> /ip firewall filter > add action=drop chain=input comment="port scanners" src-address-list="port scanners" > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp psd=21,3s,3,1 > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp tcp-flags=fin,syn > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp tcp-flags=syn,rst > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg > add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
Защита от брутфорсеров RouterOS
> /ip firewall filter > add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 protocol=tcp src-address-list=ssh_blacklist > add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage3 > add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage2 > add action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage1 > add action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=tcp > /ip firewall filter > add action=drop chain=input comment="drop telnet brute forcers" dst-port=23 protocol=tcp src-address-list=telnet_blacklist > add action=add-src-to-address-list address-list=telnet_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=23 protocol=tcp src-address-list=telnet_stage3 > add action=add-src-to-address-list address-list=telnet_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=23 protocol=tcp src-address-list=telnet_stage2 > add action=add-src-to-address-list address-list=telnet_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=23 protocol=tcp src-address-list=telnet_stage1 > add action=add-src-to-address-list address-list=telnet_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=23 protocol=tcp
Обрезание скорости торрентам двумя способами RouterOS
Первый способ по соединениям:
> /ip firewall filter > add action=drop chain=forward comment="torrent limit 20 connection" connection-limit=20,32 dst-port=!80,443,8080 protocol=tcp src-address-list=torrent_limit tcp-flags=syn > add action=drop chain=forward connection-limit=20,32 protocol=udp src-address-list=torrent_limit
список torrent_limit для тех кому на ограничить, в примере 20 коннектов
Второй способ по пакетам:
> /ip firewall filter > add action=add-dst-to-address-list address-list=dst_list chain=forward comment="torrent limit 250 packets" dst-address=192.168.1.1-192.168.1.253 protocol=udp > add chain=forward dst-address-list=dst_list dst-limit=250,250,dst-address > add action=reject chain=forward dst-address-list=dst_list reject-with=icmp-admin-prohibited
Локалка для ограничения по 250 пакетов 192.168.1.1-192.168.1.253
p.s. Как по мне первый способ лучше
Блокировка торрентов RouterOS
> /ip firewall filter > add action=drop chain=forward comment="block torrent" layer7-protocol=torrentsites src-address-list=no_torrent > add action=drop chain=forward dst-port=53 layer7-protocol=torrentsites protocol=udp src-address-list=no_torrent > add action=drop chain=forward content=torrent src-address-list=no_torrent > add action=drop chain=forward content=tracker src-address-list=no_torrent > add action=drop chain=forward content=getpeers src-address-list=no_torrent > add action=drop chain=forward content=info_hash src-address-list=no_torrent > add action=drop chain=forward content=announce_peers src-address-list=no_torrent > add action=drop chain=forward p2p=all-p2p src-address-list=no_torrent > /ip firewall layer7-protocol > add name=torrentsites regexp="^.*(get|GET).+(torrent|nthepiratebay|isohunt|entertane|demonoid|btjunkie|mininova|flixflux|ntorrentz|vertor|h33t|btscene|bitunity|bittoxic|thunderbytes|nentertane|zoozle|vcdq|bitnova|bitsoup|meganova|fulldls|btbot|nflixflux|seedpeer|fenopy|gpirate|commonbits).*$"
no_torrent адрес лист для блокированных ip
Простой динамический шейпер RouterOS
> /queue simple > add max-limit=40M/40M name=internet queue=pcq-upload-default/pcq-download-default target=192.168.1.0/24
Закрытие одноклассников и подобных RouterOS
> /ip firewall filter > add action=drop chain=forward comment="block socials" dst-address-list=!yes_social layer7-protocol=social protocol=tcp src-port=80 > add action=drop chain=forward dst-address-list=!yes_social layer7-protocol=social protocol=tcp src-port=443 > /ip firewall layer7-protocol > add name=social regexp="^.+(vk.com|vkontakte|odnoklassniki|ok.ru|odnoklasniki).*$"
разумеется для особо озабоченных yes_social )
Обновление hp в ESXi
Загрузить обновление в datastore, выполнить команды
~ # cd /vmfs/volumes/datastore1/bios ~ # chmod +x CP024363.scexe ~ # ./CP024363.scexe
Если ESXi не видит SSD
Установите SSD и создайте datastore, скопируйте идентификатор datastore (например naa.600508b1001cac41a272e11c2263b25b) и выполните
~ # esxcli storage nmp satp rule add -s VMW_SATP_LOCAL -d naa.600508b1001cac41a272e11c2263b25b -o enable_ssd ~ # esxcli storage core claiming reclaim -d naa.600508b1001cac41a272e11c2263b25b