Setelah memiliki Router mikrotik adakalanya kita membutuhkan Firewall guna untuk mengamankan dari beragam serangan yang dapat membahayakan kelangsungan Router kita ini. Apalagi seperti serangan Virus maupun serangan port scanner.
FIREWALL STANDAR
/ip firewall filter
add chain=forward connection-state=established comment="allow established connections"
add chain=forward connection-state=related comment="allow related connections"
add chain=forward connection-state=invalid action=drop comment="drop invalid connections"
add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop Messenger Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid"
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K"
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot"
add chain=forward action=jump jump-target=virus comment="jump to the virus chain"
add chain=forward action=accept protocol=tcp dst-port=80 comment="Allow HTTP"
add chain=forward action=accept protocol=tcp dst-port=25 comment="Allow SMTP"
add chain=forward protocol=tcp comment="allow TCP"
add chain=forward protocol=icmp comment="allow ping"
add chain=forward protocol=udp comment="allow udp"
add chain=forward action=drop comment="drop everything else"
add chain=input src-address-list="port scanners" action=drop comment="dropping port scanners" disabled=no
/ip firewall filter add chain=forward protocol=icmp icmp-options=11:0 action=drop comment="Drop Traceroute"
/ip firewall filter add chain=forward protocol=icmp icmp-options=3:3 action=drop comment="Drop Traceroute"
/ip firewall filter add chain=input action=accept protocol=icmp limit=50/5s,2
/ip firewall
add chain=input dst-address=192.168.0.1 protocol=tcp dst-port=21 \src-address-list=ournetwork action=accept comment="FTP" disabled=no
add chain=input dst-address=192.168.0.1 protocol=tcp dst-port=22 \src-address-list=ournetwork action=accept comment="SSH for secure shell" disabled=no
add chain=input dst-address=192.168.0.1 protocol=tcp dst-port=23 \src-address-list=ournetwork action=accept comment="Telnet" disabled=no
add chain=input dst-address=192.168.0.1 protocol=tcp dst-port=80 \src-address-list=ournetwork action=accept comment="Web" disabled=no
add chain=input dst-address=192.168.0.1 protocol=tcp dst-port=8291 \src-address-list=ournetwork action=accept comment="winbox" disabled=no
add chain=input dst-address=192.168.0.1 protocol=tcp dst-port=1723 \action=accept comment="pptp-server" disabled=no
add chain=input dst-address=192.168.0.1 src-address-list=ournetwork \action=accept comment="From Datautama network" disabled=no
add chain=input action=log log-prefix="DROP INPUT" \comment="Log everything else" disabled=no
add chain=input dst-address=192.168.0.1 action=drop \comment="Drop everything else" disabled=no
Untuk memasukkan script ini, silahkan login melalui winbox lalu buka New Terminal, dengan metode COPY PASTE maka mscript ini akan terinstall di Mikrotik anda.
Menyambut Ramadhan dengan Stop Dreaming Start Action
-
Marhaban barasal dari kata rahb yang berarti luas atau lapang. Marhaban
menggambarkan suasana penerimaan tetamu yang disambut dan diterima dengan
lapang da...
16 tahun yang lalu
0 Response to "Firewall Standar Untuk Mengamankan Mikrotik Router"
Posting Komentar