# model: RBD52G-5HacD2HnD # serial-number: D7160DE52692 # firmware-type: ipq4000L # current-firmware: 6.49.2 # installed-version: 7.15.3 # Flags: U - UNDOABLE # Columns: ACTION, BY, POLICY, TIME # ACTION BY POLICY TIME # U device changed admin write 2024-09-03 12:07:15 # U device changed admin write 2024-09-03 12:07:14 # U route 86.109.64.254 changed admin write 2024-09-03 12:06:48 # U device changed admin write 2024-09-03 12:03:46 # U device changed admin write 2024-09-03 12:03:45 # U route 86.109.64.254 changed admin write 2024-08-27 14:48:38 # U device changed admin write 2024-08-26 12:39:22 # U device changed admin write 2024-08-26 12:39:19 # U device changed admin write 2024-08-26 12:39:18 # U route 86.109.64.254 changed admin write 2024-08-26 10:43:36 # # software id = ML4T-JEQ4 # # model = RBD52G-5HacD2HnD # serial number = D7160DE52692 /interface bridge add fast-forward=no name=bridge1 port-cost-mode=short /interface wireless set [ find default-name=wlan1 ] ssid=MikroTik station-roaming=enabled set [ find default-name=wlan2 ] ssid=MikroTik station-roaming=enabled /interface ethernet set [ find default-name=ether1 ] comment=Vodafone set [ find default-name=ether2 ] comment="Sajat halozat" /interface lte apn set [ find default=yes ] ip-type=ipv4 use-network-apn=no /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik /ip smb users set [ find default=yes ] disabled=yes /ppp profile add bridge=bridge1 name=fw-budapest /interface l2tp-client add allow-fast-path=yes connect-to=86.109.64.254 disabled=no mrru=1600 name=fw-budapest password=UvEgJaNi99 profile=fw-budapest user=patakutca /routing bgp template set default disabled=no output.network=bgp-networks /routing ospf instance add disabled=no name=default-v2 /routing ospf area add disabled=yes instance=default-v2 name=backbone-v2 /snmp community set [ find default=yes ] addresses=10.0.0.0/8,86.109.64.0/27 /system logging action set 3 remote=86.109.64.16 /interface bridge port add bridge=bridge1 ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10 /interface bridge settings set use-ip-firewall=yes /ip firewall connection tracking set udp-timeout=10s /ip neighbor discovery-settings set discover-interface-list=all /ip settings set max-neighbor-entries=8192 /ipv6 settings set disable-ipv6=yes max-neighbor-entries=8192 /interface l2tp-server server set enabled=yes /interface ovpn-server server set auth=sha1,md5 /ip address add address=10.99.0.2/24 interface=ether2 network=10.99.0.0 /ip dhcp-client add default-route-distance=10 interface=ether1 use-peer-dns=no use-peer-ntp=no /ip dns set servers=86.109.64.5 /ip dns static add address=192.168.88.1 name=router.lan /ip firewall address-list add address=86.109.64.0/27 list=support add address=10.0.0.0/8 list=support add address=86.109.64.0/19 comment="Ez torolheto" list=support add address=192.168.88.0/24 list=support /ip firewall filter add action=accept chain=input src-address=86.109.65.252 add action=accept chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp src-address-list=support add action=drop chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input comment="Add Syn Flood IP to the list" connection-limit=30,32 protocol=tcp tcp-flags=syn add action=drop chain=input comment="Drop to syn flood list" src-address-list=Syn_Flooder add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="Port Scanner Detect" protocol=tcp psd=21,3s,3,1 add action=drop chain=input comment="Drop to port scan list" src-address-list=Port_Scanner add action=jump chain=input comment="Jump for icmp input flow" jump-target=ICMP protocol=icmp add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP FIN Stealth scan" protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/FIN scan" protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/RST scan" protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="FIN/PSH/URG scan" protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="ALL/ALL scan" protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP NULL scan" protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=input comment="Block all access to the winbox - except to support list # DO NOT ENABLE THIS RULE BEFORE ADD YOUR SUBNET IN THE SUPPORT ADDRESS LIST" dst-port=8291 protocol=tcp src-address-list=!support add action=accept chain=input comment="Accept to established connections" connection-state=established add action=accept chain=input comment="Accept to related connections" connection-state=related add action=accept chain=input comment="Full access to SUPPORT address list" src-address-list=support add action=accept chain=input dst-address=255.255.255.255 add action=log chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" disabled=yes add action=drop chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" icmp-options=8:0 limit=20,30:packet protocol=icmp add action=accept chain=ICMP comment="Echo reply" icmp-options=0:0 protocol=icmp add action=accept chain=ICMP comment="Time Exceeded" icmp-options=11:0 protocol=icmp add action=accept chain=ICMP comment="Destination unreachable" icmp-options=3:0-1 protocol=icmp add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp add action=drop chain=ICMP comment="Drop to the other ICMPs" protocol=icmp add action=jump chain=output comment="Jump for icmp output" jump-target=ICMP protocol=icmp /ip proxy set enabled=yes /ip route add disabled=no distance=2 dst-address=0.0.0.0/0 gateway=10.99.0.1 add check-gateway=ping comment=UPC disabled=no distance=1 dst-address=86.109.64.254/32 gateway=80.99.245.254 routing-table=main scope=30 suppress-hw-offload=no target-scope=10 add disabled=no dst-address=10.250.0.164/32 gateway=10.99.0.1 /ip service set www address=86.109.64.0/27 set api address=86.109.64.0/27 set winbox address=86.109.64.0/19 set api-ssl address=86.109.64.0/27 /ip smb shares set [ find default=yes ] directory=/flash/pub /ip ssh set allow-none-crypto=yes forwarding-enabled=remote /ppp profile add bridge=*B name=l2tp /ppp secret add name=teszt password=teszt profile=l2tp service=l2tp /routing bfd configuration add disabled=no /snmp set contact=admin@rlan.hu enabled=yes location=Sopron /system clock set time-zone-name=Europe/Budapest /system identity set name=gw-vodafone-patakutca /system logging add action=remote topics=info add action=remote topics=critical add action=remote topics=error add action=remote topics=warning /system note set show-at-login=no /system ntp client set enabled=yes /system ntp client servers add address=86.109.64.5 /system resource irq rps set ether1 disabled=no set ether2 disabled=no set ether3 disabled=no set ether4 disabled=no set ether5 disabled=no /system scheduler add interval=6d name=mentes on-event=mentes policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-date=2018-07-18 start-time=06:34:27 add interval=1m name="ip route ellenorzo" on-event="ip route ellenorzo" policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-date=2022-06-20 start-time=14:09:36 /system script add dont-require-permissions=no name=mentes owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/export file=export\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" export\") file=export.rsc\r\n/system backup save name=backup\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" Backup\") file=backup.backup" add dont-require-permissions=no name="ip route ellenorzo" owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=":global currentIP;\r\n\r\n:if (\$currentIP =\"\") do={\r\n:set currentIP \"1.1.1.1\";\r\n}\r\n\r\n:local newIP [/ip dhcp-client get [find interface=\"ether1\"] gateway];\r\n\r\n:if (\$newIP != \$currentIP) do={\r\n :log info \"gateway \$currentIP changed to \$newIP\";\r\n :set currentIP \$newIP;\r\n /ip route set [/ip route find comment=\"UPC\"] gateway=\$newIP\r\n};\r\n" /tool e-mail set from=gw-vodafone-patakutca@magicnet.hu server=86.109.64.10 /tool graphing interface add /tool graphing queue add /tool graphing resource add /tool sniffer set filter-interface=ether1 /user group add name=backup policy="ssh,read,sensitive,!local,!telnet,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!web,!sniff,!api,!romon,!rest-api"