Hi guys
we have obtained recently ASN block IPv4 /22 on our ISP.. and we have setup BGP .. after a couple of weeks of testing this IPs blocks, updating the Region/country of the ASN ip block, aparently this block was accquired from another region country to our country so after setting up the ASN and all our testing was done on the ips.
We have decided to setup and announce on BGP, and setup de pppoe-servers to distribute the public IPS to our clients..on pppoe-client mode.
the problem is that 35% os customers started complaining about downtime on the internet, routers disconnecting and slowliness on the navigation.. wifi´s connected with no internet displayed. customers having to reboot routers several times per day to get internet going.. so we have decided to migrate those clients to previous pppoe-nated private ips like they were connected before, and internet started working normal again.. and we noticed that our filter rules displaying blocking several attempts of attacks on the ports added to filter rules for viruses, worms, trojans etc...
whilst on the public ips on ASN we have created the accept rule to pass all traffic without blocking ports on the public ips.. so i am guessing that these types of attacks must be hammering the clients routers with attempts to access the devices.. i have seen on the net that there could be a ton of attacks types syn flood, dns, upnp..
so my question is, is there any approach on how to block this known famous ports of viruses and trojans.. also on the public ips alocated to our clients on pppoe-server mode? if so should this be done on the PPPOE server mikrotik side? or it could be done on the BGP machine side?
is there a way to secure the ASN IP block for the most common known virus ports on the mikrotik side?