pwlgrzs.Mikrotik-Blacklist/README.md

28 lines
1.1 KiB
Markdown
Raw Normal View History

2018-10-06 00:02:10 +02:00
# Mikrotik-Blacklist
2018-10-05 19:51:39 +02:00
This is a blocklist I use with on my Mikrotik router to block all connections from known spam/criminal/etc. networks.
2018-10-05 23:54:37 +02:00
Every 7 days I pull lists from:
2018-10-06 00:20:09 +02:00
- Spamhaus (DROP & EDROP)
2018-10-05 23:54:37 +02:00
- dShield
and reformat it to allow automatic import to MT routers.
2018-10-05 23:46:59 +02:00
## How to run this on MT
2018-10-05 23:54:37 +02:00
Run following to your MT device with not less that 7d schedule:
Download script:
2018-10-06 00:19:25 +02:00
`/tool fetch url="https://raw.githubusercontent.com/pwlgrzs/Mikrotik-Blacklist/master/blacklist.rsc" mode=https`
2018-10-05 23:54:37 +02:00
Install script:
2018-10-06 11:32:26 +02:00
`/ip firewall address-list remove [find where comment="blacklist"]; /import file-name=blacklist.rsc`
2018-10-05 23:54:37 +02:00
2018-10-05 23:59:17 +02:00
You'll also need firewall rule:
2018-10-06 11:32:26 +02:00
`/ip firewall filter add chain=input action=drop connection-state=new src-address-list=blacklist in-interface=IFNAME`
*Note: Replace IFNAME in-interface name with one you have configured*
2018-10-06 10:20:13 +02:00
Check out more detailed instructions [here](https://pawelgrzes.pl/blog/mikrotik-blacklist).
2018-10-06 11:43:04 +02:00
You can also import install.rsc file, it will do all of above for you.
2018-10-06 11:44:08 +02:00
Upload to MT and `run /import file-name=install.rsc` in terminal. You still need to manually add firewall rule.
2018-10-05 23:54:37 +02:00
## TODO
- Add more sources.