This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
networking:router:mikrotik_under_attack [2014/05/20 08:58] gcooper |
networking:router:mikrotik_under_attack [2014/06/03 16:08] (current) gcooper |
||
---|---|---|---|
Line 10: | Line 10: | ||
:!: Consider disabling or deleting these rules after the attacks have subsided to keep from polluting your firewall rule set. | :!: Consider disabling or deleting these rules after the attacks have subsided to keep from polluting your firewall rule set. | ||
+ | |||
+ | ===== Port-Based Solution (may not be ideal) ===== | ||
==== Botnet - UDP Port 30837 ==== | ==== Botnet - UDP Port 30837 ==== | ||
Line 48: | Line 50: | ||
</ | </ | ||
+ | ===== Detection Based Solution ===== | ||
+ | |||
+ | http:// | ||
+ | |||
+ | http:// | ||
+ | |||
+ | :!: This sample rule set is on the '' | ||
+ | |||
+ | :!: This rule set uses '' | ||
+ | |||
+ | :!: You can also easily exclude (whitelist) certain hosts. | ||
+ | |||
+ | This example dynamically creates two address lists: attackers ('' | ||
+ | |||
+ | < | ||
+ | /ip firewall filter | ||
+ | |||
+ | add chain=forward action=jump connection-state=new in-interface=ether1 jump-target=detect-ddos \ | ||
+ | comment=" | ||
+ | | ||
+ | add chain=detect-ddos action=return dst-limit=50, | ||
+ | comment=" | ||
+ | | ||
+ | add chain=detect-ddos action=add-dst-to-address-list address-list=ddos-target address-list-timeout=1w \ | ||
+ | comment=" | ||
+ | | ||
+ | add chain=detect-ddos action=add-src-to-address-list address-list=ddos-source address-list-timeout=1w \ | ||
+ | comment=" | ||
+ | | ||
+ | add chain=forward action=drop connection-state=new dst-address-list=ddos-target \ | ||
+ | src-address-list=ddos-source comment=" | ||
+ | </ | ||
+ | |||
+ | **Q:** Is there way to make the rule less sensitive? When I browse to my web server, Firefox hangs and retries too many times and I'm flagged as a '' | ||
+ | |||
+ | **A:** '' |