+ Responder ao Tópico



  1. amigo so me da uma ideia


    ---(link-Roteador)-------[mikrotik]------ clientes

    seguinte se sua extrutura for a de cima faça o teste com uma maquina direto no roteador, se funcionar o problema esta em seu mikrotik, se nao funcionar teste com o dns de outro provedor, e se mesmo assim nao funcionar ligue na sua operadora, caso funcione poste as configurações de firewall do seu mikrotik, pra que possamos analisar e ajudar vc a resolve isso.

    Abraços

  2. eh isso ai mesmo eh a minha estrutura



  3. vc fez o teste ligado direto ao roteador, testou com outro DNS????

    posta aqui suas regras de firewall

  4. [admin@xnet_Wireless] > ip
    [admin@xnet_Wireless] ip> firewall
    [admin@xnet_Wireless] ip firewall> filter
    [admin@xnet_Wireless] ip firewall filter> print
    Flags: X - disabled, I - invalid, D - dynamic
    0 ;;; Drop Netbius e Similar
    chain=input protocol=udp src-port=135 action=drop
    1 chain=input protocol=tcp src-port=135 action=drop
    2 chain=input protocol=udp src-port=137 action=drop
    3 chain=input protocol=tcp src-port=137 action=drop
    4 chain=input protocol=udp src-port=138 action=drop
    5 chain=input protocol=tcp src-port=138 action=drop
    6 chain=input protocol=udp src-port=139 action=drop
    7 chain=input protocol=tcp src-port=139 action=drop
    8 chain=input protocol=tcp src-port=445 action=drop
    9 chain=input protocol=udp src-port=445 action=drop
    10 ;;; drop invalid packets
    chain=input connection-state=invalid action=drop
    11 ;;; accept related packets
    chain=input connection-state=related action=accept
    12 ;;; accept established packets
    chain=input connection-state=established action=accept
    13 ;;; Redes livres
    chain=input src-address=200.101.15.0/26 action=accept
    14 chain=input src-address=201.67.42.0/29 action=accept
    15 ;;; Bloqueio da Porta 22-23
    chain=input src-address-list=drop_port_22_23 action=drop
    16 ;;; detect and drop port scan connections
    chain=input protocol=tcp psd=21,3s,3,1 action=drop
    17 ;;; jump to chain ICMP
    chain=input protocol=icmp action=jump jump-target=ICMP
    18 ;;; jump to chain services
    chain=input action=jump jump-target=services
    19 ;;; 0:0 and limit for 5pac/s
    chain=ICMP protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept
    20 ;;; 3:3 and limit for 5pac/s
    chain=ICMP protocol=icmp icmp-options=3:3 limit=5,5 action=accept
    21 ;;; 3:4 and limit for 5pac/s
    chain=ICMP protocol=icmp icmp-options=3:4 limit=5,5 action=accept
    22 ;;; 8:0 and limit for 5pac/s
    chain=ICMP protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept
    23 ;;; 11:0 and limit for 5pac/s
    chain=ICMP protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept
    24 ;;; Drop everything else
    chain=ICMP protocol=icmp action=drop
    25 ;;; accept localhost
    chain=services src-address=127.0.0.1 dst-address=127.0.0.1 action=accept
    26 X ;;; allow ftp
    chain=services protocol=tcp dst-port=20-21 action=accept
    27 X ;;; allow sftp, ssh
    chain=services protocol=tcp dst-port=22 action=accept
    28 X ;;; allow telnet
    chain=services protocol=tcp dst-port=23 action=accept
    29 ;;; allow http, webbox
    chain=services protocol=tcp dst-port=80 action=accept
    30 ;;; Allow winbox
    chain=services protocol=tcp dst-port=8291 action=accept
    31 ;;; allow MACwinbox
    chain=services protocol=udp dst-port=20561 action=accept
    32 ;;; Bandwidth server
    chain=services protocol=tcp dst-port=2000 action=accept
    33 ;;; MT Discovery Protocol
    chain=services protocol=udp dst-port=5678 action=accept
    34 ;;; allow DNS request
    chain=services protocol=tcp dst-port=53 action=accept
    35 ;;; Allow DNS request
    chain=services protocol=udp dst-port=53 action=accept
    36 ;;; allow L2TP
    chain=services protocol=udp dst-port=1701 action=accept
    37 ;;; allow PPTP
    chain=services protocol=tcp dst-port=1723 action=accept
    38 ;;; allow PPTP and EoIP
    chain=services protocol=gre action=accept
    39 X ;;; allow IPIP
    chain=services protocol=ipencap action=accept
    40 X ;;; UPnP
    chain=services protocol=udp dst-port=1900 action=accept
    41 X ;;; UPnP
    chain=services protocol=tcp dst-port=2828 action=accept
    42 X ;;; allow DHCP
    chain=services protocol=udp dst-port=67-68 action=accept
    43 ;;; allow Web Proxy
    chain=services protocol=tcp dst-port=3126 action=accept
    44 X ;;; allow NTP
    chain=services protocol=tcp dst-port=123 action=accept
    45 X ;;; allow SNMP
    chain=services protocol=tcp dst-port=161 action=accept
    46 ;;; allow https for Hotspot
    chain=services protocol=tcp dst-port=443 action=accept
    47 ;;; allow Socks for Hotspot
    chain=services protocol=tcp dst-port=1080 action=accept
    48 ;;; allow IPSec connections
    chain=services protocol=udp dst-port=500 action=accept
    49 ;;; allow IPSec
    chain=services protocol=ipsec-esp action=accept
    50 ;;; allow IPSec
    chain=services protocol=ipsec-ah action=accept
    51 ;;; Allow BGP
    chain=services protocol=tcp dst-port=179 action=accept
    52 ;;; allow RIP
    chain=services protocol=udp dst-port=520-521 action=accept
    53 ;;; allow OSPF
    chain=services protocol=ospf action=accept
    54 ;;; allow BGP
    chain=services protocol=udp dst-port=5000-5100 action=accept
    55 ;;; allow Telephony
    chain=services protocol=tcp dst-port=1720 action=accept
    56 ;;; allow Telephony
    chain=services protocol=udp dst-port=1719 action=accept
    57 ;;; allow VRRP
    chain=services protocol=vrrp action=accept
    58 ;;; Drop Blaster Worm
    chain=virus protocol=tcp dst-port=135-139 action=drop
    59 ;;; Drop Messenger Worm
    chain=virus protocol=udp dst-port=135-139 action=drop
    60 ;;; Drop Blaster Worm
    chain=virus protocol=tcp dst-port=445 action=drop
    61 ;;; Drop Blaster Worm
    chain=virus protocol=udp dst-port=445 action=drop
    62 ;;; ________
    chain=virus protocol=tcp dst-port=593 action=drop
    63 ;;; ________
    chain=virus protocol=tcp dst-port=1024-1030 action=drop
    64 ;;; ________
    chain=virus protocol=tcp dst-port=1214 action=drop
    65 ;;; ndm requester
    chain=virus protocol=tcp dst-port=1363 action=drop
    66 ;;; ndm server
    chain=virus protocol=tcp dst-port=1364 action=drop
    67 ;;; screen cast
    chain=virus protocol=tcp dst-port=1368 action=drop
    68 ;;; hromgrafx
    chain=virus protocol=tcp dst-port=1373 action=drop
    69 ;;; cichlid
    chain=virus protocol=tcp dst-port=1377 action=drop
    70 ;;; Worm
    chain=virus protocol=tcp dst-port=1433-1434 action=drop
    71 ;;; Bagle Virus
    chain=virus protocol=tcp dst-port=2745 action=drop
    72 ;;; Drop Dumaru.Y
    chain=virus protocol=tcp dst-port=2283 action=drop
    73 ;;; Drop Beagle
    chain=virus protocol=tcp dst-port=2535 action=drop
    74 ;;; Drop Beagle.C-K
    chain=virus protocol=tcp dst-port=2745 action=drop
    75 ;;; Drop MyDoom
    chain=virus protocol=tcp dst-port=3127-3128 action=drop
    76 ;;; Drop Backdoor OptixPro
    chain=virus protocol=tcp dst-port=3410 action=drop
    77 ;;; Worm
    chain=virus protocol=tcp dst-port=4444 action=drop
    78 ;;; Worm
    chain=virus protocol=udp dst-port=4444 action=drop
    79 ;;; Drop Sasser
    chain=virus protocol=tcp dst-port=5554 action=drop
    80 ;;; Drop Beagle.B
    chain=virus protocol=tcp dst-port=8866 action=drop
    81 ;;; Drop Dabber.A-B
    chain=virus protocol=tcp dst-port=9898 action=drop
    82 ;;; Drop Dumaru.Y
    chain=virus protocol=tcp dst-port=10000 action=drop
    83 ;;; Drop MyDoom.B
    chain=virus protocol=tcp dst-port=10080 action=drop
    84 ;;; Drop NetBus
    chain=virus protocol=tcp dst-port=12345 action=drop
    85 ;;; Drop Kuang2
    chain=virus protocol=tcp dst-port=17300 action=drop
    86 ;;; Drop SubSeven
    chain=virus protocol=tcp dst-port=27374 action=drop
    87 ;;; Drop PhatBot, Gaobot
    chain=virus protocol=tcp dst-port=65506 action=drop
    88 ;;; Drop phAse zero
    chain=virus protocol=tcp dst-port=555 action=drop
    89 ;;; Drop phAse zero
    chain=virus protocol=udp dst-port=555 action=drop
    90 ;;; Drop Sub-7, SubSeven
    chain=virus protocol=tcp dst-port=1243 action=drop
    91 ;;; Drop Sub-7, SubSeven
    chain=virus protocol=udp dst-port=1243 action=drop
    92 ;;; Drop Masters Paradise
    chain=virus protocol=tcp dst-port=3129 action=drop
    93 ;;; Drop Masters Paradise
    chain=virus protocol=udp dst-port=3129 action=drop
    94 ;;; Drop DeepThroat
    chain=virus protocol=tcp dst-port=6670 action=drop
    95 ;;; Drop DeepThroat
    chain=virus protocol=udp dst-port=6670 action=drop
    96 ;;; Drop Sub-7, SubSeven
    chain=virus protocol=tcp dst-port=6711 action=drop
    97 ;;; Drop Sub-7, SubSeven
    chain=virus protocol=udp dst-port=6711 action=drop
    98 ;;; Drop GateCrasher
    chain=virus protocol=tcp dst-port=6969 action=drop
    99 ;;; Drop GateCrasher
    chain=virus protocol=udp dst-port=6969 action=drop



  5. 100 ;;; Drop NetBus
    chain=virus protocol=tcp dst-port=12345 action=drop
    101 ;;; Drop NetBus
    chain=virus protocol=udp dst-port=12345 action=drop
    102 ;;; Drop GirlFriend
    chain=virus protocol=tcp dst-port=21544 action=drop
    103 ;;; Drop GirlFriend
    chain=virus protocol=udp dst-port=21544 action=drop
    104 ;;; Drop EvilFtp
    chain=virus protocol=tcp dst-port=23456 action=drop
    105 ;;; Drop EvilFtp
    chain=virus protocol=udp dst-port=23456 action=drop
    106 ;;; Drop Sub-7, SubSeven
    chain=virus protocol=tcp dst-port=27374 action=drop
    107 ;;; Drop Sub-7, SubSeven
    chain=virus protocol=udp dst-port=27374 action=drop
    108 ;;; Drop NetSphere
    chain=virus protocol=tcp dst-port=30100 action=drop
    109 ;;; Drop NetSphere
    chain=virus protocol=udp dst-port=30100 action=drop
    110 ;;; Drop Hack'a'Tack
    chain=virus protocol=tcp dst-port=31789 action=drop
    111 ;;; Drop Hack'a'Tack
    chain=virus protocol=udp dst-port=31789 action=drop
    112 ;;; Drop BackOrifice, and many others
    chain=virus protocol=tcp dst-port=31337 action=drop
    113 ;;; Drop BackOrifice, and many others
    chain=virus protocol=udp dst-port=31337 action=drop
    114 ;;; Drop Sockets de Troie
    chain=virus protocol=tcp dst-port=50505 action=drop
    115 ;;; Drop Sockets de Troie
    chain=virus protocol=udp dst-port=50505 action=drop
    116 ;;; drop site velox
    chain=forward packet-mark=velox action=drop
    117 ;;; Drop Netbius e Similar
    chain=forward protocol=udp dst-port=135 action=drop
    118 chain=forward protocol=tcp dst-port=135 action=drop
    119 chain=forward protocol=udp dst-port=137 action=drop
    120 chain=forward protocol=tcp dst-port=137 action=drop
    121 chain=forward protocol=udp dst-port=138 action=drop
    122 chain=forward protocol=tcp dst-port=138 action=drop
    123 chain=forward protocol=udp dst-port=139 action=drop
    124 chain=forward protocol=tcp dst-port=139 action=drop
    125 chain=forward protocol=tcp dst-port=445 action=drop
    126 chain=forward protocol=udp dst-port=445 action=drop
    127 ;;; p2p
    chain=forward p2p=all-p2p action=accept
    128 ;;; drop invalid packets
    chain=forward connection-state=invalid action=drop
    129 ;;; accept related packets
    chain=forward connection-state=related action=accept

    130 ;;; accept established packets
    chain=forward connection-state=established action=accept
    131 ;;; drop all that is not from unicast
    chain=forward src-address-type=!unicast action=drop
    132 ;;; jump to chain ICMP
    chain=forward protocol=icmp action=jump jump-target=ICMP
    133 ;;; jump to virus chain
    chain=forward action=jump jump-target=virus
    134 ;;; drop invalid packets
    chain=output connection-state=invalid action=drop
    135 ;;; conection limit 60
    chain=forward protocol=tcp tcp-flags=syn connection-limit=60,32
    action=drop
    136 ;;; accept related packets
    chain=output connection-state=related action=accept
    137 ;;; accept established packets
    chain=output connection-state=established action=accept
    138 ;;; drop everything else
    chain=input action=drop
    139 X chain=P2P src-address=10.0.1.2 protocol=tcp p2p=all-p2p action=accept
    140 X chain=P2P dst-address=10.0.1.2 protocol=tcp p2p=all-p2p action=accept
    141 chain=P2P p2p=all-p2p action=drop
    142 ;;; drop pcativo
    chain=forward packet-mark=rjnet action=drop
    143 ;;; drop velox
    chain=forward packet-mark=velox action=drop
    144 ;;; Bloqueando tracert
    chain=forward protocol=icmp icmp-options=8:0 action=drop
    145 X ;;; Youtube
    chain=forward packet-mark=youtube action=drop
    146 ;;; Bloqueio Sysgel
    chain=forward packet-mark=sisgel action=drop
    147 ;;; ForumWeb
    chain=forward packet-mark=forumweb action=drop
    148 ;;; Teste Sistema de Cameras
    chain=forward protocol=tcp dst-port=1999 action=accept
    149 chain=forward protocol=tcp dst-port=3550 action=accept
    150 chain=forward protocol=tcp dst-port=3650 action=accept
    151 chain=forward protocol=tcp dst-port=4550 connection-type="" action=accep>
    152 chain=forward protocol=tcp dst-port=5550 action=accept
    153 chain=forward protocol=tcp dst-port=5800 action=accept
    154 chain=forward protocol=tcp dst-port=5900 action=accept
    155 ;;; meuip
    chain=forward packet-mark=meuip action=drop
    156 chain=forward packet-mark=meuiptk action=drop
    157 ;;; reverdns
    chain=forward packet-mark=reversedns action=drop






Tópicos Similares

  1. Formulário PIS Caixa Econômica
    Por Kandango no fórum Servidores de Rede
    Respostas: 4
    Último Post: 26-07-2005, 10:37
  2. Conectividade social - Caixa Economica
    Por Cadete no fórum Servidores de Rede
    Respostas: 4
    Último Post: 23-02-2005, 08:00
  3. Squid 2.5 - não esta funcionado 100% Caixa Econômica
    Por Good_speed no fórum Servidores de Rede
    Respostas: 3
    Último Post: 08-11-2004, 07:58
  4. Bloquear emails da bol, uol, hotmail....
    Por mariborghi no fórum Servidores de Rede
    Respostas: 7
    Último Post: 13-07-2004, 16:12
  5. proxy + Caixa Economica Federal
    Por no fórum Servidores de Rede
    Respostas: 0
    Último Post: 07-11-2003, 11:49

Visite: BR-Linux ·  VivaOLinux ·  Dicas-L