<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      Mikrotik ROS默認推薦防火墻規則firewall腳本

      一、先配置接口列表

      /interface list
      add comment=defconf name=WAN
      add comment=defconf name=LAN
      
      /interface list member
      add interface=lan list=LAN
      add interface=wan list=WAN
      add interface=pppoe-out1 list=WAN

      二、配置IPv4 防火墻規則

       
      /ip firewall filter
      add action=accept chain=input comment="accept ping" protocol=icmp
      add action=accept chain=input comment="accept established,related,untracked" connection-state=established,related,untracked
      
      /ip firewall filter
      add action=drop chain=input comment="drop invalid" connection-state=invalid
      add action=drop chain=input comment="drop all from WAN" in-interface-list=WAN
      add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
      add action=accept chain=forward comment="accept established,related, untracked" connection-state=established,related,untracked
      add action=drop chain=forward comment="drop invalid" connection-state=invalid
      add action=drop chain=forward comment="drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN

      防止端口掃描

      /ip firewall filter 
      add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="Port scanners to list" disabled=no  
      add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="NMAP FIN Stealth scan"
      add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="SYN/FIN scan"
      add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="SYN/RST scan"
      add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="FIN/PSH/URG scan"
      add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="ALL/ALL scan"
      add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=14d comment="NMAP NULL scan"
      add chain=input src-address-list="port scanners" action=drop comment="dropping port scanners" disabled=no

       

      三、配置IPv6 防火墻規則,如果有使用ipv6的

       
      ipv6 firewall address-list
      add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
      add address=::1/128 comment="defconf: lo" list=bad_ipv6
      add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
      add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
      add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
      add address=100::/64 comment="defconf: discard only " list=bad_ipv6
      add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
      add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
      add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
      add address=::224.0.0.0/100 comment="defconf: other" list=bad_ipv6
      add address=::127.0.0.0/104 comment="defconf: other" list=bad_ipv6
      add address=::/104 comment="defconf: other" list=bad_ipv6
      add address=::255.0.0.0/104 comment="defconf: other" list=bad_ipv6
      
      /ipv6 firewall filter
      add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
      add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
      add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
      add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
      add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/16
      add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
      add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
      add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
      add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
      add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
      add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
      add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
      add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
      add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
      add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
      add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
      add action=accept chain=forward comment="defconf: accept HIP" protocol=139
      add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
      add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
      add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
      add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
      add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN

       

       
       
       
      posted @ 2023-03-02 19:07  cnkker.com  閱讀(5488)  評論(0)    收藏  舉報
      主站蜘蛛池模板: 国产午夜精品理论大片| 国产av中文字幕精品| 亚洲欧洲精品日韩av| 国产精品中文字幕自拍| 中文国产不卡一区二区| 国产极品美女高潮抽搐免费网站| 日韩有码中文字幕av| 国产在线拍揄自揄拍无码| 日本中文字幕乱码免费| 日韩精品国产另类专区| 日本新janpanese乱熟| 91密桃精品国产91久久| 亚洲国产精品综合久久2007| 久久国产免费观看精品3| 国产日韩精品欧美一区灰| 久久久亚洲欧洲日产国码606| 狠狠躁夜夜躁人人爽天天69| 亚洲综合91社区精品福利| 国产一级黄色片在线播放| 宅男噜噜噜66在线观看| 白丝乳交内射一二三区| 国产稚嫩高中生呻吟激情在线视频| 亚洲精品综合久久国产二区| 国产免费性感美女被插视频| 2019国产精品青青草原| 久久午夜夜伦鲁鲁片免费无码| 中文字幕一区二区久久综合| 国产不卡av一区二区| 国内精品一区二区不卡| 午夜爽爽爽男女免费观看影院| 亚洲国产午夜理论片不卡| 精品无码国产日韩制服丝袜| 国产亚洲一区二区三不卡| 丁香婷婷在线视频| 国产一码二码三码区别| a片在线免费观看| 亚洲乱码一二三四区| 国产高清色高清在线观看| 亚洲av成人无码精品电影在线| 91孕妇精品一区二区三区| 日本黄色三级一区二区三区|