Код: Выделить всё
/interface bridge
add arp=proxy-arp l2mtu=1598 name=bridge_LAN
/ip hotspot user profile
set [ find default=yes ] idle-timeout=none keepalive-timeout=2m
/ip pool
add name=dhcp_pool1 ranges=192.168.88.2-192.168.88.254
/ip dhcp-server
add address-pool=dhcp_pool1 disabled=no interface=bridge_LAN name=dhcp1
/interface bridge port
add bridge=bridge_LAN interface=ether2
add bridge=bridge_LAN interface=ether3
add bridge=bridge_LAN interface=ether4
add bridge=bridge_LAN interface=ether5
add bridge=bridge_LAN interface=wlan1
/ip address
add address=10.58.2.208/16 interface=ether1
add address=192.168.88.1/24 interface=bridge_LAN
/ip dhcp-server network
add address=192.168.88.0/24 dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=78.40.80.165,217.117.80.1,8.8.8.8
/ip firewall address-list
add address=192.168.88.0/24 list=admin_subnet
add address=10.0.0.0/8 comment=Private_Class_A list=bogons
add address=172.16.0.0/12 comment=Private_Class_B list=bogons
add address=0.0.0.0/8 comment=Self_identufication list=bogons
add address=127.0.0.0/16 comment=Loopback list=bogons
add address=169.254.0.0/16 comment=Link_local list=bogons
add address=198.0.2.0/24 comment=Reserved_testnet_1 list=bogons
add address=192.88.99.0/24 comment="6tor4Relay Anycast" list=bogons
add address=198.51.100.0/24 comment=Reserved_Tstnet_2 list=bogons
add address=203.0.113.0/24 comment=Reserved_Testnet_3 list=bogons
/ip firewall filter
add chain=input src-address=192.168.88.0/24
add action=add-src-to-address-list address-list=Syn_Flooder \
address-list-timeout=30m chain=input connection-limit=30,32 protocol=tcp \
tcp-flags=syn
add action=drop chain=input src-address-list=Syn_Flooder
add action=add-src-to-address-list address-list=Port_Scanner \
address-list-timeout=1w chain=input comment=Port_Scanner_Detect protocol=\
tcp psd=21,3s,3,1
add action=drop chain=input src-address-list=Port_Scanner
add action=jump chain=input jump-target=ICMP protocol=icmp
add action=drop chain=input dst-port=8291 protocol=tcp src-address-list=\
!admin_subnet
add action=jump chain=forward jump-target=ICMP protocol=icmp
add action=drop chain=forward dst-address-list=bogons
add action=add-src-to-address-list address-list=spammers address-list-timeout=\
3h chain=forward connection-limit=30,32 dst-port=25,587 limit=30/1m,0 \
protocol=tcp
add action=drop chain=forward dst-port=25,587 protocol=tcp src-address-list=\
spammers
add chain=input port=53 protocol=udp
add chain=input port=53 protocol=tcp
add chain=input connection-state=established
add chain=input connection-state=related
add chain=input src-address-list=admin_subnet
add action=drop chain=input
add chain=ICMP icmp-options=8:0 limit=1,5 protocol=icmp
add chain=ICMP icmp-options=0:0 protocol=icmp
add chain=ICMP icmp-options=11:0 protocol=icmp
add chain=ICMP icmp-options=3:0-1 protocol=icmp
add chain=ICMP icmp-options=3:4 protocol=icmp
add action=drop chain=ICMP protocol=icmp
add action=jump chain=output jump-target=ICMP protocol=icmp
/ip firewall nat
add action=masquerade chain=srcnat comment="Added by webbox" out-interface=\
ether1 to-addresses=0.0.0.0
/ip route
add distance=1 gateway=10.58.0.1
/ip upnp
set allow-disable-external-interface=no enabled=yes
/ip upnp interfaces
add interface=ether1 type=external
add interface=ether2 type=internal
add interface=ether3 type=internal
add interface=ether4 type=internal
add interface=ether5 type=internal
add interface=wlan1 type=internal
add interface=bridge_LAN type=internal
/system script
add name=script1 policy=\
ftp,reboot,read,write,policy,test,winbox,password,sniff,sensitive,api \
source="/ip firewall filter\r\
\nadd action=add-src-to-address-list address-list=Syn_Flooder address-list-t\
imeout=30m chain=input \\\r\
\nconnection-limit=30,32 disabled=no protocol=tcp tcp-flags=syn\r\
\nadd action=drop chain=input disabled=no src-address-list=Syn_Flooder\r\
\nadd action=add-src-to-address-list address-list=Port_Scanner address-list-\
timeout=1w chain=input comment=\"Port_Scanner_Detect\"\\\r\
\ndisabled=no protocol=tcp psd=21,3s,3,1\r\
\nadd action=drop chain=input disabled=no src-address-list=Port_Scanner\r\
\nadd action=jump chain=input disabled=no jump-target=ICMP protocol=icmp\r\
\nadd action=drop chain=input\\\r\
\ndisabled=no dst-port=8291 protocol=tcp src-address-list=!admin_subnet\r\
\nadd action=jump chain=forward disabled=no jump-target=ICMP protocol=icmp\r\
\nadd action=drop chain=forward disabled=no dst-address-list=bogons\r\
\nadd action=add-src-to-address-list address-list=spammers address-list-time\
out=3h chain=forward\\\r\
\nconnection-limit=30,32 disabled=no dst-port=25,587 limit=30/1m,0 protocol=\
tcp\r\
\nadd action=drop chain=forward disabled=no dst-port=25,587 protocol=tcp src\
-address-list=spammers\r\
\nadd action=accept chain=input disabled=no port=53 protocol=udp\r\
\nadd action=accept chain=input disabled=no port=53 protocol=tcp\r\
\nadd action=accept chain=input connection-state=established disabled=no\r\
\nadd action=accept chain=input connection-state=related disabled=no\r\
\nadd action=accept chain=input disabled=no src-address-list=admin_subnet\r\
\nadd action=drop chain=input disabled=no\r\
\nadd action=accept chain=ICMP disabled=no icmp-options=8:0 limit=1,5 protoc\
ol=icmp\r\
\nadd action=accept chain=ICMP disabled=no icmp-options=0:0 protocol=icmp\r\
\nadd action=accept chain=ICMP disabled=no icmp-options=11:0 protocol=icmp\r\
\nadd action=accept chain=ICMP disabled=no icmp-options=3:0-1 protocol=icmp\
\r\
\nadd action=accept chain=ICMP disabled=no icmp-options=3:4 protocol=icmp\r\
\nadd action=drop chain=ICMP disabled=no protocol=icmp\r\
\nadd action=jump chain=output disabled=no jump-target=ICMP protocol=icmp"
[admin@MikroTik] >