# model: RBD52G-5HacD2HnD # serial-number: D7160D5188B4 # firmware-type: ipq4000L # current-firmware: 6.49.6 # installed-version: 6.49.13 # Flags: U - undoable, R - redoable, F - floating-undo # ACTION BY POLICY # U user mentes added admin write # policy # U user group backup added admin write # policy # U ip service changed admin write # U ip service changed admin write # U ip service changed admin write # U address changed admin write # U device changed admin write # U route removed admin write # U route removed admin write # U route added admin write # U OSPFv2 network added admin write # U OSPFv2 network removed admin write # U address changed admin write # U OSPFv2 instance changed admin write # U OSPFv2 interface changed admin write # # software id = TZTW-MAHG # # model = RBD52G-5HacD2HnD # serial number = D7160D5188B4 /interface bridge add name=bridge-management add fast-forward=no mtu=1500 name=bridge1 /interface ethernet set [ find default-name=ether1 ] comment="UPLINK Digi" l2mtu=1620 mtu=1600 set [ find default-name=ether2 ] comment="Ifjusag 33 fele" full-duplex=no l2mtu=1640 mtu=1600 speed=10Mbps set [ find default-name=ether3 ] comment="TURUL FELE" set [ find default-name=ether4 ] l2mtu=1640 mtu=1620 set [ find default-name=ether5 ] comment="SW-TATABANYA fele" /interface pppoe-client add add-default-route=yes default-route-distance=150 disabled=no interface=ether1 name=pppoe-out1 password=2GNnz4sP user=r_xxcom-r7a /interface vlan add interface=ether5 name=vlan460-fortop vlan-id=460 /interface wireless security-profiles set [ find default=yes ] supplicant-identity=gw-tatabanya add authentication-types=wpa2-psk eap-methods="" mode=dynamic-keys name=wpa2 supplicant-identity="" wpa2-pre-shared-key=dsjnf999 /interface wireless set [ find default-name=wlan1 ] adaptive-noise-immunity=ap-and-client-mode band=2ghz-g/n channel-width=20/40mhz-Ce comment="Management 2.4GHz" country=no_country_set disabled=no frequency-mode=superchannel mode=ap-bridge security-profile=wpa2 ssid=RLAN_MNGMNT station-roaming=enabled wireless-protocol=802.11 set [ find default-name=wlan2 ] adaptive-noise-immunity=ap-and-client-mode band=5ghz-a/n/ac channel-width=20/40/80mhz-Ceee comment="Management 5GHz" country=no_country_set disabled=no frequency-mode=superchannel mode=ap-bridge security-profile=wpa2 ssid=RLAN_MNGMNT station-roaming=enabled wireless-protocol=802.11 /interface wireless manual-tx-power-table set wlan1 comment="Management 2.4GHz" set wlan2 comment="Management 5GHz" /interface wireless nstreme set wlan1 comment="Management 2.4GHz" set wlan2 comment="Management 5GHz" /ip ipsec proposal set [ find default=yes ] enc-algorithms=3des /ip pool add name=dhcp_pool0 ranges=86.109.70.238 add name=dhcp_pool1 ranges=192.168.88.2-192.168.88.254 /ip dhcp-server add address-pool=dhcp_pool0 disabled=no interface=vlan460-fortop name=dhcp1 add address-pool=dhcp_pool1 disabled=no interface=bridge-management name=dhcp2 /ppp profile set *0 use-encryption=no /interface l2tp-client add allow-fast-path=yes connect-to=86.109.64.70 disabled=no mrru=1600 name=l2tp-budapest password=JOI2UIghs8 profile=default user=tatabanya /queue simple add limit-at=20M/20M max-limit=20M/20M name="FOR TOP Tatabanya" target=86.109.68.186/32 add limit-at=5M/5M max-limit=5M/5M name="ONLINE AUTOFORUM TATABANYA" target=86.109.66.18/32 add limit-at=10M/20M max-limit=10M/20M name="TATABANYA TURUL KISS" target=86.109.66.26/32 add limit-at=10M/10M max-limit=10M/10M name="DRAVANET TATA PATIKA" target=86.109.66.78/32 add limit-at=110M/110M max-limit=110M/110M name="Tata iskola" target=86.109.68.30/32 add burst-limit=120M/120M burst-threshold=90M/90M burst-time=1m/1m max-limit=100M/100M name="For-Top uj 100Mbps" target=86.109.70.238/32 /routing ospf instance set [ find default=yes ] redistribute-connected=as-type-1 redistribute-static=as-type-1 router-id=10.34.0.1 /snmp community set [ find default=yes ] addresses=86.109.64.0/27 /system logging action set 0 memory-lines=100 set 1 disk-lines-per-file=100 set 3 remote=86.109.64.16 /user group set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,password,web,sniff,sensitive,api,romon,dude,tikapp" add name=backup policy="ssh,read,sensitive,!local,!telnet,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!web,!sniff,!api,!romon,!dude,!tikapp" #error exporting /interface bridge calea /interface bridge port add bridge=bridge1 hw=no interface=ether3 add bridge=bridge1 hw=no interface=ether4 add bridge=bridge1 hw=no interface=ether5 add bridge=bridge-management interface=wlan1 add bridge=bridge-management interface=wlan2 /interface bridge settings set use-ip-firewall=yes use-ip-firewall-for-pppoe=yes use-ip-firewall-for-vlan=yes /ip neighbor discovery-settings set discover-interface-list=all /interface l2tp-server server set allow-fast-path=yes authentication=mschap1,mschap2 mrru=1600 one-session-per-host=yes /ip address add address=10.34.1.1/24 interface=bridge1 network=10.34.1.0 add address=86.109.66.17/30 comment="Autoforum Riegler" interface=bridge1 network=86.109.66.16 add address=86.109.66.25/30 comment="Turul Kiss" interface=bridge1 network=86.109.66.24 add address=86.109.66.77/30 comment="Tata Patika" interface=bridge1 network=86.109.66.76 add address=86.109.68.185/30 comment="Fortop Tatabanya" interface=bridge1 network=86.109.68.184 add address=86.109.70.237/30 comment="Fortop Uj 100Mbps" interface=vlan460-fortop network=86.109.70.236 add address=10.34.0.1/24 interface=ether2 network=10.34.0.0 add address=192.168.88.1/24 interface=bridge-management network=192.168.88.0 add address=192.168.1.1/24 disabled=yes interface=ether5 network=192.168.1.0 /ip dhcp-server network add address=86.109.70.236/30 dns-server=86.109.64.5,86.109.64.66 gateway=86.109.70.237 add address=192.168.88.0/24 gateway=192.168.88.1 /ip dns set servers=86.109.64.5,86.109.64.66 /ip firewall address-list add address=86.109.64.0/27 list=support add address=10.0.0.0/8 list=support add address=86.109.64.0/19 comment="Ez torolheto" list=support add address=192.168.88.0/24 list=support #error exporting /ip firewall calea /ip firewall filter add action=accept chain=input src-address=86.109.64.70 add action=accept chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp src-address-list=support add action=drop chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input comment="Add Syn Flood IP to the list" connection-limit=30,32 protocol=tcp tcp-flags=syn add action=drop chain=input comment="Drop to syn flood list" src-address-list=Syn_Flooder add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="Port Scanner Detect" protocol=tcp psd=21,3s,3,1 add action=drop chain=input comment="Drop to port scan list" src-address-list=Port_Scanner add action=jump chain=input comment="Jump for icmp input flow" jump-target=ICMP protocol=icmp add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP FIN Stealth scan" protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/FIN scan" protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/RST scan" protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="FIN/PSH/URG scan" protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="ALL/ALL scan" protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP NULL scan" protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=input comment="Block all access to the winbox - except to support list # DO NOT ENABLE THIS RULE BEFORE ADD YOUR SUBNET IN THE SUPPORT ADDRESS LIST" dst-port=8291 protocol=tcp src-address-list=!support add action=accept chain=input comment="Accept to established connections" connection-state=established add action=accept chain=input comment="Accept to related connections" connection-state=related add action=accept chain=input comment="Full access to SUPPORT address list" src-address-list=support add action=accept chain=input dst-address=255.255.255.255 add action=log chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" disabled=yes add action=drop chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" icmp-options=8:0 limit=10,15:packet protocol=icmp add action=accept chain=ICMP comment="Echo reply" icmp-options=0:0 protocol=icmp add action=accept chain=ICMP comment="Time Exceeded" icmp-options=11:0 protocol=icmp add action=accept chain=ICMP comment="Destination unreachable" icmp-options=3:0-1 protocol=icmp add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp add action=drop chain=ICMP comment="Drop to the other ICMPs" protocol=icmp add action=jump chain=output comment="Jump for icmp output" jump-target=ICMP protocol=icmp add action=fasttrack-connection chain=forward connection-state=established,related disabled=yes add action=accept chain=forward connection-state=established,related disabled=yes /ip firewall nat add action=masquerade chain=srcnat comment=Management src-address=192.168.88.0/24 /ip proxy set cache-path=web-proxy1 /ip proxy access add dst-address=0.0.0.0 src-address=0.0.0.0 /ip route add check-gateway=ping distance=1 dst-address=86.109.64.70/32 gateway=pppoe-out1 add comment="Tata iskola" distance=1 dst-address=86.109.68.28/30 gateway=10.34.1.24 /ip service set www address=86.109.64.20/32,86.109.64.11/32 set api address=86.109.64.0/27 set api-ssl address=86.109.64.0/27 /ip ssh set allow-none-crypto=yes forwarding-enabled=remote /routing filter add action=discard chain=ospf-out prefix=192.168.88.0/24 prefix-length=24 add action=discard chain=ospf-out prefix=86.109.64.70 prefix-length=32 add action=discard chain=ospf-out prefix=10.0.0.1 prefix-length=32 /routing ospf interface add interface=l2tp-budapest network-type=point-to-point add passive=yes /routing ospf network add area=backbone network=10.250.1.155/32 /snmp set contact=admin@rlan.hu enabled=yes location=Tatabanya /system clock set time-zone-autodetect=no time-zone-name=Europe/Budapest /system identity set name=gw-esztergomi /system logging add action=remote topics=info,critical,error,warning /system ntp client set enabled=yes primary-ntp=86.109.64.5 /system routerboard settings set cpu-frequency=auto /system scheduler add interval=6d name=mentes on-event=mentes policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=sep/22/2017 start-time=05:09:06 /system script add dont-require-permissions=no name=mentes owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="/export\_file=export\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" export\") file=export.rsc \r\n/system backup save name=backup\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" Backup\") file=backup.backup\r\n" /system watchdog set auto-send-supout=yes ping-start-after-boot=35m send-email-from=gw-tatabanya@magicnet.hu send-email-to=magic@magicnet.hu send-smtp-server=86.109.64.10 /tool e-mail set address=86.109.64.10 from=gw-esztergomi@magicnet.hu /tool graphing interface add /tool graphing queue add /tool graphing resource add /tool sniffer set filter-interface=ether4