Thursday, December 20, 2007

CREATE HOST DOTA

Cara create Dota di MIKROTIK udah di joba dan jalan normal :D temen 1 net juga bisa join. langsung aja, tingggal edit sesuai dengan ip kamu, trs jgn lupa sesuaikan port game nya dengan yg di taruh di mikrotik, di game setting dotanya,
naruh nya di ip >>>> firewall>>>>nat
jgn lupa ini asumsi masquarade udah jalan. klw bisa jgn copy paste gunakan winbox aja :D
;;; Inter LAN DoTA login
chain=srcnat out-interface=LAN src-address=192.168.77.0/24 dst-address=192.168.77.0/24 action=src-nat
to-addresses=117.xxx.xxx.xxxto-ports=0-65535

;;; DoTA Game
;;; box 7
chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=tcp dst-port=6007 action=dst-nat to-addresses=192.168.77.248
to-ports=6007

chain=srcnat src-address=192.168.77.248 protocol=tcp src-port=6007 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6007

chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=udp dst-port=6007 action=dst-nat to-addresses=192.168.77.248
to-ports=6007

chain=srcnat src-address=192.168.77.248 protocol=udp src-port=6007 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6007

;;; DOTA BOX 1
chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=tcp dst-port=6001 action=dst-nat to-addresses=192.168.77.254
to-ports=6001

chain=srcnat src-address=192.168.77.254 protocol=tcp src-port=6001 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6001

chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=udp dst-port=6001 action=dst-nat to-addresses=192.168.77.254
to-ports=6001

chain=srcnat src-address=192.168.77.254 protocol=udp src-port=6001 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6001

gimana mudah kan sekarang tinggal coba coba dan coba

PROXY ON MIKROTIK

# SETUP MIKROTIK (base 1)
1. setelah mikrotik terinstall dengan baik dan benar jalankan mikrotik anda
2. masukkan username & password, dalam hal ini karena masih baru maka default usernam : admin pasword : blank
3. ganti nama ethernet anda jika anda mau, dalam hal ini anda dapat memberikan nama apa saja = [kucing@mikrotik] >interface
[kucing@mikrotik] interface >print (melihat dulu berapa banyak ethernet yg terpasang)
[kucing@mikrotik] interface >set 0 name=LAN
[kucing@mikrotik] interface >set 1 name=WAN
4. kemudian nambahkan ip addressnya
[kucing@mikrotik] >ip address
[kucing@mikrotik] ip address >add address=192.168.0.1/255.255.0.0 interface=LAN ----> ini untuk ip interface lokal
[kucing@mikrotik] ip address >add address=203.90.1.1/255.255.255.240 interface=WAN ---> ini untuk ip global yg di dapet dari ISP
5. kemudian masukin gatewaynya
[kucing@mikrotik] > ip route
[kucing@mikrotik] ip route >add gateway=xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx ----> ini merupakan gateway untuk keluar
6. kemudian setup webproxy
[kucing@mikrotik] >ip web-proxy
[kucing@mikrotik] ip web-proxy >set enable=yes
[kucing@mikrotik] ip web-proxy >set transparent-proxy=yes
[kucing@mikrotik] ip web-proxy >set max-object-size=1200KiB ---> ini supaya nge loadnya ngacir si web proxy
7. kemudian tambahkan rule supaya si client yg menggunakan port 80 akan di oper ke web-proxy
[kucing@mikrotik] >ip firewall nat
[kucing@mikrotik] ip firewall nat >add chain=dstnat protocol=tcp dst-port=80 action=redirect to-ports=3128
8. kemudian masukan dns nya
[kucing@mikrotik] >ip dns
[kucing@mikrotik] ip dns >set primary-dns=xxx.xxx.xxx.xxx
[kucing@mikrotik] ip dns >set secondary-dns=xxx.xxx.xxx.xxx
9. Sekarang masqurade interface WANnya
[kucing@mikrotik]>ip firewall nat
[kucing@mikrotik] ip firewall nat>add chain=srcnat out-interface=WAN action=masquerade
10. sekarang coba ping ke gateway & dns dari mikrotik, kalo REPLY berarti dah konek

Tuesday, December 11, 2007

YM Bisa jalan 2 atau lebih ?

Mau Ym anda jalan 2 sekaligus ata lebih enggak masalh udah di coba dan jalan tapi ini di coba di system operasi windows pastinya dan versi YM nya 8.1 dan 9 klw yg 7XXX enggak jalan tuh, kamu tinggal klik start menu>>>>> RUn>>> isi dengan REG ADD HKCU\Software\Yahoo\Pager\Test /v Plural /t REG_DWORD /d 000001
Klw masih enggak mau artinya kamu gagal =))

SCRIP TAMBAHAN BUAT BLOK VIRUS

Biar virus di jaringan biar kagak brodcast trs2 ke server kita drop aja ya pakai listing yg ada ini ya oke

/ ip firewall filter
add chain=forward connection-state=established action=accept comment="allow \
established connections" disabled=no
add chain=forward connection-state=related action=accept comment="allow \
related connections" disabled=no
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop \
Messenger Worm" disabled=no
add chain=forward connection-state=invalid action=drop comment="drop invalid \
connections" disabled=no
add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop \
Blaster Worm" disabled=no
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" \
disabled=no
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster \
Worm" disabled=no
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster \
Worm" disabled=no
add chain=virus protocol=tcp dst-port=593 action=drop comment="________" \
disabled=no
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________" \
disabled=no
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" \
disabled=no
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________" \
disabled=no
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" \
disabled=no
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server" \
disabled=no
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast" \
disabled=no
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" \
disabled=no
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid" \
disabled=no
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" \
disabled=no
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" \
disabled=no
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" \
disabled=no
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop \
Beagle.C-K" disabled=no
add chain=virus protocol=tcp dst-port=3127 action=drop comment="Drop MyDoom" \
disabled=no
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor \
OptixPro" disabled=no
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" \
disabled=no
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" \
disabled=no
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" \
disabled=no
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" \
disabled=no
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop \
Dabber.A-B" disabled=no
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop \
Dumaru.Y, sebaiknya di didisable karena juga sering digunakan utk vpn atau \
webmin" disabled=yes
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop \
MyDoom.B" disabled=no
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" \
disabled=no
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" \
disabled=no
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop \
SubSeven" disabled=no
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, \
Agobot, Gaobot" disabled=no
add chain=forward action=jump jump-target=virus comment="jump to the virus \
chain" disabled=no
add chain=input connection-state=established action=accept comment="Accept \
established connections" disabled=no
add chain=input connection-state=related action=accept comment="Accept related \
connections" disabled=no
add chain=input connection-state=invalid action=drop comment="Drop invalid \
connections" disabled=no
add chain=input protocol=udp action=accept comment="UDP" disabled=no
add chain=input protocol=icmp limit=50/5s,2 action=accept comment="Allow \
limited pings" disabled=no
add chain=input protocol=icmp action=drop comment="Drop excess pings" \
disabled=no
add chain=input protocol=tcp dst-port=21 src-address-list=ournetwork \
action=accept comment="FTP" disabled=no
add chain=input protocol=tcp dst-port=22 src-address-list=ournetwork \
action=accept comment="SSH for secure shell" disabled=no
add chain=input protocol=tcp dst-port=23 src-address-list=ournetwork \
action=accept comment="Telnet" disabled=no
add chain=input protocol=tcp dst-port=80 src-address-list=ournetwork \
action=accept comment="Web" disabled=no
add chain=input protocol=tcp dst-port=8291 src-address-list=ournetwork \
action=accept comment="winbox" disabled=no
add chain=input protocol=tcp dst-port=1723 action=accept comment="pptp-server" \
disabled=no
add chain=input src-address-list=ournetwork action=accept comment="From \
Datautama network" disabled=no
add chain=input action=log log-prefix="DROP INPUT" comment="Log everything \
else" disabled=no
add chain=input action=drop comment="Drop everything else" disabled=no

BRIDGE FOR MIKROTIK WIRELES

Setting mikrotik secara manual

langkah pertama :

Set AP :

1. Interface --> + --> Bridge--> bridge 1

2. Bridge --> Port --> + --> interface : ethernet 1

Bridge 1 : bridge 1

+ --> interface :Wlan1

Bridge : Bridge 1

3. IP --> address --> + --> misal 80.100.1.0

interface : bridge 1

4. Wireless --> interface --> wlan 1 ---> Mode : AP Bridge

default forward

5. wireless --> interface --> wlan 1 --> WDS --> wds

mode : dynamic

wds default bridge : bridge 1

6. wireless --> interface ---> + --> wds --> wds---> master

interface : wlan

7. wireless --> Access list --> + MAC add misal 00:02:...........

kemudian untuk setting client

settingan nomor 1 dan 2 sama seperti di atas AP

kemudian setting :

1. Ganti IP --> address --> +

2. wireless --> interface --> wlan 1 --> mode : station wds

scan list : terserah pake Frekwensi berapa msal

2.4 Ghz ato 5 Ghz

3. wireless --> access list --> + --> MAC add....

4. wireless --> connect list --> + --> interface : wlan1

Kagak ada pakai gambaar sorry males upload gambar :D