Защита от брутфорса на MikroTik
Mikrotik:Защита от brute-force атак для SSH и FTP
Защита от brute-force атак для FTP Приведенная ниже конфигурация позволяет только 10 неверных попыток авторизации в минуту /ip firewall filter
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment="drop ftp brute forcers"
add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m
add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" address-list=ftp_blacklist address-list-timeout=3h...
Mikrotik - Защита от брутфорса /*баним настырных на неделю, не меньше*/ /ip firewall filter add chain=input in-interface=pppoe-out1\ connection-state=new address-list=stage1\ action=add-src-to-address-list\ address-list-timeout=1m comment="" disabled=no add chain=input protocol=tcp in-interface=pppoe-out1\ connection-state=new src-address-list=stage1\ action=add-src-to-address-list address-list=stage2\ address-list-timeout=1m comment="" disabled=no add chain=input protocol=tcp in-interface=pppoe-out1\ connection-state=new src-address-list=stage2\ action=add-src-to-address-list address-list=stage3\ address-list-timeout=1m comment="" disabled=no add chain=input protocol=tcp in-interface=pppoe-out1\ connection-state=new src-address-list=stage3\ action=add-src-to-address-list address-list=blacklist\ address-list-timeout=7d comment="" disabled=no add chain=input protocol=tcp\ in-interface=pppoe-out1\ src-address-list=blacklist\ action=drop comment="drop brute forcers" disabled=yes