Protect your Network from DHCP Starvation Attacks using MikroTik RouterOS

  Рет қаралды 2,653

MAICT

MAICT

Күн бұрын

Пікірлер: 9
@majhazihamdani7604
@majhazihamdani7604 10 ай бұрын
بارك الله فيك . للامانه عمل دروب لااشياء كثيره مش عارف من وين بتدخل . بل المختصر عمل تصفيه للانترنت الداخل من جهاز الدمج
@MikhailRabinkov
@MikhailRabinkov Жыл бұрын
I was trying to use Bridge filter to block traffic between 2 devices on the network. Both devices connected to port 2 and port 4 on the same router. I've used very similar rules to what you've used but It doesn't seem to work. There is no traffic flow showing in the filter rule. What could be an issue?
@cinemax6557
@cinemax6557 Жыл бұрын
Good
@mnoquiao
@mnoquiao 22 күн бұрын
does this mean that if I have 200+ devices I need to set each of their MAC into the Switch?
@muhammedahmed9137
@muhammedahmed9137 Жыл бұрын
thanks
@florinalexe6951
@florinalexe6951 Жыл бұрын
The DHCP server is used by default to dynamically assign IP addresses to unknown devices on the local network. With your rule you block ALL network traffic (not only dhcp requests) between unknown devices and the router and allow traffic ONLY FOR KNOWN hosts. So what's the point? Will you make a list of all known Mac addresses of the hosts? Don't you think it's easier to use static addresses instead of creating lists of known MAC addresses? OK, you can use "mac address sticky" and permit only 1 MAC address on an interface but, like I said, you will block ALL network traffic not only dhcp request. (On Cisco Switches interface will be in "error disable state").
@MAICT
@MAICT Жыл бұрын
This is same as sticky on Cisco, however on MikroTik there is no error disable
@kainblock
@kainblock Жыл бұрын
This is not useful at all. It's almost the same like disabling the DHCP and use only static IPs. The real world scenario is take place on Public networks with many unknown devices.
@ОТкач-ж8н
@ОТкач-ж8н Жыл бұрын
thanks
Block DHCP Attacks - Deep Dive
22:29
Wilmer Almazan / The Network Trip
Рет қаралды 1,2 М.
How to Block SYN Flood & DDOS Attack using Mikrotik Router Firewall !
7:51
amazing#devil #lilith #funny #shorts
00:15
Devil Lilith
Рет қаралды 18 МЛН
КОГДА К БАТЕ ПРИШЕЛ ДРУГ😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 7 МЛН
pfSense Firewall (totally) Rules! Basic rule setup...🤫
38:04
The Network Berg
Рет қаралды 154 М.
MTCSE - Prevent MNDP attacks on your MikroTik router
16:25
What is MACVLAN on MikroTik RouterOS and where to use it?
11:27
Finding And Stopping Rogue DHCP Servers On MikroTik
12:00
The Network Berg
Рет қаралды 25 М.
Take Control of Your Network: Install Uptime-Kuma on MikroTik
25:37
The Network Berg
Рет қаралды 15 М.
Proxmox NETWORKING: VLANs, Bridges, and Bonds!
25:09
apalrd's adventures
Рет қаралды 156 М.
amazing#devil #lilith #funny #shorts
00:15
Devil Lilith
Рет қаралды 18 МЛН