Página 2 de 2 PrimeiroPrimeiro 12
+ Responder ao Tópico



  1. Citação Postado originalmente por pedroantonio Ver Post

    Quanto ao firmware, a versao que tenho é "AP-2000 v2.5.5(1070) SN-03UT11560366 v2.0.10".

    Valeu pela ajuda
    o firmware dele é 2.5.5 (tem problema de perder setup web com trafico)

    coloque versao 2.4.5 ou 2.4.11, o pessoal de proxim para promover os cartoes 11.b/g e 11.a desenvolvou firmware posterior.. só q fez caca..

    ano esqueça q após actualizar o firmware dar um eset default, para q nao fique nenhum config errado de outra versao de firmware.

    Citação Postado originalmente por tuxbrasil Ver Post
    cara coloquei mikrotik com o firewall fazendo o filtro dos virus, mais vc pode fazer uma coisa monta um mk so com placas de rede e usa como sw pronto
    Tux poste a regra de firewall, geralmente na minha rede eu vejo movimento suspeito pelo trafshow e aviso para o cliente q esta com virus.. e até o cliente tomar medida a rede oscilando..

    más a tua soluçao me iria bem.

    Abraços
    Lee

  2. Agradeço as dicas...

    Será que tem como eu eliminar este problema sem ter que inutilizar meu ap? ;~



  3. Citação Postado originalmente por pedroantonio Ver Post
    Agradeço as dicas...

    Será que tem como eu eliminar este problema sem ter que inutilizar meu ap? ;~
    identifique o cliente q esta com virus, nao sei se vai adiantar bloqueiar pelo filtro de mac address.. acredito q tenha q deixar sem link wireless do cliente ate solucionar o problema.

    Lee

  4. Lee,

    em bridge mesmo essa regra soluciona

    / ip firewall filter
    add chain=input connection-state=invalid action=drop comment="Descarta Conexoes Invalidas" disabled=no
    add chain=input action=jump jump-target=VIRUS comment="Salta para o Canal Virus" disabled=no
    add chain=input action=jump jump-target=icmp comment="Salta para ICMP" disabled=no
    add chain=input connection-state=established action=accept comment="Aceita Conexoes Estabelecidas" disabled=no
    add chain=input connection-state=related action=accept comment="Aceita Conexoes Relacionadas" disabled=no
    add chain=input src-address=192.168.20.0/24 action=accept comment="Aceita Conexoes Rede Interna" disabled=no
    add chain=input protocol=tcp dst-port=8291 action=accept comment="Aceita Winbox Externo" disabled=no
    add chain=input protocol=tcp dst-port=22 action=accept comment="Aceita SSH" disabled=no
    add chain=input action=drop comment="Descarta o Resto" disabled=no
    add chain=seguranca connection-state=invalid action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp src-port=445 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=445 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp src-port=445 action=drop comment="Drop Blaster Worm" disabled=no
    add chain=VIRUS protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm" disabled=no
    add chain=VIRUS protocol=tcp src-port=135-139 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp src-port=135-139 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=135-139 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=135-139 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=593 action=drop comment="________" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1024-1030 action=drop comment="________" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1214 action=drop comment="________" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1363 action=drop comment="ndm requester" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1364 action=drop comment="ndm server" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1368 action=drop comment="screen cast" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1373 action=drop comment="hromgrafx" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1377 action=drop comment="cichlid" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1433-1434 action=drop comment="Worm" disabled=no
    add chain=VIRUS protocol=tcp dst-port=2745 action=drop comment="Bagle VIRUS" disabled=no
    add chain=VIRUS protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" disabled=no
    add chain=VIRUS protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" disabled=no
    add chain=VIRUS protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K" disabled=no
    add chain=VIRUS protocol=tcp dst-port=3127 action=drop comment="Drop MyDoom" disabled=no
    add chain=VIRUS protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro" disabled=no
    add chain=VIRUS protocol=tcp dst-port=4444 action=drop comment="Worm" disabled=no
    add chain=VIRUS protocol=udp dst-port=4444 action=drop comment="Worm" disabled=no
    add chain=VIRUS protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" disabled=no
    add chain=VIRUS protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" disabled=no
    add chain=VIRUS protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B" disabled=no
    add chain=VIRUS protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y" disabled=no
    add chain=VIRUS protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B" disabled=no
    add chain=VIRUS protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" disabled=no
    add chain=VIRUS protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" disabled=no
    add chain=VIRUS protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven" disabled=no
    add chain=VIRUS protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot" disabled=no
    add chain=VIRUS protocol=tcp dst-port=513 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=513 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=525 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=525 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=568-569 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=568-569 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1512 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=1512 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=396 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=396 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1366 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=1366 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1416 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=1416 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=201-209 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=201-209 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=545 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=545 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=1381 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=1381 action=drop comment="" disabled=no
    add chain=VIRUS protocol=tcp dst-port=3031 action=drop comment="" disabled=no
    add chain=VIRUS protocol=udp dst-port=3031 action=drop comment="" disabled=no
    add chain=teste action=accept comment="" disabled=no
    add chain=bogon src-address=0.0.0.0/8 action=drop comment="" disabled=no
    add chain=bogon dst-address=0.0.0.0/8 action=drop comment="" disabled=no
    add chain=bogon src-address=127.0.0.0/8 action=drop comment="" disabled=no
    add chain=bogon dst-address=127.0.0.0/8 action=drop comment="" disabled=no
    add chain=bogon src-address=224.0.0.0/3 action=drop comment="" disabled=no
    add chain=icmp protocol=icmp icmp-options=0:0 action=accept comment="" disabled=no
    add chain=icmp protocol=icmp icmp-options=8:0 action=accept comment="" disabled=no
    add chain=icmp protocol=icmp icmp-options=11:0 action=accept comment="" disabled=no
    add chain=icmp protocol=icmp icmp-options=3:3 action=accept comment="" disabled=no
    add chain=icmp protocol=icmp icmp-options=3:4 action=accept comment="" disabled=no
    add chain=icmp protocol=icmp action=drop comment="" disabled=no






Tópicos Similares

  1. Problema com perda de pacotes ( help )
    Por igoiglesias no fórum Redes
    Respostas: 11
    Último Post: 21-10-2010, 12:31
  2. Desligar Servidor Após perda de Ping de um Host
    Por Jonatanmcc no fórum Sistemas Operacionais
    Respostas: 0
    Último Post: 16-10-2009, 23:19
  3. Problemas com teste de ping na versão 3.23
    Por cooperrj no fórum Redes
    Respostas: 4
    Último Post: 21-05-2009, 07:54
  4. Perda de ping e tambem ping alto mikrotik
    Por Cristhianvha no fórum Redes
    Respostas: 10
    Último Post: 09-01-2009, 12:46
  5. routerboard 133 com 3 cartões com perda de ping
    Por adrandrade no fórum Redes
    Respostas: 15
    Último Post: 17-06-2008, 23:24

Visite: BR-Linux ·  VivaOLinux ·  Dicas-L