User Tools

Site Tools


networking:router:mikrotik_under_attack

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
networking:router:mikrotik_under_attack [2014/06/03 15:57]
gcooper
networking:router:mikrotik_under_attack [2014/06/03 16:08] (current)
gcooper
Line 59: Line 59:
  
 :!: This rule set uses ''ether1'' as WAN (Internet) connection. :!: This rule set uses ''ether1'' as WAN (Internet) connection.
 +
 +:!: You can also easily exclude (whitelist) certain hosts.  See [[http://wiki.mikrotik.com/wiki/DDoS_Detection_and_Blocking|DDoS_Detection_and_Blocking]].
  
 This example dynamically creates two address lists: attackers (''ddos-source'') and attacked hosts (''ddos-target''), and blocks packets from the former to the latter. This example dynamically creates two address lists: attackers (''ddos-source'') and attacked hosts (''ddos-target''), and blocks packets from the former to the latter.
Line 68: Line 70:
   comment="Detect DDoS Attack"   comment="Detect DDoS Attack"
          
-  add chain=detect-ddos action=return dst-limit=32,32,src-and-dst-addresses/10s \+  add chain=detect-ddos action=return dst-limit=50,100,src-and-dst-addresses/10s \
   comment="Detect DDoS Attack - 1"   comment="Detect DDoS Attack - 1"
              
networking/router/mikrotik_under_attack.1401832626.txt.gz · Last modified: 2014/06/03 15:57 by gcooper