# model: RouterBOARD 941-2nD # serial-number: 661605F9C047 # firmware-type: qca9531L # current-firmware: 6.47.8 # installed-version: 6.47.8 # Flags: U - undoable, R - redoable, F - floating-undo # ACTION BY POLICY # U user mentes added admin write # policy # U user group backup added admin write # policy # # software id = ZVSG-1V38 # # model = RouterBOARD 941-2nD # serial number = 661605F9C047 /interface ethernet set [ find default-name=ether1 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full comment=UPLINK set [ find default-name=ether2 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full comment=PATONAI set [ find default-name=ether3 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full set [ find default-name=ether4 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik add authentication-types=wpa2-psk eap-methods="" management-protection=allowed mode=dynamic-keys name=wpa2 supplicant-identity="" wpa2-pre-shared-key=dsjnf999 /interface wireless set [ find default-name=wlan1 ] adaptive-noise-immunity=ap-and-client-mode antenna-gain=0 comment="Management wifi" country=no_country_set disabled=no frequency=auto frequency-mode=manual-txpower mode=ap-bridge security-profile=wpa2 ssid=RLAN_MNGMNT station-roaming=enabled wireless-protocol=802.11 /interface wireless manual-tx-power-table set wlan1 comment="Management wifi" /interface wireless nstreme set wlan1 comment="Management wifi" /ip ipsec proposal set [ find default=yes ] enc-algorithms=aes-128-cbc /ip pool add name=dhcp_pool1 ranges=192.168.2.100-192.168.2.254 add name=dhcp_pool3 ranges=192.168.88.100-192.168.88.254 /ip dhcp-server add address-pool=dhcp_pool1 authoritative=after-2sec-delay interface=ether3 lease-time=1h name=dhcp1 add address-pool=dhcp_pool3 disabled=no interface=wlan1 name=dhcp2 /ppp profile set *0 name=default-encryption use-encryption=yes /queue simple add burst-limit=40M/40M burst-threshold=27M/27M burst-time=1m/1m max-limit=30M/30M name=PATONAI target=86.109.68.112/29 /snmp community set [ find default=yes ] addresses=86.109.64.0/27 /system logging action set 3 remote=86.109.64.16 /user group add name=backup policy="ssh,read,sensitive,!local,!telnet,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!web,!sniff,!api,!romon,!dude,!tikapp" #error exporting /interface bridge calea /interface bridge settings set use-ip-firewall=yes /ip firewall connection tracking set tcp-established-timeout=1h /ip neighbor discovery-settings set discover-interface-list=!dynamic /ip address add address=192.168.2.1/24 disabled=yes interface=ether3 network=192.168.2.0 add address=192.168.88.1/24 interface=wlan1 network=192.168.88.0 add address=10.96.52.77/24 interface=ether1 network=10.96.52.0 add address=86.109.68.113/29 interface=ether2 network=86.109.68.112 /ip dhcp-server network add address=192.168.2.0/24 gateway=192.168.2.1 add address=192.168.88.0/24 gateway=192.168.88.1 /ip dns set servers=86.109.64.5,193.194.159.224 /ip firewall address-list add address=86.109.64.0/27 list=support add address=192.168.88.0/24 list=support add address=10.0.0.0/8 list=support add address=86.109.64.0/19 comment="Ezt ki lehet torolni, csak a beallitashoz kell" list=support #error exporting /ip firewall calea /ip firewall filter add action=accept chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp src-address-list=support add action=drop chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp add action=accept chain=input comment="Bandwidth test" protocol=tcp src-address-list=support src-port=2000 add action=accept chain=input comment="Bandwidth test" dst-port=2000 protocol=tcp src-address-list=support add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input comment="Add Syn Flood IP to the list" connection-limit=30,32 protocol=tcp tcp-flags=syn add action=drop chain=input comment="Drop to syn flood list" src-address-list=Syn_Flooder add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="Port Scanner Detect" protocol=tcp psd=21,3s,3,1 add action=drop chain=input comment="Drop to port scan list" src-address-list=Port_Scanner add action=jump chain=input comment="Jump for icmp input flow" jump-target=ICMP protocol=icmp add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP FIN Stealth scan" protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/FIN scan" protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/RST scan" protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="FIN/PSH/URG scan" protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="ALL/ALL scan" protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP NULL scan" protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=input comment="Block all access to the winbox - except to support list # DO NOT ENABLE THIS RULE BEFORE ADD YOUR SUBNET IN THE SUPPORT ADDRESS LIST" dst-port=8291 protocol=tcp src-address-list=!support add action=accept chain=input comment="Accept to established connections" connection-state=established add action=accept chain=input comment="Accept to related connections" connection-state=related add action=accept chain=input comment="Full access to SUPPORT address list" src-address-list=support add action=accept chain=input dst-address=255.255.255.255 add action=log chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" disabled=yes add action=drop chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" icmp-options=8:0 limit=10,15 protocol=icmp add action=accept chain=ICMP comment="Echo reply" icmp-options=0:0 protocol=icmp add action=accept chain=ICMP comment="Time Exceeded" icmp-options=11:0 protocol=icmp add action=accept chain=ICMP comment="Destination unreachable" icmp-options=3:0-1 protocol=icmp add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp add action=drop chain=ICMP comment="Drop to the other ICMPs" protocol=icmp add action=jump chain=output comment="Jump for icmp output" jump-target=ICMP protocol=icmp add action=fasttrack-connection chain=forward connection-state=established,related protocol=tcp add action=accept chain=forward connection-state=established,related protocol=tcp /ip firewall nat add action=masquerade chain=srcnat disabled=yes src-address=192.168.2.0/24 add action=masquerade chain=srcnat comment="Management wifi" src-address=192.168.88.0/24 add action=netmap chain=srcnat disabled=yes src-address=192.168.1.0/24 to-addresses=86.109.66.10 add action=masquerade chain=srcnat disabled=yes out-interface=wlan1 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=10022 protocol=tcp to-addresses=192.168.1.3 to-ports=10022 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=10022 protocol=udp to-addresses=192.168.1.3 to-ports=10022 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=20022 protocol=tcp to-addresses=192.168.1.3 to-ports=20022 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=20022 protocol=udp to-addresses=192.168.1.3 to-ports=20022 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=5432 protocol=tcp to-addresses=192.168.1.4 to-ports=5432 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=5432 protocol=udp to-addresses=192.168.1.4 to-ports=5432 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=10004 protocol=tcp to-addresses=192.168.1.4 to-ports=10004 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=10004 protocol=udp to-addresses=192.168.1.4 to-ports=10004 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=5666 protocol=tcp to-addresses=192.168.1.4 to-ports=5666 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=5666 protocol=udp to-addresses=192.168.1.4 to-ports=5666 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=6642 protocol=tcp to-addresses=192.168.1.4 to-ports=6642 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=6642 protocol=udp to-addresses=192.168.1.4 to-ports=6642 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=10005 protocol=tcp to-addresses=192.168.1.4 to-ports=10005 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=10005 protocol=udp to-addresses=192.168.1.4 to-ports=10005 add action=dst-nat chain=dstnat disabled=yes dst-address=86.109.66.10 dst-port=22 protocol=tcp to-addresses=192.168.1.2 to-ports=22 /ip route add distance=1 gateway=10.96.52.1 /ip service set www address=86.109.64.0/27 set api address=86.109.64.0/27 set api-ssl address=86.109.64.0/27 /ip ssh set allow-none-crypto=yes forwarding-enabled=remote /snmp set contact=admin@rlan.hu enabled=yes location=Kapuvar /system clock set time-zone-name=Europe/Budapest /system identity set name=gw-patonai /system logging add action=remote topics=info,critical,error,warning /system ntp client set enabled=yes primary-ntp=86.109.64.5 /system scheduler add interval=6d name=mentes on-event=mentes policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=nov/01/2016 start-time=21:36:25 /system script add dont-require-permissions=no name=mentes owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="/export\_file=export\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" export\") file=export.rsc\r\n/system backup save name=backup\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" Backup\") file=backup.backup\r\n" /system watchdog set auto-send-supout=yes send-email-from=gw-patonai-infrahaus@magicnet.hu send-email-to=magic@magicnet.hu send-smtp-server=86.109.64.10 /tool e-mail set address=86.109.64.10 from=gw-patonai@magicnet.hu /tool graphing interface add /tool graphing queue add /tool graphing resource add