Without more details we'll be of little help. If the attack is a DDoS their are mechanisms you can implement on your network to help mitigate the damage they can do. That said it also depends on your network architecture too.
Things like:
Enforcing BCP38 policies on your devices (CPE or PPPoE server)
Creating an automatic method of detecting the source of a DDoS and be able to deploy and manage the removal of blackhole routes (fail2ban) ahead of stateful inspection devices. (fail2ban)
If you have a very small upstream connection to the Internet you may find leasing space and bandwidth in at least one data center an effective deterrent. You could tunnel all of your traffic from the data center to your normal edge device. You'd have the advantage of inspecting and dropping the malicious traffic in the data center on a very high speed connection to the Internet that is cost effective. Pairing they with the ability to blackhole traffic before it hits your more limited connection closer to your customers.
Hi,
i can't see nothing because it block all..
i can implement, in my firewall router (ccr1036-2s+) or in bgp router (ccr1072), rules I see in wiki mikrotik or is too aggressive?
all my netowkr go out via those routers
/ip firewall filter
add chain=forward connection-state=new action=jump jump-target=block-ddos
add chain=forward connection-state=new src-address-list=ddoser dst-address-list=ddosed action=drop
add chain=block-ddos dst-limit=50,50,src-and-dst-addresses/10s action=return
add chain=block-ddos action=add-dst-to-address-list address-list=ddosed address-list-timeout=10m
add chain=block-ddos action=add-src-to-address-list address-list=ddoser address-list-timeout=10m
in attachement I give you ip settings of bgp router and firewall router.
thanks
You do not have the required permissions to view the files attached to this post.