Reglas Filter
Reglas Filter
Reglas Filter
Router protection
Digamos que nuestra red privada es 192.168.0.0/24 y pblica (WAN) de la interfaz es Ether1. Vamos a establecer cortafuegos para permitir conexiones a un router s solo de nuestra red local y colocar el resto. Tambin vamos a permitir que el protocolo ICMP en cualquier interfaz para que cualquier persona pueda hacer ping a su router de Internet.
/ip firewall filter add chain=input connection-state=invalid action=drop \ comment="Drop Invalid connections" add chain=input connection-state=established action=accept \ comment="Allow Established connections" add chain=input protocol=icmp action=accept \ comment="Allow ICMP" add chain=input src-address=192.168.0.0/24 action=accept \ in-interface=!ether1 add chain=input action=drop comment="Drop everything else"
La proteccin del cliente Para proteger la red del cliente, debemos comprobar todo el trfico que pasa a travs del router y el bloque deseado. Para icmp, tcp, udp trfico vamos a crear cadenas, donde se Droped todos los paquetes no deseados:
/ip firewall filter add chain=forward protocol=tcp connection-state=invalid \ action=drop comment="drop invalid connections" add chain=forward connection-state=established action=accept \ comment="allow already established connections" add chain=forward connection-state=related action=accept \ comment="allow related connections"
add chain=udp add chain=udp portmapper" add chain=udp portmapper" add chain=udp NBT" add chain=udp NFS" add chain=udp BackOriffice"
protocol=udp dst-port=69 action=drop comment="deny TFTP" protocol=udp dst-port=111 action=drop comment="deny PRC protocol=udp dst-port=135 action=drop comment="deny PRC protocol=udp dst-port=137-139 action=drop comment="deny protocol=udp dst-port=2049 action=drop comment="deny protocol=udp dst-port=3133 action=drop comment="deny
add chain=icmp protocol=icmp icmp-options=0:0 comment="echo reply" add chain=icmp protocol=icmp icmp-options=3:0 comment="net unreachable" add chain=icmp protocol=icmp icmp-options=3:1 comment="host unreachable" add chain=icmp protocol=icmp icmp-options=3:4
comment="host unreachable fragmentation required" add chain=icmp protocol=icmp icmp-options=4:0 action=accept \ comment="allow source quench" add chain=icmp protocol=icmp icmp-options=8:0 action=accept \ comment="allow echo request" add chain=icmp protocol=icmp icmp-options=11:0 action=accept \ comment="allow time exceed" add chain=icmp protocol=icmp icmp-options=12:0 action=accept \ comment="allow parameter bad" add chain=icmp action=drop comment="deny all other types"