Nop, it will only drop new requests, don’t forget that your requests will be initiated by router itself so replies to those will return as connection-state=established
The network is live with 320 online users.
Sure, this wont break the connection ?
I will paste the code to terminal then.
Im 500 miles away from my core office.
you have to add accept rules specifically for winbox (protocol=tcp dst-port=8291) i do not suggest to allow access to web config from outside, use winbox.
Got the email again, but its for an IP which is no where in the network, but as a block only.
You appear to be running an open recursive resolver at IP address 103.194.232.65 that participated in an attack against a customer of ours, generating large UDP responses to spoofed queries, with those responses becoming fragmented because of their size.
Please consider reconfiguring your resolver in one or more of these ways:
To only serve your customers and not respond to outside IP addresses (in BIND, this is done by defining a limited set of hosts in “allow-query”; with a Windows DNS server, you would need to use firewall rules to block external access to UDP port 53)
To only serve domains that it is authoritative for (in BIND, this is done by defining a limited set of hosts in “allow-query” for the server overall but setting “allow-query” to “any” for each zone)
To rate-limit responses to individual source IP addresses (such as by using DNS Response Rate Limiting or iptables rules)
You can see the IP is as a block and not even used.
Then how come ?