Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Interfaces
- set interfaces ge-0/0/0 unit 0 description WAN
- set interfaces ge-0/0/0 unit 0 family inet filter input-list [ prerouting icmp4 bad_tcp prerouting-termination ]
- set interfaces ge-0/0/1 unit 0 description LAN
- set interfaces ge-0/0/1 unit 0 family inet filter input-list [ prerouting icmp4 bad_tcp prerouting-termination ]
- # /ip firewall address-list
- set policy-options prefix-list bad_dst_ipv4 0.0.0.0/8
- set policy-options prefix-list bad_dst_ipv4 224.0.0.0/4
- set policy-options prefix-list bad_ipv4 127.0.0.0/8
- set policy-options prefix-list bad_ipv4 192.0.0.0/24
- set policy-options prefix-list bad_ipv4 192.0.2.0/24
- set policy-options prefix-list bad_ipv4 198.51.100.0/24
- set policy-options prefix-list bad_ipv4 203.0.113.0/24
- set policy-options prefix-list bad_ipv4 240.0.0.0/4
- set policy-options prefix-list bad_src_ipv4 224.0.0.0/4
- set policy-options prefix-list bad_src_ipv4 255.255.255.255/32
- set policy-options prefix-list not_global_ipv4 0.0.0.0/8
- set policy-options prefix-list not_global_ipv4 10.0.0.0/8
- set policy-options prefix-list not_global_ipv4 100.64.0.0/10
- set policy-options prefix-list not_global_ipv4 169.254.0.0/16
- set policy-options prefix-list not_global_ipv4 172.16.0.0/12
- set policy-options prefix-list not_global_ipv4 192.0.0.0/29
- set policy-options prefix-list not_global_ipv4 192.168.0.0/16
- set policy-options prefix-list not_global_ipv4 198.18.0.0/15
- set policy-options prefix-list not_global_ipv4 255.255.255.255/32
- # /ip firewall raw
- # Prerouting
- set firewall family inet filter prerouting term "defconf: enable for transparent firewall" then accept
- deactivate firewall family inet filter prerouting term "defconf: enable for transparent firewall"
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" from source-address 0.0.0.0/32
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" from destination-address 255.255.255.255/32
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" from protocol udp
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" from source-port 68
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" from destination-port 67
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" from interface ge-0/0/1.0
- set firewall family inet filter prerouting term "defconf: accept DHCP discover" then accept
- set firewall family inet filter prerouting term "defconf: drop bogon IP's - Source" from source-prefix-list bad_ipv4
- set firewall family inet filter prerouting term "defconf: drop bogon IP's - Source" from source-prefix-list bad_src_ipv4
- set firewall family inet filter prerouting term "defconf: drop bogon IP's - Source" then discard
- set firewall family inet filter prerouting term "defconf: drop bogon IP's - Destination" from destination-prefix-list bad_ipv4
- set firewall family inet filter prerouting term "defconf: drop bogon IP's - Destination" from destination-prefix-list bad_dst_ipv4
- set firewall family inet filter prerouting term "defconf: drop bogon IP's - Destination" then discard
- set firewall family inet filter prerouting term "defconf: drop non global from WAN" from source-prefix-list not_global_ipv4
- set firewall family inet filter prerouting term "defconf: drop non global from WAN" from interface ge-0/0/0
- set firewall family inet filter prerouting term "defconf: drop non global from WAN" then discard
- set firewall family inet filter prerouting term "defconf: drop forward to local lan from WAN" from destination-address 192.168.88.0/24
- set firewall family inet filter prerouting term "defconf: drop forward to local lan from WAN" from interface ge-0/0/0
- set firewall family inet filter prerouting term "defconf: drop forward to local lan from WAN" then discard
- set firewall family inet filter prerouting term "defconf: drop local if not from default IP range" from source-address 192.168.88.0/24
- set firewall family inet filter prerouting term "defconf: drop local if not from default IP range" from interface ge-0/0/1
- set firewall family inet filter prerouting term "defconf: drop local if not from default IP range" then next term
- set firewall family inet filter prerouting term "defconf: drop bad UDP" from protocol udp
- set firewall family inet filter prerouting term "defconf: drop bad UDP" from port 0
- # ICMP
- set firewall family inet filter icmp4 term "defconf: echo reply" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: echo reply" from icmp-type 0
- set firewall family inet filter icmp4 term "defconf: echo reply" from icmp-code 0
- set firewall family inet filter icmp4 term "defconf: echo reply" then policer icmp_policer
- set firewall family inet filter icmp4 term "defconf: echo reply" then accept
- set firewall family inet filter icmp4 term "defconf: net unreachable" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: net unreachable" from icmp-type 3
- set firewall family inet filter icmp4 term "defconf: net unreachable" from icmp-code 0
- set firewall family inet filter icmp4 term "defconf: net unreachable" then accept
- set firewall family inet filter icmp4 term "defconf: host unreachable" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: host unreachable" from icmp-type 3
- set firewall family inet filter icmp4 term "defconf: host unreachable" from icmp-code 1
- set firewall family inet filter icmp4 term "defconf: host unreachable" then accept
- set firewall family inet filter icmp4 term "defconf: protocol unreachable" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: protocol unreachable" from icmp-type 3
- set firewall family inet filter icmp4 term "defconf: protocol unreachable" from icmp-code 2
- set firewall family inet filter icmp4 term "defconf: protocol unreachable" then accept
- set firewall family inet filter icmp4 term "defconf: port unreachable" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: port unreachable" from icmp-type 3
- set firewall family inet filter icmp4 term "defconf: port unreachable" from icmp-code 3
- set firewall family inet filter icmp4 term "defconf: port unreachable" then accept
- set firewall family inet filter icmp4 term "defconf: fragmentation needed" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: fragmentation needed" from icmp-type 3
- set firewall family inet filter icmp4 term "defconf: fragmentation needed" from icmp-code 4
- set firewall family inet filter icmp4 term "defconf: fragmentation needed" then accept
- set firewall family inet filter icmp4 term "defconf: echo" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: echo" from icmp-type 8
- set firewall family inet filter icmp4 term "defconf: echo" from icmp-code 0
- set firewall family inet filter icmp4 term "defconf: echo" then policer icmp_policer
- set firewall family inet filter icmp4 term "defconf: echo" then accept
- set firewall family inet filter icmp4 term "defconf: time exceeded" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: time exceeded" from icmp-type 11
- set firewall family inet filter icmp4 term "defconf: time exceeded" then accept
- set firewall family inet filter icmp4 term "defconf: drop other icmp" from protocol icmp
- set firewall family inet filter icmp4 term "defconf: drop other icmp" then discard
- # bad-tcp
- set firewall family inet filter bad_tcp term "defconf: TCP flag filter" from protocol tcp
- set firewall family inet filter bad_tcp term "defconf: TCP flag filter" from tcp-flags "!fin | !syn | !rst | !ack"
- set firewall family inet filter bad_tcp term "defconf: TCP flag filter" then discard
- set firewall family inet filter bad_tcp term defconf from tcp-flags "(fin & syn ) | (fin & rst) | (fin & !ack) | (fin & urg) | (syn & rst) | (rst & urg)"
- set firewall family inet filter bad_tcp term "defconf: TCP port 0 drop - Source" from protocol tcp
- set firewall family inet filter bad_tcp term "defconf: TCP port 0 drop - Source" from source-port 0
- set firewall family inet filter bad_tcp term "defconf: TCP port 0 drop - Source" then discard
- set firewall family inet filter bad_tcp term "defconf: TCP port 0 drop - Destination" from protocol tcp
- set firewall family inet filter bad_tcp term "defconf: TCP port 0 drop - Destination" from destination-port 0
- set firewall family inet filter bad_tcp term "defconf: TCP port 0 drop - Destination" then discard
- # Prerouting Pt2
- set firewall family inet filter prerouting-termination term "defconf: accept everything else from LAN/WAN" from interface ge-0/0/0
- set firewall family inet filter prerouting-termination term "defconf: accept everything else from LAN/WAN" from interface ge-0/0/1
- set firewall family inet filter prerouting-termination term "defconf: accept everything else from LAN/WAN" then accept
- set firewall family inet filter prerouting-termination term "defconf: drop the rest" then discard
- # Policer
- set firewall policer icmp_policer if-exceeding bandwidth-limit 5m
- set firewall policer icmp_policer if-exceeding burst-size-limit 100k
- set firewall policer icmp_policer then discard
Advertisement
Add Comment
Please, Sign In to add comment