Páginas

terça-feira, 24 de novembro de 2009

Um script para Firewall no Mikrotik bem simples


/ip firewall filter

add chain=forward connection-state=established action=accept comment=";;; permite estabelecer conex es"
add chain=forward connection-state=related action=accept comment=";;; permitir conex es relacionadas"
add chain=forward connection-state=invalid action=drop comment=";;; Bloqueia conex es inv lidas"
add chain=virus protocol=tcp dst-port=135-139 action=drop comment=";;; Drop Blaster Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment=";;; Drop Messenger Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment=";;; Drop Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment=";;; Drop Blaster Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment=";;; ________"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment=";;; ________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment=";;; Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment=";;; ________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment=";;; ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment=" ;;; ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment=";;; screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment=";;; hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment=";;; cichlid"
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=";;; Worm"
add chain=virus protocol=tcp dst-port=2745 action=drop comment=";;; Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment=";;; Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment=";;; Drop Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment=";;; Drop Beagle.C-K"
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment=";;; Drop MyDoom"
add chain=virus protocol=tcp dst-port=3410 action=drop comment=";;; Drop Backdoor OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment=";;; Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment=";;; Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment=";;; Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment=";;; Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment=";;; Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment=";;; Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment=";;; Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment=";;; Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment=";;; Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment=";;; Drop PhatBot, Agobot, Gaobot"
add chain=forward action=jump jump-target=virus comment=";;; jump to the virus chain"
add chain=input protocol=icmp limit=50/5s,2 comment="aceitando 50 pings a cada 5 segundos"
add chain=input protocol=icmp action=drop comment="bloqueando o excesso"
add chain=forward protocol=tcp dst-port=80 action=accept comment=";;; Allow HTTP"
add chain=forward protocol=tcp dst-port=25 action=accept comment=";;; Allow SMTP"
add chain=forward protocol=tcp action=accept comment=";;; allow TCP"
add chain=forward protocol=icmp action=accept comment=";;; allow ping"
add chain=forward protocol=udp action=accept comment=";;; allow udp"
add chain=input action=log log-prefix="DROP INPUT" comment="Log everything else"
add chain=forward action=drop comment=";;; drop everything else"

Autor: Magnus R. Kirsten

Nenhum comentário:

Postar um comentário