/ip firewall filter add action=accept chain=input comment="Mikrotik All Ports Allow For Only Admin" dst-port=3430,1971 protocol=tcp src-address-list=Admin-IP-List add action=drop chain=input comment="Mikrotik All Ports Deny For All Input" dst-port=3430,1971 protocol=tcp add action=drop chain=input comment="Drop Mikrotik Discovery" dst-port=5678 protocol=udp add action=drop chain=input comment="Drop Mikrotik Winbox MAC Request" dst-port=20561 protocol=udp add action=drop chain=input comment="HTTP_Ports Drop From INTERNET" dst-port=8080 in-interface-list=INTERNET protocol=tcp add action=drop chain=input comment="Block UDP DNS Attack From INTERNET" dst-port=53 in-interface-list=INTERNET protocol=udp add action=drop chain=input comment="Block TCP DNS Attack From INTERNET" dst-port=53 in-interface-list=INTERNET protocol=tcp add action=drop chain=input comment="Block ICMP Ping" in-interface-list=INTERNET protocol=icmp add action=drop chain=forward comment="BLOCK TRACEROUTE" icmp-options=11:0 protocol=icmp add action=drop chain=forward comment="BLOCK TRACEROUTE" icmp-options=3:3 protocol=icmp add action=jump chain=forward connection-state=new jump-target=block-ddos add action=drop chain=forward connection-state=new dst-address-list=ddosed src-address-list=ddoser add action=return chain=block-ddos dst-limit=50,50,src-and-dst-addresses/10s add action=add-dst-to-address-list address-list=ddosed address-list-timeout=1m chain=block-ddos add action=add-src-to-address-list address-list=ddoser address-list-timeout=1m chain=block-ddos add action=drop chain=input comment="ping port scanners" src-address-list="port scanners" add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2m chain=input comment="Port scanners to list " protocol=tcp psd=21,3s,3,1 add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2m chain=input comment="NMAP FIN Stealth scan" protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2m chain=input comment="SYN/FIN scan" protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2m chain=input comment="SYN/RST scan" protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2m chain=input comment="FIN/PSH/URG scan" protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list="port scanners" address-list-timeout=30m chain=input comment="ALL/ALL scan" protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2m chain=input comment="NMAP NULL scan" protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=virus comment="Blaster Worm" dst-port=135-139 protocol=tcp add action=drop chain=virus comment="Blaster Worm" dst-port=445 protocol=tcp add action=drop chain=virus comment="Messenger Worm" dst-port=135-139 protocol=udp add action=drop chain=virus comment="Blaster Worm" dst-port=445 protocol=udp add action=drop chain=virus comment=________ dst-port=593 protocol=tcp add action=drop chain=virus comment=________ dst-port=1024-1030 protocol=tcp add action=drop chain=virus comment=MyDoom dst-port=1080 protocol=tcp add action=drop chain=virus comment=________ dst-port=1214 protocol=tcp add action=drop chain=virus comment="ndm requester" dst-port=1363 protocol=tcp add action=drop chain=virus comment="ndm server" dst-port=1364 protocol=tcp add action=drop chain=virus comment="screen cast" dst-port=1368 protocol=tcp add action=drop chain=virus comment=hromgrafx dst-port=1373 protocol=tcp add action=drop chain=virus comment=cichlid dst-port=1377 protocol=tcp add action=drop chain=virus comment="Bagle Virus" dst-port=2745 protocol=tcp add action=drop chain=virus comment=Dumaru.Y dst-port=2283 protocol=tcp add action=drop chain=virus comment=Beagle dst-port=2535 protocol=tcp add action=drop chain=virus comment=Beagle.C-K dst-port=2745 protocol=tcp add action=drop chain=virus comment=MyDoom dst-port=3127-3128 protocol=tcp add action=drop chain=virus comment="Backdoor OptixPro" dst-port=3410 protocol=tcp add action=drop chain=virus comment=Sasser dst-port=5554 protocol=tcp add action=drop chain=virus comment=Beagle.B dst-port=8866 protocol=tcp add action=drop chain=virus comment=Dabber.A-B dst-port=9898 protocol=tcp add action=drop chain=virus comment=Dumaru.Y dst-port=10000 protocol=tcp add action=drop chain=virus comment=MyDoom.B dst-port=10080 protocol=tcp add action=drop chain=virus comment=NetBus dst-port=12345 protocol=tcp add action=drop chain=virus comment=Kuang2 dst-port=17300 protocol=tcp add action=drop chain=virus comment=SubSeven dst-port=27374 protocol=tcp add action=drop chain=virus comment="PhatBot, Agobot, Gaobot" dst-port=65506 protocol=tcp add action=jump chain=forward comment="jump to the virus chain" jump-target=virus add action=accept chain=input comment="Accept established connections" connection-state=established add action=accept chain=input comment="Accept related connections" connection-state=related add action=drop chain=input comment="invalid connections" connection-state=invalid add action=accept chain=input comment=UDP protocol=udp add action=drop chain=forward comment="invalid connections" connection-state=invalid add action=drop chain=forward comment="Block Worm Infected Requests" dst-port=445 protocol=tcp src-address-list=Worm-Infected-p445