How To Protect DNS Attacks Thanks
UDP 53 port How To Limit By SRC address
Thanks
How To Protect DNS Attacks Thanks
UDP 53 port How To Limit By SRC address
Thanks
You may use firewall to filter packets destined to 53 port.
chain=input to protect your router.
chain=forward to protect customers.
Hai fren
yes, we allowed private dns only, and our client can't use DNS's isp... nice ![]()
as sergejs's suggested, i run since 2 years ago.
Yes I understand I have firewall rules, that are working fine, but I need to limit DNS requests somehow.
Sometimes I see DNS does not work on my router (ROS 2.9.50), when I torch the interfaces, I see that someone from my clients attacks (DNS UDP port 53 a lot of requests). How can I solve this problem, or may be you can give any script blocking such client for a while ?
Thanks
With Regards Karapet Aznavuryan
Specify to block what exactly.
Hai again,
no, i think enough without any scripts and i had 2 rules about it.
src-address=!my_isp_address_list protocol=udp action=drop port=53 chain=input
dst-address=!my_private_dns protocol=udp port=53 action=drop chain=forward
and i have another rules like that for central ntp[port=123] too.
you may use ‘limit’ filter in firewall rules to limit packet rate
or use queue for dns requests
Maybe this will help:
http://wiki.mikrotik.com/wiki/Bruteforce_login_prevention_(FTP_%26_SSH)
?
-Matt
Chupaka
May Be You can give some examples, how to use dns limit?
I’ll be very glad to see them,
Now I’m trying to limit them by the following
/ip firewall filter
add chain=input action=accept dst-port=53 protocol=udp limit=2400/1m,5 comment="limited dns" disabled=no
add chain=input action=accept dst-port=53 protocol=udp comment="allowed dns" disabled=no
I need something like that, can You help me?
/ip firewall filter
add chain=input action=accept dst-port=53 protocol=udp limit=2400/1m comment="limited dns" disabled=no
add chain=input action=drop dst-port=53 protocol=udp comment="all others go to hell" disabled=no
I Registered to thank you Chupaka! It really helps me.
If using chain=forward; wouldn’t that block customers DNS queries if they decided to use a public DNS?
How might you implement protection from DNS attacks on customers CPE’s from the Core Router?