Dear firewall users,
According to the manual :
http://www.mikrotik.com/testdocs/ros/2.9/ip/flow.php
Prerouting chain is perform before INPUT chain, so even if you Nat client address it doesn't matter; every packet reaching the INPUT chain is destinated to router himself. I have many router that NAT client and i have put these rules on it to block http,ftp,ssh and telnet access to the router himself:
/ip firewall filter
add action=accept chain=input comment="" disabled=no dst-address=xxx.xxx.xxx.x \
src-address-list=DIGICOM
add action=tarpit chain=input comment="" disabled=no dst-address=xxx.xxx.xxx.x \
dst-port=20-23,80 protocol=tcp
Client still have access to ftp or http, cause these rules are in INPUT and USE PUBLIC dst-address of the router... i repeat public address of the router. Don't use local interface address of the NAT router as it was probably the gateway of your client
The 2 rules you have decribed in your first post:
add chain=input action=drop protocol=tcp connection-limit=2,32 \
src-address-list=black_list comment="suppress DoS attack from 1 IP" \
disabled=no
add chain=input action=add-src-to-address-list protocol=tcp \
connection-limit=10,32 address-list=black_list address-list-timeout=1d \
comment="detect DoS attack 1 IP" disabled=no
missing one important parameter i think: the dst-address you want to protect against attack !
Try adding dst-address parameter and give feed back please !
Regards,
Michael