tcp
add action=drop chain=virus comment="PhatBot, Agobot, Gaobot" dst-port=65506 \
protocol=tcp
add action=drop chain=virus comment=Trinoo dst-port=12667 protocol=udp
add action=drop chain=virus comment=Trinoo dst-port=27665 protocol=udp
add action=drop chain=virus comment=Trinoo dst-port=31335 protocol=udp
add action=drop chain=virus comment=Trinoo dst-port=27444 protocol=udp
add action=drop chain=virus comment=Trinoo dst-port=34555 protocol=udp
add action=drop chain=virus comment=Trinoo dst-port=35555 protocol=udp
add action=drop chain=virus comment=Trinoo dst-port=27444 protocol=tcp
add action=jump chain=forward comment="jump to the virus chain" jump-target=\
virus
add action=drop chain=forward disabled=no dst-port=445 protocol=tcp src-address-list=Worm-Infected-p445
add action=accept chain=input comment="Accept established connections" \
connection-state=established
add action=accept chain=input comment="Accept related connections" \
connection-state=related
add action=accept chain=input comment="Accept untracked connections" \
connection-state=untracked disabled=yes
add action=drop chain=input comment="invalid connections" connection-state=\
invalid
add action=accept chain=input comment=UDP protocol=udp
add action=drop chain=forward comment="invalid connections" connection-state=\
invalid
add action=fasttrack-connection chain=forward comment="Fasttrack DNS TCP" \
dst-port=53 hw-offload=yes protocol=tcp
add action=fasttrack-connection chain=forward comment="Fasttrack DNS UDP" \
dst-port=53 hw-offload=yes protocol=udp
add action=jump chain=forward comment=Bruteforce connection-state=new \
dst-address-list=TechsoftcenterIPBlocks dst-port=22,3389 jump-target=\
Bruteforce protocol=tcp
add action=drop chain=Bruteforce comment="Drop - Blacklist" src-address-list=\
Bruteforce-Blacklist
add action=add-src-to-address-list address-list=Bruteforce-Blacklist \
address-list-timeout=15m chain=Bruteforce comment="Add - Blacklist" \
src-address-list=Bruteforce-Stage3
add action=add-src-to-address-list address-list=Bruteforce-Stage3 \
address-list-timeout=30s chain=Bruteforce comment="Add - Stage-3" \
src-address-list=Bruteforce-Stage2
add action=add-src-to-address-list address-list=Bruteforce-Stage2 \
address-list-timeout=30s chain=Bruteforce comment="Add - Stage-2" \
src-address-list=Bruteforce-Stage1
add action=add-src-to-address-list address-list=Bruteforce-Stage1 \
address-list-timeout=30s chain=Bruteforce comment="Add - Stage-1"
add action=jump chain=input comment="Jump to DNS_INPUT Chain" dst-port=53 \
jump-target=DNS_INPUT log=yes protocol=udp
add action=accept chain=DNS_INPUT comment=\
"Make exceptions for LAN DNS inquiries" port=53 protocol=udp \
src-address-list="LAN Addresses (RFC1918)"
add action=add-src-to-address-list address-list=DNS_DDoS \
address-list-timeout=none-dynamic chain=DNS_INPUT comment=\
"Add other DNS inquriries to DNS_DDoS Offenders List" port=53 protocol=\
udp src-address-list="!LAN Addresses (RFC1918)"
add action=drop chain=DNS_INPUT comment=\
"Drop Traffic Sourced from DNS_DDoS Offenders" src-address-list=DNS_DDoS
add action=return chain=DNS_INPUT comment="Return from DNS_INPUT Chain"
add action=jump chain=output comment="Jump to DNS_OUTPUT Chain" dst-port=53 \
jump-target=DNS_OUTPUT protocol=udp
add action=accept chain=DNS_OUTPUT comment=\
"Make Exceptions for Traffic to the DNS Servers" dst-address-list=\
"DNS Servers" dst-port=53 protocol=udp
add action=drop chain=DNS_OUTPUT comment=\
"Drop All Other Out Bound DNS Traffic" dst-port=53 protocol=udp
add action=return chain=DNS_OUTPUT comment="Return from DNS_OUTPUT Chain"
add action=jump chain=forward comment="Jump to DNS_FORWARD Chain" \
jump-target=DNS_FORWARD
add action=accept chain=DNS_FORWARD comment=\
"Make Exceptions for Traffic from the DNS Servers going to the LAN" \
dst-address-list="LAN Addresses (RFC1918)" port=53 protocol=udp \
src-address-list="DNS Servers"
add action=accept chain=DNS_FORWARD comment=\
"Make Exceptions for Traffic from the LAN going to the DNS Servers" \
dst-address-list="DNS Servers" port=53 protocol=udp src-address-list=\
"LAN Addresses (RFC1918)"
add action=drop chain=DNS_FORWARD comment="Drop All Other DNS Traffic" port=\
53 protocol=udp
add action=drop chain=forward comment=\
"Drop Traffic to DNS DNS_DDoS Offenders" dst-address-list=DNS_DDoS