Friday, July 31, 2009

Security sederhana pada mikrotik


Di bawah ini merupakan configurasi security dan virus dropping sederhana pada Mikrotik Router, yaitu dengan membatasi input dari luar/global.

/ ip firewall filter add chain=forward connection-state=established action=accept comment="allow established connections" disabled=no
/ ip firewall filter add chain=forward connection-state=related action=accept comment="allow related connections" disabled=no
/ ip firewall filter add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop Messenger Worm" disabled=no
/ ip firewall filter add chain=forward connection-state=invalid action=drop comment="drop invalid connections" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm" disabled=no
/ ip firewall filter add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=593 action=drop comment="________" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1214 action=drop comment="________" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=3127 action=drop comment="Drop MyDoom" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" disabled=no
/ ip firewall filter add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y, sebaiknya di didisable karena juga sering digunakan utk vpn atau webmin" disabled=yes
/ ip firewall filter add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven" disabled=no
/ ip firewall filter add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot" disabled=no
/ ip firewall filter add chain=forward action=jump jump-target=virus comment="jump to the virus chain" disabled=no
/ ip firewall filter add chain=input connection-state=established action=accept comment="Accept established connections" disabled=no
/ ip firewall filter add chain=input connection-state=related action=accept comment="Accept related connections" disabled=no
/ ip firewall filter add chain=input connection-state=invalid action=drop comment="Drop invalid connections" disabled=no
/ ip firewall filter add chain=input protocol=udp action=accept comment="UDP" disabled=no
/ ip firewall filter add chain=input protocol=icmp limit=50/5s,2 action=accept comment="Allow limited pings" disabled=no
/ ip firewall filter add chain=input protocol=icmp action=drop comment="Drop excess pings" disabled=no
/ ip firewall filter add chain=input action=log log-prefix="DROP INPUT" comment="Log everything else" disabled=no
/ ip firewall filter add chain=input action=drop comment="Drop everything else" disabled=no
/ ip firewall filter add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="Port scanners to list " disabled=no
/ ip firewall filter add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP FIN Stealth scan"
/ ip firewall filter add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="SYN/FIN scan"
/ ip firewall filter add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="SYN/RST scan"

/ ip firewall filter add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="FIN/PSH/URG scan"
/ ip firewall filter add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="ALL/ALL scan"
/ ip firewall filter add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP NULL scan"
/ ip firewall filter add chain=input src-address-list="port scanners" action=drop comment="dropping port scanners" disabled=no


Note : thanks to dagocan (kaskuser)

No comments: