• Breaking News

    Saturday 31 December 2016

    94. Mikrotik Protect your Clients from Virus



    You can contact me: plus.google.com/+PhallaCCMT; youtube.com/phallaccmt; facebook.com/Phalla.CCMT; twitter.com/PhallaCCMT and Phalla.CCMT@gmail.com

    Scritp:

    /ip firewall filter add chain=forward protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm" 
    /ip firewall filter add chain=forward protocol=udp dst-port=135-139 action=drop comment="Drop Messenger Worm"    
    /ip firewall filter add chain=forward protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm" 
    /ip firewall filter add chain=forward protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=593 action=drop comment="________" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1024-1030 action=drop comment="________" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1214 action=drop comment="________" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1363 action=drop comment="ndm requester" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1364 action=drop comment="ndm server" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1368 action=drop comment="screen cast" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1373 action=drop comment="hromgrafx" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1377 action=drop comment="cichlid" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=1433-1434 action=drop comment="Worm" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=2745 action=drop comment="Bagle forward" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro"
    /ip firewall filter add chain=forward protocol=tcp dst-port=4444 action=drop comment="Worm" 
    /ip firewall filter add chain=forward protocol=udp dst-port=4444 action=drop comment="Worm" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven" 
    /ip firewall filter add chain=forward protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot"

    Ref: http://wiki.mikrotik.com/wiki/Protecting_your_customers

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel