Hi…
look around in the forum, but no way to find out this…
i manage to make the tcp session limit work…
But, how can we make this thing happen?
thanks…
Hi…
look around in the forum, but no way to find out this…
i manage to make the tcp session limit work…
But, how can we make this thing happen?
thanks…
Assuming that all of those rules are in forward chain, create the same rules that you’ve created for tcp, and set them to limit the udp. and then put this rule on top of them:
/ip firewall filter add chain=forward protocol=udp dst-port=53 action=accept
that way, dns requests will be accepted by the above rule and no limit will be applied to them.