RE: [YF] [SHARE] Konfigurasi Firewall pada MikroTik RouterOS

2009-03-20 Terurut Topik The Green Pearl
Terima kasih Sharing nya mas Adhari…kalo ada lebih banyak mengenai Mikrotik 
Routers tolong di sharing lagi yach..

 

Tks,

 

From: yogyafree-perjuangan@yahoogroups.com 
[mailto:yogyafree-perjuan...@yahoogroups.com] On Behalf Of Adhari Purnawan
Sent: 20 Maret 2009 13:09
To: yogyafree-perjuangan@yahoogroups.com
Subject: [YF] [SHARE] Konfigurasi Firewall pada MikroTik RouterOS

 

konfigurasi Firewall pada MikroTik RouterOS
Security Router MikroTik
/ ip firewall filter
adhari purnawan
* add chain=input connection-state=established comment=”Accept established 
connections”
* add chain=input connection-state=related comment=”Accept related 
connections”
* add chain=input connection-state=invalid action=drop comment=”Drop 
invalid connections”
* add chain=input protocol=udp action=accept comment=”UDP” disabled=no
* add chain=input protocol=icmp limit=50/5s,2 comment=”Allow limited pings”
* add chain=input protocol=icmp action=drop comment=”Drop excess pings”
* add chain=input protocol=tcp dst-port=22 comment=”SSH for secure shell”
* add chain=input protocol=tcp dst-port=8291 comment=”winbox” # Edit these 
rules to reflect your actual IP addresses! #
* add chain=input src-address=159.148.172.192/28 comment=”From Mikrotikls 
network”
* add chain=input src-address=10.0.0.0/8 comment=”From our private LAN”# 
End of Edit #
* add chain=input action=log log-prefix=”DROP INPUT” comment=”Log 
everything else”
* add chain=input action=drop comment=”Drop everything else” 

Setting Keamanan Jaringan Hanya untuk Lokal Area:
/ip firewall filter

* add chain=forward connection-state=established comment=”allow established 
connections”
* add chain=forward connection-state=related comment=”allow related 
connections”
* add chain=forward connection-state=invalid action=drop comment=”drop 
invalid connections”
* add chain=virus protocol=tcp dst-port=135-139 action=drop comment=”Drop 
Blaster Worm”
* add chain=virus protocol=udp dst-port=135-139 action=drop comment=”Drop 
Messenger Worm”
* add chain=virus protocol=tcp dst-port=445 action=drop comment=”Drop 
Blaster Worm”
* add chain=virus protocol=udp dst-port=445 action=drop comment=”Drop 
Blaster Worm”
* add chain=virus protocol=tcp dst-port=593 action=drop comment=””
* add chain=virus protocol=tcp dst-port=1024-1030 action=drop 
comment=””
* add chain=virus protocol=tcp dst-port=1080 action=drop comment=”Drop 
MyDoom”
* add chain=virus protocol=tcp dst-port=1214 action=drop comment=””
* add chain=virus protocol=tcp dst-port=1363 action=drop comment=”ndm 
requester”
* add chain=virus protocol=tcp dst-port=1364 action=drop comment=”ndm 
server”
* add chain=virus protocol=tcp dst-port=1368 action=drop comment=”screen 
cast”
* add chain=virus protocol=tcp dst-port=1373 action=drop comment=”hromgrafx”
* add chain=virus protocol=tcp dst-port=1377 action=drop comment=”cichlid”
* add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=”Worm”
* add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Bagle 
Virus”
* add chain=virus protocol=tcp dst-port=2283 action=drop comment=”Drop 
Dumaru.Y”
* add chain=virus protocol=tcp dst-port=2535 action=drop comment=”Drop 
Beagle”
* add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Drop 
Beagle.C-K”
* add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment=”Drop 
MyDoom”
* add chain=virus protocol=tcp dst-port=3410 action=drop comment=”Drop 
Backdoor OptixPro”
* add chain=virus protocol=tcp dst-port= action=drop comment=”Worm”
* add chain=virus protocol=udp dst-port= action=drop comment=”Worm”
* add chain=virus protocol=tcp dst-port=5554 action=drop comment=”Drop 
Sasser”
* add chain=virus protocol=tcp dst-port=8866 action=drop comment=”Drop 
Beagle.B”
* add chain=virus protocol=tcp dst-port=9898 action=drop comment=”Drop 
Dabber.A-B”
* add chain=virus protocol=tcp dst-port=1 action=drop comment=”Drop 
Dumaru.Y”
* add chain=virus protocol=tcp dst-port=10080 action=drop comment=”Drop 
MyDoom.B”
* add chain=virus protocol=tcp dst-port=12345 action=drop comment=”Drop 
NetBus”
* add chain=virus protocol=tcp dst-port=17300 action=drop comment=”Drop 
Kuang2″
* add chain=virus protocol=tcp dst-port=27374 action=drop comment=”Drop 
SubSeven”
* add chain=virus protocol=tcp dst-port=65506 action=drop comment=”Drop 
PhatBot, Agobot, Gaobot”

Matikan Port yang Biasa di pakai Spam :

* /ip firewall filter add chain=forward dst-port=135-139 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=135-139 protocol=udp 
action=drop
* /ip firewall filter add chain=forward dst-port=445 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=445 protocol=udp 
action=drop
* /ip firewall filter add chain=forward dst-port=593 protocol=tcp 
action

[YF] [SHARE] Konfigurasi Firewall pada MikroTik RouterOS

2009-03-20 Terurut Topik Adhari Purnawan
konfigurasi Firewall pada MikroTik RouterOS
Security Router MikroTik
/ ip firewall filter
adhari purnawan
* add chain=input connection-state=established comment=”Accept established 
connections”
* add chain=input connection-state=related comment=”Accept related 
connections”
* add chain=input connection-state=invalid action=drop comment=”Drop 
invalid connections”
* add chain=input protocol=udp action=accept comment=”UDP” disabled=no
* add chain=input protocol=icmp limit=50/5s,2 comment=”Allow limited pings”
* add chain=input protocol=icmp action=drop comment=”Drop excess pings”
* add chain=input protocol=tcp dst-port=22 comment=”SSH for secure shell”
* add chain=input protocol=tcp dst-port=8291 comment=”winbox” # Edit these 
rules to reflect your actual IP addresses! #
* add chain=input src-address=159.148.172.192/28 comment=”From Mikrotikls 
network”
* add chain=input src-address=10.0.0.0/8 comment=”From our private LAN”# 
End of Edit #
* add chain=input action=log log-prefix=”DROP INPUT” comment=”Log 
everything else”
* add chain=input action=drop comment=”Drop everything else”

Setting Keamanan Jaringan Hanya untuk Lokal Area:
/ip firewall filter

* add chain=forward connection-state=established comment=”allow established 
connections”
* add chain=forward connection-state=related comment=”allow related 
connections”
* add chain=forward connection-state=invalid action=drop comment=”drop 
invalid connections”
* add chain=virus protocol=tcp dst-port=135-139 action=drop comment=”Drop 
Blaster Worm”
* add chain=virus protocol=udp dst-port=135-139 action=drop comment=”Drop 
Messenger Worm”
* add chain=virus protocol=tcp dst-port=445 action=drop comment=”Drop 
Blaster Worm”
* add chain=virus protocol=udp dst-port=445 action=drop comment=”Drop 
Blaster Worm”
* add chain=virus protocol=tcp dst-port=593 action=drop comment=””
* add chain=virus protocol=tcp dst-port=1024-1030 action=drop 
comment=””
* add chain=virus protocol=tcp dst-port=1080 action=drop comment=”Drop 
MyDoom”
* add chain=virus protocol=tcp dst-port=1214 action=drop comment=””
* add chain=virus protocol=tcp dst-port=1363 action=drop comment=”ndm 
requester”
* add chain=virus protocol=tcp dst-port=1364 action=drop comment=”ndm 
server”
* add chain=virus protocol=tcp dst-port=1368 action=drop comment=”screen 
cast”
* add chain=virus protocol=tcp dst-port=1373 action=drop comment=”hromgrafx”
* add chain=virus protocol=tcp dst-port=1377 action=drop comment=”cichlid”
* add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=”Worm”
* add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Bagle 
Virus”
* add chain=virus protocol=tcp dst-port=2283 action=drop comment=”Drop 
Dumaru.Y”
* add chain=virus protocol=tcp dst-port=2535 action=drop comment=”Drop 
Beagle”
* add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Drop 
Beagle.C-K”
* add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment=”Drop 
MyDoom”
* add chain=virus protocol=tcp dst-port=3410 action=drop comment=”Drop 
Backdoor OptixPro”
* add chain=virus protocol=tcp dst-port= action=drop comment=”Worm”
* add chain=virus protocol=udp dst-port= action=drop comment=”Worm”
* add chain=virus protocol=tcp dst-port=5554 action=drop comment=”Drop 
Sasser”
* add chain=virus protocol=tcp dst-port=8866 action=drop comment=”Drop 
Beagle.B”
* add chain=virus protocol=tcp dst-port=9898 action=drop comment=”Drop 
Dabber.A-B”
* add chain=virus protocol=tcp dst-port=1 action=drop comment=”Drop 
Dumaru.Y”
* add chain=virus protocol=tcp dst-port=10080 action=drop comment=”Drop 
MyDoom.B”
* add chain=virus protocol=tcp dst-port=12345 action=drop comment=”Drop 
NetBus”
* add chain=virus protocol=tcp dst-port=17300 action=drop comment=”Drop 
Kuang2″
* add chain=virus protocol=tcp dst-port=27374 action=drop comment=”Drop 
SubSeven”
* add chain=virus protocol=tcp dst-port=65506 action=drop comment=”Drop 
PhatBot, Agobot, Gaobot”

Matikan Port yang Biasa di pakai Spam :

* /ip firewall filter add chain=forward dst-port=135-139 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=135-139 protocol=udp 
action=drop
* /ip firewall filter add chain=forward dst-port=445 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=445 protocol=udp 
action=drop
* /ip firewall filter add chain=forward dst-port=593 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port= protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=5554 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=9996 protocol=tcp 
action=drop
* /ip firewall filter add chain=forward dst-port=995-999 protocol=udp 
action=drop
* /ip firewall filter add chain=forwar