+ Responder ao Tópico



  1. #1

    Padrão alguem sabe pq esta fazendo isso quando tento ver a pagina de status.

    antes eu via normal a pagina de status e todas as outras porem agora nao deixa mais ver nao sei o que fiz ..
    aparece assim agora.
    ERROR: The requested URL could not be retrievedERROR

    The requested URL could not be retrieved

    While trying to retrieve the URL: http://auth.netwireless.com.br/
    The following error was encountered:

    • Connection Failed

    The system returned:
    (111) Connection refused The remote host or network may be down. Please try the request again.
    Your cache administrator is [email protected].

    Generated Sun, 28 Sep 2008 02:44:47 GMT by proxy (squid/2.5.STABLE11)

    se alguem souber como resolver isso da um help ficarei muito grato.

  2. #2

    Padrão

    da uma olhada no firewall filter ruler se tem esta regra "drom all that is not from unicast" se tiver basta desabilitar ok ? qualquer coisa entra em contato [email protected]



  3. #3

    Padrão

    olha como está o filter rules é algumas dessas regras?

    / ip firewall filter
    add chain=input in-interface=Speedy protocol=tcp dst-port=3128 action=drop \
    comment="BLOQUEIO DO PROXY EXTERNO" disabled=no
    add chain=input protocol=tcp dst-port=8291 src-mac-address=??:??:??:??:??:?? \
    action=accept comment="acessar winbox somente eu" disabled=no
    add chain=input protocol=tcp dst-port=8291 action=drop comment="bloquear \
    \n" disabled=no dos
    add chain=input protocol=tcp dst-port=22 src-address-list=acesso_ssh \
    action=drop comment="Acesso_ssh" disabled=no
    add chain=forward packet-mark=pkt-warez action=drop comment="Bloqueia Warez" \
    disabled=no
    add chain=input protocol=tcp dst-port=3128 action=accept comment="Conex es \
    cache full" disabled=no
    add chain=forward p2p=warez action=drop comment="Bloqueio all-p2p" disabled=no
    add chain=forward p2p=gnutella action=drop comment="" disabled=no
    add chain=forward p2p=bit-torrent action=drop comment="" disabled=no
    add chain=forward protocol=tcp src-port=135-139 dst-port=135-139 action=drop \
    comment="Bloqueio da Netbios para n o compartilhar arquivos em rede usando \
    o Mikrotik" disabled=no
    add chain=forward protocol=tcp src-port=445 dst-port=445 action=drop \
    comment="" disabled=no
    add chain=forward protocol=udp src-port=135-139 dst-port=135-139 action=drop \
    comment="" disabled=no
    add chain=forward protocol=udp src-port=445 dst-port=445 action=drop \
    comment="" disabled=no
    add chain=forward protocol=tcp src-port=67-69 dst-port=67-69 action=drop \
    comment="" disabled=no
    add chain=forward protocol=udp src-port=67-69 dst-port=67-69 action=drop \
    comment="" disabled=no
    add chain=forward src-address=192.168.1.0/24 dst-address=192.168.1.0/24 \
    action=drop comment="" disabled=no
    add chain=forward connection-state=invalid action=drop comment="Bloquear conex \
    es inv lidas" disabled=no
    add chain=forward connection-state=established action=accept comment="Conex es \
    estabilizadas" disabled=no
    add chain=forward connection-state=related action=accept comment="Conex es \
    relatadas" disabled=no
    add chain=forward action=jump jump-target=virus comment="!!! Check for \
    well-known viruses !!!" disabled=no
    add chain=forward protocol=udp action=accept comment="UDP" disabled=no
    add chain=forward protocol=icmp limit=50/5s,2 action=accept comment="Allow \
    limited Pings" disabled=no
    add chain=forward protocol=icmp action=drop comment="Drop excess pings" \
    disabled=no
    add chain=input connection-state=invalid action=drop comment="Drop invalid \
    connections" disabled=no
    add chain=input tcp-flags=!syn connection-state=established action=accept \
    comment="Accept established connections" disabled=no
    add chain=input connection-state=related action=accept comment="Accept related \
    connections" disabled=no
    add chain=input action=jump jump-target=virus comment="!!! Check for \
    well-known viruses !!!" disabled=no
    add chain=input protocol=udp action=accept comment="UDP" disabled=no
    add chain=input protocol=icmp limit=50/5s,2 action=accept comment="Allow \
    limited pings" disabled=no
    add chain=input protocol=icmp action=drop comment="Drop excess pings" \
    disabled=no
    add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop \
    Blaster Worm" disabled=no
    add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop \
    Messenger Worm" disabled=no
    add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster \
    Worm" disabled=no
    add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster \
    Worm" disabled=no
    add chain=virus protocol=tcp dst-port=593 action=drop comment="________" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1214 action=drop comment="________" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid" \
    disabled=no
    add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" \
    disabled=no
    add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" \
    disabled=no
    add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" \
    disabled=no
    add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" \
    disabled=no
    add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop \
    Beagle.C-K" disabled=no
    add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop \
    porta proxy" disabled=no
    add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor \
    OptixPro" disabled=no
    add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" \
    disabled=no
    add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" \
    disabled=no
    add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" \
    disabled=no
    add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" \
    disabled=no
    add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop \
    Dabber.A-B" disabled=no
    add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop \
    Dumaru.Y" disabled=no
    add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop \
    MyDoom.B" disabled=no
    add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" \
    disabled=no
    add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" \
    disabled=no
    add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop \
    SubSeven" disabled=no

  4. #4

    Padrão

    Se toda sua reg. esta ai.... deve ser outro prob. ok ? ai teria que olha direitinho todas as suas reg.



  5. #5

    Padrão

    Citação Postado originalmente por marcosdiirr Ver Post
    Se toda sua reg. esta ai.... deve ser outro prob. ok ? ai teria que olha direitinho todas as suas reg.
    toda a regra do firewall filter rules sim esta tudo ..
    porque que regras esta faltando que nao sei ?