This document contains firewall configuration rules for filtering network traffic. It defines rules for logging, limiting, and dropping traffic based on protocols, ports, flags, and address lists. Specific rules target detecting and mitigating DDoS attacks, spam, port scanning, and invalid network traffic. Address lists are used to log sources and block future access from suspicious IP addresses.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
496 views2 pages
Mikrotik - Filter Firewall
This document contains firewall configuration rules for filtering network traffic. It defines rules for logging, limiting, and dropping traffic based on protocols, ports, flags, and address lists. Specific rules target detecting and mitigating DDoS attacks, spam, port scanning, and invalid network traffic. Address lists are used to log sources and block future access from suspicious IP addresses.