This.  It really should be a no-brainer to protect your devices by only 
allowing management from specific management networks.  If you don’t, you are 
asking for trouble.

> On Aug 5, 2018, at 1:06 PM, Jesse DuPont <jesse.dup...@celeritycorp.net> 
> wrote:
> 
> Exactly what Lewis said. We take an "allow specific things, block everything 
> else" approach. We only allow a small list of IP addresses to access Winbox 
> or SSH on a router. And aside from a small list of other services the router 
> needs to respond on (rate-limited ICMP, established/related, DHCP on some 
> interfaces, OSPF or LDP on some interfaces, BGP from IP ranges of internal 
> routers), everything else in the INPUT chain is explicitly dropped.
> 
>> On 8/5/18 1:32 PM, Lewis Bergman wrote:
>> It can be inconvenient, but we only allow connections from our ip at work. 
>> If you want in, you have to VPN there first. 
>> 
>>> On Sun, Aug 5, 2018, 1:12 PM CBB - Jay Fuller <par...@cyberbroadband.net> 
>>> wrote:
>>>  
>>> Looking through all of our routers, most running the latest firmware, most 
>>> running non-standard winbox ports, i still see the following today:
>>>  
>>> * accept rule in firewall  (for port 10438 i think, same port enabled on ip 
>>> -> socks)
>>> * account added called "service"
>>> * socks config changed ; enabled
>>> * log entries changed to only show one line
>>>  
>>> anyone else seeing this?  What are they doing?
>>>  
>>>  
>>> -- 
>>> AF mailing list
>>> AF@af.afmug.com
>>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>> 
>> 
> 
> -- 
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to