Reglas de Firewall: /ip firewall filter add action=add-src-to-address-list address-list=Block-
DDoS  address-list-timeout=none-dynamic chain=input comment=" Block DDoS"  connection-
limit=32,32 disabled=yes protocol=tcp add action=tarpit chain=input connection-limit=10,32
protocol=tcp  src-address-list=Block-DDoS comment="" disabled=yes add action=accept
chain=input comment="Acceso winbox desde trunk" dst-port= 8291 disabled=yes protocol=tcp
add action=drop chain=input dst-port=53 in-interface=ether4 log-prefix= DNS protocol=udp
disabled=yes comment=" Bloquea consultas DNS desde Internet" add action=accept
chain=input disabled=yes comment= " Permite sesiones TCP input establecidas" connection-
state=established add action=accept chain=input comment= " Permite sesiones TCP input
relacionadas" disabled=yes connection-state=related add action=accept chain=input
comment=" Acceso al DHCP server" disabled=yes dst-port=67-68  log-prefix="DHCP
REQUEST" protocol=udp add action=accept chain=input comment= " Permite utilizar el MK
como DNS Server" disabled=yes dst-port=53 protocol=udp add action=drop chain=input
comment=" No permite sesiones TCP input invalidas"  connection-state=invalid log-
prefix="DROP INPUT INVALIDAS" disabled=yes add action=drop chain=input comment="
DENIEGO TODO LO QUE ENTRE AL ROUTER Y NO  ESTC9 EXPLICITAMENTE
PERMITIDO" log-prefix="DROP INPUT" protocol=!icmp disabled=yes add action=accept
chain=forward comment=" Permite sesiones TCP establecidas"  connection-state=established
disabled=yes add action=accept chain=forward comment=" Permite sesiones TCP
relacionadas"  connection-state=related disabled=yes add action=accept chain=forward
comment=" Permite PING" log-prefix=PING  protocol=icmp disabled=yes add action=accept
chain=forward comment=" Permite HTTP" dst-port=80 protocol= tcp disabled=yes add
action=accept chain=forward comment=" Permite 587 Secure Mail" dst-port=587  protocol=tcp
disabled=yes add action=accept chain=forward comment=" Permite HTTPS" dst-port=443 
protocol=tcp disabled=yes add action=accept chain=forward comment=" Permite FTP" dst-
port=21 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite
SSH" dst-port=22 protocol= tcp disabled=yes add action=accept chain=forward comment="
Permite SSH 1122" dst-port=1122  protocol=tcp disabled=yes add action=accept
chain=forward comment=" Permite DNS" dst-port=53 protocol= udp disabled=yes add
action=accept chain=forward comment=" Permite SMTP" dst-port=25 protocol= tcp
disabled=yes add action=accept chain=forward comment=" Permite SMTP" dst-port=465
protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite POP3" dst-
port=110 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite
POP3S" dst-port=995  protocol=tcp disabled=yes add action=accept chain=forward
comment=" Permite IMAP" dst-port=143 protocol= tcp disabled=yes add action=accept
chain=forward comment=" Permite IMAPS" dst-port=993  protocol=tcp disabled=yes add
action=accept chain=forward comment=" Permite RDP" dst-port=3389 protocol= tcp
disabled=yes add action=drop chain=forward comment=" DISABLED No permite sesiones
TCP invalidas"  connection-state=invalid disabled=yes log-prefix="DROP FORWARD
INVALIDAS" add action=drop chain=forward comment=" DENIEGO TODO LO QUE
ATRAVIESE EL ROUTER _Y NO ESTC9 EXPLICITAMENTE PERMITIDO" log=yes  log-
prefix="DROP FORWARD" disabled=yes

More Related Content

DOCX
Firewall filters
PDF
Complete squid & firewall configuration. plus easy mac binding
PDF
Ip firewall mangle
PDF
Athenticated smaba server config with open vpn
PPTX
How to convert your Linux box into Security Gateway - Part 1
TXT
Linuxserver harden
PDF
Cisco Equipment Security
PDF
Building a moat bastion server
Firewall filters
Complete squid & firewall configuration. plus easy mac binding
Ip firewall mangle
Athenticated smaba server config with open vpn
How to convert your Linux box into Security Gateway - Part 1
Linuxserver harden
Cisco Equipment Security
Building a moat bastion server

Similar to Reglas de Firewall.docx (20)

TXT
Firewall
PDF
Introduction to firewalls through Iptables
PDF
Open Source Networking with Vyatta
PDF
presentation_microtik y sus buenas practicas.pdf
PDF
Xb30330.xb30350 management guide
DOCX
25 most frequently used linux ip tables rules examples
DOCX
25 most frequently used linux ip tables rules examples
PDF
Router security-configuration-guide-executive-summary
PPT
Chapter10ccna
PDF
Linux internet server security and configuration tutorial
ODP
A look at computer security
DOCX
fortigate-cli-most used configuration.docx
PDF
Dns configuration on rhel 5
PDF
Fail2ban
PPT
Cisco ACL
PDF
Ch4-Implementing Firewall Technologies.pdf
PPT
Chapter 4 overview
PDF
Hack Your Home Routers
PDF
Network commands
Firewall
Introduction to firewalls through Iptables
Open Source Networking with Vyatta
presentation_microtik y sus buenas practicas.pdf
Xb30330.xb30350 management guide
25 most frequently used linux ip tables rules examples
25 most frequently used linux ip tables rules examples
Router security-configuration-guide-executive-summary
Chapter10ccna
Linux internet server security and configuration tutorial
A look at computer security
fortigate-cli-most used configuration.docx
Dns configuration on rhel 5
Fail2ban
Cisco ACL
Ch4-Implementing Firewall Technologies.pdf
Chapter 4 overview
Hack Your Home Routers
Network commands

Recently uploaded (20)

PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
Understand the Gitlab_presentation_task.pdf
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PPTX
Reading as a good Form of Recreation
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Artificial_Intelligence_Basics use in our daily life
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Understand the Gitlab_presentation_task.pdf
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
simpleintnettestmetiaerl for the simple testint
Alethe Consulting Corporate Profile and Solution Aproach
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
Reading as a good Form of Recreation
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
t_and_OpenAI_Combined_two_pressentations
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Artificial_Intelligence_Basics use in our daily life
250152213-Excitation-SystemWERRT (1).ppt
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx

Reglas de Firewall.docx

  • 1. Reglas de Firewall: /ip firewall filter add action=add-src-to-address-list address-list=Block- DDoS address-list-timeout=none-dynamic chain=input comment=" Block DDoS" connection- limit=32,32 disabled=yes protocol=tcp add action=tarpit chain=input connection-limit=10,32 protocol=tcp src-address-list=Block-DDoS comment="" disabled=yes add action=accept chain=input comment="Acceso winbox desde trunk" dst-port= 8291 disabled=yes protocol=tcp add action=drop chain=input dst-port=53 in-interface=ether4 log-prefix= DNS protocol=udp disabled=yes comment=" Bloquea consultas DNS desde Internet" add action=accept chain=input disabled=yes comment= " Permite sesiones TCP input establecidas" connection- state=established add action=accept chain=input comment= " Permite sesiones TCP input relacionadas" disabled=yes connection-state=related add action=accept chain=input comment=" Acceso al DHCP server" disabled=yes dst-port=67-68 log-prefix="DHCP REQUEST" protocol=udp add action=accept chain=input comment= " Permite utilizar el MK como DNS Server" disabled=yes dst-port=53 protocol=udp add action=drop chain=input comment=" No permite sesiones TCP input invalidas" connection-state=invalid log- prefix="DROP INPUT INVALIDAS" disabled=yes add action=drop chain=input comment=" DENIEGO TODO LO QUE ENTRE AL ROUTER Y NO ESTC9 EXPLICITAMENTE PERMITIDO" log-prefix="DROP INPUT" protocol=!icmp disabled=yes add action=accept chain=forward comment=" Permite sesiones TCP establecidas" connection-state=established disabled=yes add action=accept chain=forward comment=" Permite sesiones TCP relacionadas" connection-state=related disabled=yes add action=accept chain=forward comment=" Permite PING" log-prefix=PING protocol=icmp disabled=yes add action=accept chain=forward comment=" Permite HTTP" dst-port=80 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite 587 Secure Mail" dst-port=587 protocol=tcp disabled=yes add action=accept chain=forward comment=" Permite HTTPS" dst-port=443 protocol=tcp disabled=yes add action=accept chain=forward comment=" Permite FTP" dst- port=21 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite SSH" dst-port=22 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite SSH 1122" dst-port=1122 protocol=tcp disabled=yes add action=accept chain=forward comment=" Permite DNS" dst-port=53 protocol= udp disabled=yes add action=accept chain=forward comment=" Permite SMTP" dst-port=25 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite SMTP" dst-port=465 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite POP3" dst- port=110 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite POP3S" dst-port=995 protocol=tcp disabled=yes add action=accept chain=forward comment=" Permite IMAP" dst-port=143 protocol= tcp disabled=yes add action=accept chain=forward comment=" Permite IMAPS" dst-port=993 protocol=tcp disabled=yes add action=accept chain=forward comment=" Permite RDP" dst-port=3389 protocol= tcp disabled=yes add action=drop chain=forward comment=" DISABLED No permite sesiones TCP invalidas" connection-state=invalid disabled=yes log-prefix="DROP FORWARD INVALIDAS" add action=drop chain=forward comment=" DENIEGO TODO LO QUE ATRAVIESE EL ROUTER _Y NO ESTC9 EXPLICITAMENTE PERMITIDO" log=yes log- prefix="DROP FORWARD" disabled=yes