Advertisement
Guest User

filter basic mikrotik fw

a guest
Nov 15th, 2019
848
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.32 KB | None | 0 0
  1. /ip firewall filter
  2. add action=add-src-to-address-list address-list=Suspect.Spam \
  3. address-list-timeout=none-dynamic chain=forward comment=\
  4. "Log Spammer To Address List" dst-port=25,465,587 protocol=tcp \
  5. src-address-list=Spammer
  6. add action=tarpit chain=forward comment="Block Spammer Or Infected IP" \
  7. dst-port=25,143,587 protocol=tcp src-address-list=Spammer
  8. add action=add-src-to-address-list address-list=Spammer address-list-timeout=\
  9. 3d chain=forward comment="Detect & Add-list SMTP Virus Or Spammers" \
  10. connection-limit=30,32 dst-port=25,465,587 limit=50,5:packet protocol=tcp \
  11. src-address-list=!WhiteListSpam
  12. add action=passthrough chain=unused-hs-chain comment=\
  13. "place hotspot rules here"
  14. add action=drop chain=Virus comment="port block warning" dst-port=1434 \
  15. protocol=tcp
  16. add action=drop chain=Virus dst-port=1434 protocol=udp
  17. add action=drop chain=Virus dst-port=2745 protocol=udp
  18. add action=drop chain=Virus dst-port=6344-6381 protocol=tcp
  19. add action=drop chain=Virus dst-port=6344-6381 protocol=udp
  20. add action=drop chain=Virus comment=MyDoom dst-port=1080 protocol=tcp
  21. add action=drop chain=Virus dst-port=1214 protocol=tcp
  22. add action=drop chain=Virus dst-port=593 protocol=tcp
  23. add action=drop chain=Virus dst-port=1024-1030 protocol=tcp
  24. add action=drop chain=Virus comment=SNPP dst-port=444 protocol=tcp
  25. add action=drop chain=Virus comment="Blaster Worm" dst-port=135-139 protocol=\
  26. tcp
  27. add action=drop chain=Virus comment="Messenger Worm" dst-port=135-139 \
  28. protocol=udp
  29. add action=add-src-to-address-list address-list=ip-infected-virus \
  30. address-list-timeout=3d chain=Virus comment="Blaster Worm" \
  31. dst-address-list=!smb-flooder dst-port=445 protocol=tcp src-address-list=\
  32. smb-flooder
  33. add action=drop chain=Virus comment="Blaster Worm" dst-address-list=\
  34. !smb-flooder dst-port=445 protocol=tcp src-address-list=smb-flooder
  35. add action=drop chain=Virus comment="Blaster Worm" dst-address-list=\
  36. !smb-flooder dst-port=445 protocol=udp src-address-list=smb-flooder
  37. add action=drop chain=Virus comment="ndm requester" dst-port=1363 protocol=\
  38. tcp
  39. add action=drop chain=Virus comment="ndm server" dst-port=1364 protocol=tcp
  40. add action=drop chain=Virus comment="screen cast" dst-port=1368 protocol=tcp
  41. add action=drop chain=Virus comment=hromgrafx dst-port=1373 protocol=tcp
  42. add action=drop chain=Virus comment=cichlid dst-port=1377 protocol=tcp
  43. add action=drop chain=Virus comment=Worm dst-port=1433-1434 protocol=tcp
  44. add action=drop chain=Virus comment="Bagle Virus" dst-port=2745 protocol=tcp
  45. add action=drop chain=Virus comment="Drop Dumaru.Y" dst-port=2283 protocol=\
  46. tcp
  47. add action=drop chain=Virus comment="Drop Beagle" dst-port=2235 protocol=tcp
  48. add action=drop chain=Virus comment="Drop Beagle.C-K" dst-port=2745 protocol=\
  49. tcp
  50. add action=drop chain=Virus comment="Drop MyDoom" dst-port=3127-3128 \
  51. protocol=tcp
  52. add action=drop chain=Virus comment="Drop Backdoor OptixPro" dst-port=3410 \
  53. protocol=tcp
  54. add action=drop chain=Virus comment=Worm dst-port=4444 protocol=tcp
  55. add action=drop chain=Virus comment=Worm dst-port=4444 protocol=udp
  56. add action=drop chain=Virus comment="Drop Sasser" dst-port=5554 protocol=tcp
  57. add action=drop chain=Virus comment="Drop Beagle.B" dst-port=8866 protocol=\
  58. tcp
  59. add action=drop chain=Virus comment="Drop Dabber.A-B" dst-port=9898 protocol=\
  60. tcp
  61. add action=drop chain=Virus comment="Drop Dumaru.Y" dst-port=10000 protocol=\
  62. tcp
  63. add action=drop chain=Virus comment="Drop MyDoom.B" dst-port=10080 protocol=\
  64. tcp
  65. add action=drop chain=Virus comment="Drop NetBus" dst-port=12345 protocol=tcp
  66. add action=drop chain=Virus comment="Drop Kuang2" dst-port=17300 protocol=tcp
  67. add action=drop chain=Virus comment="Drop PhatBot, Agobot, Gaobot" dst-port=\
  68. 65506 protocol=tcp
  69. add action=drop chain=Virus comment="Drop SubSeven" dst-port=27374 protocol=\
  70. tcp
  71. add action=drop chain=forward connection-state=invalid
  72. add action=accept chain=forward connection-state=related
  73. add action=accept chain=forward connection-state=established
  74. add action=jump chain=forward jump-target=Virus
  75. add action=drop chain=input connection-state=invalid
  76. add action=accept chain=input connection-state=related
  77. add action=accept chain=input connection-state=established
  78. add action=jump chain=input jump-target=Virus
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement