Thursday, December 20, 2007
CREATE HOST DOTA
naruh nya di ip >>>> firewall>>>>nat
jgn lupa ini asumsi masquarade udah jalan. klw bisa jgn copy paste gunakan winbox aja :D
;;; Inter LAN DoTA login
chain=srcnat out-interface=LAN src-address=192.168.77.0/24 dst-address=192.168.77.0/24 action=src-nat
to-addresses=117.xxx.xxx.xxxto-ports=0-65535
;;; DoTA Game
;;; box 7
chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=tcp dst-port=6007 action=dst-nat to-addresses=192.168.77.248
to-ports=6007
chain=srcnat src-address=192.168.77.248 protocol=tcp src-port=6007 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6007
chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=udp dst-port=6007 action=dst-nat to-addresses=192.168.77.248
to-ports=6007
chain=srcnat src-address=192.168.77.248 protocol=udp src-port=6007 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6007
;;; DOTA BOX 1
chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=tcp dst-port=6001 action=dst-nat to-addresses=192.168.77.254
to-ports=6001
chain=srcnat src-address=192.168.77.254 protocol=tcp src-port=6001 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6001
chain=dstnat dst-address=117.xxx.xxx.xxxprotocol=udp dst-port=6001 action=dst-nat to-addresses=192.168.77.254
to-ports=6001
chain=srcnat src-address=192.168.77.254 protocol=udp src-port=6001 action=src-nat to-addresses=117.xxx.xxx.xxx
to-ports=6001
gimana mudah kan sekarang tinggal coba coba dan coba
PROXY ON MIKROTIK
1. setelah mikrotik terinstall dengan baik dan benar jalankan mikrotik anda
2. masukkan username & password, dalam hal ini karena masih baru maka default usernam : admin pasword : blank
3. ganti nama ethernet anda jika anda mau, dalam hal ini anda dapat memberikan nama apa saja = [kucing@mikrotik] >interface
[kucing@mikrotik] interface >print (melihat dulu berapa banyak ethernet yg terpasang)
[kucing@mikrotik] interface >set 0 name=LAN
[kucing@mikrotik] interface >set 1 name=WAN
4. kemudian nambahkan ip addressnya
[kucing@mikrotik] >ip address
[kucing@mikrotik] ip address >add address=192.168.0.1/255.255.0.0 interface=LAN ----> ini untuk ip interface lokal
[kucing@mikrotik] ip address >add address=203.90.1.1/255.255.255.240 interface=WAN ---> ini untuk ip global yg di dapet dari ISP
5. kemudian masukin gatewaynya
[kucing@mikrotik] > ip route
[kucing@mikrotik] ip route >add gateway=xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx ----> ini merupakan gateway untuk keluar
6. kemudian setup webproxy
[kucing@mikrotik] >ip web-proxy
[kucing@mikrotik] ip web-proxy >set enable=yes
[kucing@mikrotik] ip web-proxy >set transparent-proxy=yes
[kucing@mikrotik] ip web-proxy >set max-object-size=1200KiB ---> ini supaya nge loadnya ngacir si web proxy
7. kemudian tambahkan rule supaya si client yg menggunakan port 80 akan di oper ke web-proxy
[kucing@mikrotik] >ip firewall nat
[kucing@mikrotik] ip firewall nat >add chain=dstnat protocol=tcp dst-port=80 action=redirect to-ports=3128
8. kemudian masukan dns nya
[kucing@mikrotik] >ip dns
[kucing@mikrotik] ip dns >set primary-dns=xxx.xxx.xxx.xxx
[kucing@mikrotik] ip dns >set secondary-dns=xxx.xxx.xxx.xxx
9. Sekarang masqurade interface WANnya
[kucing@mikrotik]>ip firewall nat
[kucing@mikrotik] ip firewall nat>add chain=srcnat out-interface=WAN action=masquerade
10. sekarang coba ping ke gateway & dns dari mikrotik, kalo REPLY berarti dah konek
Tuesday, December 11, 2007
YM Bisa jalan 2 atau lebih ?
Klw masih enggak mau artinya kamu gagal =))
SCRIP TAMBAHAN BUAT BLOK VIRUS
/ ip firewall filter
add chain=forward connection-state=established action=accept comment="allow \
established connections" disabled=no
add chain=forward connection-state=related action=accept comment="allow \
related connections" disabled=no
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop \
Messenger Worm" disabled=no
add chain=forward connection-state=invalid action=drop comment="drop invalid \
connections" disabled=no
add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop \
Blaster Worm" disabled=no
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" \
disabled=no
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster \
Worm" disabled=no
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster \
Worm" disabled=no
add chain=virus protocol=tcp dst-port=593 action=drop comment="________" \
disabled=no
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________" \
disabled=no
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" \
disabled=no
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________" \
disabled=no
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" \
disabled=no
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server" \
disabled=no
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast" \
disabled=no
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" \
disabled=no
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid" \
disabled=no
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" \
disabled=no
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" \
disabled=no
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" \
disabled=no
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop \
Beagle.C-K" disabled=no
add chain=virus protocol=tcp dst-port=3127 action=drop comment="Drop MyDoom" \
disabled=no
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor \
OptixPro" disabled=no
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" \
disabled=no
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" \
disabled=no
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" \
disabled=no
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" \
disabled=no
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop \
Dabber.A-B" disabled=no
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop \
Dumaru.Y, sebaiknya di didisable karena juga sering digunakan utk vpn atau \
webmin" disabled=yes
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop \
MyDoom.B" disabled=no
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" \
disabled=no
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" \
disabled=no
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop \
SubSeven" disabled=no
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, \
Agobot, Gaobot" disabled=no
add chain=forward action=jump jump-target=virus comment="jump to the virus \
chain" disabled=no
add chain=input connection-state=established action=accept comment="Accept \
established connections" disabled=no
add chain=input connection-state=related action=accept comment="Accept related \
connections" disabled=no
add chain=input connection-state=invalid action=drop comment="Drop invalid \
connections" disabled=no
add chain=input protocol=udp action=accept comment="UDP" disabled=no
add chain=input protocol=icmp limit=50/5s,2 action=accept comment="Allow \
limited pings" disabled=no
add chain=input protocol=icmp action=drop comment="Drop excess pings" \
disabled=no
add chain=input protocol=tcp dst-port=21 src-address-list=ournetwork \
action=accept comment="FTP" disabled=no
add chain=input protocol=tcp dst-port=22 src-address-list=ournetwork \
action=accept comment="SSH for secure shell" disabled=no
add chain=input protocol=tcp dst-port=23 src-address-list=ournetwork \
action=accept comment="Telnet" disabled=no
add chain=input protocol=tcp dst-port=80 src-address-list=ournetwork \
action=accept comment="Web" disabled=no
add chain=input protocol=tcp dst-port=8291 src-address-list=ournetwork \
action=accept comment="winbox" disabled=no
add chain=input protocol=tcp dst-port=1723 action=accept comment="pptp-server" \
disabled=no
add chain=input src-address-list=ournetwork action=accept comment="From \
Datautama network" disabled=no
add chain=input action=log log-prefix="DROP INPUT" comment="Log everything \
else" disabled=no
add chain=input action=drop comment="Drop everything else" disabled=no
BRIDGE FOR MIKROTIK WIRELES
Setting mikrotik secara manual
langkah pertama :
Set AP :
1. Interface --> + --> Bridge--> bridge 1
2. Bridge --> Port --> + --> interface : ethernet 1
Bridge 1 : bridge 1
+ --> interface :Wlan1
Bridge : Bridge 1
3. IP --> address --> + --> misal 80.100.1.0
interface : bridge 1
4. Wireless --> interface --> wlan 1 ---> Mode : AP Bridge
default forward
5. wireless --> interface --> wlan 1 --> WDS --> wds
mode : dynamic
wds default bridge : bridge 1
6. wireless --> interface ---> + --> wds --> wds---> master
interface : wlan
7. wireless --> Access list --> + MAC add misal 00:02:...........
kemudian untuk setting client
settingan nomor 1 dan 2 sama seperti di atas AP
kemudian setting :
1. Ganti IP --> address --> +
2. wireless --> interface --> wlan 1 --> mode : station wds
scan list : terserah pake Frekwensi berapa msal
2.4 Ghz ato 5 Ghz
3. wireless --> access list --> + --> MAC add....
4. wireless --> connect list --> + --> interface : wlan1