radek1 píše:A proč máš za to, že se jedná o útok? Je cílem toho toku skutečně Mikrotik, resp. INPUT rules?
Buď udělej read only přístup do svojeho MK, nebo pro začátek pošli výpis firewall rules
topic vlakna je otazka. NEVIEM o co sa jedna, iba tipujem. Samozrejme je mozne, ze som im nastreamoval 10GB animal porna lebo ho potrebovali v afghanistane a stacilo im - ziadny utok, cista jednorazovka.
pristup by ti bol k nicomu, pretoze cela "vec" trva 3-5min. A predpokladam ze zle nastavenym firewallom si nesposobim 1Gb traffic. A ak mi tam nieco chyba - povedz co, velmi rad sa poucim a dorobim pravidla, preto sem pisem.A prikladam filter rulez exportnuty, nech to mozte omrknut a nech dorobim co chyba.
hapi píše:sorry musim se rejpnout ale ty máš k dispozici 1Gbit konekt do netu a neumíš ovládat router?
Mam unlimited link(Gb porty na MK) a priznavam ze neviem vsetko. KAzdopadne, myslim si ze to nie je v dnesnej dobe problem - na sk urcite, v CR je to problem(s tou gigovou linkou)?
to s tym wiresharkom...hm...akurat tu nemam volnu masinu kam to mirrornut, je pravda ze to by bolo dobre odchytit.skusim nieco narychlo
Kód: Vybrat vše
/ip firewall filter
add action=drop chain=input disabled=no src-address=208.67.237.237
add action=drop chain=input disabled=no dst-address=208.67.237.237
add action=drop chain=output disabled=no src-address=208.67.237.237
add action=drop chain=output disabled=no dst-address=208.67.237.237
add action=accept chain=input comment="odtialto ide novo nahraty firewall" \
disabled=no src-address-list=povoleny_monitoring
add action=add-src-to-address-list address-list=black_list \
address-list-timeout=1d chain=input comment="detect DoS attack" \
connection-limit=30,32 disabled=no protocol=tcp
add action=tarpit chain=input comment="suppres DoS attack" connection-limit=\
3,32 disabled=no protocol=tcp src-address-list=black_list
add action=drop chain=input comment="drop ftp brute forcers" disabled=no \
dst-port=21 protocol=tcp src-address-list=ftp_blacklist
add action=accept chain=output content="530 Login incorrect" disabled=no \
dst-limit=1/1m,3,dst-address/1m protocol=tcp
add action=add-dst-to-address-list address-list=ftp_blacklist \
address-list-timeout=3h chain=output content="530 Login incorrect" \
disabled=no protocol=tcp
add action=drop chain=input comment="drop ssh brute forcers" disabled=no \
dst-port=22 protocol=tcp src-address-list=ssh_blacklist
add action=log chain=input connection-state=new disabled=no dst-port=22 \
log-prefix="add addres ssh_blacklist" protocol=tcp src-address-list=\
ssh_stage3
add action=add-src-to-address-list address-list=ssh_blacklist \
address-list-timeout=1w3d chain=input connection-state=new disabled=no \
dst-port=22 protocol=tcp src-address-list=ssh_stage3
add action=add-src-to-address-list address-list=ssh_stage3 \
address-list-timeout=1m chain=input connection-state=new disabled=no \
dst-port=22 protocol=tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 \
address-list-timeout=1m chain=input connection-state=new disabled=no \
dst-port=22 protocol=tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 \
address-list-timeout=1m chain=input connection-state=new disabled=no \
dst-port=22 protocol=tcp
add action=drop chain=forward disabled=no dst-port=22 protocol=tcp \
src-address-list=ssh_blacklist