/ip firewall filter
add action=add-src-to-address-list address-list="R&D-BZL-Adser DDoS Protect"
address-list-timeout=4w2d chain=input connection-limit=30,32 log=yes protocol=tcp
add action=tarpit chain=input comment="BZL _R&D Advisor" connection-limit=30,32
log=yes protocol=tcp src-address-list="R&D-BZL-Adser DDoS Protect"
add action=drop chain=input dst-port=53 protocol=udp
add action=add-src-to-address-list address-list=Syn_Flooder address-list-
timeout=4w2d chain=input comment="Add Syn Flood IP to the list" connection-
limit=30,32 protocol=\
tcp tcp-flags=syn
add action=add-src-to-address-list address-list=Port_Scanner address-list-
timeout=4w2d chain=input comment="Port Scanner Detect" protocol=tcp psd=21,3s,3,1
add action=drop chain=input dst-port=53 protocol=tcp
add action=drop chain=input comment="Drop to syn flood list" src-address-
list=Syn_Flooder
add action=drop chain=input comment="Drop to port scan list" src-address-
list=Port_Scanner
add action=jump chain=input comment="Jump for icmp input flow" disabled=yes jump-
target=ICMP protocol=icmp
add action=jump chain=forward comment="Jump for icmp forward flow" disabled=yes
jump-target=ICMP protocol=icmp
add action=drop chain=forward comment="Drop to bogon list" disabled=yes dst-
address-list=bogons
add action=add-src-to-address-list address-list=spammers address-list-timeout=4w2d
chain=forward comment="Add Spammers to the list for 3 hours" connection-limit=30,32
\
dst-port=25,587 limit=30/1m,0:packet protocol=tcp
add action=drop chain=forward comment="Avoid spammers action" dst-port=25,587
protocol=tcp src-address-list=spammers
add action=accept chain=input comment="Accept DNS - UDP" port=53 protocol=udp
add action=accept chain=input comment="Accept DNS - TCP" port=53 protocol=tcp
add action=accept chain=input comment="Accept to established connections"
connection-state=established disabled=yes
add action=accept chain=input comment="Accept to related connections" connection-
state=related disabled=yes
add action=accept chain=input comment="Full access to SUPPORT address list"
disabled=yes src-address-list=support
add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" icmp-
options=8:0 limit=1,5:packet protocol=icmp
add action=accept chain=ICMP comment="Echo reply" disabled=yes icmp-options=0:0
protocol=icmp
add action=accept chain=ICMP comment="Time Exceeded" disabled=yes icmp-options=11:0
protocol=icmp
add action=accept chain=ICMP comment="Destination unreachable" disabled=yes icmp-
options=3:0-1 protocol=icmp
add action=accept chain=ICMP comment=PMTUD disabled=yes icmp-options=3:4
protocol=icmp
add action=drop chain=ICMP comment="Drop to the other ICMPs" disabled=yes
protocol=icmp
add action=jump chain=output comment="Jump for icmp output" disabled=yes jump-
target=ICMP protocol=icmp
add action=add-src-to-address-list address-list="Syn_Flooders " address-list-
timeout=4w2d chain=input comment="Add IP in Syn Flooders List for 30 Min"
connection-limit=\
30,32 protocol=tcp tcp-flags=syn
add action=add-src-to-address-list address-list="Syn_Flooders " address-list-
timeout=4w2d chain=input comment="Add IP in Syn Flooders List for 30 Min"
connection-limit=\
30,32 protocol=udp
add action=drop chain=input comment="Drop Syn Flooders" src-address-
list="Syn_Flooders "
add action=add-src-to-address-list address-list=Rule-55 address-list-timeout=4w2d
chain=input comment="Block Spamming from using IPs configured in Mikrotik
interface" \
dst-port=25,587 protocol=tcp
add action=add-dst-to-address-list address-list=Rule-55 address-list-timeout=4w2d
chain=input comment="Block Spamming from using IPs configured in Mikrotik
interface" \
dst-port=25,587 protocol=tcp
add action=drop chain=input comment="Block Spamming from using IPs configured in
Mikrotik interface" dst-port=25,587 protocol=tcp
add action=add-src-to-address-list address-list=Port_Scanner address-list-
timeout=8w4d chain=input comment="Add IP in Port Scanner List for 7 Days"
protocol=tcp psd=\
21,3s,3,1
add action=accept chain=input comment="Allow all icmp" disabled=yes protocol=icmp
add action=accept chain=input comment="Accept Established and related " connection-
state=established,related disabled=yes
add action=add-src-to-address-list address-list=spammers address-list-timeout=4w2d
chain=forward comment="Add Spammers to the list for 3 hours" connection-limit=30,32
\
dst-port=25,587 limit=30/1m,0:packet protocol=tcp
add action=add-dst-to-address-list address-list=spammers-dst address-list-
timeout=4w2d chain=forward comment="Add Spammers to the list for 3 hours"
connection-limit=30,32 \
dst-port=25,587 limit=30/1m,0:packet protocol=tcp
add action=accept chain=forward disabled=yes protocol=icmp
add action=accept chain=input disabled=yes dst-port=8291 protocol=tcp
add action=drop chain=input disabled=yes dst-port=21-23 protocol=tcp src-address-
list=!DNS-RTR-ALLOW
add action=drop chain=input dst-port=21-23 protocol=udp src-address-list=!DNS-RTR-
ALLOW
add action=drop chain=input connection-state=invalid disabled=yes
add action=drop chain=forward connection-state=invalid disabled=yes
add action=add-src-to-address-list address-list=SUSPECTEDSPAMBOT address-list-
timeout=4w2d chain=forward connection-limit=50,32 dst-port=25 limit=50,5:packet
protocol=tcp
add action=drop chain=forward connection-limit=0,0 disabled=yes dst-
address=43.245.142.128/26 src-address=10.0.30.0/24
add action=drop chain=forward connection-limit=50,32 disabled=yes limit=50,5:packet
src-address-list=SUSPECTEDSPAMBOT
add action=jump chain=forward connection-state=new disabled=yes jump-target=detect-
ddos-ips
add action=return chain=detect-ddos-ips dst-limit=32,32,src-and-dst-addresses/10s
add action=add-dst-to-address-list address-list=ddos-target address-list-
timeout=4w2d chain=detect-ddos-ips
add action=add-src-to-address-list address-list=ddos-src address-list-timeout=4w2d
chain=detect-ddos-ips