Ola sera que alguem pode me ajudar meu problema esta no web-proxy pois eu habilito a regra para limitar conexoes por cliente funciona beleza mas quando e habilito o web-proxy a regra para limite de conexoes para de funcionar sera que alguem pode me ajudar?
Desde já fico grato.
Configurações,
Web-Proxy
enabled: yes
src-address: 0.0.0.0
port: 3128
hostname: "Web-Proxy"
transparent-proxy: yes
parent-proxy: 0.0.0.0:0
cache-administrator: "[email protected]"
max-object-size: 4096KiB
cache-drive: system
max-cache-size: 200000000KiB
max-ram-cache-size: 200000KiB
status: running
reserved-for-cache: 11251712KiB
reserved-for-ram-cache: 2048KiB
Firewall Filter Rules
0 ;;; drop invalid connections
chain=forward connection-state=invalid action=drop
1 ;;; Bloquear_Ares
chain=forward p2p=warez action=drop
2 ;;; Drop Blaster Worm
chain=virus protocol=tcp dst-port=135-139 action=drop
3 ;;; Drop Messenger Worm
chain=virus protocol=udp dst-port=135-139 action=drop
4 ;;; Drop Blaster Worm
chain=virus protocol=tcp dst-port=445 action=drop
5 ;;; Drop Blaster Worm
chain=virus protocol=udp dst-port=445 action=drop
6 ;;; ________
chain=virus protocol=tcp dst-port=593 action=drop
7 ;;; ________
chain=virus protocol=tcp dst-port=1024-1030 action=drop
8 ;;; Drop MyDoom
chain=virus protocol=tcp dst-port=1080 action=drop
9 ;;; ________
chain=virus protocol=tcp dst-port=1214 action=drop
10 ;;; ndm requester
chain=virus protocol=tcp dst-port=1363 action=drop
11 ;;; ndm server
chain=virus protocol=tcp dst-port=1364 action=drop
12 ;;; screen cast
chain=virus protocol=tcp dst-port=1368 action=drop
13 ;;; hromgrafx
chain=virus protocol=tcp dst-port=1373 action=drop
14 ;;; cichlid
chain=virus protocol=tcp dst-port=1377 action=drop
13 ;;; hromgrafx
chain=virus protocol=tcp dst-port=1373 action=drop
14 ;;; cichlid
chain=virus protocol=tcp dst-port=1377 action=drop
15 ;;; Worm
chain=virus protocol=tcp dst-port=1433-1434 action=drop
16 ;;; Bagle Virus
chain=virus protocol=tcp dst-port=2745 action=drop
17 ;;; Drop Dumaru.Y
chain=virus protocol=tcp dst-port=2283 action=drop
18 ;;; Drop Beagle
chain=virus protocol=tcp dst-port=2535 action=drop
19 ;;; Drop Beagle.C-K
chain=virus protocol=tcp dst-port=2745 action=drop
20 ;;; Drop MyDoom
chain=virus protocol=tcp dst-port=3127-3128 action=drop
21 ;;; Drop Backdoor OptixPro
chain=virus protocol=tcp dst-port=3410 action=drop
22 ;;; Worm
chain=virus protocol=tcp dst-port=4444 action=drop
23 ;;; Worm
chain=virus protocol=udp dst-port=4444 action=drop
24 ;;; Drop Sasser
chain=virus protocol=tcp dst-port=5554 action=drop
25 ;;; Drop Beagle.B
chain=virus protocol=tcp dst-port=8866 action=drop
26 ;;; Drop Dabber.A-B
chain=virus protocol=tcp dst-port=9898 action=drop
27 ;;; Drop Dumaru.Y
chain=virus protocol=tcp dst-port=10000 action=drop
28 ;;; Drop MyDoom.B
chain=virus protocol=tcp dst-port=10080 action=drop
29 ;;; Drop NetBus
chain=virus protocol=tcp dst-port=12345 action=drop
30 ;;; Drop Kuang2
chain=virus protocol=tcp dst-port=17300 action=drop
31 ;;; Drop SubSeven
chain=virus protocol=tcp dst-port=27374 action=drop
32 ;;; Drop PhatBot, Agobot, Gaobot
chain=virus protocol=tcp dst-port=65506 action=drop
33 ;;; Bloqueiode spamrs
chain=forward protocol=tcp dst-port=25 src-address-list=spammer
action=drop
34 chain=forward protocol=tcp dst-port=25 connection-limit=15,32 limit=50,5
src-address-list=!spammer action=add-src-to-address-list
address-list=spammer address-list-timeout=1d
35 ;;; Net Bios tcp
chain=forward protocol=tcp dst-port=137-139 action=drop
36 ;;; NetBios
chain=forward protocol=tcp dst-port=445 action=drop
37 ;;; Limitando numero conexoes simultaneas
chain=forward src-address=192.168.2.0/24 protocol=tcp tcp-flags=syn
packet-mark=semlimite connection-limit=15,32 action=drop
38 ;;; proxy_externo
chain=input in-interface=link protocol=tcp dst-port=3128 action=drop
Firewall nat
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Redireciona Proxy
chain=dstnat in-interface=cliente protocol=tcp dst-port=80
action=redirect to-ports=3128
1 chain=dstnat in-interface=link protocol=tcp dst-port=80 action=redirect
to-ports=3128
2 ;;; NAT
chain=srcnat out-interface=link action=masquerade
Firewall Mangle
0 chain=prerouting p2p=all-p2p action=mark-packet new-packet-mark=Conexao-p2>
passthrough=yes
1 chain=prerouting connection-mark=Conexao-p2p action=mark-packet
new-packet-mark=Pacotes-P2P passthrough=yes
2 ;;; Marcando Pacotes Sem Limite Conexao
chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=21
action=mark-packet new-packet-mark=semlimite passthrough=yes
3 chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=22
action=mark-packet new-packet-mark=semlimite passthrough=yes
4 chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=23
action=mark-packet new-packet-mark=semlimite passthrough=yes
5 chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=25
action=mark-packet new-packet-mark=semlimite passthrough=yes
6 chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=53
action=mark-packet new-packet-mark=semlimite passthrough=yes
7 chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=110
action=mark-packet new-packet-mark=semlimite passthrough=yes
8 chain=forward src-address=192.168.2.0/24 protocol=tcp dst-port=443
action=mark-packet new-packet-mark=semlimite passthrough=yes