i want to disable UDP flooding on mikrotik is there any option on mikrotik to disable UDP flooding.
I want disable UDP flooding just because VOIP is not working properly.
plaese share wth configuration steps.
i want to disable UDP flooding on mikrotik is there any option on mikrotik to disable UDP flooding.
I want disable UDP flooding just because VOIP is not working properly.
plaese share wth configuration steps.
What is “udp flooding?”
Are you the target of a DDoS attack?
Are you being used as part of an outbound DDoS attack? (this is the most likely)
Most likely you have DNS configured to “allow remote requests=yes”
This is okay if you need the feature, but you should make sure that your WAN interface(s) block incoming DNS requests.
Most commonly, people take a default configuration, and add a pppoe-client configuration to connect to an ADSL provider, but then forget to update the firewall rules. If this is your case, then go into the IP > Firewall > Filter tab, and look at the rules of the INPUT chain… there’s probably a rule that says action=drop in-interface=ether1-gateway. If you’re using PPPoE, change the in-interface to be pppoe1-out (or whatever your pppoe client interface is named).
If you’re not using the Mikrotik as a DNS proxy, then just disable the feature (set the allow remote requests = no).
If you are the target of the DDoS attack, then none of this matters - you probably need to call your ISP and have them filter the attack if possible.
Nope sir, i am not the target of DDoS attack.
There are two lines terminated on mikrotik one is ILL and other is MPLS line.
and we are running VOIP on MPLS line between two locations. and this VOIP is not working on MPLS line. Here VOIP engineer says that we have to disable UDP flooding to fix this.so please tell what we can do to block UDP flooding
You should give us some more details. UDP flooding is a very general term and is not enough to solve the problem.
You need to investigate a little: What is the source of those UDP packets? Are they unicast/multicasts?
Is it legitimate traffic or not?
Depending on the answers, you need to construct proper firewall rules.