# jan/04/1970 17:58:57 by RouterOS 6.47.10 # software id = 9W80-6UQ9 # # model = RB750Gr3 # serial number = D5030F543626 /interface bridge add name=BRIDGE_LAN add name="loopback Monitoreo" /interface eoip add local-address=172.10.20.6 mac-address=02:E7:A5:2C:D4:25 name=eoip-1856942_Z3 remote-address=172.10.20.18 tunnel-id=103 add keepalive=10s,102 local-address=172.10.20.6 mac-address=02:E7:A5:2C:D4:25 mtu=1500 name=eoip-1856949_Z8 remote-address=\ 172.10.20.22 tunnel-id=102 /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik /ip hotspot profile set [ find default=yes ] html-directory=flash/hotspot /snmp community add addresses=190.61.4.34/32,190.61.4.170/32,190.61.4.35/32,190.61.4.36/32 name=ifxcliente write-access=yes /interface bridge port add comment=defconf interface=ether1 add bridge=BRIDGE_LAN comment=defconf interface=ether2 add comment=defconf interface=ether3 add comment=defconf interface=ether4 add comment=defconf interface=ether5 add bridge=BRIDGE_LAN interface=eoip-1856949_Z8 add bridge=BRIDGE_LAN interface=eoip-1856942_Z3 /ip address add address=172.10.20.6/30 interface=ether1 network=172.10.20.4 /ip dhcp-client add comment=defconf disabled=no /ip dns set servers=200.91.200.100,200.91.200.101 /ip firewall filter add action=drop chain=input comment="drop ftp brute forcers" dst-port=21 protocol=tcp src-address-list=ftp_blacklist add action=drop chain=input comment="drop Telnet brute forcers" dst-port=23 protocol=tcp src-address-list=telnet_blacklist add action=accept chain=output content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m protocol=tcp add action=add-dst-to-address-list address-list=ftp_blacklist address-list-timeout=3h chain=output content="530 Login incorrect" \ protocol=tcp add action=add-dst-to-address-list address-list=telnet_blacklist address-list-timeout=3h chain=output content="530 Login incorrect" \ protocol=tcp add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 protocol=tcp src-address-list=ssh_blacklist add action=drop chain=input comment="drop telnet brute forcers" dst-port=23 protocol=tcp src-address-list=telnet_blacklist add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=22 \ protocol=tcp src-address-list=ssh_stage3 add action=add-src-to-address-list address-list=telnet_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=\ 23 protocol=tcp src-address-list=telnet_stage3 add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=22 \ protocol=tcp src-address-list=ssh_stage2 add action=add-src-to-address-list address-list=telnet_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=23 \ protocol=tcp src-address-list=telnet_stage2 /ip route add distance=1 gateway=172.10.20.5 add check-gateway=ping distance=1 gateway=172.10.20.5 /snmp set enabled=yes location=IFX trap-community=ifxcliente /system identity set name=SID_1856951_ANTILLON_SUCESORES /system note set note="**************************************************************\ \n* *\ \n* ATENCION: Este equipo es propiedad de IFX Networks *\ \n* El uso no autorizado esta estrictamente prohibido. *\ \n* Todos los usuarios son legalmente responsables de sus *\ \n* acciones sobre el sistema y toda actividad sera registrada *\ \n* *\ \n**************************************************************"