Hello,
We use routerboard 1200 in a colocated datacenter with 10M connection. Recently we have had a lot of issues with flooding attacks from IP’s based in china. Since we have a lot of RDP users, they get disconnected when these 8-9 second attacks happens and then they have to re-enter the credentials which obviously they are not very pleased about.
So far we have tried to drop packets using these commands
add chain=forward src-address=0.0.0.0/8 action=drop
add chain=forward dst-address=0.0.0.0/8 action=drop
but I wanted to block the entire china IP block. We can easily get a list from http://www.countryipblocks.net/ and I have created the commands using excel for the entire list so all I need to do is copy paste into the terminal.
My worry is that with almost 8000 rules (4K src and 4k dst), will I see a major degradation in performance?
Any other ideas on stopping such flooding attacks?
Thanks in advance!