Rabu, 25 April 2012

seting mikrotik



Cara Memisahkan Browse, Download, Upload, Dan Game

Settingan ini Berjalan Pada Mikrotik RB750 OS ver.4.5 Dan percobaan Ini dilakukan pada mikrotik PC dengan Mikrotik Versi V2.9.27

Siapkan Perangkat PC dan Instal Mikrotik V2.9.27

Lan Card 1 menuju ISP dalam settingan ini menggunakan Speedy “Jaringan Speedy”
Lan Card 2 Menuju Jaringan Local dengan nama “Jaringan Local”
Setting IP untuk Lan 1 (Baca Tutorial Instal Mikrotik)
setting IP untuk Lan 2 (disini IP : 192.168.0.0/24
Settingan Yang akan Dilakukan :

GAME Poin Blank
Game Poker
BROWSING
UPLOAD
LIMIT DOWNLOAD
QUEUE
Tahapan atau teknik setting seperti berikut :

Settingan Untuk GAME Poin Blank
contoh buat Point Blank, game lain sesuaikan aja port/ip nya

Untuk Perintah Dibawah buatkan Pada bagian IP-Firewall-Mangle

————————————————————————————————-
chain=game action=mark-connection new-connection-mark=Game passthrough=yes protocol=tcp dst-address=203.89.146.0/23 dst-port=39190 comment=”Point Blank”
————————————————————————————————-
chain=game action=mark-connection new-connection-mark=Game passthrough=yes protocol=udp dst-address=203.89.146.0/23 dst-port=40000-40010
————————————————————————————————-
chain=game action=mark-packet new-packet-mark=Game_pkt passthrough=no connection-mark=Game
————————————————————————————————-
chain=prerouting action=jump jump-target=game
————————————————————————————————-

Settingan Untuk GAME Poker
Untuk Perintah Dibawah buatkan Pada bagian IP-Firewall-Mangle

————————————————————————————————-
chain=forward action=mark-connection new-connection-mark=Poker_con passthrough=yes protocol=tcp dst-address-list=LOAD POKER comment=”POKER”
————————————————————————————————-
chain=forward action=mark-connection new-connection-mark=Poker_con passthrough=yes protocol=tcp content=statics.poker.static.zynga.com
————————————————————————————————-
chain=forward action=mark-packet new-packet-mark=Poker passthrough=no connection-mark=Poker_con
————————————————————————————————-

BROWSING
————————————————————————————————-
chain=forward action=mark-connection new-connection-mark=http passthrough=yes protocol=tcp in-interface=WAN out-interface=Lan packet-mark=!Game_pkt connection-mark=!Game connection-bytes=0-262146 comment=”BROWSE”
————————————————————————————————-
chain=forward action=mark-packet new-packet-mark=http_pkt passthrough=no protocol=tcp connection-mark=http
————————————————————————————————-
chain=forward action=mark-packet new-packet-mark=http_pkt passthrough=no protocol=tcp connection-mark=http
————————————————————————————————-

UPLOAD
————————————————————————————————-
chain=prerouting action=mark-packet new-packet-mark=Upload passthrough=no protocol=tcp src-address=192.168.0.0/24 in-interface=Lan packet-mark=!icmp_pkt comment=”UPLOAD”
————————————————————————————————-

LIMIT DOWNLOAD
————————————————————————————————-
chain=forward action=mark-connection new-connection-mark=Download passthrough=yes protocol=tcp in-interface=WAN out-interface=Lan packet-mark=!Game_pkt connection-mark=!Poker_con connection bytes=262146-4294967295 comment=”LIMIT DOWNLOAD”
————————————————————————————————-
chain=forward action=mark-packet new-packet-mark=Download_pkt passthrough=no packet-mark=!Game_pk> connection-mark=Download
————————————————————————————————-

QUEUE
Queue Type
————————————————————————————————-
name=”Download” kind=pcq pcq-rate=256000 pcq-limit=50 pcq-classifier=dst-address pcq-total-limit=2000

name=”Http” kind=pcq pcq-rate=1M pcq-limit=50 pcq-classifier=dst-address pcq-total-limit=2000

name=”Game” kind=pcq pcq-rate=0 pcq-limit=50 pcq-classifier=src-address,dst-address,src-port,dst-port pcq-total-limit=2000

name=”Upload” kind=pcq pcq-rate=0 pcq-limit=50 pcq-classifier=src-address pcq-total-limit=2000
————————————————————————————————-

Queue Tree
————————————————————————————————-
name=”Main Browse” parent=Lan limit-at=0 priority=8 max-limit=1M burst-limit=0 burst-threshold=0 burst-time=0s

name=”Browse” parent=Main Browse packet-mark=http_pkt limit-at=0 queue=Http priority=8 max-limit=1M burst-limit=0 burst-threshold=0 burst-time=0s

name=”Game” parent=global-total packet-mark=Game_pkt limit-at=0 queue=Game priority=1 max-limit=0 burst-limit=0 burst-threshold=0 burst-time=0s

name=”Poker” parent=global-out packet-mark=Poker limit-at=0 queue=Game priority=3 max-limit=0 burst-limit=0 burst-threshold=0 burst-time=0s

name=”Download” parent=global-out packet-mark=Download_pkt limit-at=0 queue=Download priority=8 max-limit=256k burst-limit=0 burst-threshold=0 burst-time=0s

name=”Main Upload” parent=global-in limit-at=0 priority=8 max-limit=256k burst-limit=0 burst-threshold=0 burst-time=0s

name=”Upload” parent=Main Upload packet-mark=Upload limit-at=0 queue=Upload priority=8 max-limit=0 burst-limit=0 burst-threshold=0 burst-time=0s
————————————————————————————————-

Membatasi BW jika suatu traffic client melewati batas tertentu

add name="Isp" target-addresses=192.111.111.99/32 dst-address=0.0.0.0/0 \

    interface=all parent=none direction=both priority=8 \

    queue=default-small/share-ni-down limit-at=0/0 max-limit=32000/64000 \

    burst-limit=/128000 burst-threshold=/30000 burst-time=/10s \

    total-queue=default-small disabled=no
dan kita menginginkan membatasi bandwidth-nya jika trafficnya sudah melewati misalkan 500MB dalam satu hari, maka kita bisa membuat script dibawah ini:

add name="trafwatcher01" source="

/queue simple

:local traf;

:set traf [get [find name="Isp"] total-bytes]

:if ($traf  > 500000000) do = {

set [find name="Isp"] max-limit= 32000/32000

:log info "isp traffic exceeding 500MB"}

policy=ftp,reboot,read,write,policy,test,winbox,password
variabel traf fungsinya untuk menampung sementara nilai total traffic

buat scheduler untuk mengecek traffic script-nya, misalnya dibuat setiap 1/2 jam untuk mengeceknya.

Code:

add name="trafisp" on-event=trafwatcher01 start-date=jan/01/1970 \

    start-time=11:00:00 interval=30m comment="" disabled=no
nah itu untuk script untuk membatasinya, tinggal membuat script satu lagi jika sudah melewati satu hari (misal jam 12 malam), counternya mereset total traffic queue client tsb dan mereset bandwidthnya normal ke 64 kbps lagi.

GOODLUCK

mudahan ini bisa jadi gambaran :

/queue simple

:local traf;

:local maxi;

:set traf [get [find name="Isp"] total-bytes]

:set maxi [get [find name="Isp"] max-limit]

:if ($traf  < 10000000 && $maxi != "64000/96000") do = {

set [find name="Isp"] max-limit= "64000/96000"}

:if ($traf  > 10000000 && $maxi != "64000/64000") do = {

set [find name="Isp"] max-limit= "64000/64000"}

:if ($traf  > 100000000 && $maxi != "64000/32000") do = {

set [find name="Isp"] max-limit= "32000/32000"

/sys sched disa [find name="isp-trafwatcher"]}
Penjelasan:

Gue buat 2 tingkat bandwidth limiternya jadi dibawah 10MB masih sesuai limit awal, 10 – 100 MB turun jadi 64k, atas 100MB jadi 32k

biar script ngga ngulang ngulang terus di log-nya dibuat satu variabel lagi yaitu variabel maxi yang menampung setting bandwidthnya, kalo tidak sama dengan logika-nya maka que simple ga di set ulang.

di script terakhir ditambahin buat mendisable schedulernya biar scheduler ga jalan terus ( di disable).

nah biar enable lagi, perlu dibuat satu script lagi untuk men-clear counter trafficnya dan meng-enable lagi schedulernya,misalnya tiap jam 00:00

script buat enable lagi en autoclear counter. kasi nama script bebas, abis itu buat juga schedulenya

Code:

/ip fire filt reset-counters-all
/que tree reset-counters-all

/que sim reset-counters-all

/sys sched ena [find name="isp-trafwatcher"]
Membagi Bandwidth Rata dengan PCQ di Mikrotik

Dengan menggunakan queue type pcq di Mikrotik, kita bisa membagi bandwidth yang ada secara merata untuk para “pelahap-bandwidth” saat jaringan pada posisi peak.

Contohnya, kita berlangganan 256 Kbps. Kalau ada yang sedang berinternet ria, maka beliau dapat semua itu jatah bandwidth. Tetapi begitu teman-temannya datang, katakanlah 9 orang lagi, maka masing-masingnya dapat sekitar 256/10 Kbps.

Yah.. masih cukup layaklah untuk buka-buka situs non-porn atau sekedar cek e-mail & blog.

OK, langsung saja ke caranya :

Asumsi : Network Address 192.168.169.0/28, interface yang mengarah ke pengguna diberi nama LAN, dan interface yang mengarah ke upstream provider diberi nama INTERNET;
Ketikkan di console atau terminal :
> /ip firewall mangle add chain=forward src-address=192.168.169.0/28 action=mark-connection new-connection-mark=NET1-CM
> /ip firewall mangle add connection-mark=NET1-CM action=mark-packet new-packet-mark=NET1-PM chain=forward
> /queue type add name=downsteam-pcq kind=pcq pcq-classifier=dst-address
> /queue type add name=upstream-pcq kind=pcq pcq-classifier=src-address
> /queue tree add parent=LAN queue=DOWNSTREAM packet-mark=NET1-PM
> /queue tree add parent=INTERNET queue=UPSTREAM packet-mark=NET1-PM
Good Luck!!
kalo pake cara diatas targetnya cuman sebisa mungkin membagi bandwidth sama rata antar client..
kalo menghadapi IDM pengalaman saya gak bisa pake cara di atas, harus ditambah masing-masing client dibuat mangle-nya dan queue tree typenya pake pcq.

contoh: nama client = unyil ip-nya=192.168.1.12/32 bw-limitnya=64k/128k
caranya:
> /ip firewall mangle add chain=forward src-address=192.168.1.12/32 action=mark-connection new-connection-mark=UNYIL-CM
> /ip firewall mangle add connection-mark=UNYIL-CM action=mark-packet new-packet-mark=UNYIL-PM chain=forward
> /queue type add name=downsteam-pcq kind=pcq pcq-classifier=dst-address
> /queue type add name=upstream-pcq kind=pcq pcq-classifier=src-address
> /queue tree add parent=LAN queue=UNYIL_DOWNSTREAM packet-mark=UNYIL-PM max-limit=128k
> /queue tree add parent=INTERNET queue=UNYIL_UPSTREAM packet-mark=UNYIL-PM max-limit=64k

mengatur bandwith berdasarkan waktu siang dan malam

Sekarang kita coba untuk mengatur bandwith user Hotspot berdasarkan waktu pagi dan malam, karena pada siang hari banyak user yang kuliah jadi bandwith kosong, dan malam banyak user yang browsing dan download

Untuk Script Limit bandwith malam :
1.Akses Router Miktorik anda
2.System > Clock > kemudian perhatikan date(tgl) & time(waktu)
3.System > Scripts > New Script isikan data berikut :
Name : Limit Malam
Policy : Conteng Read, Policy dan Write
Source :
/ip hotspot user profile set 125 idle-timeout=none keepalive-timeout=2m status-autorefresh=1m shared-users=1 rate-limit=64k/128k transparent-proxy=yes open-status-page=always advertise=no

4.System > Scheduler > New Schedule isikan data berikut :
Name : Malam
Start Date : (tgl mulai disesuaikan dengan tgl di mikrotik) jun/28/2009
Start Time : (waktu mulai disesuaikan kebutuhan) 19:00:00 (untuk jam 7 mlm)
Interval : 1d 00:00:00 (rolling per 1 hari)
On Event :
Limit Malam
Untuk Script Limit bandwith siang :
1.System > Scripts > New Script isikan data berikut :
Name : Limit Siang
Policy : Conteng Read, Policy dan Write
Source :
/ip hotspot user profile set 125 idle-timeout=none keepalive-timeout=2m status-autorefresh=1m shared-users=1 rate-limit=64k/256k transparent-proxy=yes open-status-page=always advertise=no
nb:silahkan sesuaian pada user yg laen
2.System > Scheduler > New Schedule isikan data berikut :
Name : Siang
Start Date : (tgl mulai disesuaikan dengan tgl di mikrotik) jun/28/2009
Start Time : (waktu mulai disesuaikan kebutuhan) 07:00:00 (untuk jam 7 pagi)
Interval : 1d 00:00:00 (rolling per 1 hari)
On Event :
Limit Siang
Langkah diatas secara otomatis akan memberikan setting limit pada siang hari 64k/256k mulai jam 7 pagi s/d jam 7 mlm sedangkan limit bandwith malam hari 64k/128k mulai jam 7 mlm s/d jam 7 pagi.
Semua setting bisa disesuaikan dengan kebutuhan, mudah-mudahan bisa dengan mudah dimengerti dan membantu.

Pengamanan Mikrotik dari Scan Winbox dan Neighbour
On October 8, 2008, in MikroTik, Networking, by Oemar-BGS

0

Kadang kala para ISP atau penyedia jasa layanan tidak terlalu jeli untuk melindungi customernya. Terutama ketika melindungi router pelanggan yang menggunakan Mikrotik RouterOS(tm). Dengan menjalankan IP >> Neighbor kita bisa melihat router mikrotik lainnya yang secara fisik terhubung dengan router kita melalui jaringan di provider kita.
Untuk itu kita bisa melindunginya dengan berbagai cara misalnya memblok scan dari winbox dan neighbor kita. Berikut adalah cara yang paling mudah :

Code:

admin@mikrotik] interface bridge> filter print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; block discovery mikrotik
chain=forward in-interface=ether1 mac-protocol=ip dst-port=5678
ip-protocol=udp action=drop
1 ;;; block discovery mikrotik
chain=input in-interface=ether1 mac-protocol=ip dst-port=5678
ip-protocol=udp action=drop
2 ;;; block discovery mikrotik
chain=output mac-protocol=ip dst-port=5678 ip-protocol=udp action=drop
3 ;;; block discovery mikrotik
chain=input in-interface=ether1 mac-protocol=ip dst-port=8291
ip-protocol=tcp action=drop
4 ;;; block winbox mikrotik
chain=forward in-interface=ether1 mac-protocol=ip dst-port=8291
ip-protocol=tcp action=drop
5 ;;; block request DHCP
chain=input mac-protocol=ip dst-port=68 ip-protocol=udp action=drop
6 ;;; block request DHCP
chain=forward mac-protocol=ip dst-port=68 ip-protocol=udp action=drop
7 ;;; block request DHCP
chain=output mac-protocol=ip dst-port=68 ip-protocol=udp action=drop
Dengan perintah tersebut kita bisa menutup beberapa scan terutama yang menggunakan winbox dan ip neighbor. Port diatas adalah bagian dari share Mikrotik RouterOS yang memang di perlukan untuk monitoring.

24 Sep 2011
CARA MEMBLOKIR SITUS-SITUS TERTENTU (PORNO)
00:01 Diposkan oleh tantoroni

Salah satu masalah yang sering kita jumpai dalam dunia maya adalah beberapa situs dewasa yang semakin banyak jumlahnya. Mungkin, kita sebagai orang yang paham terhadap komputer dan Internet bisa saja mengenali dan waspada terhadap situs-situs dewasa tersebut. Tetapi bagaimana bila anak-anak yang sedang mencoba berselancar di internet melalui Pc atau Laptop kita terjaring masuk ke dalam situs-situs dewasa tersebut?

Salah satu cara untuk mengatasi hal ini adalah Dengan menggunakan software anti-p0rn dari tu Eagles. Langkah-langkahnya adalah sebagai berikut:

1. Download softwarenya dulu dari sini
2. Download softwarenya dengan meng-klik tombol Local download, perlu diperhatikan juga bahwa software ini masih berjalan dalam platform Windows, belum ada versi iOS nya.

3. Setelah di download kemudian klik dua kali terhadap aplikasinya, kemudian lakukan Next pada halaman Welcome.

4. Klik Install pada halaman Installasi agar proses installasi bisa dilanjutkan.

5. Tunggulah samai proses installasi berjalan.

6. Jika sudah selesai maka akan ada pilihan untuk me-restart komputer anda. Berikan tanda centang untuk me-restart dan sebaliknya, hapus tanda centang untuk tidak me-restart Windows anda.

7. Secara Default, icon mata akan bertambah di ujung kanan bawah pada taskbar windows anda.

8. Klik kanan > Settings and Options > masukkan Password anda.

Dengan trik ini, semua situs yang terblokir oleh aplikasi ini tidak akan lagi bisa diakses melalui komputer/notebook anda. Selamat mencoba.

Penulis Artikel : Nathan Gusti Ryan

DHCP Server ( Dynamic Host Configuration Protocol ) adalah Sebuah Server yang menyediakan Services atau memberikan layanan IP Address Otomatis bagi Client yang IP Address-nya di setting Automatic. DHCP Server menyediakan konfigurasi IP Address Otomatis yang meliputi : IP Address, IP Gateway dan IP DNS Server.

Membuat DHCP Server Mikrotik memanglah sangat mudah, tapi bagi beginner bisa bikin puyeng juga. So… Artikel ini adalah konfigurasi yang lebih manusiawi dengan konfigurasi melalui Winbox. Selain melalui Winbox, kita bisa melakukan konfigurasi DHCP Server melalui Console / CLI, Telnet, WebBox, dll.

Berikut ini Step by Step membuat DHCP Server Mikrotik dengan Winbox :

1. Pastikan semua konfigurasi Mikrotik telah selesai dan siap pakai. Lalu masuk ke menu : IP -> DHCP SERVER.
2. Pada menu DHCP Server, pilih menu DHCP Setup untuk memulai Wizard-nya. Lalu pilih interface yang akan di gunakan untuk memberikan layanan DHCP. Tentunya disini kita akan mengunakan Interface LAN lalu kita klik Next.

3. Selanjutnya kita menentukan DHCP Address Space. Karena IP Address jairngan LAN kita adalah 192.168.0.xxx/24 maka secara otomatis Wizard akan menawarkan DHCP Address Space : 192.168.0.0/24

4. Selanjutnya kita menentukan IP Gateway untuk DHCP ini. IP Gateway adalah IP Address dari interface yang menjembatani antara jaringan LAN dan Mikrotik, tentunya pada contoh Mikrotik ini kita gunakan IP Address : 192.168.0.1, lalu kita klik Next.

5. Selanjutnya kita menentukan DHCP IP Address Range alias alokasi IP Address yang akan di layani untuk Client. Pada Mikrotik ini kita tentukan IP Address Range yang dilayani adalah 192.168.0.100 – 192.168.0.200. Lalu kita Klik Next.

6. Selanjutnya menentukan IP Address DNS Server. Disini kita dapat mengunakan IP DNS yang di gunakan oleh Provider kita atau bisa mengunakan IP DNS punya Nawala, yaitu :  180.131.144.144 dan 180.131.145.145. Lalu kita klik Next…

7. Selanjutnya kita menentukan LEASE TIME alias Waktu Persewaan IP Address atau Waktu yang di sewakan. Intinya adalah Lama waktu yang diberikan kepada Client untuk mengunakan IP Address otomatis dari DHCP Server Mikrotik. Misalnya kita berikan waktu 4 jam ( 4:00:00 ) -> Artinya : Jika Client masih terkoneksi ke jaringan LAN melebihi waktu 4 jam, maka Client tersebut akan tetap mendapatkan IP Address yang sama dan lease time-nya kembali mulai 4 jam lagi. Namun jika dalam waktu 4 jam Client sudah tidak terkoneksi ke jaringan maka IP Address tersebut dapat digunakan oleh Client yang lain. Lalu kita klik Next.

8. Selanjutnya akan muncul tampilan seperti dibawah ini : “Setup has completed successfully”. Berarti Wizard DHCP Server telah selasai dan telah sukses kita lakukan. Lalu kita klik “OK”.

9. Selanjutnya kalau kita buka menu : IP -> POOL maka kita akan ada IP Pool baru dengan nama “dhcp_pool1? yang berisi IP : 192.168.0.100 – 192.168.0.200. ( lihat langkah ke 5 ).

10. Selanjutnya kita dapat mengamati pada menu tab “Leases”. Disitu ditampilkan informasi dari Layanan DHCP Server, termasuk informasi client penguna DHCP. Informasi tersebut berupa : Nama Host, IP Address yang digunakan, Mac Address, Lease Time, dll. Kita juga dapat menjadikan suatu IP Address khusus bagi suatu client tertentu, istilahnya adalah IP Address Reservation ( Reservasi IP Address ). IP Address Reservation dilakukan berdasarkan Mac Addres. Cukup Klik IP Address yang akan di buat statik lalu klik menu “Make Static” atau dengan cara Klik kanan lalu klik “Make Static”.


Mudah sekali bukan???  Selamat mencoba…

BLOK SITUS

facebook

/ip firewall filter add chain=forward src-address=0.0.0.0/0 protocol=tcp \ dst-port=80 content=”facebook” action=drop comment=”Blokir Situs Facebook”;

twitter

/ip firewall filter add chain=forward src-address=0.0.0.0/0 protocol=tcp \ dst-port=80 content=”twitter” action=drop comment=”Blokir Situs twitter”;

youtube

/ip firewall filter add chain=forward src-address=0.0.0.0/0 protocol=tcp \ dst-port=80 content=”youtube” action=drop comment=”Blokir Situs youtube”;

WEB PROXY

ip web proxy web proxy setting v enable apply ok

add dst host=*.facebook.com;*.twitter.com action=deny apply ok

LAYER 7 PROTOCOL

ip firewall layer 7 protocol add name:denied action=drop/reject regexp=^.+(facebook|twitter|youtube).*$ app ok

address list add name=nama user address=ip user

filter rule add advanced dst address list=nama user layer 7 protocol=denied action=drop/reject comment=… apply ok

FIREWALL

add chain=forward action=mark-connection new-connection mark=download passthrough=yes protocol=tcp in-interface=wan out-interface=lan connection–bytes=128000-4294967295

add chain=forward action=mark-packet new-packet-mark=download passthrough=no protocol=tcp in-interface=wan out-interface=lan connection-mark=download

add chain=forward action=mark-connection new-connection-mark=upload passthrough=yes protocol=tcp in-interface=wan out-interface=lan connection-bytes=64000-4294967295

add chain=forward action=mark-packet new-packet-mark=upload passthrough=no protocol=tcp in-interface=lan out-interface=wan connection-mark=upload

add chain=forward action=mark-connection new-connection-mark=browse passthrough=yes protocol=tcp in-interface=wan out-interface=lan connection-bytes=0-128000

add chain=forward action=mark-packet new-packet-mark=browse passthrough=no protocol=tcp in-interface=wan out-interface=lan connection-mark=browse

FIREWALL PROXY

FIREWALL PROXY SEJAJAR DENGAN ROUTER

/ip firewall mangle add chain=prerouting action=mark-packet new-packet-mark=p2p passthrough=no connection-mark=p2p-conn

/ip firewall mangle add chain=prerouting action=mark-connection new-connection-mark=other_conn passthrough=yes

/ip firewall nat add chain=dst-nat to-address=ip pc proxy to-ports=8000 protocol=tcp src-address=!ip pc proxy src-address-list=warnet in-interface=lan dst-port=80

/ip firewall nat add chain=dstnat action=dst-nat to-address=ip pc proxy to-ports=8000

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.pdf address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.exe address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.zip address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.rar address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.tar address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.mov address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.3gp address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.mp3 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.mp4 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.mkv address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.avi address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.mpeg address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.flv address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.001 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.002 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.003 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.004 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.005 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.006 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.007 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.008 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.009 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.010 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.011 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.012 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.013 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.014 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.015 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.016 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.017 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.018 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.019 address-list=download

/ip firewall filter add chain=forward action=add-dst-to-address-list protocol=tcp src-address=ip pusat(192.168.88.0/25) content=*.020 address-list=download

FILE OVER

LOAD BALANCING FAIL OVER

merubah ether eth1=wan1 eth2=wan2 eth3=lan

set ip, misal: wan1=10.10.10.5/29 wan2=10.10.11.5/29 lan=192.168.10.1/28

/ip address add

set gateway

/ip route add gateway=10.10.10.1 apply ok

/ip route add gateway=10.10.11.1 apply ok

/ip route add dst-address=0.0.0.0/0 gateway=10.10.10.1 scope=255 target=10 routing-mark=odd comment=”…”disabled=no

/ip route add dst-address=0.0.0.0/0 gateway=10.10.11.1 scope=255 target=10 routing-mark=even comment=”…”disabled=no

/ip route add dst-address=0.0.0.0/0 gateway=10.10.10.1 scope=255 target=10 comment=”…”disabled=no

/ip firewall mangle add chain=prerouting in-interface=lan connection-state=new nth=10,1 action=mark-connection new-connection-mark=odd passthrough=yes comment=”..” disabled=no

/ip firewall mangle add chain=prerouting in-interface=lan connection-mark=odd action=mark-routing new=routing-mark=odd passthrough=no comment=”..” disabled=no

/ip firewall mangle add chain=prerouting in-interface=lan connection-state=new nth=11,1 action=mark-connection new-connection-mark=even passthrough=yes comment=”..” disabled=no

/ip firewall mangle add chain=prerouting in-interface=lan connection-mark=even action=mark-routing new-routing-mark=even passthrough=no comment=”..” disabled=no

/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.10.1

/ip firewall nat add chain=src-nat to-address=10.10.10.5 to-ports=0-65535 protocol=tcp connection-mark=even

/ip firewall nat add chain=src-nat to-address=10.10.10.5 to-ports=0-65535 protocol=tcp connection-mark=odd

/ip firewall nat add chain=src-nat out-interface=10.10.10.5 action=masquerade

/ip firewall filter add chain=input action=drop protocol=tcp in-interface=lan dst-port=135-139,445

/ip firewall filter add chain=input action=drop protocol=udp in-interface=lan dst-port=135-139,445

/ip firewall filter add chain=forward action=drop protocol=tcp in-interface=lan dst-port=25,135,137-139,445,593,1025,4691,5933

/ip firewall filter add chain=forward action=drop protocol=udp in-interface=lan dst-port=25,135,137-139,445,593,1025,4691,5933

/ip firewall filter add chain=forward action=drop p2p=bit-torrent

/ip firewall filter add chain=forward action=accept connection-state=established

/ip firewall filter add chain=forward action=accept connection-state=related

/ip firewall filter add chain=forward action=drop connection-state=invalid

LOAD BALANCING

LOAD BALANCING TIPE PCC

/ip address add address=192.168.10.5/30 interface=wan1

/ip address add address=192.168.20.5/30 interface=wan2

/ip address add address=192.168.1.1/28 interface=lan

/ip dns set allow-remote-request=yes primary-dns=180.131.144.144 secondary-dns=180.131.145.145

/ip route add dst-address=0.0.0.0/0 gateway=192.168.10.1 distance=1 check-gateway=ping

/ip route add dst-address=0.0.0.0/0 gateway=192.168.20.1 distance=2 check-gateway=ping

/ip firewall nat add action=masquerade chain=src-nat out-interface=wan1

/ip firewall nat add action=masquerade chain=src-nat out-interface=wan2

/ip firewall address-list add address=192.168.10.0/30 list=local

/ip firewall address-list add address=192.168.10.0/30 list=local

/ip firewall address-list add address=192.168.10.0/30 list=local

/ip firewall mangle add action=accept chain=prerouting dst-address-list=local in-interface=lan comment=”trafik lokal”

/ip firewall mangle add action=accept chain=output dst-address-list=local

==========================================================================

TAMBAHAN UNTUK FIREWALL MANGLE

/ip firewall mangle add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=wan1 new-connection-mark=con-from-isp1 passthrough=yes comment=”trafik dari isp1?

/ip firewall mangle add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=wan2 new-connection-mark=con-from-isp2 passthrough=yes comment=”trafik dari isp2?

/ip firewall mangle add action=mark-connection chain=output comment=dns dst-address=125.160.2.34 dst-port=53 new-connection-mark=dns passthrough=yes protocol=tcp comment=”trafik dns telkom speedy”

/ip firewall mangle add action=mark-connection chain=output dst-address=202.134.1.10 dst-port=53 new-connection-mark=dns passthrough=yes protocol=udp

/ip firewall mangle add action=mark-routing chain=output connection-mark=dns

/ip route add check gateway=ping dst-address=0.0.0.0/0 gateway=192.168.10.1 routing-mark=route-to-isp1 distance=1

/ip route add check gateway=ping dst-address=0.0.0.0/0 gateway=192.168.20.1 routing-mark=route-to-isp1 distance=2

/ip route add check gateway=ping dst-address=0.0.0.0/0 gateway=192.168.20.1 routing-mark=route-to-isp2 distance=1

/ip route add check gateway=ping dst-address=0.0.0.0/0 gateway=192.168.10.1 routing-mark=route-to-isp2 distance=2


LOAD BALANCING FAIL OVER

LOAD BALANCING FAIL OVER
merubah ether eth1=wan1 eth2=wan2 eth3=lan
set ip, misal: wan1=10.10.10.5/29 wan2=10.10.11.5/29 lan=192.168.10.1/28
set ip, misal: wan1=192.168.2.1/30 wan2=192.168.3.1 lan=192.168.100.1/24
/ip address add
set gateway
/ip route add gateway=192.168.2.1
/ip route add gateway=192.168.3.1
/ip route add dst-address=0.0.0.0/0 gateway=192.168.2.1 scope=255 target=10 routing-mark=odd comment=”…”disabled=no
/ip route add dst-address=0.0.0.0/0 gateway=192.168.3.1 scope=255 target=10 routing-mark=even comment=”…”disabled=no
/ip route add dst-address=0.0.0.0/0 gateway=192.168.2.1 scope=255 target=10 comment=”…”disabled=no
/ip firewall mangle add chain=prerouting in-interface=lan connection-state=new nth=10,1 action=mark-connection new-connection-mark=odd passthrough=yes comment=”..” disabled=no
/ip firewall mangle add chain=prerouting in-interface=lan connection-mark=odd action=mark-routing new=routing-mark=odd passthrough=no comment=”..” disabled=no
/ip firewall mangle add chain=prerouting in-interface=lan connection-mark=even action=mark-routing new-routing-mark=even passthrough=no comment=”..” disabled=no
/ip firewall mangle add chain=prerouting in-interface=lan connection-state=new nth=11,1 action=mark-connection new-connection-mark=even passthrough=yes comment=”..” disabled=no

/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.100.1
/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.101.1

/ip firewall nat add chain=src-nat to-address=192.168.2.2 to-ports=0-65535 protocol=tcp connection-mark=even
/ip firewall nat add chain=src-nat to-address=192.168.2.2 to-ports=0-65535 protocol=tcp connection-mark=odd
/ip firewall nat add chain=src-nat out-interface=192.168.2.2 action=masquerade
/ip firewall filter add chain=input action=drop protocol=tcp in-interface=lan dst-port=135-139,445
/ip firewall filter add chain=input action=drop protocol=udp in-interface=lan dst-port=135-139,445
/ip firewall filter add chain=forward action=drop protocol=tcp in-interface=lan dst-port=25,135,137-139,445,593,1025,4691,5933
/ip firewall filter add chain=forward action=drop protocol=udp in-interface=lan dst-port=25,135,137-139,445,593,1025,4691,5933
/ip firewall filter add chain=forward action=drop p2p=bit-torrent
/ip firewall filter add chain=forward action=accept connection-state=established
/ip firewall filter add chain=forward action=accept connection-state=related
/ip firewall filter add chain=forward action=drop connection-state=invalid

fail over mikrotik 2


/ip address add address=192.168.1.2/30 interface=ether1
/ip address add address=192.168.2.2/30 interface=ether2
/ip address add address=192.168.100.1/24 interface=ether3
/ip address add address=192.168.101.1/24 interface=wlan1
/ip firewall mangle add chain=prerouting src-address=192.168.100.0/24 action=mark-routing new-routingmark=SUBNET1-RM
/ip firewall mangle add chain=prerouting src-address=192.168.101.0/24 action=mark-routing new-routingmark=SUBNET1-RM
/ip route add gateway=192.168.1.1,192.168.2.1,192.168.2.1
/ip route add gateway=192.168.1.1 routing-mark=SUBNET1-RM check-gateway=ping
/ip route add gateway=192.168.2.1

anti virus mikrotik

ip firewall filter
add chain=virus protocol=tcp dst-port=1 action=drop comment=" Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250"
add chain=virus protocol=tcp dst-port=28 action=drop comment=" Amanda.200"
add chain=virus protocol=tcp dst-port=31 action=drop comment=" MastersParadise.920"
add chain=virus protocol=tcp dst-port=68 action=drop comment=" Subseven.100"
add chain=virus protocol=tcp dst-port=142 action=drop comment=" NetTaxi.180"
add chain=virus protocol=tcp dst-port=146 action=drop comment=" Infector.141, Intruder.100, Intruder.100"
add chain=virus protocol=tcp dst-port=171 action=drop comment=" ATrojan.200"
add chain=virus protocol=tcp dst-port=285-286 action=drop comment=" WCTrojan.100"
add chain=virus protocol=tcp dst-port=334 action=drop comment=" Backage.310"
add chain=virus protocol=tcp dst-port=370 action=drop comment=" NeuroticKat.120, NeuroticKat.130"
add chain=virus protocol=tcp dst-port=413 action=drop comment=" Coma.109"
add chain=virus protocol=tcp dst-port=420 action=drop comment=" Breach.450"
add chain=virus protocol=tcp dst-port=555 action=drop comment=" Id2001.100, PhaseZero.100, StealthSpy.100"
add chain=virus protocol=tcp dst-port=623 action=drop comment=" Rtb666.160"
add chain=virus protocol=tcp dst-port=660 action=drop comment=" Zaratustra.100"
add chain=virus protocol=tcp dst-port=661 action=drop comment=" Noknok.800, Noknok.820"
add chain=virus protocol=tcp dst-port=666 action=drop comment=" BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110"
add chain=virus protocol=tcp dst-port=667 action=drop comment=" SniperNet.210, Snipernet.220"
add chain=virus protocol=tcp dst-port=668 action=drop comment=" Unicorn.101, Unicorn.110"
add chain=virus protocol=tcp dst-port=680 action=drop comment=" Rtb666.160"
add chain=virus protocol=tcp dst-port=777 action=drop comment=" Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332"
add chain=virus protocol=tcp dst-port=785 action=drop comment=" NetworkTerrorist.100"
add chain=virus protocol=tcp dst-port=800 action=drop comment=" NeuroticKitten.010"
add chain=virus protocol=tcp dst-port=831 action=drop comment=" NeuroticKat.100, NeuroticKat.120, NeuroticKat.130"
add chain=virus protocol=tcp dst-port=901 action=drop comment=" NetDevil.130, NetDevil.140"
add chain=virus protocol=tcp dst-port=1000 action=drop comment=" DerSpaeher.200"
add chain=virus protocol=tcp dst-port=1001 action=drop comment=" Silencer.100"
add chain=virus protocol=tcp dst-port=1008 action=drop comment=" AutoSpy.100"
add chain=virus protocol=tcp dst-port=1010 action=drop comment=" DerSpaeher.200"
add chain=virus protocol=tcp dst-port=1015 action=drop comment=" Doly.150"
add chain=virus protocol=tcp dst-port=1111 action=drop comment=" TPort.100"
add chain=virus protocol=tcp dst-port=1130 action=drop comment=" Noknok.800, Noknok.820"
add chain=virus protocol=tcp dst-port=1207 action=drop comment=" SoftWAR.100"
add chain=virus protocol=tcp dst-port=1243 action=drop comment=" Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200"
add chain=virus protocol=tcp dst-port=1245 action=drop comment=" VoodooDoll.006"
add chain=virus protocol=tcp dst-port=1269 action=drop comment=" Matrix.130"
add chain=virus protocol=tcp dst-port=1480 action=drop comment=" RemoteHack.130"
add chain=virus protocol=tcp dst-port=1568 action=drop comment=" RemoteHack.100, RemoteHack.110"
add chain=virus protocol=tcp dst-port=1600-1602 action=drop comment=" DirectConnection.100"
add chain=virus protocol=tcp dst-port=1634 action=drop comment=" NetCrack.100"
add chain=virus protocol=tcp dst-port=1784 action=drop comment=" Snid.120, Snid.212"
add chain=virus protocol=tcp dst-port=1999 action=drop comment=" TransmissionScout.100, TransmissionScout.110"
add chain=virus protocol=tcp dst-port=2000 action=drop comment=" ATrojan.200, InsaneNetwork.400"
add chain=virus protocol=tcp dst-port=2001 action=drop comment=" DIRT.220, TrojanCow.100"
add chain=virus protocol=tcp dst-port=2003 action=drop comment=" TransmissionScout.100, TransmissionScout.110"
add chain=virus protocol=tcp dst-port=2023 action=drop comment=" RipperPro.100"
add chain=virus protocol=tcp dst-port=2040 action=drop comment=" InfernoUploader.100"
add chain=virus protocol=tcp dst-port=2115 action=drop comment=" Bugs.100"
add chain=virus protocol=tcp dst-port=2140 action=drop comment=" DeepThroat.100, DeepThroat.200, DeepThroat.310"
add chain=virus protocol=tcp dst-port=2332 action=drop comment=" SilentSpy.202"
add chain=virus protocol=tcp dst-port=2589 action=drop comment=" Dagger.140"
add chain=virus protocol=tcp dst-port=2600 action=drop comment=" DigitalRootbeer.100"
add chain=virus protocol=tcp dst-port=2989 action=drop comment=" Rat.200"
add chain=virus protocol=tcp dst-port=3128 action=drop comment=" MastersParadise.970"
add chain=virus protocol=tcp dst-port=3129 action=drop comment=" MastersParadise.920, MastersParadise.970"
add chain=virus protocol=tcp dst-port=3150 action=drop comment=" DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110"
add chain=virus protocol=tcp dst-port=3215 action=drop comment=" BlackStar.100, Ghost.230"
add chain=virus protocol=tcp dst-port=3333 action=drop comment=" Daodan.123"
add chain=virus protocol=tcp dst-port=3410 action=drop comment=" OptixPro.100, OptixPro.110"
add chain=virus protocol=tcp dst-port=3456 action=drop comment=" Force.155, TerrorTrojan.100"
add chain=virus protocol=tcp dst-port=3505 action=drop comment=" AutoSpy.130, AutoSpy.140"
add chain=virus protocol=tcp dst-port=3586 action=drop comment=" Snid.120, Snid.212"
add chain=virus protocol=tcp dst-port=3700 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=3723 action=drop comment=" Mantis.100"
add chain=virus protocol=tcp dst-port=3800 action=drop comment=" Eclypse.100"
add chain=virus protocol=tcp dst-port=3996 action=drop comment=" RemoteAnything.364"
add chain=virus protocol=tcp dst-port=4000 action=drop comment=" SkyDance.220, SkyDance.229"
add chain=virus protocol=tcp dst-port=4201 action=drop comment=" Wartrojan.160, Wartrojan.200"
add chain=virus protocol=tcp dst-port=4225 action=drop comment=" SilentSpy.202"
add chain=virus protocol=tcp dst-port=4321 action=drop comment=" Bobo.100"
add chain=virus protocol=tcp dst-port=4444 action=drop comment=" AlexTrojan.200, Crackdown.100"
add chain=virus protocol=tcp dst-port=4488 action=drop comment=" EventHorizon.100"
add chain=virus protocol=tcp dst-port=4523 action=drop comment=" Celine.100"
add chain=virus protocol=tcp dst-port=4545 action=drop comment=" InternalRevise.100, RemoteRevise.150"
add chain=virus protocol=tcp dst-port=4567 action=drop comment=" FileNail.100"
add chain=virus protocol=tcp dst-port=4666 action=drop comment=" Mneah.100"
add chain=virus protocol=tcp dst-port=4950 action=drop comment=" ICQTrojan.100"
add chain=virus protocol=tcp dst-port=5005 action=drop comment=" Aladino.060"
add chain=virus protocol=tcp dst-port=5025 action=drop comment=" Keylogger.WMRemote.100"
add chain=virus protocol=tcp dst-port=5031 action=drop comment=" NetMetro.104"
add chain=virus protocol=tcp dst-port=5032 action=drop comment=" NetMetro.104"
add chain=virus protocol=tcp dst-port=5033 action=drop comment=" NetMetro.104"
add chain=virus protocol=tcp dst-port=5050 action=drop comment=" RoxRat.100"
add chain=virus protocol=tcp dst-port=5151 action=drop comment=" OptixLite.020, OptixLite.030, OptixLite.040"
add chain=virus protocol=tcp dst-port=5190 action=drop comment=" MBomber.100"
add chain=virus protocol=tcp dst-port=5277 action=drop comment=" WinShell.400"
add chain=virus protocol=tcp dst-port=5343 action=drop comment=" WCRat.100"
add chain=virus protocol=tcp dst-port=5400 action=drop comment=" BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300"
add chain=virus protocol=tcp dst-port=5401 action=drop comment=" BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100"
add chain=virus protocol=tcp dst-port=5402 action=drop comment=" BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100"
add chain=virus protocol=tcp dst-port=5534 action=drop comment=" TheFlu.100"
add chain=virus protocol=tcp dst-port=5550 action=drop comment=" XTCP.200, XTCP.201"
add chain=virus protocol=tcp dst-port=5555 action=drop comment=" Noxcape.100, Noxcape.200"
add chain=virus protocol=tcp dst-port=5695 action=drop comment=" Assassin.100"
add chain=virus protocol=tcp dst-port=5714 action=drop comment=" WinCrash.100"
add chain=virus protocol=tcp dst-port=5741 action=drop comment=" WinCrash.100"
add chain=virus protocol=tcp dst-port=5742 action=drop comment=" WinCrash.103"
add chain=virus protocol=tcp dst-port=5802 action=drop comment=" Y3KRat.160"
add chain=virus protocol=tcp dst-port=5810 action=drop comment=" Y3KRat.160"
add chain=virus protocol=tcp dst-port=5838 action=drop comment=" Y3KRat.170"
add chain=virus protocol=tcp dst-port=5858 action=drop comment=" Y3KRat.110, Y3KRat.120, Y3KRat.140"
add chain=virus protocol=tcp dst-port=5880 action=drop comment=" Y3KRat.140"
add chain=virus protocol=tcp dst-port=5881 action=drop comment=" Y3KRat.110, Y3KRat.120, Y3KRat.140"
add chain=virus protocol=tcp dst-port=5882 action=drop comment=" Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150"
add chain=virus protocol=tcp dst-port=5883 action=drop comment=" Y3KRat.110, Y3KRat.140"
add chain=virus protocol=tcp dst-port=5884 action=drop comment=" Y3KRat.140, Y3KRat.150"
add chain=virus protocol=tcp dst-port=5885 action=drop comment=" Y3KRat.110, Y3KRat.120, Y3KRat.140"
add chain=virus protocol=tcp dst-port=5886 action=drop comment=" Y3KRat.120, Y3KRat.140"
add chain=virus protocol=tcp dst-port=5887 action=drop comment=" Y3KRat.110, Y3KRat.120, Y3KRat.140"
add chain=virus protocol=tcp dst-port=5888 action=drop comment=" Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150"
add chain=virus protocol=tcp dst-port=5889 action=drop comment=" Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150"
add chain=virus protocol=tcp dst-port=5890 action=drop comment=" Y3KRat.140"
add chain=virus protocol=tcp dst-port=6400 action=drop comment=" Thething.100, Thething.150"
add chain=virus protocol=tcp dst-port=6556 action=drop comment=" AutoSpy.120, AutoSpy.122"
add chain=virus protocol=tcp dst-port=6655 action=drop comment=" Aqua.020"
add chain=virus protocol=tcp dst-port=6660 action=drop comment=" LameSpy.095"
add chain=virus protocol=tcp dst-port=6666 action=drop comment=" LameRemote.100, ProjectMayhem.100"
add chain=virus protocol=tcp dst-port=6669 action=drop comment=" Vampire.100"
add chain=virus protocol=tcp dst-port=6670 action=drop comment=" DeepThroat.200, DeepThroat.210"
add chain=virus protocol=tcp dst-port=6671 action=drop comment=" DeepThroat.310"
add chain=virus protocol=tcp dst-port=6699 action=drop comment=" HostControl.101"
add chain=virus protocol=tcp dst-port=6711 action=drop comment=" DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190"
add chain=virus protocol=tcp dst-port=6712 action=drop comment=" Subseven.100"
add chain=virus protocol=tcp dst-port=6713 action=drop comment=" Subseven.100"
add chain=virus protocol=tcp dst-port=6767 action=drop comment=" NTRC.120"
add chain=virus protocol=tcp dst-port=6776 action=drop comment=" SubSeven.180, SubSeven.190, Subseven.200"
add chain=virus protocol=tcp dst-port=6789 action=drop comment=" Doly.200"
add chain=virus protocol=tcp dst-port=6796 action=drop comment=" SubSeven.214"
add chain=virus protocol=tcp dst-port=6912 action=drop comment=" ShitHeep.100"
add chain=virus protocol=tcp dst-port=6939 action=drop comment=" Indoctrination.100"
add chain=virus protocol=tcp dst-port=6953 action=drop comment=" Lithium.100"
add chain=virus protocol=tcp dst-port=6969 action=drop comment=" 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120"
add chain=virus protocol=tcp dst-port=6970 action=drop comment=" Danton.330"
add chain=virus protocol=tcp dst-port=7001 action=drop comment=" Freak88.100"
add chain=virus protocol=tcp dst-port=7119 action=drop comment=" Massaker.100"
add chain=virus protocol=tcp dst-port=7200 action=drop comment=" Massaker.110"
add chain=virus protocol=tcp dst-port=7300 action=drop comment=" Coced.221"
add chain=virus protocol=tcp dst-port=7301action=drop comment=" Coced.221"
add chain=virus protocol=tcp dst-port=7306 action=drop comment=" NetSpy.200, NetSpy.200"
add chain=virus protocol=tcp dst-port=7410 action=drop comment=" Phoenix.190, Phoenix.200"
add chain=virus protocol=tcp dst-port=7511 action=drop comment=" Genue.100"
add chain=virus protocol=tcp dst-port=7609 action=drop comment=" Snid.120, Snid.212"
add chain=virus protocol=tcp dst-port=7614 action=drop comment=" Wollf.130"
add chain=virus protocol=tcp dst-port=7648 action=drop comment=" BlackStar.100, Ghost.230"
add chain=virus protocol=tcp dst-port=7788 action=drop comment=" Last.2000, Matrix.200"
add chain=virus protocol=tcp dst-port=7826 action=drop comment=" MiniOblivion.010, Oblivion.010"
add chain=virus protocol=tcp dst-port=7887 action=drop comment=" SmallFun.110"
add chain=virus protocol=tcp dst-port=7891 action=drop comment=" Revenger.100"
add chain=virus protocol=tcp dst-port=7979 action=drop comment=" VagrNocker.200"
add chain=virus protocol=tcp dst-port=7997 action=drop comment=" VagrNocker.200"
add chain=virus protocol=tcp dst-port=8000 action=drop comment=" XConsole.100"
add chain=virus protocol=tcp dst-port=8011 action=drop comment=" Way.240"
add chain=virus protocol=tcp dst-port=8012 action=drop comment=" Ptakks.215, Ptakks.217"
add chain=virus protocol=tcp dst-port=8110 action=drop comment=" LoseLove.100"
add chain=virus protocol=tcp dst-port=8111 action=drop comment=" LoseLove.100"
add chain=virus protocol=tcp dst-port=8301 action=drop comment=" LoseLove.100"
add chain=virus protocol=tcp dst-port=8302 action=drop comment=" LoseLove.100"
add chain=virus protocol=tcp dst-port=8372 action=drop comment=" NetBoy.100"
add chain=virus protocol=tcp dst-port=8720 action=drop comment=" Connection.130"
add chain=virus protocol=tcp dst-port=8734 action=drop comment=" AutoSpy.110"
add chain=virus protocol=tcp dst-port=8811 action=drop comment=" Force.155"
add chain=virus protocol=tcp dst-port=8899 action=drop comment=" Last.2000"
add chain=virus protocol=tcp dst-port=9000 action=drop comment=" Aristotles.100"
add chain=virus protocol=tcp dst-port=9301 action=drop comment=" LoseLove.100"
add chain=virus protocol=tcp dst-port=9400 action=drop comment=" InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170"
add chain=virus protocol=tcp dst-port=9401 action=drop comment=" InCommand.100, InCommand.110, InCommand.170"
add chain=virus protocol=tcp dst-port=9402 action=drop comment=" InCommand.100, InCommand.110"
add chain=virus protocol=tcp dst-port=9561 action=drop comment=" CRatPro.110"
add chain=virus protocol=tcp dst-port=9563 action=drop comment=" CRatPro.110"
add chain=virus protocol=tcp dst-port=9580 action=drop comment=" TheefLE.100"
add chain=virus protocol=tcp dst-port=9696 action=drop comment=" Danton.210, Ghost.230"
add chain=virus protocol=tcp dst-port=9697 action=drop comment=" Danton.320, Danton.330, Ghost.230"
add chain=virus protocol=tcp dst-port=9870 action=drop comment=" R3C.100"
add chain=virus protocol=tcp dst-port=9872 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=9873 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=9874 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=9875 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=9876 action=drop comment=" Rux.100, SheepGoat.100"
add chain=virus protocol=tcp dst-port=9877 action=drop comment=" SmallBigBrother.020"
add chain=virus protocol=tcp dst-port=9878 action=drop comment=" SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120"
add chain=virus protocol=tcp dst-port=9879 action=drop comment=" SmallBigBrother.020"
add chain=virus protocol=tcp dst-port=9999 action=drop comment=" ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300"
add chain=virus protocol=tcp dst-port=10001 action=drop comment=" DTr.130, DTr.140"
add chain=virus protocol=tcp dst-port=10013 action=drop comment=" Amanda.200"
add chain=virus protocol=tcp dst-port=10067 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=10100 action=drop comment=" Gift.240"
add chain=virus protocol=tcp dst-port=10101 action=drop comment=" NewSilencer.100"
add chain=virus protocol=tcp dst-port=10167 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=tcp dst-port=10528 action=drop comment=" HostControl.100, HostControl.260"
add chain=virus protocol=tcp dst-port=10607 action=drop comment=" Coma.109"
add chain=virus protocol=tcp dst-port=10666 action=drop comment=" Ambush.100"
add chain=virus protocol=tcp dst-port=11011 action=drop comment=" Amanda.200"
add chain=virus protocol=tcp dst-port=11050 action=drop comment=" HostControl.101"
add chain=virus protocol=tcp dst-port=11051 action=drop comment=" HostControl.100, HostControl.260"
add chain=virus protocol=tcp dst-port=11223 action=drop comment=" AntiNuke.100, Progenic.100, Progenic.110"
add chain=virus protocol=tcp dst-port=11225 action=drop comment=" Cyn.100, Cyn.103, Cyn.120"
add chain=virus protocol=tcp dst-port=11306 action=drop comment=" Noknok.800, Noknok.820"
add chain=virus protocol=tcp dst-port=11831 action=drop comment=" Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400"
add chain=virus protocol=tcp dst-port=11991 action=drop comment=" PitfallSurprise.100"
add chain=virus protocol=tcp dst-port=12043 action=drop comment=" Frenzy.2000"
add chain=virus protocol=tcp dst-port=12345 action=drop comment=" Fade.100, Netbus.160, Netbus.170, VagrNocker.400"
add chain=virus protocol=tcp dst-port=12346 action=drop comment=" Netbus.160, Netbus.170"
add chain=virus protocol=tcp dst-port=12348 action=drop comment=" Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317"
add chain=virus protocol=tcp dst-port=12349 action=drop comment=" Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402"
add chain=virus protocol=tcp dst-port=12389 action=drop comment=" KheSanh.210"
add chain=virus protocol=tcp dst-port=12478 action=drop comment=" Bionet.210"
add chain=virus protocol=tcp dst-port=12623 action=drop comment=" Buttman.090, Buttman.100"
add chain=virus protocol=tcp dst-port=12624 action=drop comment=" Buttman.090, Buttman.100"
add chain=virus protocol=tcp dst-port=12625 action=drop comment=" Buttman.100"
add chain=virus protocol=tcp dst-port=12904 action=drop comment=" Akropolis.100, Rocks.100"
add chain=virus protocol=tcp dst-port=13473 action=drop comment=" Chupacabra.100"
add chain=virus protocol=tcp dst-port=13753 action=drop comment=" AFTP.010"
add chain=virus protocol=tcp dst-port=14100 action=drop comment=" Eurosol.100"
add chain=virus protocol=tcp dst-port=14194 action=drop comment=" CyberSpy.840"
add chain=virus protocol=tcp dst-port=14286 action=drop comment=" HellDriver.100"
add chain=virus protocol=tcp dst-port=14500 action=drop comment=" PCInvader.050, PCInvader.060, PCInvader.070"
add chain=virus protocol=tcp dst-port=14501 action=drop comment=" PCInvader.060, PCInvader.070"
add chain=virus protocol=tcp dst-port=14502 action=drop comment=" PCInvader.050, PCInvader.060, PCInvader.070"
add chain=virus protocol=tcp dst-port=14503 action=drop comment=" PCInvader.050, PCInvader.060, PCInvader.070"
add chain=virus protocol=tcp dst-port=14504 action=drop comment=" PCInvader.050, PCInvader.060"
add chain=virus protocol=tcp dst-port=15092 action=drop comment=" HostControl.100, HostControl.260"
add chain=virus protocol=tcp dst-port=15382 action=drop comment=" SubZero.100"
add chain=virus protocol=tcp dst-port=15432 action=drop comment=" Cyn.210"
add chain=virus protocol=tcp dst-port=15555 action=drop comment=" ICMIBC.100"
add chain=virus protocol=tcp dst-port=16322 action=drop comment=" LastDoor.100"
add chain=virus protocol=tcp dst-port=16484 action=drop comment=" MoSucker.110"
add chain=virus protocol=tcp dst-port=16661 action=drop comment=" Dfch.010"
add chain=virus protocol=tcp dst-port=16969 action=drop comment=" Progenic.100"
add chain=virus protocol=tcp dst-port=16982 action=drop comment=" AcidShiver.100"
add chain=virus protocol=tcp dst-port=17300 action=drop comment=" Kuang.200"
add chain=virus protocol=tcp dst-port=17499 action=drop comment=" CrazzyNet.370, CrazzyNet.375, CrazzyNet.521"
add chain=virus protocol=tcp dst-port=17500 action=drop comment=" CrazzyNet.370, CrazzyNet.375, CrazzyNet.521"
add chain=virus protocol=tcp dst-port=17569 action=drop comment=" Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100"
add chain=virus protocol=tcp dst-port=17593 action=drop comment=" AudioDoor.120"
add chain=virus protocol=tcp dst-port=19191 action=drop comment=" BlueFire.035, BlueFire.041"
add chain=virus protocol=tcp dst-port=19604 action=drop comment=" Metal.270"
add chain=virus protocol=tcp dst-port=19605 action=drop comment=" Metal.270"
add chain=virus protocol=tcp dst-port=19991 action=drop comment=" Dfch.010"
add chain=virus protocol=tcp dst-port=20000 action=drop comment=" Millenium.100"
add chain=virus protocol=tcp dst-port=20001 action=drop comment=" Millenium.100, PshychoFiles.180"
add chain=virus protocol=tcp dst-port=20002 action=drop comment=" AcidKor.100, PshychoFiles.180"
add chain=virus protocol=tcp dst-port=20005 action=drop comment=" MoSucker.200, MoSucker.210, MoSucker.220"
add chain=virus protocol=tcp dst-port=21212 action=drop comment=" Schwindler.182"
add chain=virus protocol=tcp dst-port=21554 action=drop comment=" Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135"
add chain=virus protocol=tcp dst-port=21579 action=drop comment=" Breach.2001"
add chain=virus protocol=tcp dst-port=21584 action=drop comment=" Breach.2001"
add chain=virus protocol=tcp dst-port=21684 action=drop comment=" Intruse.134"
add chain=virus protocol=tcp dst-port=22068 action=drop comment=" AcidShiver.110"
add chain=virus protocol=tcp dst-port=22115 action=drop comment=" Cyn.120"
add chain=virus protocol=tcp dst-port=22222 action=drop comment=" Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600"
add chain=virus protocol=tcp dst-port=22223 action=drop comment=" Rux.400, Rux.500, Rux.600"
add chain=virus protocol=tcp dst-port=22456 action=drop comment=" Bla.200, Bla.503"
add chain=virus protocol=tcp dst-port=22457 action=drop comment=" AcidShiver.120, Bla.200, Bla.503"
add chain=virus protocol=tcp dst-port=22784 action=drop comment=" Intruzzo.110"
add chain=virus protocol=tcp dst-port=22845 action=drop comment=" Breach.450"
add chain=virus protocol=tcp dst-port=22847 action=drop comment=" Breach.450"
add chain=virus protocol=tcp dst-port=23005 action=drop comment=" Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100"
add chain=virus protocol=tcp dst-port=23006 action=drop comment=" Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100"
add chain=virus protocol=tcp dst-port=23032 action=drop comment=" Amanda.200"
add chain=virus protocol=tcp dst-port=23432 action=drop comment=" Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110"
add chain=virus protocol=tcp dst-port=23456 action=drop comment=" EvilFTP.100, VagrNocker.400"
add chain=virus protocol=tcp dst-port=23476 action=drop comment=" DonaldDick.153, DonaldDick.154, DonaldDick.155"
add chain=virus protocol=tcp dst-port=23477 action=drop comment=" DonaldDick.153"
add chain=virus protocol=tcp dst-port=24000 action=drop comment=" Infector.170"
add chain=virus protocol=tcp dst-port=24307 action=drop comment=" Wildek.020"
add chain=virus protocol=tcp dst-port=25386 action=drop comment=" MoonPie.220"
add chain=virus protocol=tcp dst-port=25486 action=drop comment=" MoonPie.220"
add chain=virus protocol=tcp dst-port=25555 action=drop comment=" FreddyK.100, FreddyK.200"
add chain=virus protocol=tcp dst-port=25556 action=drop comment=" FreddyK.100"
add chain=virus protocol=tcp dst-port=25685 action=drop comment=" MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400"
add chain=virus protocol=tcp dst-port=25686 action=drop comment=" MoonPie.135, MoonPie.200, MoonPie.400"
add chain=virus protocol=tcp dst-port=25982 action=drop comment=" MoonPie.135, MoonPie.200"
add chain=virus protocol=tcp dst-port=26274 action=drop comment=" Delta.050"
add chain=virus protocol=tcp dst-port=27160 action=drop comment=" MoonPie.135, MoonPie.200"
add chain=virus protocol=tcp dst-port=27184 action=drop comment=" Alvgus.100, Alvgus.800"
add chain=virus protocol=tcp dst-port=27374 action=drop comment=" Muerte.110, Subseven.210, SubSeven.213"
add chain=virus protocol=tcp dst-port=28429-28436 action=drop comment=" Hack'a'Tack.2000"
add chain=virus protocol=tcp dst-port=29559 action=drop comment=" DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400"
add chain=virus protocol=tcp dst-port=29891 action=drop comment=" Unexplained.100"
add chain=virus protocol=tcp dst-port=30000 action=drop comment=" Infector.170"
add chain=virus protocol=tcp dst-port=30001 action=drop comment=" Error32.100"
add chain=virus protocol=tcp dst-port=30003 action=drop comment=" LamersDeath.100"
add chain=virus protocol=tcp dst-port=30029action=drop comment=" AOLTrojan.110"
add chain=virus protocol=tcp dst-port=30100-30103 action=drop comment=" NetSphere.127, NetSphere.130, NetSphere.131"
add chain=virus protocol=tcp dst-port=30103 action=drop comment=" NetSphere.131"
add chain=virus protocol=tcp dst-port=30947 action=drop comment=" Intruse.134"
add chain=virus protocol=tcp dst-port=31320 action=drop comment=" LittleWitch.400, LittleWitch.420"
add chain=virus protocol=tcp dst-port=31337 action=drop comment=" BackOrifice.120, Khaled.100, OPC.200"
add chain=virus protocol=tcp dst-port=31415 action=drop comment=" Lithium.101"
add chain=virus protocol=tcp dst-port=31416 action=drop comment=" Lithium.100, Lithium.101"
add chain=virus protocol=tcp dst-port=31557 action=drop comment=" Xanadu.110"
add chain=virus protocol=tcp dst-port=31631 action=drop comment=" CleptoManicos.100"
add chain=virus protocol=tcp dst-port=31745 action=drop comment=" Buschtrommel.100, Buschtrommel.122"
add chain=virus protocol=tcp dst-port=31785 action=drop comment=" Hack'a'Tack.100, Hack'a'Tack.112"
add chain=virus protocol=tcp dst-port=31787 action=drop comment=" Hack'a'Tack.100, Hack'a'Tack.112"
add chain=virus protocol=tcp dst-port=31789 action=drop comment=" Hack'a'Tack.100, Hack'a'Tack.112"
add chain=virus protocol=tcp dst-port=31791 action=drop comment=" Hack'a'Tack.100, Hack'a'Tack.112"
add chain=virus protocol=tcp dst-port=31887 action=drop comment=" BDDT.100"
add chain=virus protocol=tcp dst-port=31889 action=drop comment=" BDDT.100"
add chain=virus protocol=tcp dst-port=32100 action=drop comment=" ProjectNext.053"
add chain=virus protocol=tcp dst-port=32418 action=drop comment=" AcidBattery.100"
add chain=virus protocol=tcp dst-port=32791 action=drop comment=" Akropolis.100, Rocks.100"
add chain=virus protocol=tcp dst-port=33291 action=drop comment=" RemoteHak.001"
add chain=virus protocol=tcp dst-port=33333 action=drop comment=" Blackharaz.100, Prosiak.047, SubSeven.214"
add chain=virus protocol=tcp dst-port=33577 action=drop comment=" SonOfPsychward.020"
add chain=virus protocol=tcp dst-port=34324 action=drop comment=" TelnetServer.100"
add chain=virus protocol=tcp dst-port=34763 action=drop comment=" Infector.180, Infector.190, Infector.200"
add chain=virus protocol=tcp dst-port=35000 action=drop comment=" Infector.190, Infector.200"
add chain=virus protocol=tcp dst-port=35600 action=drop comment=" Subsari.140"
add chain=virus protocol=tcp dst-port=36794 action=drop comment=" BugBear.100"
add chain=virus protocol=tcp dst-port=37237 action=drop comment=" Mantis.020"
add chain=virus protocol=tcp dst-port=37651 action=drop comment=" YAT.210"
add chain=virus protocol=tcp dst-port=37653 action=drop comment=" YAT.310"
add chain=virus protocol=tcp dst-port=40308 action=drop comment=" Subsari.140"
add chain=virus protocol=tcp dst-port=40412 action=drop comment=" TheSpy.100"
add chain=virus protocol=tcp dst-port=40421 action=drop comment=" MastersParadise.970"
add chain=virus protocol=tcp dst-port=40422 action=drop comment=" MastersParadise.970"
add chain=virus protocol=tcp dst-port=40999 action=drop comment=" DiemsMutter.110, DiemsMutter.140"
add chain=virus protocol=tcp dst-port=41626 action=drop comment=" Shah.100"
add chain=virus protocol=tcp dst-port=44444 action=drop comment=" Prosiak.070"
add chain=virus protocol=tcp dst-port=45673 action=drop comment=" Akropolis.100, Rocks.100"
add chain=virus protocol=tcp dst-port=47262 action=drop comment=" Delta.050"
add chain=virus protocol=tcp dst-port=48006 action=drop comment=" Fragglerock.200"
add chain=virus protocol=tcp dst-port=49683 action=drop comment=" HolzPferd.210"
add chain=virus protocol=tcp dst-port=50000 action=drop comment=" Infector.180"
add chain=virus protocol=tcp dst-port=50130 action=drop comment=" Enterprise.100"
add chain=virus protocol=tcp dst-port=50766 action=drop comment=" Fore.100"
add chain=virus protocol=tcp dst-port=51234 action=drop comment=" Cyn.210"
add chain=virus protocol=tcp dst-port=51966 action=drop comment=" Cafeini.080, Cafeini.110"
add chain=virus protocol=tcp dst-port=54321 action=drop comment=" PCInvader.010"
add chain=virus protocol=tcp dst-port=57341 action=drop comment=" NetRaider.100"
add chain=virus protocol=tcp dst-port=57922 action=drop comment=" Bionet.084"
add chain=virus protocol=tcp dst-port=58008 action=drop comment=" Tron.100"
add chain=virus protocol=tcp dst-port=58009 action=drop comment=" Tron.100"
add chain=virus protocol=tcp dst-port=59090 action=drop comment=" AcidReign.200"
add chain=virus protocol=tcp dst-port=59211 action=drop comment=" DuckToy.100, DuckToy.101"
add chain=virus protocol=tcp dst-port=59345 action=drop comment=" NewFuture.100"
add chain=virus protocol=tcp dst-port=60000 action=drop comment=" DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101"
add chain=virus protocol=tcp dst-port=60411 action=drop comment=" Connection.100, Connection.130"
add chain=virus protocol=tcp dst-port=60412 action=drop comment=" Connection.130"
add chain=virus protocol=tcp dst-port=60552 action=drop comment=" RoxRat.100"
add chain=virus protocol=tcp dst-port=63536 action=drop comment=" InsaneNetwork.500"
add chain=virus protocol=tcp dst-port=63878 action=drop comment=" AphexFTP.100"
add chain=virus protocol=tcp dst-port=63879 action=drop comment=" AphexFTP.100"
add chain=virus protocol=tcp dst-port=64969 action=drop comment=" Lithium.100"
add chain=virus protocol=tcp dst-port=65000 action=drop comment=" Socket.100"
add chain=virus protocol=udp dst-port=1 action=drop comment=" SocketsDeTroie.250"
add chain=virus protocol=udp dst-port=666 action=drop comment=" Bla.200, Bla.400, Bla.503, Noknok.820"
add chain=virus protocol=udp dst-port=1130 action=drop comment=" Noknok.800, Noknok.820"
add chain=virus protocol=udp dst-port=2140 action=drop comment=" DeepThroat.100, DeepThroat.200, DeepThroat.310"
add chain=virus protocol=udp dst-port=2989 action=drop comment=" Rat.200"
add chain=virus protocol=udp dst-port=3128 action=drop comment=" MastersParadise.970"
add chain=virus protocol=udp dst-port=3129 action=drop comment=" MastersParadise.920, MastersParadise.970"
add chain=virus protocol=udp dst-port=3150 action=drop comment=" DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110"
add chain=virus protocol=udp dst-port=3333 action=drop comment=" Daodan.123"
add chain=virus protocol=udp dst-port=3800 action=drop comment=" Eclypse.100"
add chain=virus protocol=udp dst-port=3996 action=drop comment=" RemoteAnything.364"
add chain=virus protocol=udp dst-port=4000 action=drop comment=" RemoteAnything.364"
add chain=virus protocol=udp dst-port=5555 action=drop comment=" Daodan.123"
add chain=virus protocol=udp dst-port=5881 action=drop comment=" Y3KRat.110, Y3KRat.140"
add chain=virus protocol=udp dst-port=5882 action=drop comment=" Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150"
add chain=virus protocol=udp dst-port=5883 action=drop comment=" Y3KRat.110, Y3KRat.140"
add chain=virus protocol=udp dst-port=5884 action=drop comment=" Y3KRat.140, Y3KRat.150"
add chain=virus protocol=udp dst-port=5885 action=drop comment=" Y3KRat.110, Y3KRat.120, Y3KRat.140"
add chain=virus protocol=udp dst-port=5886 action=drop comment=" Y3KRat.120, Y3KRat.140"
add chain=virus protocol=udp dst-port=5887 action=drop comment=" Y3KRat.110, Y3KRat.120, Y3KRat.140"
add chain=virus protocol=udp dst-port=5888 action=drop comment=" Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150"
add chain=virus protocol=udp dst-port=6953 action=drop comment=" Lithium.100"
add chain=virus protocol=udp dst-port=8012 action=drop comment=" Ptakks.217"
add chain=virus protocol=udp dst-port=10067 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=udp dst-port=10167 action=drop comment=" PortalOfDoom.100"
add chain=virus protocol=udp dst-port=10666 action=drop comment=" Ambush.100"
add chain=virus protocol=udp dst-port=11225 action=drop comment=" Cyn.100, Cyn.103, Cyn.120"
add chain=virus protocol=udp dst-port=11306 action=drop comment=" Noknok.800, Noknok.820"
add chain=virus protocol=udp dst-port=12389 action=drop comment=" KheSanh.210"
add chain=virus protocol=udp dst-port=12623 action=drop comment=" Buttman.090, Buttman.100"
add chain=virus protocol=udp dst-port=12625 action=drop comment=" Buttman.100"
add chain=virus protocol=udp dst-port=14100 action=drop comment=" Eurosol.100"
add chain=virus protocol=udp dst-port=23476 action=drop comment=" DonaldDick.155"
add chain=virus protocol=udp dst-port=26274 action=drop comment=" Delta.050"
add chain=virus protocol=udp dst-port=27184 action=drop comment=" Alvgus.100"
add chain=virus protocol=udp dst-port=28431-28436 action=drop comment=" Hack'a'Tack.2000"
add chain=virus protocol=udp dst-port=29891 action=drop comment=" Unexplained.100"
add chain=virus protocol=udp dst-port=30103 action=drop comment=" NetSphere.131"
add chain=virus protocol=udp dst-port=31320 action=drop comment=" LittleWitch.400, LittleWitch.420"
add chain=virus protocol=udp dst-port=31337 action=drop comment=" BackOrifice.120, OPC.200"
add chain=virus protocol=udp dst-port=31416 action=drop comment=" Lithium.100, Lithium.101"
add chain=virus protocol=udp dst-port=31789 action=drop comment=" Hack'a'Tack.100, Hack'a'Tack.112"
add chain=virus protocol=udp dst-port=31791 action=drop comment=" Hack'a'Tack.100, Hack'a'Tack.112"
add chain=virus protocol=udp dst-port=33333 action=drop comment=" Blackharaz.100"
add chain=virus protocol=udp dst-port=47262 action=drop comment=" Delta.050"
add chain=virus protocol=udp dst-port=49683 action=drop comment=" HolzPferd.210"
add chain=virus protocol=udp dst-port=60000 action=drop comment=" MiniBacklash.100"

Selasa, 24 April 2012

EVicam

EVicam





Fungsinya untuk menggerakkan pointer mouse menggunakan kedua mata kita,dgn syarat PC/laptop tsb harus terpasang webcam.

download

fail over mikrotik


/ip address add address=192.168.1.2/30 interface=ether1
/ip address add address=192.168.2.2/30 interface=ether2
/ip address add address=192.168.100.1/24 interface=ether3
/ip address add address=192.168.101.1/24 interface=wlan1
/ip firewall mangle add chain=prerouting src-address=192.168.100.0/24 action=mark-routing new-routingmark=SUBNET1-RM
/ip firewall mangle add chain=prerouting src-address=192.168.101.0/24 action=mark-routing new-routingmark=SUBNET1-RM
/ip route add gateway=192.168.1.1,192.168.2.1,192.168.2.1
/ip route add gateway=192.168.1.1 routing-mark=SUBNET1-RM check-gateway=ping
/ip route add gateway=192.168.2.1

Minggu, 22 April 2012

Rufus








Rufus adalah program mini untuk memformat dan membuat flash drive USB bootable, semisal USB flash/pendrive, memory stick, dll. Rufus bahkan bisa secara khusus digunakan misalnya ketika:

- Agan pengen buat media instalasi USB dari file ISO bootable (Windows, Linux, dll)
- Belum ada OS yg sdh diinstal.
- Agan pengen flash BIOS atau firmware lainnya dari dlm DOS.
- Agan pengen format 'Low-Level' USB agan.

Selain ukurannya yg sangat kecil, proses kerja Rufus utk membuat instalasi USB Windows 7 juga sgt cepat! Bahkan 2x lebih cepat daripada tool UNetBootin, Universal USB Installer atau bahkan Windows 7 USB download tool. Rufus juga lebih cepat dlm membuatkan USB Linux bootable dari file ISO-nya. Perbandingannya bisa diliat dibawah.

Dan, sekali USB drive agan diformat dgn Rufus, USB drive tsb tetap mash bisa dipakai utk transfer data agan lainnya; jadi tdk cuma dikhususkan utk instalasi DOS atau ISO saja.