Scritp:
/ip firewall filter add chain=forward protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm"
/ip firewall filter add chain=forward protocol=udp dst-port=135-139 action=drop comment="Drop Messenger Worm"
/ip firewall filter add chain=forward protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm"
/ip firewall filter add chain=forward protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm"
/ip firewall filter add chain=forward protocol=tcp dst-port=593 action=drop comment="________"
/ip firewall filter add chain=forward protocol=tcp dst-port=1024-1030 action=drop comment="________"
/ip firewall filter add chain=forward protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom"
/ip firewall filter add chain=forward protocol=tcp dst-port=1214 action=drop comment="________"
/ip firewall filter add chain=forward protocol=tcp dst-port=1363 action=drop comment="ndm requester"
/ip firewall filter add chain=forward protocol=tcp dst-port=1364 action=drop comment="ndm server"
/ip firewall filter add chain=forward protocol=tcp dst-port=1368 action=drop comment="screen cast"
/ip firewall filter add chain=forward protocol=tcp dst-port=1373 action=drop comment="hromgrafx"
/ip firewall filter add chain=forward protocol=tcp dst-port=1377 action=drop comment="cichlid"
/ip firewall filter add chain=forward protocol=tcp dst-port=1433-1434 action=drop comment="Worm"
/ip firewall filter add chain=forward protocol=tcp dst-port=2745 action=drop comment="Bagle forward"
/ip firewall filter add chain=forward protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y"
/ip firewall filter add chain=forward protocol=tcp dst-port=2535 action=drop comment="Drop Beagle"
/ip firewall filter add chain=forward protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K"
/ip firewall filter add chain=forward protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom"
/ip firewall filter add chain=forward protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro"
/ip firewall filter add chain=forward protocol=tcp dst-port=4444 action=drop comment="Worm"
/ip firewall filter add chain=forward protocol=udp dst-port=4444 action=drop comment="Worm"
/ip firewall filter add chain=forward protocol=tcp dst-port=5554 action=drop comment="Drop Sasser"
/ip firewall filter add chain=forward protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
/ip firewall filter add chain=forward protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B"
/ip firewall filter add chain=forward protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y"
/ip firewall filter add chain=forward protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B"
/ip firewall filter add chain=forward protocol=tcp dst-port=12345 action=drop comment="Drop NetBus"
/ip firewall filter add chain=forward protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2"
/ip firewall filter add chain=forward protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven"
/ip firewall filter add chain=forward protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot"
Ref: http://wiki.mikrotik.com/wiki/Protecting_your_customers
No comments:
Post a Comment