Conectar-se

Esqueci minha senha

lateral
Estatísticas
Temos 31060 usuários registrados
O último usuário registrado atende pelo nome de jajasoad

Os nossos membros postaram um total de 38010 mensagens em 5736 assuntos

regras firewall filter

Ir em baixo

regras firewall filter

Mensagem por carloscesar14 em Qua 5 Dez - 20:50

/ ip firewall filter
add chain=input protocol=tcp dst-port=1863 action=accept comment="Melhorias No MSN" disabled=no
add chain=input protocol=tcp src-port=1863 action=accept comment="" disabled=no
add chain=input protocol=tcp dst-port=443 action=accept comment="" disabled=no
add chain=forward protocol=tcp dst-port=443 action=accept comment="" disabled=no
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment="Bloqueio - For a Bruta FTP"
disabled=no
add chain=output protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m action=accept comment="" \
disabled=no
add chain=output protocol=tcp content="530 Login incorrect" action=add-dst-to-address-list address-list=ftp_blacklist \
address-list-timeout=3h comment="" disabled=no
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop comment="Bloqueio - Brute Force SSH"
disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage3 action=add-src-to-address-list
address-list=ssh_blacklist address-list-timeout=1w3d comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage2 action=add-src-to-address-list
address-list=ssh_stage3 address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage1 action=add-src-to-address-list
address-list=ssh_stage2 address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new action=add-src-to-address-list address-list=ssh_stage1 \
address-list-timeout=1m comment="" disabled=no
add chain=forward protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop comment="Bloqueio - Brute Force SS
Downstream" disabled=no
add chain=forward content=dsl.brasiltelecom.net action=drop comment="BLOQUEIO DE DNS REVERSO" disabled=no
add chain=input src-address=10.5.50.1 packet-mark=superproxy action=drop comment="EXTERNAL PROXY BLOCK" disabled=no
add chain=forward protocol=tcp connection-state=invalid action=drop comment="Block Connecoes Invalidas" disabled=no
add chain=forward connection-state=established action=accept comment="Permitir Connecoes Estabilizada" disabled=no
add chain=forward connection-state=related action=accept comment="Permitir Connecoes Relatada" disabled=no
add chain=input protocol=tcp dst-port=8291 action=add-src-to-address-list address-list=AcessoMK address-list-timeout=0s
comment="Captura IP Remoto - Winbox" disabled=no
add chain=forward protocol=icmp action=jump jump-target=icmp comment="Loop nas regras de ICMP" disabled=no
add chain=icmp protocol=icmp icmp-options=0:0 action=accept comment="Block conex es invalido" disabled=no
add chain=icmp protocol=icmp icmp-options=3:0 action=accept comment="permitem liga oes estabelecer" disabled=no
add chain=icmp protocol=icmp icmp-options=3:1 action=accept comment="permitir conexoes ja estabelecidas" disabled=no
add chain=icmp protocol=icmp icmp-options=4:0 action=accept comment="permitir fonte tampera" disabled=no
add chain=icmp protocol=icmp icmp-options=8:0 action=accept comment="Permitir Echo Pedido" disabled=no
add chain=icmp protocol=icmp icmp-options=11:0 action=accept comment="permitir tempo ultrapassar" disabled=no
add chain=icmp protocol=icmp icmp-options=12:0 action=accept comment="permitir parametro ruim" disabled=no
add chain=icmp action=drop comment="negar todos os outros tipos" disabled=no
add chain=input protocol=tcp connection-limit=10,32 src-address-list=ddos_blacklist action=drop comment="Suppress DoS \
Attack from 1 IP" disabled=no
add chain=input protocol=tcp connection-limit=10,32 action=add-src-to-address-list address-list=ddos_blackList \
address-list-timeout=1d comment="detect DoS attack 1 IP" disabled=no
add chain=input protocol=udp action=accept comment="Aceita Protocolo UDP" disabled=no
add chain=input protocol=icmp limit=50/5s,2 action=accept comment="Aceita Ping Limitados" disabled=no
add chain=input protocol=icmp action=log log-prefix="Drop_Ping_Exessivos" comment="Log Drop Ping Exessivos" disabled=no
add chain=input protocol=icmp action=drop comment="Bloqueia Ping Exessivos" disabled=no
add chain=input protocol=tcp dst-port=22 action=accept comment="Permite Acesso SSH" disabled=no
add chain=input protocol=tcp dst-port=8291 action=accept comment="Aceita Conexao Winbox" disabled=no
add chain=forward src-address=0.0.0.0/8 action=drop comment="BLOCK DE IPS CHAMADO"BOGONS"" disabled=no
add chain=forward dst-address=0.0.0.0/8 action=drop comment="" disabled=no
add chain=forward src-address=127.0.0.0/8 action=drop comment="" disabled=no
add chain=forward dst-address=127.0.0.0/8 action=drop comment="" disabled=no
add chain=forward src-address=224.0.0.0/3 action=drop comment="" disabled=no
add chain=forward dst-address=224.0.0.0/3 action=drop comment="" disabled=no
add chain=forward protocol=tcp tcp-flags=syn connection-limit=20,32 src-address-list=!Free_Conn action=drop \
comment="Limite de Conex es por Cliente" disabled=no
add chain=forward src-address=0.0.0.0/0 protocol=tcp src-port=0 dst-port=0 action=log log-prefix="Drop_P2P_Warez" \
comment="Log Drop P2P Warez" disabled=no
add chain=forward src-address=10.5.0.0/16 protocol=tcp src-port=0 action=drop comment="CONTROLE P2P Warez E Semelhantes"
disabled=no
add chain=forward src-address=10.5.0.0/16 protocol=tcp dst-port=0 action=drop comment="" disabled=no
add chain=forward src-address=10.5.0.0/16 protocol=udp src-port=0 action=drop comment="" disabled=no
add chain=forward src-address=10.5.0.0/16 protocol=udp dst-port=0 action=drop comment="" disabled=no
add chain=forward src-address=10.5.0.0/16 p2p=warez action=drop comment="" disabled=no
add chain=forward protocol=tcp dst-port=25 connection-limit=30,32 limit=50,5 action=add-src-to-address-list \
address-list=spammer address-list-timeout=1d comment="Detect and add-list SMTP virus or spammers" disabled=no
add chain=forward protocol=tcp dst-port=25 src-address-list=spammer action=drop comment="Bloqueia Spammers e Usuarios \
Infectados" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=winmx connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="Filtro de P2P" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=warez connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp connection-mark=P2P-Conexao p2p=bit-torrent connection-limit=5,32 limit=1,3 \
connection-state=new src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=edonkey connection-limit=10,32 limit=1,3 connection-state=new
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=gnutella connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=fasttrack connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=fasttrack connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=direct-connect connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward protocol=tcp packet-mark=P2P-Pacotes p2p=blubster connection-limit=10,32 limit=1,3 \
src-address-list=!Free_Conn_P2P action=drop comment="" disabled=no
add chain=forward action=jump jump-target=virus comment="Jump to the Virus Chaim" disabled=no
add chain=input action=jump jump-target=virus comment="Jump to the Virus Chaim" disabled=no
add chain=virus protocol=tcp dst-port=31 action=drop comment="Virus - Agent 31" disabled=no
add chain=virus protocol=tcp dst-port=41 action=drop comment="Deep Throat" disabled=no
add chain=virus protocol=tcp dst-port=48 action=drop comment="Drat" disabled=no
add chain=virus protocol=tcp dst-port=50 action=drop comment="Drat" disabled=no
add chain=virus protocol=tcp dst-port=79 action=drop comment="Fire Hotcker" disabled=no
add chain=virus protocol=tcp dst-port=99 action=drop comment="Hidden Port" disabled=no
add chain=virus protocol=tcp dst-port=100 action=drop comment="Der Spacher 3" disabled=no
add chain=virus protocol=tcp dst-port=113 action=drop comment="Kazimas" disabled=no
add chain=virus protocol=tcp dst-port=119 action=drop comment="Happy 99" disabled=no
add chain=virus protocol=tcp dst-port=121 action=drop comment="Jammer Killah" disabled=no
add chain=virus protocol=tcp dst-port=123 action=drop comment="Net Controler" disabled=no
add chain=virus protocol=tcp dst-port=135 action=drop comment="Win Nuke" disabled=no
add chain=virus protocol=udp dst-port=137-139 action=drop comment="NetBios Name / NetBios Datagram / Session / Drop \
Blaster Worm" disabled=no
add chain=virus protocol=tcp dst-port=137-139 action=drop comment="NetBios Name / NetBios Datagram / Session / Drop \
Blaster Worm" disabled=no
add chain=virus protocol=tcp dst-port=146 action=drop comment="Infector" disabled=no
add chain=virus protocol=udp dst-port=146 action=drop comment="Infector" disabled=no
add chain=virus protocol=tcp dst-port=421 action=drop comment="TCP Wrappers" disabled=no
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm" disabled=no
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm" disabled=no
add chain=virus protocol=tcp dst-port=531 action=drop comment="Rasmim" disabled=no
add chain=virus protocol=tcp dst-port=555 action=drop comment="Ini-Killer" disabled=no
add chain=virus protocol=tcp dst-port=456 action=drop comment="Hackers Paradise" disabled=no
add chain=virus protocol=tcp dst-port=593 action=drop comment="" disabled=no
add chain=virus protocol=tcp dst-port=605 action=drop comment="Secret Service" disabled=no
add chain=virus protocol=tcp dst-port=666 action=drop comment="Cain e Abel" disabled=no
add chain=virus protocol=tcp dst-port=777 action=drop comment="Virus - AIM Spy" disabled=no
add chain=virus protocol=tcp dst-port=911 action=drop comment="Dark Shadow" disabled=no
add chain=virus protocol=tcp dst-port=999 action=drop comment="Deep Throat / Win Satan" disabled=no
add chain=virus protocol=tcp dst-port=1001 action=drop comment="SK Silencer / Web Ex" disabled=no
add chain=virus protocol=tcp dst-port=1015 action=drop comment="Doly Trojan" disabled=no
add chain=virus protocol=tcp dst-port=1020 action=drop comment="Vampire" disabled=no
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="NetSpy / Psyber Stream Server" disabled=no
add chain=virus protocol=tcp dst-port=1033 action=drop comment="NetSpy" disabled=no
add chain=virus protocol=tcp dst-port=1042 action=drop comment="Virus - BLA" disabled=no
add chain=virus protocol=tcp dst-port=1245 action=drop comment="Voodoo Doll" disabled=no
add chain=virus protocol=tcp dst-port=1045 action=drop comment="Rasmim" disabled=no
add chain=virus protocol=tcp dst-port=1050 action=drop comment="Mini Command" disabled=no
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop Mydoom" disabled=no
add chain=virus protocol=tcp dst-port=1082 action=drop comment="Win Hole" disabled=no
add chain=virus protocol=tcp dst-port=1090 action=drop comment="Xtreme" disabled=no
add chain=virus protocol=tcp dst-port=1097-1099 action=drop comment="Rat" disabled=no
add chain=virus protocol=tcp dst-port=1170 action=drop comment="Streaming Audio Trojan / Psyber Stream Server / Voice" \
disabled=no
add chain=virus protocol=udp dst-port=1200-1201 action=drop comment="Softwar" disabled=no
add chain=virus protocol=tcp dst-port=1207 action=drop comment="Softwar" disabled=no
add chain=virus protocol=tcp dst-port=1214 action=drop comment="" disabled=no
add chain=virus protocol=tcp dst-port=1234 action=drop comment="Ultors Trojan" disabled=no
add chain=virus protocol=tcp dst-port=1243 action=drop comment="Virus - BackDoor-G / SubSeven / SubSeven Apocalypse" \
disabled=no
add chain=virus protocol=tcp dst-port=1269 action=drop comment="Mavericks Matrix" disabled=no
add chain=virus protocol=tcp dst-port=1313 action=drop comment="Net Trojan" disabled=no
add chain=virus protocol=tcp dst-port=1349 action=drop comment="Virus - Orifice DLL" disabled=no
add chain=virus protocol=udp dst-port=1349 action=drop comment="Virus - Orifice DLL" disabled=no
add chain=virus protocol=tcp dst-port=1363 action=drop comment="Ndm Requester" disabled=no
add chain=virus protocol=tcp dst-port=1364 action=drop comment="Ndm Server" disabled=no
add chain=virus protocol=tcp dst-port=1368 action=drop comment="Screen Cast" disabled=no
add chain=virus protocol=tcp dst-port=1373 action=drop comment="Hromgrafx" disabled=no
add chain=virus protocol=tcp dst-port=1377 action=drop comment="Cichlid" disabled=no
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" disabled=no
add chain=virus protocol=tcp dst-port=1492 action=drop comment="FTP 99CMP" disabled=no
add chain=virus protocol=tcp dst-port=1509 action=drop comment="Psyber Stream Server" disabled=no
add chain=virus protocol=tcp dst-port=1600 action=drop comment="Sivka Burka" disabled=no
add chain=virus protocol=tcp dst-port=1807 action=drop comment="Spy Sender" disabled=no
add chain=virus protocol=tcp dst-port=1981 action=drop comment="ShockRave" disabled=no
add chain=virus protocol=tcp dst-port=1999 action=drop comment="Virus - BackDoor" disabled=no
add chain=virus protocol=tcp dst-port=2001 action=drop comment="The Trojan Cow" disabled=no
add chain=virus protocol=tcp dst-port=2023 action=drop comment="Hackcity Riper Pro" disabled=no
add chain=virus protocol=tcp dst-port=2115 action=drop comment="Bugs" disabled=no
add chain=virus protocol=tcp dst-port=2140 action=drop comment="The Invasor / Deep Throat" disabled=no
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.y / HVL Rat5" disabled=no
add chain=virus protocol=tcp dst-port=2300 action=drop comment="Xplorer" disabled=no
add chain=virus protocol=tcp dst-port=2345 action=drop comment="Evil FTP" disabled=no
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" disabled=no
add chain=virus protocol=tcp dst-port=2565 action=drop comment="Striker" disabled=no
add chain=virus protocol=tcp dst-port=2583 action=drop comment="Win Crash" disabled=no
add chain=virus protocol=tcp dst-port=2600 action=drop comment="Digital Rootbeer" disabled=no
add chain=virus protocol=tcp dst-port=2716 action=drop comment="The Prayer" disabled=no
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.c-K / Bagle Virus" disabled=no
add chain=virus protocol=tcp dst-port=2773 action=drop comment="SubSeven" disabled=no
add chain=virus protocol=tcp dst-port=2801 action=drop comment="Phineas Phucker" disabled=no
add chain=virus protocol=tcp dst-port=2989 action=drop comment="Rat" disabled=no
add chain=virus protocol=tcp dst-port=3024 action=drop comment="Win Crash" disabled=no
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom" disabled=no
add chain=virus protocol=tcp dst-port=3150 action=drop comment="Deep Throat / The Invasor" disabled=no
add chain=virus protocol=tcp dst-port=3332 action=drop comment="Virus - BackDoor-QO" disabled=no
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop BackDoor OptixPro" disabled=no
add chain=virus protocol=tcp dst-port=3456 action=drop comment="Terror Trojan" disabled=no
add chain=virus protocol=tcp dst-port=3700 action=drop comment="Portal of Doom" disabled=no
add chain=virus protocol=udp dst-port=3801 action=drop comment="Eclypse" disabled=no
add chain=virus protocol=tcp dst-port=4000 action=drop comment="Psyber Stream Server / Voice" disabled=no
add chain=virus protocol=tcp dst-port=4092 action=drop comment="Win Crash" disabled=no
add chain=virus protocol=tcp dst-port=4242 action=drop comment="Virtual Hacking Machine" disabled=no
add chain=virus protocol=tcp dst-port=4321 action=drop comment="Virus - Bobo" disabled=no
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" disabled=no
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" disabled=no
add chain=virus protocol=tcp dst-port=4567 action=drop comment="File Nail" disabled=no
add chain=virus protocol=tcp dst-port=4590 action=drop comment="ICQ Trojan" disabled=no
add chain=virus protocol=tcp dst-port=5000-5001 action=drop comment="Virus - Sockets de Troie / Bubbel / Back Door Setup
disabled=no
add chain=virus protocol=tcp dst-port=5031 action=drop comment="Net Metropolian" disabled=no
add chain=virus protocol=tcp dst-port=5321 action=drop comment="Fire Hotcker" disabled=no
add chain=virus protocol=tcp dst-port=5400 action=drop comment="Virus - Blade Runner" disabled=no
add chain=virus protocol=tcp dst-port=5401 action=drop comment="Virus - Back Construction" disabled=no
add chain=virus protocol=tcp dst-port=5402 action=drop comment="Virus - Blade Runner" disabled=no
add chain=virus protocol=tcp dst-port=5512 action=drop comment="Illusion Mailer" disabled=no
add chain=virus protocol=tcp dst-port=5550 action=drop comment="XTCP" disabled=no
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" disabled=no
add chain=virus protocol=tcp dst-port=5555 action=drop comment="Serveme" disabled=no
add chain=virus protocol=tcp dst-port=5569 action=drop comment="Robo Hack" disabled=no
add chain=virus protocol=tcp dst-port=5714 action=drop comment="Win Crash" disabled=no
add chain=virus protocol=tcp dst-port=5741-5742 action=drop comment="Win Crash" disabled=no
add chain=virus protocol=tcp dst-port=6000 action=drop comment="The Thing" disabled=yes
add chain=virus protocol=tcp dst-port=6272 action=drop comment="Secret Service" disabled=no
add chain=virus protocol=tcp dst-port=6400 action=drop comment="The Thing" disabled=no
add chain=virus protocol=tcp dst-port=6667 action=drop comment="Scheduler Agent" disabled=no
add chain=virus protocol=tcp dst-port=6669 action=drop comment="Host Control" disabled=no
add chain=virus protocol=tcp dst-port=6670 action=drop comment="Deep Throat v2" disabled=no
add chain=virus protocol=tcp dst-port=6674 action=drop comment="Deep Throat v3" disabled=no
add chain=virus protocol=tcp dst-port=6669 action=drop comment="Vampire" disabled=no
add chain=virus protocol=tcp dst-port=6711-6713 action=drop comment="Virus - Deep Throat v2 / SubSeven" disabled=no
add chain=virus protocol=tcp dst-port=6767 action=drop comment="SubSeven" disabled=no
add chain=virus protocol=tcp dst-port=6771 action=drop comment="Deep Throat" disabled=no
add chain=virus protocol=tcp dst-port=6776 action=drop comment="Virus - 2000 Cracks" disabled=no
add chain=virus protocol=tcp dst-port=6912 action=drop comment="Shit Heep" disabled=no
add chain=virus protocol=tcp dst-port=6939 action=drop comment="Indoctrination" disabled=no
add chain=virus protocol=tcp dst-port=6969-6970 action=drop comment="Gate Crasher" disabled=no
add chain=virus protocol=tcp dst-port=7000 action=drop comment="Virus - SubSeven / Remote Grab / Kazimas" disabled=no
add chain=virus protocol=tcp dst-port=7300-7301 action=drop comment="Net Monitor" disabled=no
add chain=virus protocol=tcp dst-port=7306-7308 action=drop comment="Net Monitor" disabled=no
add chain=virus protocol=tcp dst-port=7789 action=drop comment="Virus - Back Door Setup" disabled=no
add chain=virus protocol=tcp dst-port=8787 action=drop comment="Virus - Back Orifice 2000" disabled=no
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" disabled=no
add chain=virus protocol=tcp dst-port=8897 action=drop comment="Hack Office" disabled=no
add chain=virus protocol=tcp dst-port=8989 action=drop comment="RCon" disabled=no
add chain=virus protocol=tcp dst-port=9400 action=drop comment="Incommand" disabled=no
add chain=virus protocol=tcp dst-port=9872-9875 action=drop comment="Portal of Doom" disabled=no
add chain=virus protocol=tcp dst-port=9876 action=drop comment="Cyber Attacker" disabled=no
add chain=virus protocol=tcp dst-port=9878 action=drop comment="Trans Scout" disabled=no
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B" disabled=no
add chain=virus protocol=tcp dst-port=9989 action=drop comment="Ini-Killer" disabled=no
add chain=virus protocol=tcp dst-port=9999 action=drop comment="The Prayer" disabled=no
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Damuru.Y" disabled=no
add chain=virus protocol=udp dst-port=10067 action=drop comment="Drop MyDoom.B" disabled=no
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B" disabled=no
add chain=virus protocol=tcp dst-port=10086 action=drop comment="Spy Phillis" disabled=no
add chain=virus protocol=tcp dst-port=10101 action=drop comment="Virus - BrainSpy" disabled=no
add chain=virus protocol=udp dst-port=10167 action=drop comment="Virus - BrainSpy" disabled=no
add chain=virus protocol=tcp dst-port=10250 action=drop comment="Virus - Acid Shivers" disabled=no
add chain=virus protocol=tcp dst-port=10425 action=drop comment="Virus - BackDoor-QE" disabled=no
add chain=virus protocol=tcp dst-port=10607 action=drop comment="Coma" disabled=no
add chain=virus protocol=udp dst-port=10666 action=drop comment="Virus - Ambush" disabled=no
add chain=virus protocol=tcp dst-port=10666 action=drop comment="Virus - Ambush" disabled=no
add chain=virus protocol=tcp dst-port=11000 action=drop comment="Spy FTP Server" disabled=no
add chain=virus protocol=tcp dst-port=11050 action=drop comment="Host Control" disabled=no
add chain=virus protocol=tcp dst-port=11223 action=drop comment="Secret Agent" disabled=no
add chain=virus protocol=tcp dst-port=12076 action=drop comment="GJamer" disabled=no
add chain=virus protocol=tcp dst-port=12223 action=drop comment="Progenic" disabled=no
add chain=virus protocol=tcp dst-port=12345-12346 action=drop comment="Virus - Gaban Bus / Drop NetBus" disabled=no
add chain=virus protocol=tcp dst-port=12349 action=drop comment="Virus - Bionet" disabled=no
add chain=virus protocol=tcp dst-port=12361-12362 action=drop comment="Wack-A-Mole" disabled=no
add chain=virus protocol=udp dst-port=12623 action=drop comment="Dun Control" disabled=no
add chain=virus protocol=tcp dst-port=12631 action=drop comment="Whack Job" disabled=no
add chain=virus protocol=tcp dst-port=12973 action=drop comment="Virus - BackDoor-QR" disabled=no
add chain=virus protocol=tcp dst-port=12975 action=drop comment="Virus - BackDoor-QR" disabled=no
add chain=virus protocol=tcp dst-port=13000 action=drop comment="Senna Spy FTP Server" disabled=yes
add chain=virus protocol=tcp dst-port=16484 action=drop comment="Mosucker" disabled=no
add chain=virus protocol=tcp dst-port=16969 action=drop comment="Priority" disabled=no
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" disabled=no
add chain=virus protocol=tcp dst-port=17777 action=drop comment="Nephron" disabled=no
add chain=virus protocol=tcp dst-port=1999-2005 action=drop comment="Trans Scout" disabled=no
add chain=virus protocol=tcp dst-port=20034 action=drop comment="Netbus Pro" disabled=no
add chain=virus protocol=tcp dst-port=20203 action=drop comment="Chupacabra" disabled=no
add chain=virus protocol=tcp dst-port=20331 action=drop comment="Virus - BLA" disabled=no
add chain=virus protocol=tcp dst-port=21554 action=drop comment="Virus - Girl Friend / Schwindler" disabled=no
add chain=virus protocol=tcp dst-port=22222 action=drop comment="Prosiak" disabled=no
add chain=virus protocol=tcp dst-port=23456 action=drop comment="Virus - Ugly FTP / Whack Job" disabled=no
add chain=virus protocol=tcp dst-port=23476-23477 action=drop comment="Donald Dick" disabled=no
add chain=virus protocol=tcp dst-port=26274 action=drop comment="Delta Source" disabled=no
add chain=virus protocol=udp dst-port=26274 action=drop comment="Delta Source" disabled=no
add chain=virus protocol=tcp dst-port=27374 action=drop comment="SubSeven" disabled=no
add chain=virus protocol=tcp dst-port=27573 action=drop comment="SubSeven" disabled=no
add chain=virus protocol=udp dst-port=29891 action=drop comment="The Unexplainded" disabled=no
add chain=virus protocol=tcp dst-port=30029 action=drop comment="Virus - AOL Trojan" disabled=no
add chain=virus protocol=tcp dst-port=30100-30103 action=drop comment="Net Sphere" disabled=no
add chain=virus protocol=tcp dst-port=30303 action=drop comment="Socket25" disabled=no
add chain=virus protocol=tcp dst-port=30999 action=drop comment="Kuang2" disabled=no
add chain=virus protocol=tcp dst-port=31336 action=drop comment="Virus - Bo Wack" disabled=no
add chain=virus protocol=tcp dst-port=31337 action=drop comment="Virus - BackFire" disabled=no
add chain=virus protocol=udp dst-port=31337 action=drop comment="Virus - BackFire" disabled=no
add chain=virus protocol=tcp dst-port=31338-31339 action=drop comment="NetSpy" disabled=no
add chain=virus protocol=tcp dst-port=31780 action=drop comment="Hack A Tack" disabled=no
add chain=virus protocol=tcp dst-port=31785 action=drop comment="Hack A Tack" disabled=no
add chain=virus protocol=tcp dst-port=31787-31789 action=drop comment="Hack A Tack" disabled=no
add chain=virus protocol=udp dst-port=31791-31792 action=drop comment="Hack A Tack" disabled=no
add chain=virus protocol=udp dst-port=31792 action=drop comment="Hack A Tack" disabled=no
add chain=virus protocol=tcp dst-port=32418 action=drop comment="Virus - Acid Battery" disabled=no
add chain=virus protocol=tcp dst-port=33333 action=drop comment="Prosiak" disabled=no
add chain=virus protocol=tcp dst-port=33911 action=drop comment="Spirint 2001A" disabled=no
add chain=virus protocol=tcp dst-port=34324 action=drop comment="Tiny Telnet Server" disabled=no
add chain=input protocol=icmp icmp-options=8:0 limit=1,5 action=accept comment="DOS ATTACK" disabled=no
add chain=forward protocol=icmp icmp-options=8:0 limit=1,5 action=accept comment="" disabled=no
add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list=pscanners address-list-timeout=2w
comment="Criar Lista Para Scanner de Portas" disabled=no
add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=pscanner
address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list address-list=pscanners \
address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list=pscanners \
address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!ack action=add-src-to-address-list address-list=pscanners \
address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list=pscanners \
address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=pscanne
address-list-timeout=2w comment="" disabled=no
add chain=input src-address-list=pscanners action=drop comment="Block Todos que estiver na Lista Scanner de Portas" \
disabled=no
add chain=input src-address=10.5.0.0/16 protocol=udp dst-port=0-65535 limit=1,5 dst-limit=1,5,dst-address/1m40s \
action=accept comment="Bloqueio Wintraff" disabled=no
add chain=input in-interface=saida action=accept comment="" disabled=no
add chain=input in-interface=!saida src-address=10.5.0.0/16 action=accept comment="" disabled=no
add chain=input in-interface=saida src-address=!10.5.0.0/16 protocol=tcp dst-port=8080 action=add-src-to-address-list \
address-list=Acesso_Proxy_Interno_placa-out address-list-timeout=1d comment="" disabled=no

carloscesar14
Baby
Baby

Mensagens : 9
Pontos : 15
Reputação : 0
Data de inscrição : 04/08/2011
Idade : 42
Localização Localização : recife

Voltar ao Topo Ir em baixo

Re: regras firewall filter

Mensagem por ZBTECK em Qua 5 Dez - 21:15

Qual RB ideal para aplicar estas regras todas?

__________________________________________________
Contato Skype zbteck_ltda

ZBTECK
Power User
Power User

Mensagens : 930
Pontos : 1117
Reputação : 186
Data de inscrição : 11/04/2011
Idade : 30
Localização Localização : São Paulo

Voltar ao Topo Ir em baixo

Re: regras firewall filter

Mensagem por carloscesar14 em Qui 6 Dez - 10:36

QUALQUER RB OU MIKROTIK QUE NAO TENHA CHECKER FULL

carloscesar14
Baby
Baby

Mensagens : 9
Pontos : 15
Reputação : 0
Data de inscrição : 04/08/2011
Idade : 42
Localização Localização : recife

Voltar ao Topo Ir em baixo

Re: regras firewall filter

Mensagem por sdfaria em Qui 6 Dez - 15:17

carloscesar14 escreveu:QUALQUER RB OU MIKROTIK QUE NAO TENHA CHECKER FULL



bom pode ate pode, mas o nível do processamento vai ficar la em cima... o que vai fazer ficar ruim as conf. mas caso seja poucas pessoas utilizando não da problema não.


e tenham sempre uma coisa na cabeça, não copie as regras e cole simplesmente, leia e verifique as suas necessidades para tais.


avatar
sdfaria
Advance user
Advance user

Mensagens : 219
Pontos : 260
Reputação : 40
Data de inscrição : 05/10/2011
Idade : 33
Localização Localização : Maricá

http://mkrouter.blogspot.com/

Voltar ao Topo Ir em baixo

Voltar ao Topo


 
Permissão deste fórum:
Você não pode responder aos tópicos neste fórum