本帖最後由 gfx86674 於 2016-5-14 11:47 編輯
您的PPTP/SSTP/L2TP/OVPN-Server常常被陌生人trying嗎?
是的話,您應該建立基本的VPN防護.
首先,您應透過防火牆把這些嘗試使用vpn-server的ip列入觀察名單.
請注意SSTP與OVPN ,您使用的連接埠可能會不一樣...- /ip firewall filter
- add action=accept chain=input src-address-list=mobile
- add action=accept chain=input src-address-list=temp \
- dst-port=1723,443,1194 protocol=tcp
- add action=accept chain=input src-address-list=temp \
- dst-port=500,1701,4500 protocol=udp
- add action=drop chain=input src-address-list="port scanners"
- # PPTP #
- add action=add-src-to-address-list address-list=temp address-list-timeout=1m20s \
- chain=input dst-port=1723 protocol=tcp
- # SSTP #
- add action=add-src-to-address-list address-list=temp address-list-timeout=1m20s \
- chain=input dst-port=443 protocol=tcp
- # L2TP #
- add action=add-src-to-address-list address-list=temp address-list-timeout=1m20s \
- chain=input dst-port=500,1701,4500 protocol=udp
- # OVPN #
- add action=add-src-to-address-list address-list=temp address-list-timeout=1m20s \
- chain=input dst-port=1194 protocol=tcp
複製代碼 在/system schedule新增 Vpn-points (VPN檢查哨) ,每分鐘驗證一次.
script:https://dl.dropboxusercontent.com/u/34743921/vpncheck.txt
透過檢查哨檢查,不該對Router進行連線的陌生ip一律進port scanners封鎖掉.
|