30mbit
50k pps
cpu load 80+%!
Where from queuing 21.7%?
Where from firewall 25.7%?
[dobrofenix@MikroTik] > ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; ddos protect
chain=forward action=jump jump-target=detect-ddos connection-state=new1 chain=detect-ddos action=return dst-limit=32,32,src-and-dst-addresses/10s
2 chain=detect-ddos action=add-dst-to-address-list address-list=ddosed
address-list-timeout=5m3 chain=detect-ddos action=add-src-to-address-list address-list=ddoser
address-list-timeout=10m4 chain=forward action=drop connection-state=new src-address-list=ddoser
dst-address-list=ddosed5 ;;; SYN Flood protect
chain=forward action=jump jump-target=SYN-Protect tcp-flags=syn
connection-state=new protocol=tcp6 chain=SYN-Protect action=accept tcp-flags=syn connection-state=new
protocol=tcp limit=100,57 chain=SYN-Protect action=drop tcp-flags=syn connection-state=new
protocol=tcp8 ;;; limit
chain=input action=add-src-to-address-list protocol=tcp
address-list=blocked-addr address-list-timeout=1d connection-limit=25,329 chain=input action=tarpit protocol=tcp src-address-list=blocked-addr
connection-limit=5,3210 ;;; Port scanners to list
chain=input action=add-src-to-address-list protocol=tcp psd=21,3s,3,1
address-list=port scanners address-list-timeout=2d11 ;;; NMAP FIN Stealth scan
chain=input action=add-src-to-address-list
tcp-flags=fin,!syn,!rst,!psh,!ack,!urg protocol=tcp
address-list=port scanners address-list-timeout=2w12 ;;; SYN/FIN scan
chain=input action=add-src-to-address-list tcp-flags=fin,syn
protocol=tcp address-list=port scanners address-list-timeout=2w13 ;;; SYN/RST scan
chain=input action=add-src-to-address-list tcp-flags=syn,rst
protocol=tcp address-list=port scanners address-list-timeout=2d14 ;;; FIN/PSH/URG scan
chain=input action=add-src-to-address-list
tcp-flags=fin,psh,urg,!syn,!rst,!ack protocol=tcp
address-list=port scanners address-list-timeout=2w15 ;;; ALL/ALL scan
chain=input action=add-src-to-address-list
tcp-flags=fin,syn,rst,psh,ack,urg protocol=tcp
address-list=port scanners address-list-timeout=2w16 ;;; NMAP NULL scan
chain=input action=add-src-to-address-list
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg protocol=tcp
address-list=port scanners address-list-timeout=2w17 ;;; dropping port scanners
chain=input action=drop src-address-list=port scanners18 ;;; Drop 80 DoS attack
chain=virus action=drop protocol=tcp src-address-list=spammer
connection-limit=4,32 limit=4,519 ;;; Drop 80 DoS attack
chain=virus action=add-src-to-address-list protocol=tcp
src-address-list=!smtpOK address-list=spammer address-list-timeout=2d
connection-limit=5,32 limit=5,520 chain=forward action=drop protocol=udp src-address=80.252.18.136
21 chain=forward action=drop protocol=udp src-address=85.113.37.46
22 chain=forward action=drop src-address=80.252.18.3
23 chain=forward action=drop protocol=udp dst-port=27001
24 chain=forward action=accept
[dobrofenix@MikroTik] > queue simple print det
Flags: X - disabled, I - invalid, D - dynamic
