This document provides a script for configuring security settings on a Mikrotik Routerboard, including changing passwords and ports, blocking SSH brute force attempts, blocking DDoS attacks, and detecting and blocking port scanners. The script contains rules to add IP addresses to blocklists after multiple login attempts on port 22, drop traffic from known scanners, and detect uncommon TCP flag combinations that are signs of stealth port scanning.
This document provides a script for configuring security settings on a Mikrotik Routerboard, including changing passwords and ports, blocking SSH brute force attempts, blocking DDoS attacks, and detecting and blocking port scanners. The script contains rules to add IP addresses to blocklists after multiple login attempts on port 22, drop traffic from known scanners, and detect uncommon TCP flag combinations that are signs of stealth port scanning.
This document provides a script for configuring security settings on a Mikrotik Routerboard, including changing passwords and ports, blocking SSH brute force attempts, blocking DDoS attacks, and detecting and blocking port scanners. The script contains rules to add IP addresses to blocklists after multiple login attempts on port 22, drop traffic from known scanners, and detect uncommon TCP flag combinations that are signs of stealth port scanning.