I have on my gateway router mikrotik version 3.30. It's most stable on a current hardware.
I would like to block tcp syn flood attempts from clients inside my network to clients in the internet. I tried this:
/ip firewall filter
add action=jump chain=forward comment="SYN Flood protect" disabled=no jump-target=SYN-floodcheck protocol=tcp src-address-list=LOKAL tcp-flags=syn
add action=accept chain=SYN-floodcheck comment="" disabled=no dst-limit=1000,0,addresses-and-dst-port/10s protocol=tcp src-address-list=LOKAL tcp-flags=syn
add action=drop chain=SYN-Protect comment="" disabled=no
First rule should direct tcp packets with syn flag from LAN to SYN-floodcheck chain. Second rule should allow all packets (if there is less than 1000 packets each seconds). Third rule should drop all overlimit packets.
But this doesn't work. Third rule is used even though packet rate at second rule is around 40 pps which shouldn't happen.
Could this be a bug in dst-limit matcher?
Thanks