mirror of
https://github.com/pwlgrzs/Mikrotik-Blacklist.git
synced 2025-08-06 03:05:13 +02:00
Update README.md
This commit is contained in:
parent
9f31f1df63
commit
132442d054
1 changed files with 15 additions and 5 deletions
20
README.md
20
README.md
|
@ -1,15 +1,25 @@
|
|||
# Mikrotik-Blocklist
|
||||
This is a blocklist I use with on my Mikrotik router to block all connections from known spam/criminal/etc. networks.
|
||||
|
||||
Every 7 days I pull lists from Spamhaus and reformat it to allow automatic import to MT routers.
|
||||
Every 7 days I pull lists from:
|
||||
- Spamhaus
|
||||
- dShield
|
||||
|
||||
and reformat it to allow automatic import to MT routers.
|
||||
|
||||
## How to run this on MT
|
||||
Add following scripts to your MT device with not less that 7d schedule:
|
||||
Run following to your MT device with not less that 7d schedule:
|
||||
|
||||
Download script:
|
||||
`/tool fetch url="https://raw.githubusercontent.com/pwlgrzs/Mikrotik-Blocklist/master/blacklist.rsc" mode=https;
|
||||
:log info "Blocklist downloaded";`
|
||||
|
||||
and
|
||||
|
||||
Install script:
|
||||
`/ip firewall address-list remove [find where comment="blacklist"]
|
||||
/import file-name=blacklist.rsc;
|
||||
:log info "List reinstalled from source";`
|
||||
|
||||
You'll also need firewall rule:
|
||||
`/ip firewall filter add chain=input action=drop connection-state=new src-address-list=blacklist in-interface=<REPLACE>`
|
||||
**Note: Replace in-interface name with one you have configured**
|
||||
## TODO
|
||||
- Add more sources.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue