I forgot to tell another information: it's not PPPOE connection but IPOE
Many thanks in advance for help me
Many thanks in advance for help me
Code:
# 1970-01-06 06:29:39 by RouterOS 7.12.1# software id = ## model = RB5009UPr+S+# serial number = xxxxxx/interface bridgeadd name=WAN protocol-mode=noneadd name=bridge1-LAN protocol-mode=none/interface ethernetset [ find default-name=ether1 ] name=ether1-WAN/interface vlanadd interface=ether1-WAN name=vlan835 vlan-id=835/interface wireless security-profilesset [ find default=yes ] supplicant-identity=MikroTik/ip pooladd name=pool1 ranges=192.168.10.0/24/ip dhcp-serveradd add-arp=yes address-pool=pool1 interface=bridge1-LAN name=dhcp1/interface bridge portadd bridge=bridge1-LAN interface=ether2add bridge=bridge1-LAN interface=ether3add bridge=bridge1-LAN interface=ether4add bridge=WAN interface=ether1-WAN/ip addressadd address=88.xx.xx.14/31 interface=vlan835 network=88.xx.xx.14add address=192.168.10.1/24 interface=bridge1-LAN network=192.168.10.0add address=80.xx.xx.8/29 interface=WAN network=80.xx.xx.8/ip dhcp-server networkadd address=80.xx.xx.8/29 dns-server=151.xx.xx.2,62.xx.xx.150 gateway=\ 80.xx.xx.8/ip dnsset servers=151.xx.xx.2,62.xx.xx.150/ip firewall address-listadd address=80.xx.xx.8/29 list=connected_hostadd address=192.168.10.0/24 list=connected_host/ip firewall filteradd action=accept chain=input comment="accept established connection packets" \ connection-state=established,related,untrackedadd action=fasttrack-connection chain=forward hw-offload=no limit=10,5:packetadd action=accept chain=input comment="accept related connection packets" \ connection-state=relatedadd action=drop chain=input comment="drop invalid packets" connection-state=\ invalidadd action=accept chain=input comment=\ "Allow access to router from managing network" src-address-list=\ managed_hostadd action=drop chain=input comment="detect and drop port scan connections" \ protocol=tcp psd=21,3s,3,1add action=tarpit chain=input comment="suppress DoS attack" connection-limit=\ 3,32 limit=1,5:packet protocol=tcp src-address-list=black_listadd action=add-src-to-address-list address-list=black_list \ address-list-timeout=1d chain=input comment="detect DoS attack" \ connection-limit=10,32 protocol=tcpadd action=jump chain=input comment="jump to chain ICMP" jump-target=ICMP \ protocol=icmpadd action=accept chain=input comment=\ "Allow access to router from connected network" src-address-list=\ connected_hostadd action=accept chain=input comment="Allow Broadcast Traffic" \ dst-address-type=broadcastadd action=drop chain=input comment="drop everything else"add action=accept chain=ICMP comment="0:0 and limit for 5pac/s" icmp-options=\ 0:0-255 limit=5,5:packet protocol=icmpadd action=accept chain=ICMP comment="3:3 and limit for 5pac/s" icmp-options=\ 3:3 limit=5,5:packet protocol=icmpadd action=accept chain=ICMP comment="3:4 and limit for 5pac/s" icmp-options=\ 3:4 limit=5,5:packet protocol=icmpadd action=accept chain=ICMP comment="8:0 and limit for 5pac/s" icmp-options=\ 8:0-255 limit=5,5:packet protocol=icmpadd action=accept chain=ICMP comment="11:0 and limit for 5pac/s" \ icmp-options=11:0-255 limit=5,5:packet protocol=icmpadd action=drop chain=ICMP comment="Drop everything else" protocol=icmpadd action=accept chain=forward in-interface=WAN out-interface=bridge1-LANadd action=accept chain=forward in-interface=bridge1-LAN out-interface=WANadd action=drop chain=forward/ip firewall natadd action=netmap chain=dstnat dst-address=80.xx.xx.8/29 to-addresses=\ 192.168.10.0/24add action=netmap chain=srcnat src-address=192.168.10.0/24 to-addresses=\ 80.xx.xx.8/29/ip routeadd disabled=no distance=1 dst-address=0.0.0.0/0 gateway=88.xx.xx.15 \ pref-src="" routing-table=main scope=30 suppress-hw-offload=no \ target-scope=10/system identityset name=RB5009/system note/code]
Statistics: Posted by Barcode8 — Fri Feb 09, 2024 9:44 pm