на Mac OS в обзоре сети заметил новые устройства ( у меня таких пак нет) меня что взломали?
https://i86.fastpic.ru/big/2019/0904/ab ... b996ab.png
https://i86.fastpic.ru/big/2019/0904/44 ... 2f4944.png
Неизвестные устройства minint* и stilecpe
В IP - DHCP Srrver - Leases новых IP нет, как и где еще можно посмотреть, как можно разобраться?
Мой firewall:
Код: Выделить всё
# model = RB4011iGS+5HacQ2HnD
/ip firewall filter
add action=reject chain=forward comment=\
"No packet walking between the bridges" in-interface=bridge4-NET-G \
out-interface=bridge1-NET-V reject-with=icmp-network-unreachable
add action=reject chain=forward in-interface=bridge4-NET-G out-interface=\
bridge2-NET-E reject-with=icmp-network-unreachable
add action=reject chain=forward in-interface=bridge4-NET-G out-interface=\
bridge3-NET-S reject-with=icmp-network-unreachable
add action=reject chain=forward in-interface=bridge1-NET-V out-interface=\
bridge4-NET-G reject-with=icmp-network-unreachable
add action=reject chain=forward in-interface=bridge2-NET-E out-interface=\
bridge4-NET-G reject-with=icmp-network-unreachable
add action=reject chain=forward in-interface=bridge3-NET-S out-interface=\
bridge4-NET-G reject-with=icmp-network-unreachable
add action=drop chain=forward comment=Huawei connection-mark="" disabled=yes \
src-address=192.168.6.23
add action=drop chain=input comment="Drop access to DNS from WAN" dst-port=53 \
in-interface-list=WANs protocol=tcp
add action=drop chain=input dst-port=53 in-interface-list=WANs protocol=udp
add action=accept chain=forward comment=\
"Forward and Input Established and Related connections" connection-state=\
established,related
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=accept chain=input comment="defconf: accept established,related" \
connection-state=established,related
add action=drop chain=input connection-state=invalid
add action=add-src-to-address-list address-list=ddos-blacklist \
address-list-timeout=1d chain=input comment=\
"DDoS Protect - Connection Limit" connection-limit=100,32 \
in-interface-list=WANs protocol=tcp
add action=tarpit chain=input connection-limit=3,32 protocol=tcp \
src-address-list=ddos-blacklist
add action=jump chain=forward comment="DDoS Protect - SYN Flood" \
connection-state=new jump-target=SYN-Protect protocol=tcp tcp-flags=syn
add action=jump chain=input connection-state=new in-interface-list=WANs \
jump-target=SYN-Protect protocol=tcp tcp-flags=syn
add action=return chain=SYN-Protect connection-state=new limit=200,5:packet \
protocol=tcp tcp-flags=syn
add action=drop chain=SYN-Protect connection-state=new protocol=tcp \
tcp-flags=syn
add action=drop chain=input comment="Protected - Ports Scanners" \
src-address-list="Port Scanners"
add action=add-src-to-address-list address-list="Port Scanners" \
address-list-timeout=none-dynamic chain=input in-interface-list=WANs log=\
yes protocol=tcp psd=21,3s,3,1
add action=drop chain=input comment="1.5. Protected - WinBox Access" \
src-address-list="Black List Winbox"
add action=add-src-to-address-list address-list="Black List Winbox" \
address-list-timeout=none-dynamic chain=input connection-state=new \
dst-port=38391 in-interface-list=WANs log=yes log-prefix="BLACK WINBOX" \
protocol=tcp src-address-list="Winbox Stage 3"
add action=add-src-to-address-list address-list="Winbox Stage 3" \
address-list-timeout=1m chain=input connection-state=new dst-port=38391 \
in-interface-list=WANs protocol=tcp src-address-list="Winbox Stage 2"
add action=add-src-to-address-list address-list="Winbox Stage 2" \
address-list-timeout=1m chain=input connection-state=new dst-port=38391 \
in-interface-list=WANs protocol=tcp src-address-list="Winbox Stage 1"
add action=add-src-to-address-list address-list="Winbox Stage 1" \
address-list-timeout=1m chain=input connection-state=new dst-port=38391 \
in-interface-list=WANs protocol=tcp
add action=accept chain=input dst-port=38391 in-interface-list=WANs protocol=\
tcp
add action=accept chain=input comment="Access Normal Ping" in-interface-list=\
WANs limit=50/5s,2:packet protocol=icmp
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WANs
add action=drop chain=input comment=Bogon_Wan_Drop in-interface-list=WANs \
src-address-list=BOGONS
add action=drop chain=input comment="defconf: drop all from WAN" \
in-interface-list=WANs
Прошу помощи чтоб разобраться с этим и закрыть дыры если существуют.
Спасибо.