# version: 7.20.6 (stable) # factory-software: 6.36.1 # total-memory: 256.0MiB # cpu: MIPS 1004Kc V2.15 # cpu-count: 4 # total-hdd-space: 16.0MiB # architecture-name: mmips # board-name: hEX # platform: MikroTik # installed-version: 7.20.6 # Flags: U - UNDOABLE # Columns: ACTION, BY, POLICY, TIME # ACTION BY POLICY TIME # U ospf-interface-1 changed admin write 2025-12-14 15:56:06 # U address removed admin write 2025-12-14 15:55:23 # U address changed admin write 2025-12-14 15:55:00 # U ospf-interface-1 changed admin write 2025-12-14 15:52:15 # U filter-rule-1 changed admin write 2025-12-14 15:50:28 # U filter-rule-2 added admin write 2025-12-14 15:50:23 # U default-v2 changed admin write 2025-12-14 15:50:04 # U ntp server record added read 2025-12-03 13:00:41 # U ovpn server added read 2025-12-03 13:00:41 # # software id = KJ6T-FH9L # # model = RB750Gr3 # serial number = 6F3807F961A8 /interface bridge add name=bridge-iroda port-cost-mode=short add name=bridge-link port-cost-mode=short /interface ethernet set [ find default-name=ether1 ] comment=IRODA set [ find default-name=ether2 ] comment="USER 5G" set [ find default-name=ether3 ] comment=KASSAI2 set [ find default-name=ether4 ] comment=SZIESZTA set [ find default-name=ether5 ] comment="Server belso halon" /interface lte apn set [ find default=yes ] ip-type=ipv4 use-network-apn=no /ip pool add name=dhcp_pool0 ranges=10.0.98.200-10.0.98.240 /ip dhcp-server add address-pool=dhcp_pool0 interface=bridge-iroda lease-time=1h name=dhcp1 /ip smb users set [ find default=yes ] disabled=yes /routing bgp template set default as=65530 disabled=no output.network=bgp-networks /routing ospf instance add disabled=no in-filter-chain=ospf-in name=default-v2 out-filter-chain=ospf-out redistribute=connected,static,vpn,dhcp,modem /routing ospf area add disabled=no instance=default-v2 name=backbone-v2 /snmp community set [ find default=yes ] addresses=86.109.64.0/27,10.0.0.2/32 add addresses=86.109.64.0/27,10.0.0.2/32 name=partnerlogin /system logging action set 3 remote=86.109.64.16 /user group add name=backup policy="ssh,read,sensitive,!local,!telnet,!ftp,!reboot,!write,!policy,!test,!winbox,!password,!web,!sniff,!api,!romon,!rest-api" /interface bridge port add bridge=bridge-link hw=no ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10 add bridge=bridge-iroda hw=no ingress-filtering=no interface=ether1 internal-path-cost=10 path-cost=10 add bridge=bridge-link ingress-filtering=no interface=ether4 internal-path-cost=10 multicast-router=disabled path-cost=10 add bridge=bridge-link ingress-filtering=no interface=ether3 internal-path-cost=10 multicast-router=disabled path-cost=10 add bridge=bridge-iroda ingress-filtering=no interface=ether5 internal-path-cost=10 path-cost=10 /ip firewall connection tracking set udp-timeout=10s /ip neighbor discovery-settings set discover-interface-list=all /ipv6 settings set disable-ipv6=yes max-neighbor-entries=8192 /interface ovpn-server server add auth=sha1,md5 mac-address=FE:3E:B4:B6:4A:75 name=ovpn-server1 /ip address add address=86.109.64.194/30 interface=ether4 network=86.109.64.192 add address=10.0.98.1/24 interface=bridge-iroda network=10.0.98.0 /ip dhcp-client add default-route-distance=200 disabled=yes interface=ether5 use-peer-dns=no use-peer-ntp=no /ip dhcp-server network add address=10.0.98.0/24 gateway=10.0.98.1 /ip dns set servers=8.8.8.8,86.109.64.5,193.194.159.225 /ip firewall address-list add address=86.109.64.0/27 list=support add address=192.168.88.0/24 list=support add address=10.0.0.0/8 list=support add address=86.109.64.0/19 comment="Ezt ki lehet torolni, csak a beallitashoz kell" list=support /ip firewall filter add action=accept chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp src-address-list=support add action=drop chain=input comment=telnet,ssh,ftp dst-port=21-23 protocol=tcp add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input comment="Add Syn Flood IP to the list" connection-limit=30,32 protocol=tcp tcp-flags=syn add action=drop chain=input comment="Drop to syn flood list" src-address-list=Syn_Flooder add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="Port Scanner Detect" protocol=tcp psd=21,3s,3,1 add action=drop chain=input comment="Drop to port scan list" src-address-list=Port_Scanner add action=jump chain=input comment="Jump for icmp input flow" jump-target=ICMP protocol=icmp add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP FIN Stealth scan" protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/FIN scan" protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="SYN/RST scan" protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="FIN/PSH/URG scan" protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="ALL/ALL scan" protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1h chain=input comment="NMAP NULL scan" protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=input comment="Block all access to the winbox - except to support list # DO NOT ENABLE THIS RULE BEFORE ADD YOUR SUBNET IN THE SUPPORT ADDRESS LIST" dst-port=8291 protocol=tcp src-address-list=!support add action=accept chain=input comment="Accept to established connections" connection-state=established add action=accept chain=input comment="Accept to related connections" connection-state=related add action=accept chain=input comment="Full access to SUPPORT address list" src-address-list=support add action=accept chain=input dst-address=255.255.255.255 add action=log chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" disabled=yes add action=drop chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED" add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" icmp-options=8:0 limit=10,15 protocol=icmp add action=accept chain=ICMP comment="Echo reply" icmp-options=0:0 protocol=icmp add action=accept chain=ICMP comment="Time Exceeded" icmp-options=11:0 protocol=icmp add action=accept chain=ICMP comment="Destination unreachable" icmp-options=3:0-1 protocol=icmp add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp add action=drop chain=ICMP comment="Drop to the other ICMPs" protocol=icmp add action=jump chain=output comment="Jump for icmp output" jump-target=ICMP protocol=icmp /ip firewall mangle add action=change-mss chain=forward disabled=yes new-mss=1440 protocol=tcp tcp-flags=syn tcp-mss=1440-65535 /ip firewall nat add action=netmap chain=srcnat comment=86.109.64.194 src-address=10.0.98.0/24 to-addresses=86.109.64.194 add action=netmap chain=srcnat comment=upc disabled=yes src-address=10.0.98.0/24 to-addresses=213.222.186.138 add action=dst-nat chain=dstnat disabled=yes dst-port=22 protocol=tcp to-addresses=10.0.98.250 /ip hotspot profile set [ find default=yes ] html-directory=hotspot /ip ipsec profile set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5 /ip proxy set src-address=80.99.245.84 /ip proxy access add src-address=86.109.64.106 add src-address=86.109.66.22 add action=deny /ip route add disabled=no distance=200 dst-address=0.0.0.0/0 gateway=86.109.64.193 /ip service set www address=86.109.64.0/27 set api address=86.109.64.0/27 set api-ssl address=86.109.64.0/27 /ip smb shares set [ find default=yes ] directory=/flash/pub /ppp profile set *0 bridge=*13 set *FFFFFFFE bridge=*13 /routing bfd configuration add disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5 /routing filter rule add chain=ospf-out disabled=no rule="if (dst in 10.0.98.0/24 && dst-len == 24) { reject; }\r\naccept;\n" add chain=ospf-in disabled=no rule="accept;\n" /routing ospf interface-template add area=backbone-v2 cost=10 disabled=yes interfaces=bridge-link networks=86.109.64.192/30 priority=1 /snmp set contact=admin@rlan.hu enabled=yes location=Sopron /system clock set time-zone-name=Europe/Budapest /system identity set name=gw-kassai /system logging add disabled=yes topics=dhcp add disabled=yes topics=l2tp add action=remote topics=info add action=remote topics=critical add action=remote topics=error add action=remote topics=warning add topics=web-proxy /system ntp client set enabled=yes /system ntp client servers add address=86.109.64.5 /system resource irq rps set ether1 disabled=no set ether2 disabled=no set ether3 disabled=no set ether4 disabled=no set ether5 disabled=no /system scheduler add interval=6d name=mentes on-event=mentes policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-date=2017-10-19 start-time=08:28:10 /system script add dont-require-permissions=no name=mentes owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/system backup save name=backup\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" Backup\") file=backup.backup\r\n/export file=export\r\n/tool e-mail send from=\"backup@rlan.hu\" to=\"backup@rlan.hu\" subject=([/system identity get name] . \" export\") file=export.rsc\r\n\r\n" /tool e-mail set from=gw-kassai@rlan.hu server=86.109.64.10 /tool graphing interface add /tool graphing queue add /tool graphing resource add /tool sniffer set file-limit=5000KiB file-name=sniff filter-interface=*9