Thanks for the comments Butch, this has been a busy on-call weekend with the bandwidth manager dropping twice (It actually shut the power off on the server) and several Mikrotik towers refusing to come back up until rebooted.  To try to battle this I went to the WIKI for Mikrotik and entered this string:

/ ip firewall filter
add chain=input connection-state=established comment="Accept established connections"
add chain=input connection-state=related comment="Accept related connections"
add chain=input connection-state=invalid action="" comment="Drop invalid connections"
add chain=input protocol=udp action="" comment="UDP" disabled=no
add chain=input protocol=icmp limit=50/5s,2 comment="Allow limited pings"
add chain=input protocol=icmp action="" comment="Drop excess pings"
add chain=input protocol=tcp dst-port=22 comment="SSH for secure shell"
add chain=input protocol=tcp dst-port=8291 comment="winbox"
# End of Edit #
add chain=input action="" log-prefix="DROP INPUT" comment="Log everything else"
add chain=input action="" comment="Drop everything else"

Immediately after implementing this WhatsUp indicated:

bandwdith manager HTTP(Down at least 5 min)

So how can I protect my bandwidth manager and still monitor it at the same time?  I guess I could disable HTTP monitor and do pings on the monitor software.

Three more quick questions:
1) I didn't put in these lines because I wasn't sure what IP's to use, same problem when I installed PRTG I'm not sure what IP's I need to monitor within the system to watch:
# Edit these rules to reflect your actual IP addresses! # 
add chain=input src-address= comment="From Mikrotikls network" 
add chain=input src-address= comment="From our private LAN"
2)  The "add chain=input action="" log-prefix="DROP INPUT" comment="Log everything else"" command indicates there is a log that I can watch foul traffic, where do I find that log?

3) Is there more sets of examples for firewalls for my Mikrotik routers somewhere, I'm searching WIKI's right now.

Thanks for the help, hope your weekend is going well, I already have logged 100 miles just chasing outages down in the last 12 hours.


On 9/5/2010 10:39 AM, Butch Evans wrote:
On Fri, 2010-09-03 at 14:15 -0700, Forbes Mercy wrote: 
I keep adding filters as traffic presents itself but help and 
training is very expensive and extraordinarily technical 
While I would disagree that training is "very expensive", I would have
to agree that it is very technical in nature.  My training sessions are
normally under $300/day for students (not counting

On my backhauls 
when one Mikrotik goes down its not unusual for the foul traffic to 
permeate throughout (yes I'm bridged) the network and take down other 
Mikrotik's and often requires a drive to reboot then they work fine 
again, irritating, yes but still great equipment.
Training would be especially good if you could learn something that
would keep you from having to roll a truck even once every 2 weeks.  It
wouldn't take long to pay for that.

Ubiquiti is a monster for power and throughput, it's menus are basic 
but filters entry options are slim and limited to IP rather than by 
protocol so some things sneak through that wouldn't with Mikrotik.
This, unfortunately, is one "cost" of less expensive gear.  FWIW, you
have most of the same functionality available in both platforms, but
it's just not in the GUI for UBNT.

I promised an analogy so here goes, I feel from experience that Mikrotik 
is the Linux of equipment, you better know what you're doing when you 
buy it.  
UBNT is linux, too.  :-)

Ubiquiti is like Windows, pretty GUI driven, and simplified at a 
reasonable cost.
You have access to iptables and more in the ssh/telnet interface with


WISPA Wants You! Join today!
WISPA Wireless List:



Reply via email to