بيانات العضو
hanyfarag .:: مراقب عام قسم الحاسب ::.
معلومات العضو
المساهمات : 340العمر : 53السٌّمعَة : 33النقاط : : 56148تاريخ التسجيل : 28/06/2009
موضوع: رول انتى فيرس لسيرفر ميكروتك الجمعة 18 سبتمبر 2009, 16:22
فقط ضيف الرول عفواً النص مخفي يتوجب عليك وضع رد أولاً
الكود: [size=12]ip firewall filter add action=passthrough chain=unused-hs-chain comment="place hotspot rules here" disabled=no add action=drop chain=forward comment="" disabled=no p2p=all-p2p add action=drop chain=forward comment="" disabled=no p2p=bit-torrent add action=drop chain=forward comment="" disabled=no p2p=blubster add action=drop chain=forward comment="" disabled=no p2p=direct-connect add action=drop chain=forward comment="" disabled=no p2p=edonkey add action=drop chain=forward comment="" disabled=no p2p=fasttrack add action=drop chain=forward comment="" disabled=no p2p=gnutella add action=drop chain=forward comment="" disabled=no p2p=soulseek add action=drop chain=forward comment="" disabled=no p2p=warez add action=drop chain=forward comment="" disabled=no p2p=winmx add action=drop chain=virus comment="Drop Blaster Worm" disabled=no dst-port=135-139 protocol=tcp add action=drop chain=virus comment="Drop Messenger Worm" disabled=no dst-port=135-139 protocol=udp add action=drop chain=virus comment="Drop Blaster Worm" disabled=no dst-port=445 protocol=tcp add action=drop chain=virus comment="Drop Blaster Worm" disabled=no dst-port=445 protocol=udp add action=drop chain=virus comment=________ disabled=no dst-port=593 protocol=tcp add action=drop chain=virus comment=________ disabled=no dst-port=1024-1030 protocol=tcp add action=drop chain=virus comment="Drop MyDoom" disabled=no dst-port=1080 protocol=tcp add action=drop chain=virus comment=________ disabled=no dst-port=1214 protocol=tcp add action=drop chain=virus comment="ndm requester" disabled=no dst-port=1363 protocol=tcp add action=drop chain=virus comment="ndm server" disabled=no dst-port=1364 protocol=tcp add action=drop chain=virus comment="screen cast" disabled=no dst-port=1368 protocol=tcp add action=drop chain=virus comment=hromgrafx disabled=no dst-port=1373 protocol=tcp add action=drop chain=virus comment=cichlid disabled=no dst-port=1377 protocol=tcp add action=drop chain=virus comment=Worm disabled=no dst-port=1433-1434 protocol=tcp add action=drop chain=virus comment="Bagle Virus" disabled=no dst-port=2745 protocol=tcp add action=drop chain=virus comment="Drop Dumaru.Y" disabled=no dst-port=2283 protocol=tcp add action=drop chain=virus comment="Drop Beagle" disabled=no dst-port=2535 protocol=tcp add action=drop chain=virus comment="Drop Beagle.C-K" disabled=no dst-port=2745 protocol=tcp add action=drop chain=virus comment="Drop MyDoom" disabled=no dst-port=3127-3128 protocol=tcp add action=drop chain=virus comment="Drop Backdoor OptixPro" disabled=no dst-port=3410 protocol=tcp add action=drop chain=virus comment=Worm disabled=no dst-port=4444 protocol=tcp add action=drop chain=virus comment=Worm disabled=no dst-port=4444 protocol=udp add action=drop chain=virus comment="Drop Sasser" disabled=no dst-port=5554 protocol=tcp add action=drop chain=virus comment="Drop Beagle.B" disabled=no dst-port=8866 protocol=tcp add action=drop chain=virus comment="Drop Dabber.A-B" disabled=no dst-port=9898 protocol=tcp add action=drop chain=virus comment="Drop Dumaru.Y" disabled=no dst-port=10000 protocol=tcp add action=drop chain=virus comment="Drop MyDoom.B" disabled=no dst-port=10080 protocol=tcp add action=drop chain=virus comment="Drop NetBus" disabled=no dst-port=12345 protocol=tcp add action=drop chain=virus comment="Drop Kuang2" disabled=no dst-port=17300 protocol=tcp add action=drop chain=virus comment="Drop SubSeven" disabled=no dst-port=27374 protocol=tcp add action=drop chain=virus comment="Drop PhatBot, Agobot, Gaobot" disabled=no dst-port=65506 protocol=tcp add action=jump chain=forward comment="jump to the virus chain" disabled=no jump-target=virus add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="Port scanners to list " disabled=no protocol=tcp psd=21,3s,3,1 add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="NMAP FIN Stealth scan\ \n" disabled=no protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="" disabled=no protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="SYN/FIN scan" disabled=no protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="SYN/RST scan" disabled=no protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="FIN/PSH/URG scan" disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="ALL/ALL scan" disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="NMAP NULL scan" disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=input comment="dropping port scanners" disabled=no src-address-list="port scanners" add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="Port scanners to list " disabled=no protocol=tcp psd=21,3s,3,1 add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="NMAP FIN Stealth scan\ \n" disabled=no protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="" disabled=no protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="SYN/FIN scan" disabled=no protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="SYN/RST scan" disabled=no protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="FIN/PSH/URG scan" disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="ALL/ALL scan" disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=forward \ comment="NMAP NULL scan" disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=forward comment="dropping port scanners" disabled=no src-address-list=\ "port scanners" add action=jump chain=forward comment="" disabled=no jump-target=restrict-tcp protocol=tcp add action=reject chain=restrict-tcp comment="" connection-mark=auth disabled=no reject-with=\ icmp-network-unreachable add action=jump chain=restrict-tcp comment="anti-spam policy" connection-mark=smtp disabled=no \ jump-target=smtp-first-drop add action=add-src-to-address-list address-list=approved-smtp address-list-timeout=5s chain=\ smtp-first-drop comment="" disabled=no src-address-list=first-smtp add action=return chain=smtp-first-drop comment="" disabled=no src-address-list=approved-smtp add action=add-src-to-address-list address-list=first-smtp address-list-timeout=5s chain=smtp-first-drop \ comment="" disabled=no add action=reject chain=smtp-first-drop comment="" disabled=no reject-with=icmp-network-unreachable add action=accept chain=forward comment="Allow HTTP" disabled=no dst-port=80 protocol=tcp add action=accept chain=forward comment="Allow SMTP" disabled=no dst-port=25 protocol=tcp add action=accept chain=forward comment="allow TCP" disabled=no protocol=tcp add action=accept chain=forward comment="allow ping" disabled=no protocol=icmp add action=accept chain=forward comment="allow udp" disabled=no protocol=udp add action=drop chain=forward comment="drop everything else" disabled=no add action=accept chain=forward comment="allow established connections" connection-state=established \ disabled=no add action=accept chain=forward comment="allow related connections" connection-state=related disabled=no add action=drop chain=forward comment="drop invalid connections" connection-state=invalid disabled=no[/size]
الموضوع الأصلي : رول انتى فيرس لسيرفر ميكروتك المصدر : مُنتَدَيَاتْ صُـوتــْ بَــلَــدْنََــا
______________________________________________________
hanyfarag
بيانات العضو
Super Admin .:: ADM!N ::.
معلومات العضو
المساهمات : 2341العمر : 35الموقع المفضل : صوت بلدنا فقط لا غيرالعمل أو الوظيفة : محاميالمزاج : قشطة و الحمد للهالسٌّمعَة : 35النقاط : : 71387تاريخ التسجيل : 02/03/2009
معلومات الاتصال
بيانات العضو
byru صوت
معلومات العضو
المساهمات : 4العمر : 46السٌّمعَة : 1النقاط : : 51964تاريخ التسجيل : 26/02/2010
بيانات العضو
himaelkawas صوت
معلومات العضو
المساهمات : 1العمر : 37السٌّمعَة : 1النقاط : : 51551تاريخ التسجيل : 08/04/2010
بيانات العضو
noor2005 صوت
معلومات العضو
المساهمات : 2العمر : 58السٌّمعَة : 1النقاط : : 45182تاريخ التسجيل : 05/01/2012
بيانات العضو
noor2005 صوت
معلومات العضو
المساهمات : 2العمر : 58السٌّمعَة : 1النقاط : : 45182تاريخ التسجيل : 05/01/2012