User Tools

Site Tools


networking:router:mikrotik_fw

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
networking:router:mikrotik_fw [2014/07/06 14:26]
gcooper
networking:router:mikrotik_fw [2022/07/22 10:06] (current)
gcooper
Line 1: Line 1:
 ====== Mikrotik RouterOS Firewall ====== ====== Mikrotik RouterOS Firewall ======
- 
-http://wiki.mikrotik.com/wiki/Protecting_your_customers 
  
 ===== Denial of Service ===== ===== Denial of Service =====
Line 27: Line 25:
 ===== Destination NAT (Port Forwarding) Examples ===== ===== Destination NAT (Port Forwarding) Examples =====
  
-:!: "Destination NATis often called "Port Forwarding".+:!: ''Destination NAT'' is often called ''Port Forwarding''.
  
-:!: With Mikrotik RouterOS, you don't have to add a separate firewall rule for forwarded ports.+:!: With Mikrotik RouterOS, you do not add an explicit ''accept'' firewall rule for forwarded ports as ''accept'' is implied.
  
 <file> <file>
Line 48: Line 46:
 http://forum.mikrotik.com/viewtopic.php?f=2&t=11368 http://forum.mikrotik.com/viewtopic.php?f=2&t=11368
  
-Normal 'masquerade' source NAT uses the address of the outbound interface as the external IP:+Normal ''masquerade'' source NAT uses the address of the outbound interface as the external IP:
  
 <file> <file>
 /ip firewall nat /ip firewall nat
- +add action=masquerade chain=srcnat comment="Masquerade (NAT) - Last NAT Rule" out-interface=ether1
-add action=masquerade chain=srcnat comment="Masquerade (NAT)" out-interface=ether1+
 </file> </file>
  
Line 77: Line 74:
  
 ===== Basic Firewall ===== ===== Basic Firewall =====
 +
 +FIXME This basic firewall script needs modernization, probably based on the newer default Mikrotik firewall.
  
 Firewall/Router: http://gregsowell.com/?p=4013 Firewall/Router: http://gregsowell.com/?p=4013
Line 144: Line 143:
  
 http://wiki.mikrotik.com/wiki/Port_Knocking http://wiki.mikrotik.com/wiki/Port_Knocking
 +
 +==== Country Code ====
 +
 +:!: This is probably **for more powerful routers with lots of RAM** as it could add many rules.
 +
 +:!: You probably want to put the rules **near the top** of the list.
 +
 +**Country Code List**: https://mikrotikconfig.com/firewall/
 +
 +  - **Create the script/list** of countries to be blocked using the above web site
 +  - **Copy the ''IP-Firewall-Address-List.rsc'' file** to the Mikrotik
 +  - **Import the script**
 +  - **Create a firewall rule** referencing the new address list
 +
 +<file>
 +/import IP-Firewall-Address-List.rsc
 +/ip firewall filter
 +add action=drop chain=input comment="Drop traffic by CC - Input chain" in-interface=ether1 log=yes \
 +    log-prefix="DROP BY CC" src-address-list=CountryIPBlocks
 +add action=drop chain=forward comment="Drop traffic by CC - Forward chain" in-interface=ether1 log=yes \
 +    log-prefix="DROP BY CC" src-address-list=CountryIPBlocks
 +</file>
  
 ==== FTP ==== ==== FTP ====
Line 153: Line 174:
 :!: This appears to be specific to the response of the Mikrotik FTP service (''content='') to a failed login attempt and requires the FTP service be enabled to function.  If forwarding FTP inward, you might have to change the ''content='' specification. :!: This appears to be specific to the response of the Mikrotik FTP service (''content='') to a failed login attempt and requires the FTP service be enabled to function.  If forwarding FTP inward, you might have to change the ''content='' specification.
  
-:!: To have the attacker blocked completely, you can probably just remove the ''dst-port=21'' and the ''protocol=tcp'' in the drop rules.+:!: **To have the attacker blocked completely**, you can probably just **remove** the ''dst-port=21'' and the ''protocol=tcp'' in the **drop rules**.
  
 This example allows only 10 FTP login incorrect answers per minute, then bans the attacker (from FTP) for 10 days: This example allows only 10 FTP login incorrect answers per minute, then bans the attacker (from FTP) for 10 days:
Line 394: Line 415:
     * NAT Traversal (NAT-T)     * NAT Traversal (NAT-T)
  
-Accept L2TP/IPSec:+Accept L2TP/IPSec connection traffic:
  
 :!: These rules could be further limited by interface and/or source address. :!: These rules could be further limited by interface and/or source address.
networking/router/mikrotik_fw.1404678371.txt.gz · Last modified: 2014/07/06 14:26 by gcooper