Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Virus

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 4

/ ip firewall filter

add chain=Virus protocol=tcp dst-port=1434 action=drop comment="port block \


warning" disabled=no
add chain=Virus protocol=udp dst-port=1434 action=drop comment="" disabled=no
add chain=Virus protocol=udp dst-port=2745 action=drop comment="" disabled=no
add chain=Virus protocol=tcp dst-port=6344-6381 action=drop comment="" \
disabled=no
add chain=Virus protocol=udp dst-port=6344-6381 action=drop comment="" \
disabled=no
add chain=Virus protocol=tcp dst-port=1080 action=drop comment="MyDoom" \
disabled=no
add chain=Virus protocol=tcp dst-port=1214 action=drop comment="" disabled=no
add chain=Virus protocol=tcp dst-port=593 action=drop comment="" disabled=no
add chain=Virus protocol=tcp dst-port=1024-1030 action=drop comment="" \
disabled=no
add chain=Virus protocol=tcp dst-port=135-139 action=drop comment="Blaster \
Worm" disabled=no
add chain=Virus protocol=udp dst-port=135-139 action=drop comment="Messenger \
Worm" disabled=no
add chain=Virus protocol=tcp dst-port=445 action=drop comment="Blaster Worm" \
disabled=no
add chain=Virus protocol=udp dst-port=445 action=drop comment="Blaster Worm" \
disabled=no
add chain=Virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" \
disabled=no
add chain=Virus protocol=tcp dst-port=1364 action=drop comment="ndm server" \
disabled=no
add chain=Virus protocol=tcp dst-port=1368 action=drop comment="screen cast" \
disabled=no
add chain=Virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" \
disabled=no
add chain=Virus protocol=tcp dst-port=1377 action=drop comment="cichlid" \
disabled=no
add chain=Virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" \
disabled=no
add chain=Virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" \
disabled=no
add chain=Virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" \
disabled=no
add chain=Virus protocol=tcp dst-port=2235 action=drop comment="Drop Beagle" \
disabled=no
add chain=Virus protocol=tcp dst-port=2745 action=drop comment="Drop \
Beagle.C-K" disabled=no
add chain=Virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop \
MyDoom" disabled=no
add chain=Virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor \
OptixPro" disabled=no
add chain=Virus protocol=tcp dst-port=4444 action=drop comment="Worm" \
disabled=no
add chain=Virus protocol=udp dst-port=4444 action=drop comment="Worm" \
disabled=no
add chain=Virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" \
disabled=no
add chain=Virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" \
disabled=no
add chain=Virus protocol=tcp dst-port=9898 action=drop comment="Drop \
Dabber.A-B" disabled=no
add chain=Virus protocol=tcp dst-port=10000 action=drop comment="Drop \
Dumaru.Y" disabled=no
add chain=Virus protocol=tcp dst-port=10080 action=drop comment="Drop \
MyDoom.B" disabled=no
add chain=Virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" \
disabled=no
add chain=Virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" \
disabled=no
add chain=Virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, \
Agobot, Gaobot" disabled=no
add chain=Virus protocol=tcp dst-port=27374 action=drop comment="Drop \
SubSeven" disabled=no

add chain=forward connection-state=invalid action=drop comment="" disabled=no


add chain=forward connection-state=related action=accept comment="" \
disabled=no
add chain=forward connection-state=established action=accept comment="" \
disabled=no
add chain=forward action=jump jump-target=Virus comment="" disabled=no

add chain=input connection-state=invalid action=drop comment="" disabled=no


add chain=input connection-state=related action=accept comment="" disabled=no
add chain=input connection-state=established action=accept comment="" \
disabled=no
add chain=input action=jump jump-target=Virus comment="" disabled=no

----------------------------------------------------------------------------------

/ip firewall filter


add chain=input connection-state=established comment="Accept established
connections"
add chain=input connection-state=related comment="Accept related connections"
add chain=input connection-state=invalid action=drop comment="Drop invalid
connections"
add chain=input protocol=udp action=accept comment="UDP" disabled=no
add chain=forward connection-state=invalid action=drop comment="drop invalid
connections"
add chain=input protocol=icmp limit=50/5s,2 comment="Allow limited pings"
add chain=input protocol=icmp action=drop comment="Drop excess pings"

add action=drop chain=input comment="DROP PING REPLY" disabled=no protocol=icmp


src-address=!10.10.0.4

add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster


Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop Messenger
Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid"
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K"

add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom"


add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor
OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot,
Agobot, Gaobot"
add chain=forward action=jump jump-target=virus comment="jump to the virus chain"

add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-


list="port scanners" address-list-timeout=2w comment="Port scanners to list "
disabled=no
add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-
to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP
FIN Stealth scan"
add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list
address-list="port scanners" address-list-timeout=2w comment="SYN/FIN scan"
add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list
address-list="port scanners" address-list-timeout=2w comment="SYN/RST scan"
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-
to-address-list address-list="port scanners" address-list-timeout=2w
comment="FIN/PSH/URG scan"
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-
address-list address-list="port scanners" address-list-timeout=2w comment="ALL/ALL
scan"
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-
src-to-address-list address-list="port scanners" address-list-timeout=2w
comment="NMAP NULL scan"
add chain=input src-address-list="port scanners" action=drop comment="dropping port
scanners" disabled=no

add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop


comment="drop ftp brute forcers"
add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-
limit=1/1m,9,dst-address/1m
add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login
incorrect" address-list=ftp_blacklist address-list-timeout=3h
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop
comment="drop ssh brute forcers" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-
list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist address-
list-timeout=3d comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-
list=ssh_stage2 action=add-src-to-address-list address-list=ssh_stage3 address-
list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-
list=ssh_stage1 action=add-src-to-address-list address-list=ssh_stage2 address-
list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new action=add-src-to-
address-list address-list=ssh_stage1 address-list-timeout=1m comment="" disabled=no

add chain=forward protocol=tcp dst-port=22 src-address-list=ssh_blacklist


action=drop comment="drop ssh brute downstream" disabled=no

You might also like