ALGUEM ME AJUDA ESTOU PENSANDO EM COLOCAR ESTAR REGRAS EM MEU MK USO REDE CABEADA AQUI NA LANHOUSE FAIXA DE IP ADDRESLIST: 192.168.2.1/24
USO TBM PPPOE IP CLIENTES: 10.10.10.2-10.10.10.254 ---- QUAIS ALTERAÇÕES DEVO FAZER NAS REGRAS ABAIXO PARA INSERIR EM MINHA REDE AS REGRAS.
para o bloqueio de vírus uso estás regras abaixo.
/ ip firewall filter
add chain=input action=drop in-interface=ether3 dst-port=8080 protocol=tcp \
comment="Bloqueio ao acesso externo do web-proxy" disabled=no
add chain=forward action=drop dst-port=135-139 protocol=tcp comment="Bloqueio \
da Netbios para n o compatilhar arquivos em rede usando o Mikrotik" \
disabled=no
add chain=forward action=drop dst-port=445 protocol=tcp comment="" disabled=no
add chain=forward action=drop dst-port=135-139 protocol=udp comment="" \
disabled=no
add chain=forward action=drop dst-port=445 protocol=udp comment="" disabled=no
add chain=forward action=drop src-address=192.0.0.0/16 \
dst-address=192.0.0.0/16 comment="" disabled=no
add chain=input action=accept connection-state=established \
comment="Established connections" disabled=no
add chain=input action=accept connection-state=related comment="Related \
connections" disabled=no
add chain=input action=log connection-state=invalid log-prefix="INVALID" \
comment="Log invalid connections" disabled=no
add chain=input action=drop connection-state=invalid comment="Drop invalid \
connections" disabled=no
add chain=input action=jump jump-target=virus comment="!!! Check for \
well-known viruses !!!" disabled=no
add chain=input action=accept protocol=udp comment="UDP" disabled=no
add chain=input action=accept protocol=icmp comment="ICMP" disabled=no
add chain=input action=accept dst-port=1723 protocol=tcp comment="Allow PPTP" \
disabled=no
add chain=input action=accept protocol=gre comment="Allow PPTP" disabled=no
add chain=input action=accept protocol=ospf comment="Allow OSPF" disabled=no
add chain=input action=jump jump-target=demo comment="Jump to demo chain" \
disabled=no
add chain=input action=accept src-address=192.168.10.0/24 comment="From local \
net" disabled=no
add chain=forward action=accept connection-state=established \
comment="Established connections" disabled=no
add chain=forward action=accept connection-state=related comment="Related \
connections" disabled=no
add chain=forward action=log connection-state=invalid log-prefix="INVALID" \
comment="Log invalid connections" disabled=no
add chain=forward action=drop connection-state=invalid comment="Drop invalid \
connections" disabled=no
add chain=forward action=jump jump-target=virus comment="!!! Check for \
well-known viruses !!!" disabled=no
add chain=forward action=accept protocol=udp comment="UDP" disabled=no
add chain=forward action=accept protocol=icmp comment="ICMP" disabled=no
add chain=virus action=drop dst-port=135-139 protocol=tcp comment="Drop \
Blaster Worm" disabled=no
add chain=virus action=drop dst-port=135-139 protocol=udp comment="Drop \
Messenger Worm" disabled=no
add chain=virus action=drop dst-port=445 protocol=tcp comment="Drop Blaster \
Worm" disabled=no
add chain=virus action=drop dst-port=445 protocol=udp comment="Drop Blaster \
Worm" disabled=no
add chain=virus action=drop dst-port=593 protocol=tcp comment="________" \
disabled=no
add chain=virus action=drop dst-port=1024-1030 protocol=tcp comment="________" \
disabled=no
add chain=virus action=drop dst-port=1080 protocol=tcp comment="Drop MyDoom" \
disabled=no
add chain=virus action=drop dst-port=1214 protocol=tcp comment="________" \
disabled=no
add chain=virus action=drop dst-port=1363 protocol=tcp comment="ndm requester" \
disabled=no
add chain=virus action=drop dst-port=1364 protocol=tcp comment="ndm server" \
disabled=no
add chain=virus action=drop dst-port=1368 protocol=tcp comment="screen cast" \
disabled=no
add chain=virus action=drop dst-port=1373 protocol=tcp comment="hromgrafx" \
disabled=no
add chain=virus action=drop dst-port=1377 protocol=tcp comment="cichlid" \
disabled=no
add chain=virus action=drop dst-port=1433-1434 protocol=tcp comment="Worm" \
disabled=no
add chain=virus action=drop dst-port=2745 protocol=tcp comment="Bagle Virus" \
disabled=no
add chain=virus action=drop dst-port=2283 protocol=tcp comment="Drop Dumaru.Y" \
disabled=no
add chain=virus action=drop dst-port=2535 protocol=tcp comment="Drop Beagle" \
disabled=no
add chain=virus action=drop dst-port=2745 protocol=tcp comment="Drop \
Beagle.C-K" disabled=no
add chain=virus action=drop dst-port=3127-3128 protocol=tcp comment="Drop \
MyDoom" disabled=no
add chain=virus action=drop dst-port=3410 protocol=tcp comment="Drop Backdoor \
OptixPro" disabled=no
add chain=virus action=drop dst-port=4444 protocol=tcp comment="Worm" \
disabled=no
add chain=virus action=drop dst-port=4444 protocol=udp comment="Worm" \
disabled=no
add chain=virus action=drop dst-port=5554 protocol=tcp comment="Drop Sasser" \
disabled=no
add chain=virus action=drop dst-port=8866 protocol=tcp comment="Drop Beagle.B" \
disabled=no
add chain=virus action=drop dst-port=9898 protocol=tcp comment="Drop \
Dabber.A-B" disabled=no
add chain=virus action=drop dst-port=10000 protocol=tcp comment="Drop \
Dumaru.Y" disabled=no
add chain=virus action=drop dst-port=10080 protocol=tcp comment="Drop \
MyDoom.B" disabled=no
add chain=virus action=drop dst-port=12345 protocol=tcp comment="Drop NetBus" \
disabled=no
add chain=virus action=drop dst-port=17300 protocol=tcp comment="Drop Kuang2" \
disabled=no
add chain=virus action=drop dst-port=27374 protocol=tcp comment="Drop \
SubSeven" disabled=no
add chain=virus action=drop dst-port=65506 protocol=tcp comment="Drop PhatBot, \
Agobot, Gaobot" disabled=no
add chain=demo action=accept dst-port=8291 protocol=tcp comment="Allow WinBox \
for demo purposes" disabled=no
add chain=demo action=accept dst-port=80 protocol=tcp comment="Allow Web for \
demo purposes" disabled=no
add chain=demo action=accept dst-port=23 protocol=tcp comment="Allow Telnet \
for demo purposes" disabled=no
add chain=demo action=accept dst-port=22 protocol=tcp comment="Allow SSH for \
demo purposes" disabled=no