Monday, February 02, 2009

Setting Mikrotik Untuk Router

KONFIGURASI FIREWALL DAN NETWORK

#/ip firewall nat add action=masquerade chain=srcnat

#/ip firewall filter add chain=input connection-state=invalid action=drop

#/ip firewall filter add chain=input protocol=udp action=accept

#/ip firewall filter add chain=input protocol=icmp action=accept

#/ip firewall filter add chain=input in-interface=(ethernet card yg ke lan) action=accept

#/ip firewall filter add chain=input in-interface=(ethernet card yg ke internet) action=accept

#/ip firewall filter add chain=input action=drop

Jika Anda menggunakan Web Proxy :

#/ip web-proxy set enabled=yes src-address=0.0.0.0. port=8080 hostname=”” parent-proxy=0.0.0.0:0 cache-administrator=”webmaster” max-object-size=4096KiB cache-drive=system max-cache-size=unlimited max-ram-cache-size=unlimited

#/ip firewall nat add chain=dstnat protocol=tcp dst-port=80 action=redirect to-ports=3128
#/ip firewall nat add in-interface=modem dst-port=80 protocol=tcp action=redirect
to-ports=3128 chain=dstnat dst-address=!192.168.0.1/24

Yang 3128 semuanya di ganti 8080 : caranya :

#/ip web-proxy set enable=yes

#/ip web-proxy set port=3128

#/ip web-proxy set max-cache-size=3145728 ( 3 kali total ram )

#/ip web-proxy set hostname=”proxy.saya”

#/ip web-proxy set allow-remote-requests=yes

#/ip web-proxy set cache-administrator: “emailku@yahoo.com”

FILTERING :

#/ ip firewall filter

#add chain=input connection-state=invalid action=drop comment=”Drop Invalid connections”

#add chain=input connection-state=established action=accept comment=”Allow Established connections”

#add chain=input protocol=udp action=accept comment=”Allow UDP”

#add chain=input protocol=icmp action=accept comment=”Allow ICMP”

#add chain=input src-address=192.168.0.0/24 action=accept comment=”Allow access to router from known network”

#add chain=input action=drop comment=”Drop anything else”


ANTI VIRUS UNTUK MIKROTIK :

#add chain=forward action=jump jump-target=virus comment=”jump to the virus chain”

#add chain=forward protocol=icmp comment=”allow ping”add chain=forward protocol=udp comment=”allow udp”add chain=forward action=drop comment=”drop everything else“

SECURITY ROUTER MIKROTIK ANDA :

/ ip firewall filter

#add chain=input connection-state=established comment=”Accept established connections”

#add chain=input connection-state=related comment=”Accept related connections”

#add chain=input connection-state=invalid action=drop comment=”Drop invalid connections”

#add chain=input protocol=udp action=accept comment=”UDP” disabled=no

#add chain=input protocol=icmp limit=50/5s,2 comment=”Allow limited pings”

#add chain=input protocol=icmp action=drop comment=”Drop excess pings”

#add chain=input protocol=tcp dst-port=22 comment=”SSH for secure shell”

#add chain=input protocol=tcp dst-port=8291 comment=”winbox”

# End of Edit #

#add chain=input action=log log-prefix=”DROP INPUT” comment=”Log everything else”

#add chain=input action=drop comment=”Drop everything else”

SETTING KEAMANAN JARINGAN HANYA UNTUK LOKAL AREA ANDA :

/ip firewall filter

#add chain=forward connection-state=established comment=”allow established connections”

#add chain=forward connection-state=related comment=”allow related connections”

#add chain=forward connection-state=invalid action=drop comment=”drop invalid connections”

#add chain=virus protocol=tcp dst-port=135-139 action=drop comment=”Drop Blaster Worm”

#add chain=virus protocol=udp dst-port=135-139 action=drop comment=”Drop Messenger Worm”

#add chain=virus protocol=tcp dst-port=445 action=drop comment=”Drop Blaster Worm”

#add chain=virus protocol=udp dst-port=445 action=drop comment=”Drop Blaster Worm”

#add chain=virus protocol=tcp dst-port=593 action=drop comment=”________”

#add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment=”________”

#add chain=virus protocol=tcp dst-port=1080 action=drop comment=”Drop MyDoom”

#add chain=virus protocol=tcp dst-port=1214 action=drop comment=”________”

#add chain=virus protocol=tcp dst-port=1363 action=drop comment=”ndm requester”

#add chain=virus protocol=tcp dst-port=1364 action=drop comment=”ndm server”

#add chain=virus protocol=tcp dst-port=1368 action=drop comment=”screen cast”

#add chain=virus protocol=tcp dst-port=1373 action=drop comment=”hromgrafx”

#add chain=virus protocol=tcp dst-port=1377 action=drop comment=”cichlid”

#add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=”Worm”

#add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Bagle Virus”

#add chain=virus protocol=tcp dst-port=2283 action=drop comment=”Drop Dumaru.Y” add chain=virus protocol=tcp dst-port=2535 action=drop comment=”Drop Beagle”

#add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Drop Beagle.C-K” add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment=”Drop MyDoom”

#add chain=virus protocol=tcp dst-port=3410 action=drop comment=”Drop Backdoor OptixPro”

#add chain=virus protocol=tcp dst-port=4444 action=drop comment=”Worm”

#add chain=virus protocol=udp dst-port=4444 action=drop comment=”Worm”

#add chain=virus protocol=tcp dst-port=5554 action=drop comment=”Drop Sasser”

#add chain=virus protocol=tcp dst-port=8866 action=drop comment=”Drop Beagle.B”

#add chain=virus protocol=tcp dst-port=9898 action=drop comment=”Drop Dabber.A-B”

#add chain=virus protocol=tcp dst-port=10000 action=drop comment=”Drop Dumaru.Y”

#add chain=virus protocol=tcp dst-port=10080 action=drop comment=”Drop MyDoom.B”

#add chain=virus protocol=tcp dst-port=12345 action=drop comment=”Drop NetBus”

#add chain=virus protocol=tcp dst-port=17300 action=drop comment=”Drop Kuang2″

#add chain=virus protocol=tcp dst-port=27374 action=drop comment=”Drop SubSeven”

#add chain=virus protocol=tcp dst-port=65506 action=drop comment=”Drop PhatBot, Agobot, Gaobot”

#MatikanPort yang Biasa di pakai Spam :

#/ip firewall filter add chain=forward dst-port=135-139 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=135-139 protocol=udp action=drop

#/ip firewall filter add chain=forward dst-port=445 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=445 protocol=udp action=drop

#/ip firewall filter add chain=forward dst-port=593 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=4444 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=5554 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=9996 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=995-999 protocol=udp action=drop

#/ip firewall filter add chain=forward dst-port=53 protocol=tcp action=drop

#/ip firewall filter add chain=forward dst-port=55 protocol=tcp action=drop

No comments: