Virus dan malware pada jaringan dapat terjadi jika anda tidak selektif dalam mengaktifkan port apa saja yang digunakan. Berikut ini adalah tutorial Cara Block Virus Jaringan Pada Mikrotik yang digunakan untuk mengamankan jaringan dari penyebaran virus dan malware. Kita dapat menutup port komunikasi yang tidak digunakan dan rentan dimanfaatkan oleh virus. Konfigurasi ini berjalan untuk RouterOS versi 6 dan belum diuji pada RouterOS versi 7.
Cara Block Virus Jaringan Pada Mikrotik
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 |
/ip firewall filter add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Blaster Worm" add chain=virus protocol=udp dst-port=135-139 action=drop comment="Messenger Worm" add chain=virus protocol=tcp dst-port=445 action=drop comment="Blaster Worm" add chain=virus protocol=udp dst-port=445 action=drop comment="Blaster Worm" add chain=virus protocol=tcp dst-port=593 action=drop comment="____" add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="____" add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" add chain=virus protocol=tcp dst-port=1214 action=drop comment="____" add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server" add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast" add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid" add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" add chain=virus protocol=tcp dst-port=2283 action=drop comment="Dumaru.Y" add chain=virus protocol=tcp dst-port=2535 action=drop comment="Beagle" add chain=virus protocol=tcp dst-port=2745 action=drop comment="Beagle.C-K" add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="MyDoom" add chain=virus protocol=tcp dst-port=3410 action=drop comment="Backdoor OptixPro" add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B" add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y" add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B" add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" yet add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven" add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot,Agobot, Gaobot" add chain=virus protocol=udp dst-port=12667 action=drop comment="Trinoo" disabled=no add chain=virus protocol=udp dst-port=27665 action=drop comment="Trinoo" disabled=no add chain=virus protocol=udp dst-port=31335 action=drop comment="Trinoo" disabled=no add chain=virus protocol=udp dst-port=27444 action=drop comment="Trinoo" disabled=no add chain=virus protocol=udp dst-port=34555 action=drop comment="Trinoo" disabled=no add chain=virus protocol=udp dst-port=35555 action=drop comment="Trinoo" disabled=no add chain=virus protocol=tcp dst-port=27444 action=drop comment="Trinoo" disabled=no add chain=virus protocol=tcp dst-port=27665 action=drop comment="Trinoo" disabled=no add chain=virus protocol=tcp dst-port=31335 action=drop comment="Trinoo" disabled=no add chain=virus protocol=tcp dst-port=31846 action=drop comment="Trinoo" disabled=no add chain=virus protocol=tcp dst-port=34555 action=drop comment="Trinoo" disabled=no add chain=virus protocol=tcp dst-port=35555 action=drop comment="Trinoo" disabled=no add action=drop chain=forward comment=";;Block W32.Kido - Conficker" disabled=no protocol=udp src-port=135-139,445 add action=drop chain=forward comment="" disabled=no dst-port=135-139,445 protocol=udp add action=drop chain=forward comment="" disabled=no protocol=tcp src-port=135-139,445,593 add action=drop chain=forward comment="" disabled=no dst-port=135-139,445,593 protocol=tcp add action=accept chain=input comment="Allow limited pings" disabled=no limit=50/5s,2 protocol=icmp add action=accept chain=input comment="" disabled=no limit=50/5s,2 protocol=icmp add action=drop chain=input comment="drop FTP Brute Forcers" disabled=no dst-port=21 protocol=tcp src-address-list=FTP_BlackList add action=drop chain=input comment="" disabled=no dst-port=21 protocol=tcp src-address-list=FTP_BlackList add action=accept chain=output comment="" content="530 Login incorrect" disabled=no dst-limit=1/1m,9,dst-address/1m protocol=tcp add action=add-dst-to-address-list address-list=FTP_BlackList address-list-timeout=1d chain=output comment="" content="530 Login incorrect" disabled=no protocol=tcp add action=drop chain=input comment="drop SSH&TELNET Brute Forcers" disabled=no dst-port=22-23 protocol=tcp src-address-list=IP_BlackList add action=add-src-to-address-list address-list=IP_BlackList address-list-timeout=1d chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp src-address-list=SSH_BlackList_3 add action=add-src-to-address-list address-list=SSH_BlackList_3 address-list-timeout=1m chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp src-address-list=SSH_BlackList_2 add action=add-src-to-address-list address-list=SSH_BlackList_2 address-list-timeout=1m chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp src-address-list=SSH_BlackList_1 add action=add-src-to-address-list address-list=SSH_BlackList_1 address-list-timeout=1m chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp add action=drop chain=input comment="drop port scanners" disabled=no src-address-list=port_scanners add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,syn add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=syn,rst add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg add action=add-src-to-address-list address-list=port_scanners Along yet address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg add action=drop chain=forward comment="Block W32.Kido - Conficker" disabled=no protocol=udp src-port=135-139,445 add action=drop chain=forward comment="" disabled=no dst-port=135-139,445 protocol=udp add action=drop chain=forward comment="" disabled=no protocol=tcp src-port=135-139,445,593 add action=drop chain=forward comment="" disabled=no dst-port=135-139,445,593 protocol=tcp add action=accept chain=input comment="Allow limited pings" disabled=no limit=50/5s,2 protocol=icmp add action=accept chain=input comment="" disabled=no limit=50/5s,2 protocol=icmp add action=drop chain=input comment="drop FTP Gloom & Doom" disabled=no dst-port=139,445 protocol=tcp add action=drop chain=input comment="Block FTP Brute Forcers" disabled=no dst-port=21 protocol=tcp src-address-list=FTP_BlackList add action=drop chain=input comment="Block W32.Kido - Conficker" disabled=no protocol=udp src-port=135-139,445 add action=drop chain=forward comment="Block W32.Kido - Conficker" disabled=no protocol=udp src-port=135-139,445 |
Virus Jaman Sekarang (2024)
Untuk melindungi jaringan dari ancaman ini, pastikan untuk selalu memperbarui firmware dan perangkat lunak keamanan, serta menerapkan kebijakan keamanan yang ketat. Keamanan jaringan adalah prioritas utama, dan kami di GemarOprek siap membantu Anda dengan layanan manajemen yang profesional dan terpercaya. Dengan jasa manage service kami, Anda bisa fokus pada bisnis Anda sementara kami memastikan jaringan Anda aman dari segala jenis ancaman.