Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Simple and Powerfull Firewall Filter Mikrotik
- ether1=ip public/internet
- ether2=ip local/network /lan
- ===========================================================
- /ip firewall filter
- add action=drop chain=input comment=”Drop Invalid connections” connection-state=invalid disabled=no
- add action=accept chain=input comment=”Allow UDP” disabled=no protocol=udp
- add action=accept chain=input comment=”Allow Established connections” connection-state=established disabled=no
- add action=drop chain=forward connection-state=invalid disabled=no protocol=tcp
- add action=accept chain=input comment=”Allow ICMP” disabled=no protocol=icmp
- add action=accept chain=forward connection-state=established disabled=no
- add action=accept chain=input disabled=no in-interface=ether2 src-address=192.168.1.0/24
- add action=accept chain=forward comment=”allow related connections” connection-state=related disabled=no
- add action=drop chain=forward disabled=no src-address=0.0.0.0/8
- add action=drop chain=forward disabled=no dst-address=0.0.0.0/8
- add action=drop chain=forward disabled=no src-address=127.0.0.0/8
- add action=drop chain=forward disabled=no dst-address=127.0.0.0/8
- add action=drop chain=forward disabled=no src-address=224.0.0.0/3
- add action=drop chain=forward disabled=no dst-address=224.0.0.0/3
- add action=jump chain=forward disabled=no jump-target=tcp protocol=tcp
- add action=jump chain=forward disabled=no jump-target=udp protocol=udp
- add action=jump chain=forward disabled=no jump-target=icmp protocol=icmp
- add action=drop chain=tcp comment=”deny TFTP” disabled=no dst-port=69 protocol=tcp
- add action=drop chain=tcp comment=”deny RPC portmapper” disabled=no dst-port=111 protocol=tcp
- add action=drop chain=tcp comment=”deny RPC portmapper” disabled=no dst-port=135 protocol=tcp
- add action=reject chain=tcp comment=”deny NBT” disabled=no dst-port=137-139 protocol=tcp reject-with=icmp-network-unreachable
- add action=reject chain=tcp comment=”deny cifs” disabled=no dst-port=445 protocol=tcp reject-with=icmp-network-unreachable
- add action=drop chain=tcp comment=”deny NFS” disabled=no dst-port=2049 protocol=tcp
- add action=drop chain=tcp comment=”deny NetBus” disabled=no dst-port=12345-12346 protocol=tcp
- add action=drop chain=tcp comment=”deny NetBus” disabled=no dst-port=20034 protocol=tcp
- add action=drop chain=tcp comment=”deny BackOriffice” disabled=no dst-port=3133 protocol=tcp
- add action=drop chain=tcp comment=”deny DHCP” disabled=no dst-port=67-68 protocol=tcp
- add action=drop chain=udp comment=”deny TFTP” disabled=no dst-port=69 protocol=udp
- add action=drop chain=udp comment=”deny PRC portmapper” disabled=no dst-port=111 protocol=udp
- add action=drop chain=udp comment=”deny PRC portmapper” disabled=no dst-port=135 protocol=udp
- add action=drop chain=udp comment=”deny NBT” disabled=no dst-port=137-139 protocol=udp
- add action=drop chain=udp comment=”deny NFS” disabled=no dst-port=2049 protocol=udp
- add action=reject chain=forward content=whatsmyipaddress.org disabled=no reject-with=icmp-network-unreachable
- add action=drop chain=udp comment=”deny BackOriffice” disabled=no dst-port=3133 protocol=udp
- add action=accept chain=icmp comment=”drop invalid connections” disabled=no icmp-options=0:0 protocol=icmp
- add action=accept chain=icmp comment=”allow established connections” disabled=no icmp-options=3:0 protocol=icmp
- add action=accept chain=icmp comment=”allow already established connections” disabled=no icmp-options=3:1 protocol=icmp
- add action=accept chain=icmp comment=”allow source quench” disabled=no icmp-options=4:0 protocol=icmp
- add action=accept chain=icmp comment=”allow echo request” disabled=no icmp-options=8:0 protocol=icmp
- add action=accept chain=icmp comment=”allow time exceed” disabled=no icmp-options=11:0 protocol=icmp
- add action=accept chain=icmp disabled=no icmp-options=12:0 protocol=icmp
- add action=drop chain=icmp comment=”deny all other types” disabled=no
- add action=drop chain=input comment=”;;;INPUT SELAIN IP NETWORK LAN, DROP” disabled=no in-interface=ether2 src-address=!192.168.1.0/24
- add action=drop chain=forward disabled=no in-interface=ether2 src-address=!192.168.1.0/24
- add action=drop chain=forward comment=”;;;CONTOH DROP AKSES FB PER IP KLIEN” content=youtube.com disabled=no src-address=192.168.1.12
- add action=reject chain=forward comment=”CONTOH DROP VIRUS DAN AKSES ” content=.internetdownloadmanager.com disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward disabled=no p2p=all-p2p reject-with=icmp-network-unreachable
- add action=reject chain=input disabled=no p2p=all-p2p reject-with=icmp-network-unreachable
- add action=reject chain=input content=loader.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward content=loader.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=input content=svchost.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward content=www.wieistmeineip.de disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward content=dialer.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward disabled=no p2p=all-p2p reject-with=icmp-network-unreachable
- add action=reject chain=forward content=svchost.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=input content=dialer.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward content=downloader.exe disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=forward content=.downloader disabled=no reject-with=icmp-network-unreachable
- add action=reject chain=input content=whatsmyipaddress.org disabled=no reject-with=icmp-network-unreachable
- add action=drop chain=forward content=getmyip.org disabled=no
- add action=drop chain=input comment=”::::::::DROP PING ON PUBLIC :::::;” disabled=no in-interface=ether1 protocol=icmp
- add action=drop chain=forward disabled=no in-interface=ether1 protocol=icmp
- add action=drop chain=forward comment=”::::::::LIMIT PORT OUT IN ON PUBLIC INTERFACE:::::;” disabled=no dst-address=0.0.0.0/0 dst-port=!53,843,9339,5000-15000,2778,6005,2112,600-6005 out-interface=ether1 protocol=udp src-address=0.0.0.0/0
- add action=drop chain=input comment=”::::::::INPUT SELAIN PORT REMOTE IP PUBLIC, DROP:::::;” disabled=no dst-address=0.0.0.0/0 dst-port=!8291,22,10000 in-interface=ether1 protocol=tcp src-address=0.0.0.0/0
- add action=jump chain=forward comment=”Flood protect” connection-state=new disabled=no jump-target=SYN-Protect protocol=tcp tcp-flags=syn
- add action=jump chain=forward comment=”Flood protect” connection-state=new disabled=no jump-target=SYN-Protect protocol=tcp tcp-flags=syn
- add action=accept chain=SYN-Protect disabled=no protocol=tcp
- add action=jump chain=input disabled=no jump-target=icmp protocol=icmp
- add action=accept chain=icmp comment=”Limited Ping Flood” disabled=no icmp-options=0:0-255 limit=5,5 protocol=icmp
- add action=accept chain=icmp disabled=no icmp-options=3:3 limit=5,5 protocol=icmp
- add action=accept chain=icmp disabled=no icmp-options=3:4 limit=5,5 protocol=icmp
- add action=accept chain=icmp disabled=no icmp-options=8:0-255 limit=5,5 protocol=icmp
- add action=accept chain=icmp disabled=no icmp-options=11:0-255 limit=5,5 protocol=icmp
- add action=drop chain=icmp disabled=no protocol=icmp
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement