#/ip firewall nat add action=masquerade chain=srcnat
#/ip firewall filter add chain=input connection-state=invalid action=drop
#/ip firewall filter add chain=input protocol=udp action=accept
#/ip firewall filter add chain=input protocol=icmp action=accept
#/ip firewall filter add chain=input in-interface=(ethernet card yg ke lan) action=accept
#/ip firewall filter add chain=input in-interface=(ethernet card yg ke internet) action=accept
#/ip firewall filter add chain=input action=drop
Jika Anda menggunakan Web Proxy :
#/ip web-proxy set enabled=yes src-address=0.0.0.0. port=8080 hostname=”” parent-proxy=0.0.0.0:0 cache-administrator=”webmaster” max-object-size=4096KiB cache-drive=system max-cache-size=unlimited max-ram-cache-size=unlimited
#/ip firewall nat add in-interface=modem dst-port=80 protocol=tcp action=redirect to-ports=3128 chain=dstnat dst-address=!192.168.0.1/24
Yang 3128 semuanya di ganti 8080 : caranya :
#/ip web-proxy set enable=yes
#/ip web-proxy set port=3128
#/ip web-proxy set max-cache-size=3145728 ( 3 kali total ram )
#/ip web-proxy set hostname=”proxy.saya”
#/ip web-proxy set allow-remote-requests=yes
#/ip web-proxy set cache-administrator: “emailku@yahoo.com”
FILTERING :
#/ ip firewall filter
#add chain=input connection-state=invalid action=drop comment=”Drop Invalid connections”
#add chain=input connection-state=established action=accept comment=”Allow Established connections”
#add chain=input protocol=udp action=accept comment=”Allow UDP”
#add chain=input protocol=icmp action=accept comment=”Allow ICMP”
#add chain=input src-address=192.168.0.0/24 action=accept comment=”Allow access to router from known network”
#add chain=input action=drop comment=”Drop anything else”
ANTI VIRUS UNTUK MIKROTIK :
#add chain=forward action=jump jump-target=virus comment=”jump to the virus chain”
#add chain=forward protocol=icmp comment=”allow ping”add chain=forward protocol=udp comment=”allow udp”add chain=forward action=drop comment=”drop everything else“
SECURITY ROUTER MIKROTIK ANDA :
/ ip firewall filter
#add chain=input connection-state=established comment=”Accept established connections”
#add chain=input connection-state=related comment=”Accept related connections”
#add chain=input connection-state=invalid action=drop comment=”Drop invalid connections”
#add chain=input protocol=udp action=accept comment=”UDP” disabled=no
#add chain=input protocol=icmp limit=50/5s,2 comment=”Allow limited pings”
#add chain=input protocol=icmp action=drop comment=”Drop excess pings”
#add chain=input protocol=tcp dst-port=22 comment=”SSH for secure shell”
#add chain=input protocol=tcp dst-port=8291 comment=”winbox”
# End of Edit #
#add chain=input action=log log-prefix=”DROP INPUT” comment=”Log everything else”
#add chain=input action=drop comment=”Drop everything else”
SETTING KEAMANAN JARINGAN HANYA UNTUK LOKAL AREA ANDA :
/ip firewall filter
#add chain=forward connection-state=established comment=”allow established connections”
#add chain=forward connection-state=related comment=”allow related connections”
#add chain=forward connection-state=invalid action=drop comment=”drop invalid connections”
#add chain=virus protocol=tcp dst-port=135-139 action=drop comment=”Drop Blaster Worm”
#add chain=virus protocol=udp dst-port=135-139 action=drop comment=”Drop Messenger Worm”
#add chain=virus protocol=tcp dst-port=445 action=drop comment=”Drop Blaster Worm”
#add chain=virus protocol=udp dst-port=445 action=drop comment=”Drop Blaster Worm”
#add chain=virus protocol=tcp dst-port=593 action=drop comment=”________”
#add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment=”________”
#add chain=virus protocol=tcp dst-port=1080 action=drop comment=”Drop MyDoom”
#add chain=virus protocol=tcp dst-port=1214 action=drop comment=”________”
#add chain=virus protocol=tcp dst-port=1363 action=drop comment=”ndm requester”
#add chain=virus protocol=tcp dst-port=1364 action=drop comment=”ndm server”
#add chain=virus protocol=tcp dst-port=1368 action=drop comment=”screen cast”
#add chain=virus protocol=tcp dst-port=1373 action=drop comment=”hromgrafx”
#add chain=virus protocol=tcp dst-port=1377 action=drop comment=”cichlid”
#add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=”Worm”
#add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Bagle Virus”
#add chain=virus protocol=tcp dst-port=2283 action=drop comment=”Drop Dumaru.Y” add chain=virus protocol=tcp dst-port=2535 action=drop comment=”Drop Beagle”
#add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Drop Beagle.C-K” add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment=”Drop MyDoom”
#add chain=virus protocol=tcp dst-port=3410 action=drop comment=”Drop Backdoor OptixPro”
#add chain=virus protocol=tcp dst-port=4444 action=drop comment=”Worm”
#add chain=virus protocol=udp dst-port=4444 action=drop comment=”Worm”
#add chain=virus protocol=tcp dst-port=5554 action=drop comment=”Drop Sasser”
#add chain=virus protocol=tcp dst-port=8866 action=drop comment=”Drop Beagle.B”
#add chain=virus protocol=tcp dst-port=9898 action=drop comment=”Drop Dabber.A-B”
#add chain=virus protocol=tcp dst-port=10000 action=drop comment=”Drop Dumaru.Y”
#add chain=virus protocol=tcp dst-port=10080 action=drop comment=”Drop MyDoom.B”
#add chain=virus protocol=tcp dst-port=12345 action=drop comment=”Drop NetBus”
#add chain=virus protocol=tcp dst-port=17300 action=drop comment=”Drop Kuang2″
#add chain=virus protocol=tcp dst-port=27374 action=drop comment=”Drop SubSeven”
#add chain=virus protocol=tcp dst-port=65506 action=drop comment=”Drop PhatBot, Agobot, Gaobot”
#MatikanPort yang Biasa di pakai Spam :
#/ip firewall filter add chain=forward dst-port=135-139 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=135-139 protocol=udp action=drop
#/ip firewall filter add chain=forward dst-port=445 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=445 protocol=udp action=drop
#/ip firewall filter add chain=forward dst-port=593 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=4444 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=5554 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=9996 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=995-999 protocol=udp action=drop
#/ip firewall filter add chain=forward dst-port=53 protocol=tcp action=drop
#/ip firewall filter add chain=forward dst-port=55 protocol=tcp action=drop
No comments:
Post a Comment