Would the following be effective at limiting DNS traffic from IPs not in the 
DNS_Servers address list? 

/ip firewall mangle 
add action=mark-packet chain=prerouting connection-limit=3,32 disabled=no 
dst-port=53 new-packet-mark=Other_DNS passthrough=no protocol=tcp 
src-address-list=!DNS_Servers 
add action=mark-packet chain=prerouting connection-limit=3,32 disabled=no 
dst-port=53 new-packet-mark=Other_DNS passthrough=no protocol=udp 
src-address-list=!DNS_Servers 
/queue tree 
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 
max-limit=15k name=queue1 packet-mark=Other_DNS parent=global-in priority=8 
queue=default 




----- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 




-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.butchevans.com/pipermail/mikrotik/attachments/20140704/47668b99/attachment.html>
_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to