ubnt解决方案
查看: 1461|回复: 2

[RouterOS] ROS防火墙脚本

[复制链接]

2

回帖

567

积分

52 小时

在线时间

中尉

注册时间
2016-1-6
金币
493 个
威望
0 个
荣誉
0 个
累计签到:35 天
连续签到:0 天
[LV.50]初入江湖
发表于 2016-8-31 17:45
/ ip firewall filter
% x" Q8 W4 R  H" P0 D/ fadd chain=input connection-state=invalid action=drop \
7 {6 X/ [5 n4 W& C2 ycomment=”丢弃非法连接packets” disabled=no
! h0 }; L9 v8 F  ^! E( Yadd chain=input protocol=tcp dst-port=80 connection-limit=90,0 action=drop \5 @# Z1 e. j6 c+ g/ }
comment=”限制总http连接数为90″ disabled=no0 b/ n6 }$ e8 Z
add chain=input protocol=tcp psd=21,3s,3,1 action=drop \" U) D. p. O5 ~
comment=”探测并丢弃端口扫描连接” disabled=no
/ R  C7 v' L1 t2 E* jadd chain=input protocol=tcp connection-limit=3,32 src-address-list=black_list \
) Z$ m( ~; d3 O9 l4 b2 \action=tarpit comment=”压制DoS攻击” disabled=no# S4 K( e% C0 K* v
add chain=input protocol=tcp connection-limit=10,32 \2 E/ R- P! e9 b) S0 v
action=add-src-to-address-list address-list=black_list \
9 ?6 L  @2 a$ w* Z. |$ r! E6 [address-list-timeout=1d comment=”探测DoS攻击” disabled=no* X& Z3 Z3 Z6 L* m/ p% E# J8 b
add chain=input dst-address-type=!local action=drop comment=”丢弃掉非本地数据” \
' u' d1 F1 u3 {$ c6 ?disabled=no
* o6 S) q- Q0 \( I5 w9 c+ I0 Z2 _add chain=input src-address-type=!unicast action=drop \
# \" c4 N& u* }- X, y; ocomment=”丢弃掉所有非单播数据” disabled=no& T7 s+ s1 N) x& \
add chain=input protocol=icmp action=jump jump-target=ICMP \
+ b, W' ]$ J5 n0 dcomment=”跳转到ICMP链表” disabled=no4 T; W; k# i1 m, G  Q" S0 u
add chain=input protocol=tcp action=jump jump-target=virus \+ z, G$ E3 J  x4 M. X, [
comment=”跳转到病毒链表” disabled=no
* a- g8 a3 j  c3 [* l9 F* ]# Ladd chain=ICMP protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept \
: L1 _0 e% A4 M0 i8 t1 Z$ zcomment=”Ping应答限制为每秒5个包” disabled=no
, X6 j8 G% |& g% cadd chain=ICMP protocol=icmp icmp-options=3:3 limit=5,5 action=accept \8 s& e  {! a9 z, q
comment=”Traceroute限制为每秒5个包” disabled=no6 r- s6 O  B  a, ^0 Q* S
add chain=ICMP protocol=icmp icmp-options=3:4 limit=5,5 action=accept \% ]" {1 w0 T4 @- M
comment=”MTU线路探测限制为每秒5个包” disabled=no
0 ~' I" w' s1 h6 {' tadd chain=ICMP protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept \
3 ^  C9 `3 \# a1 q0 Y) ?comment=”Ping请求限制为每秒5个包” disabled=no; {% S, ~! Y. u6 _2 M! d
add chain=ICMP protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept \' a8 K. l' u& n6 C* L3 a0 M
comment=”Trace TTL限制为每秒5个包” disabled=no& L0 ~9 g7 S, O3 Y/ G' k
add chain=ICMP protocol=icmp action=drop comment=”丢弃掉任何ICMP数据” \
/ i6 R  U+ a  H" Q' Z# y* E( kdisabled=no
: Q  B; O  k6 p; I' Tadd chain=forward connection-state=established action=accept \
4 v2 m; t8 m% _9 {3 m. d- n8 Y. Kcomment=”接受以连接的数据包” disabled=no, ^" M8 g% W) l; x$ k: F
add chain=forward connection-state=related action=accept \; d2 K; ?( C* i/ l
comment=”接受相关数据包” disabled=no
, b6 t8 ^! m$ @add chain=forward connection-state=invalid action=drop \
8 z+ {7 P2 t- h0 b( o& y0 ?' Ncomment=”丢弃非法数据包” disabled=no
" f# O7 b( P6 [3 I2 }' {6 madd chain=forward protocol=tcp connection-limit=50,32 action=drop \
* o2 }$ X1 k7 H6 m5 pcomment=”限制每个主机TCP连接数为50条” disabled=no
0 V4 i! \% ]3 ]* ~! s# @add chain=forward src-address-type=!unicast action=drop \
2 h9 x! V* Z& x, s* ~9 s9 r: ycomment=”丢弃掉所有非单播数据” disabled=no" W! x( ~8 O3 d* F2 N4 m
add chain=forward protocol=icmp action=jump jump-target=ICMP \, J; ~, n# Z: _5 ]. U
comment=”跳转到ICMP链表” disabled=no: u; D# l% s) c# i9 S2 q! r6 M
add chain=forward action=jump jump-target=virus comment=”跳转到病毒链表” \
" m) S) b$ F* o+ V, f2 p4 g# Q" h) kdisabled=no. e: b; z9 _& z$ e. Y  D
add chain=virus protocol=tcp dst-port=41 action=drop \
7 d3 k" t( @$ R, Y2 Icomment=”DeepThroat.Trojan-1″ disabled=no* A* B- t+ A- Q3 O6 C9 @# ~
add chain=virus protocol=tcp dst-port=82 action=drop \7 K: L* n0 M5 u1 T  M) o
comment=”Worm.NetSky.Y@mm” disabled=no6 \1 V6 ?4 D( m- V
add chain=virus protocol=tcp dst-port=113 action=drop \
8 K8 f& q2 j6 p' r+ @comment=”W32.Korgo.A/B/C/D/E/F-1″ disabled=no; A% L) E) U- }( M- }5 c
add chain=virus protocol=tcp dst-port=2041 action=drop \
( {( O, o- k0 B' T. P- {5 O) Scomment=”W33.Korgo.A/B/C/D/E/F-2″ disabled=no# W6 a/ J# z! d* G# w# l
add chain=virus protocol=tcp dst-port=3150 action=drop \; J: o0 R& |( }& r
comment=”DeepThroat.Trojan-2″ disabled=no
4 C$ G# u. z7 h! m6 \& Wadd chain=virus protocol=tcp dst-port=3067 action=drop \$ b: J0 u/ @, z7 o
comment=”W32.Korgo.A/B/C/D/E/F-3″ disabled=no
% l  Z- G6 ?: g4 D' B  x2 [/ ~add chain=virus protocol=tcp dst-port=3422 action=drop \
7 B- y5 R- Z2 lcomment=”Backdoor.IRC.Aladdinz.R-1″ disabled=no8 I2 D8 ~! x% E
add chain=virus protocol=tcp dst-port=6667 action=drop \7 |0 V5 }; @4 z' t1 t
comment=”W32.Korgo.A/B/C/D/E/F-4″ disabled=no9 k- j& V" p0 Y& |
add chain=virus protocol=tcp dst-port=6789 action=drop \
5 r! }1 Z* P" o; f8 m3 Pcomment=”Worm.NetSky.S/T/U@mm” disabled=no
9 b' Q' l3 H4 Kadd chain=virus protocol=tcp dst-port=8787 action=drop \3 ~9 s# R2 `$ m  B4 @
comment=”Back.Orifice.2000.Trojan-1″ disabled=no
% x$ d1 k$ y, I, |' jadd chain=virus protocol=tcp dst-port=8879 action=drop \9 r* b7 z/ l) Y; _% o, P& `0 {
comment=”Back.Orifice.2000.Trojan-2″ disabled=no
5 H, \. T; U3 H6 h# _* x6 Madd chain=virus protocol=tcp dst-port=8967 action=drop \* n) N+ C/ N5 Q9 c( k* L
comment=”W32.Dabber.A/B-2″ disabled=no
4 t: {; A+ n" f- k' qadd chain=virus protocol=tcp dst-port=9999 action=drop \0 c* x& L  L4 o% ?7 \; H
comment=”W32.Dabber.A/B-3″ disabled=no! H. v: q' {' U, Y& }2 {3 n
add chain=virus protocol=tcp dst-port=20034 action=drop \
" g& L' l3 U4 f9 x- t5 d0 C1 Jcomment=”Block.NetBus.Trojan-2″ disabled=no3 ]5 t' [  F& c; K* ~0 v6 }
add chain=virus protocol=tcp dst-port=21554 action=drop \
: h0 {1 S7 X5 i% T  E9 \3 p0 Xcomment=”GirlFriend.Trojan-1″ disabled=no+ `3 S3 U+ v! H8 A& q! I; w
add chain=virus protocol=tcp dst-port=31666 action=drop \! H; }  {# [+ R  P
comment=”Back.Orifice.2000.Trojan-3″ disabled=no
1 |2 t2 C! K0 s. \3 a8 gadd chain=virus protocol=tcp dst-port=43958 action=drop \$ O) f5 u2 W5 x, L- m
comment=”Backdoor.IRC.Aladdinz.R-2″ disabled=no
4 U! V, d- m3 J; d- b  |add chain=virus protocol=tcp dst-port=999 action=drop \
# Y' T1 ^( Z& s/ V& kcomment=”DeepThroat.Trojan-3″ disabled=no
9 ]$ a( e# b" H4 F2 A2 i3 T6 kadd chain=virus protocol=tcp dst-port=6670 action=drop \( g4 Z6 c! b5 I  Q* P% ^' k. V$ O, Y
comment=”DeepThroat.Trojan-4″ disabled=no
% `9 m! _% N9 D8 ^7 \add chain=virus protocol=tcp dst-port=6771 action=drop \& ?* M; J3 X* g: N$ t: v2 L# Y
comment=”DeepThroat.Trojan-5″ disabled=no9 _4 D5 S! t( Y
add chain=virus protocol=tcp dst-port=60000 action=drop \
( [! e  y9 V* |' Acomment=”DeepThroat.Trojan-6″ disabled=no5 b! S7 \: [2 T2 O/ l4 o4 j
add chain=virus protocol=tcp dst-port=2140 action=drop \
4 D4 U- y3 v6 B' D. ]9 ^* C0 S, X5 ~# gcomment=”DeepThroat.Trojan-7″ disabled=no. T# g$ D1 i! x* l7 W2 L
add chain=virus protocol=tcp dst-port=10067 action=drop \6 b" I; h1 {  u8 p" `
comment=”Portal.of.Doom.Trojan-1″ disabled=no
0 u* N4 V  ~: K3 f, ~add chain=virus protocol=tcp dst-port=10167 action=drop \
4 J" o8 W; z$ ^/ H2 n5 I" o/ Tcomment=”Portal.of.Doom.Trojan-2″ disabled=no" b8 F% Y7 R' P
add chain=virus protocol=tcp dst-port=3700 action=drop \
0 H) x. Y' L" r3 ?  k+ acomment=”Portal.of.Doom.Trojan-3″ disabled=no, B  E! f2 R; d! P
add chain=virus protocol=tcp dst-port=9872-9875 action=drop \
: A& V" x" H, T5 [- ]1 }: ~comment=”Portal.of.Doom.Trojan-4″ disabled=no
: z* E! V6 P7 o6 k0 ladd chain=virus protocol=tcp dst-port=6883 action=drop \4 R; q7 H6 ?5 c  f
comment=”Delta.Source.Trojan-1″ disabled=no
. M" A% S: s" P; ]5 Cadd chain=virus protocol=tcp dst-port=26274 action=drop \
6 F( L  T( b  F( Wcomment=”Delta.Source.Trojan-2″ disabled=no
) ]4 [! r4 T$ F5 Q' z2 yadd chain=virus protocol=tcp dst-port=4444 action=drop \
8 |% e) J  A) w8 `9 rcomment=”Delta.Source.Trojan-3″ disabled=no  y" L9 x1 D3 A' T
add chain=virus protocol=tcp dst-port=47262 action=drop \6 ^* z1 }; Z8 e8 ~+ F0 ?( ~6 H
comment=”Delta.Source.Trojan-4″ disabled=no
: p9 w& Z& f; y/ i1 x; L7 M- o; r* ~, {add chain=virus protocol=tcp dst-port=3791 action=drop \
5 ^7 v1 @  V9 z% Z9 z; Bcomment=”Eclypse.Trojan-1″ disabled=no
+ x) }' }! f7 {* d0 L. kadd chain=virus protocol=tcp dst-port=3801 action=drop \
0 P" q* V& D0 P) r4 Y5 _  Icomment=”Eclypse.Trojan-2″ disabled=no' H1 W- B: `1 R1 K; c1 u: g" v
add chain=virus protocol=tcp dst-port=65390 action=drop \
" B& l0 z9 m; s' R2 }comment=”Eclypse.Trojan-3″ disabled=no# `3 p0 i9 J( @" ~- W' c  F
add chain=virus protocol=tcp dst-port=5880-5882 action=drop \1 l% b- W: `( k
comment=”Y3K.RAT.Trojan-1″ disabled=no
1 c+ {+ p: f3 q" Ladd chain=virus protocol=tcp dst-port=5888-5889 action=drop \
, k. ~' `: s( d+ y. Tcomment=”Y3K.RAT.Trojan-2″ disabled=no- a( Z- {+ w- J
add chain=virus protocol=tcp dst-port=30100-30103 action=drop \
$ M( M1 V6 a  P5 Fcomment=”NetSphere.Trojan-1″ disabled=no+ S1 P( y: v4 j/ _5 c" j' }2 K
add chain=virus protocol=tcp dst-port=30133 action=drop \
. F; J# k3 E; A2 ncomment=”NetSphere.Trojan-2″ disabled=no
, a4 `$ g* {. sadd chain=virus protocol=tcp dst-port=7300-7301 action=drop \
9 [% J2 k, N' N' z6 K8 R" B0 ycomment=”NetMonitor.Trojan-1″ disabled=no( k# o, v5 o. e' O' k5 E6 a
add chain=virus protocol=tcp dst-port=7306-7308 action=drop \
1 Q. N# B, P3 y- r  M: Ccomment=”NetMonitor.Trojan-2″ disabled=no
$ Z' B9 r4 l3 Q2 ~4 l! k- zadd chain=virus protocol=tcp dst-port=79 action=drop \' O5 d% r, ]2 d& O) x
comment=”FireHotcker.Trojan-1″ disabled=no
, n- T) T" X! p5 q5 v$ F) W0 Eadd chain=virus protocol=tcp dst-port=5031 action=drop \
: n$ g+ M  E! V+ P: Lcomment=”FireHotcker.Trojan-2″ disabled=no1 e- x7 A/ P8 ?- \) G
add chain=virus protocol=tcp dst-port=5321 action=drop \+ Y/ D7 t; _! x" v; V8 }! Q
comment=”FireHotcker.Trojan-3″ disabled=no4 {% w, c1 O3 n5 N6 r! A0 S
add chain=virus protocol=tcp dst-port=6400 action=drop \
* {  h; K- C: w9 i5 R) rcomment=”TheThing.Trojan-1″ disabled=no
1 c7 W; O/ O5 A3 w* S! A; sadd chain=virus protocol=tcp dst-port=7777 action=drop \5 n$ P; F& f% v. q* r
comment=”TheThing.Trojan-2″ disabled=no
; [  z+ A0 ?1 |/ q+ ?4 padd chain=virus protocol=tcp dst-port=1047 action=drop \1 \! \  D, h: M- D# V8 A: Q& a  o# V
comment=”GateCrasher.Trojan-1″ disabled=no
4 F  k& h  ^9 d/ Wadd chain=virus protocol=tcp dst-port=6969-6970 action=drop \7 R2 ^. N- W; A9 o2 l
comment=”GateCrasher.Trojan-2″ disabled=no( k( N; ?9 p7 [6 O5 r5 n
add chain=virus protocol=tcp dst-port=2774 action=drop comment=”SubSeven-1″ \
# {0 m2 s& V2 ^+ K* vdisabled=no
- m( o4 `3 Y" `% ]. |6 L# R$ O& Kadd chain=virus protocol=tcp dst-port=27374 action=drop comment=”SubSeven-2″ \7 f2 U7 B2 d8 ^/ y) L: F
disabled=no
& N2 Y/ A9 x$ n. Cadd chain=virus protocol=tcp dst-port=1243 action=drop comment=”SubSeven-3″ \
- ]- A+ u" F/ q1 }0 U* V/ o' l# B% E" zdisabled=no6 c5 u: O% Y0 C6 f3 E& ]
add chain=virus protocol=tcp dst-port=1234 action=drop comment=”SubSeven-4″ \
  g1 T$ l/ j+ ]( pdisabled=no- s5 h* C6 ^2 e  Y& k# B$ d8 e7 H
add chain=virus protocol=tcp dst-port=6711-6713 action=drop \
+ v/ s* e. |$ e+ ^3 hcomment=”SubSeven-5″ disabled=no
3 Y" }7 a/ L% z: E! J0 Z8 Dadd chain=virus protocol=tcp dst-port=16959 action=drop comment=”SubSeven-7″ \
  w5 m' {* j6 x) T$ C& @disabled=no
& h. o% A1 A* f: t) Jadd chain=virus protocol=tcp dst-port=25685-25686 action=drop \
6 M. h1 y( @1 N" W/ Z. zcomment=”Moonpie.Trojan-1″ disabled=no
- j# `9 U& G9 J6 ladd chain=virus protocol=tcp dst-port=25982 action=drop \9 k, g) c1 y: j7 b. l. w
comment=”Moonpie.Trojan-2″ disabled=no
& d7 u3 J2 b- ]1 Q( |( xadd chain=virus protocol=tcp dst-port=31337-31339 action=drop \8 t3 X5 x8 o$ v( `& T
comment=”NetSpy.Trojan-3″ disabled=no
1 h9 x" Q6 [" p; fadd chain=virus protocol=tcp dst-port=8102 action=drop comment=”Trojan” \
4 z* I. C) ~0 I* I" s. Q$ }disabled=no4 y5 n  ~# f' e' H4 }
add chain=virus protocol=tcp dst-port=8011 action=drop comment=”WAY.Trojan” \+ o3 y  e9 h- N( [! f9 Z
disabled=no
$ c3 f3 Z' M5 [; h$ aadd chain=virus protocol=tcp dst-port=7626 action=drop comment=”Trojan.BingHe” \
. J: X6 s8 _/ f/ _+ K' m1 Fdisabled=no  _7 u4 y( H  `4 U& t0 U
add chain=virus protocol=tcp dst-port=19191 action=drop \
; k6 E# @4 N# o& {! scomment=”Trojan.NianSeHoYian” disabled=no" X1 K5 N- H( O. t
add chain=virus protocol=tcp dst-port=23444-23445 action=drop \/ _3 g3 O5 S% x$ m
comment=”NetBull.Trojan” disabled=no4 {" M- E/ p; m9 X( v3 T% q  w9 }- z
add chain=virus protocol=tcp dst-port=2583 action=drop \
& h' E0 l: N, ucomment=”WinCrash.Trojan-1″ disabled=no* h7 w8 w, h' B
add chain=virus protocol=tcp dst-port=3024 action=drop \
& P6 \# o5 I7 |4 A& gcomment=”WinCrash.Trojan-2″ disabled=no9 C* b' u  E4 D+ g) `; o* [' d6 \. @
add chain=virus protocol=tcp dst-port=4092 action=drop \
2 h- y, a- T" |( o  Z3 W* qcomment=”WinCrash.Trojan-3″ disabled=no
' H. n8 C  k: C4 q, kadd chain=virus protocol=tcp dst-port=5714 action=drop \
9 C; W0 \2 v% K  V) M0 Lcomment=”WinCrash.Trojan-4″ disabled=no: ~$ B: q5 C. h; T
: @" F  d+ T- R4 @4 B! x1 c

# m- h7 c$ l* _

2

回帖

567

积分

52 小时

在线时间

中尉

注册时间
2016-1-6
金币
493 个
威望
0 个
荣誉
0 个
累计签到:35 天
连续签到:0 天
[LV.50]初入江湖
发表于 2016-8-31 17:45
add chain=virus protocol=tcp dst-port=1010-1012 action=drop \
/ B7 Y9 y7 w9 b4 s) mcomment=”Doly1.0/1.35/1.5trojan-1″ disabled=no
; h4 L5 s" i# u7 w" W/ l7 `0 I( Aadd chain=virus protocol=tcp dst-port=1015 action=drop \
! K  r2 S7 S) a0 a/ Dcomment=”Doly1.0/1.35/1.5trojan-2″ disabled=no
! J# ]7 m4 u' C$ g1 fadd chain=virus protocol=tcp dst-port=2004-2005 action=drop \4 H. h( P/ k6 ?; {  A6 A
comment=”TransScout.Trojan-1″ disabled=no; x0 b) [+ q8 E0 Q4 z$ B
add chain=virus protocol=tcp dst-port=9878 action=drop \
/ L$ n  Y/ o- S6 Vcomment=”TransScout.Trojan-2″ disabled=no
) f6 A5 r" o: B2 Badd chain=virus protocol=tcp dst-port=2773 action=drop \
  x3 W. j( g# L5 S4 Tcomment=”Backdoor.YAI..Trojan-1″ disabled=no5 i% Q0 k* Y; O( P$ D  y
add chain=virus protocol=tcp dst-port=7215 action=drop \1 G( W3 M* I1 \. s+ C& Y! Y+ d
comment=”Backdoor.YAI.Trojan-2″ disabled=no
* @# g6 m" e. }5 Q5 Eadd chain=virus protocol=tcp dst-port=54283 action=drop \& b6 P+ l  g7 Q
comment=”Backdoor.YAI.Trojan-3″ disabled=no
3 G8 |# |( c7 ]' m; [: a5 q7 Sadd chain=virus protocol=tcp dst-port=1003 action=drop \
* W% ?1 Y7 D& P4 P2 m: o& v) tcomment=”BackDoorTrojan-1″ disabled=no2 P8 @9 t% H  [# i+ Y
add chain=virus protocol=tcp dst-port=5598 action=drop \
" W  g: J6 Q: x# Zcomment=”BackDoorTrojan-2″ disabled=no9 B1 ^& Y# y$ _% w4 B
add chain=virus protocol=tcp dst-port=5698 action=drop \
& O& W' r0 _3 m, V" p7 u0 |- Xcomment=”BackDoorTrojan-3″ disabled=no# T6 ~# p- C) k
add chain=virus protocol=tcp dst-port=31554 action=drop \) s8 C$ i% J' ?1 U3 m: J" V5 C
comment=”SchainwindlerTrojan-2″ disabled=no/ f8 q' R0 X, H* F( P
add chain=virus protocol=tcp dst-port=18753 action=drop \  g# K5 n4 l7 k5 k% L
comment=”Shaft.DDoS.Trojan-1″ disabled=no
# z1 _' q0 |* c% `* h0 n+ z* vadd chain=virus protocol=tcp dst-port=20432 action=drop \$ K8 G( _/ Q" j! Y, _/ B3 F, t
comment=”Shaft.DDoS.Trojan-2″ disabled=no8 ?2 _" r8 X1 a$ y
add chain=virus protocol=tcp dst-port=65000 action=drop \
" X; ?* S2 x, R1 t; r! Icomment=”Devil.DDoS.Trojan” disabled=no
0 B/ \0 _: u; W/ [* d& Gadd chain=virus protocol=tcp dst-port=11831 action=drop \
# A- J/ p" {& k) Bcomment=”LatinusTrojan-1″ disabled=no
2 h. X* I" u' L. H' yadd chain=virus protocol=tcp dst-port=29559 action=drop \9 {% |$ y7 _  j7 ^9 Z
comment=”LatinusTrojan-2″ disabled=no0 C+ B" }7 S% [& ]3 J) C
add chain=virus protocol=tcp dst-port=1784 action=drop \) S0 N) n4 o$ R5 e) T1 T" ]$ z- Z
comment=”Snid.X2Trojan-1″ disabled=no
& B1 Z: [7 @. d" x4 j( j( madd chain=virus protocol=tcp dst-port=3586 action=drop \$ U' P* K( F' _% e  ~$ u& y
comment=”Snid.X2Trojan-2″ disabled=no
' g1 K8 H# t3 c5 [! Uadd chain=virus protocol=tcp dst-port=7609 action=drop \0 O; D8 Q/ i- ~, R  g
comment=”Snid.X2Trojan-3″ disabled=no
$ v) x! ]6 a7 K) P8 `add chain=virus protocol=tcp dst-port=12348-12349 action=drop \
  [' q- x% L# k' h( Jcomment=”BionetTrojan-1″ disabled=no9 C& H" ?1 {" L0 V* j! v& I7 l
add chain=virus protocol=tcp dst-port=12478 action=drop \
' \+ Z$ M* e& w! W6 H  o$ M3 [comment=”BionetTrojan-2″ disabled=no
7 T* s9 I. E5 ]add chain=virus protocol=tcp dst-port=57922 action=drop \
7 U7 q% E: _' @- M4 u: D9 F9 kcomment=”BionetTrojan-3″ disabled=no. q1 s! m& [! p
add chain=virus protocol=tcp dst-port=3127 action=drop \1 t0 J6 r  r& M7 N
comment=”Worm.Novarg.a.Mydoom.a1.” disabled=no
8 G8 `, h6 ?, M* K' ~add chain=virus protocol=tcp dst-port=6777 action=drop \$ _4 q/ U2 S, O$ X  J7 P' z; a
comment=”Worm.BBeagle.a.Bagle.a.” disabled=no
) j0 K0 }* s' y7 u4 Fadd chain=virus protocol=tcp dst-port=8866 action=drop \
* T4 Y2 w$ ]9 |comment=”Worm.BBeagle.b” disabled=no
# J  O3 K$ p7 B" h: w% @add chain=virus protocol=tcp dst-port=2745 action=drop \1 W/ K$ |( m+ E" m" u
comment=”Worm.BBeagle.c-g/j-l” disabled=no
+ d' K2 Y! a( z5 ?" n( Oadd chain=virus protocol=tcp dst-port=2556 action=drop \
5 Z) L8 D8 Z9 |1 }; ?comment=”Worm.BBeagle.p/q/r/n” disabled=no
1 l+ l5 ]. ^( E0 a) A+ h1 X( ]add chain=virus protocol=tcp dst-port=20742 action=drop \8 E/ Q* G/ t2 x( S
comment=”Worm.BBEagle.m-2″ disabled=no4 L' v- N+ S+ s) i0 `
add chain=virus protocol=tcp dst-port=4751 action=drop \# J& F; V: Y' r2 `# _9 j$ e/ Q7 C
comment=”Worm.BBeagle.s/t/u/v” disabled=no$ _$ z' l  k  D+ v3 B' E
add chain=virus protocol=tcp dst-port=2535 action=drop \
& E- u. F6 \, j) F# zcomment=”Worm.BBeagle.aa/ab/w/x-z-2″ disabled=no
* A* I# n& b4 ?; aadd chain=virus protocol=tcp dst-port=5238 action=drop \
* s0 X* `# U) \% }  R$ ~comment=”Worm.LovGate.r.RpcExploit” disabled=no
7 V' E% T& t4 N0 [add chain=virus protocol=tcp dst-port=1068 action=drop comment=”Worm.Sasser.a” \$ z* d( F, r4 J: U2 R" v
disabled=no
$ g! n* |. J# i4 sadd chain=virus protocol=tcp dst-port=5554 action=drop \) [( R& v3 x, {  `( L$ S
comment=”Worm.Sasser.b/c/f” disabled=no
( W. B: l5 U* badd chain=virus protocol=tcp dst-port=9996 action=drop \
& @( O, z# j2 Z1 A0 k7 h8 y( Jcomment=”Worm.Sasser.b/c/f” disabled=no* R4 e5 T; G1 V# l4 M" N
add chain=virus protocol=tcp dst-port=9995 action=drop comment=”Worm.Sasser.d” \
, B; O! |; m) A! pdisabled=no
9 S5 f0 j0 X! ~- sadd chain=virus protocol=tcp dst-port=10168 action=drop \
/ i" z% T" F* n" _; z( {comment=”Worm.Lovgate.a/b/c/d” disabled=no
: `5 Y9 t8 E# _; m+ [+ @2 Dadd chain=virus protocol=tcp dst-port=20808 action=drop \
, p* c  v5 r/ Acomment=”Worm.Lovgate.v.QQ” disabled=no
$ [" K( T+ y, U/ c$ H6 h( r+ T, q, Gadd chain=virus protocol=tcp dst-port=1092 action=drop \
9 ?4 w( D4 p( J& gcomment=”Worm.Lovgate.f/g” disabled=no  q" L7 A9 U3 ?
add chain=virus protocol=tcp dst-port=20168 action=drop \
1 Z1 U+ M3 w- [comment=”Worm.Lovgate.f/g” disabled=no
, {# Y8 S! r/ b# Iadd chain=virus protocol=tcp dst-port=1363-1364 action=drop \) z. G; e) Q) }2 O; |
comment=”ndm.requester” disabled=no* M" m; v( o0 O2 S9 M( j0 K3 L
add chain=virus protocol=tcp dst-port=1368 action=drop comment=”screen.cast” \, M) U2 }1 S5 r+ z
disabled=no
& h4 S+ L  b! eadd chain=virus protocol=tcp dst-port=1373 action=drop comment=”hromgrafx” \* m' L/ ]# z! o- o: F: _4 \
disabled=no
: {' b" U6 G# R0 fadd chain=virus protocol=tcp dst-port=1377 action=drop comment=”cichainlid” \
0 M$ G& p  f$ _9 D: Y+ n/ j7 ~- a- ^# ]disabled=no
0 V- r/ R! }( @0 W" t4 sadd chain=virus protocol=tcp dst-port=3410 action=drop \1 U& e$ h8 B2 t0 X5 z5 k
comment=”Backdoor.Optixprotocol” disabled=no8 j8 \( l; F! e) x. S) t( d
add chain=virus protocol=tcp dst-port=8888 action=drop \* Q1 a, n" Q: ?' t9 g
comment=”Worm.BBeagle.b” disabled=no
- ]8 ]# Q/ o- t1 f0 t4 Gadd chain=virus protocol=udp dst-port=44444 action=drop \
6 g0 m* T( q5 T% p* h* e$ _$ Gcomment=”Delta.Source.Trojan-7″ disabled=no
/ }- {, y" P3 g, `: _2 Iadd chain=virus protocol=udp dst-port=8998 action=drop \7 e( Z. c6 ~: h. N9 I7 }& Y
comment=”Worm.Sobig.f-3″ disabled=no
( G" L3 \: l) ^% X2 cadd chain=virus protocol=udp dst-port=123 action=drop comment=”Worm.Sobig.f-1″ \) A$ j9 j+ M7 p
disabled=no4 U9 O! ~; v! C# j" }1 Y
add chain=virus protocol=tcp dst-port=3198 action=drop \9 o# E& W  u7 l
comment=”Worm.Novarg.a.Mydoom.a2.” disabled=no
7 H2 S* \; U2 U& X' |0 K# ^add chain=virus protocol=tcp dst-port=139 action=drop comment=”Drop Blaster \9 [3 ~8 P- h: @" p" _- M1 u" D) |
Worm” disabled=no
0 B3 b; x7 V  ~0 P: ]$ yadd chain=virus protocol=tcp dst-port=135 action=drop comment=”Drop Blaster \
/ R$ h( f: b7 M  C! h+ a+ [( rWorm” disabled=no
- Y& t: z: [8 l( Zadd chain=virus protocol=tcp dst-port=445 action=drop comment=”Drop Blaster \
4 `2 d4 Y  L0 D  ?- J7 yWorm” disabled=no5 j  S* e* P4 h# b- M8 N
/ ip firewall connection tracking
+ d) R( J8 ~8 K1 dset enabled=yes tcp-syn-sent-timeout=5s tcp-syn-received-timeout=5s \7 E/ U. ?. p' B& `3 Q6 J- _
tcp-established-timeout=10h tcp-fin-wait-timeout=2m \
( v5 f5 w0 m& B5 Qtcp-close-wait-timeout=1m tcp-last-ack-timeout=30s \
- b! r9 I6 d1 A6 ~tcp-time-wait-timeout=2m tcp-close-timeout=10s udp-timeout=30s \
' Y" H1 A# b+ q- l9 z/ W. ~6 Audp-stream-timeout=3m icmp-timeout=10s generic-timeout=10m \
+ Z" @/ g7 N. v" Ytcp-syncookie=yes

11

回帖

14

积分

0 小时

在线时间

新兵上阵

注册时间
2020-12-5
金币
3 个
威望
0 个
荣誉
0 个
累计签到:1 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2020-12-5 14:33

站点统计 | Archiver | 手机版 | 无线门户 ( 粤ICP备11076993号|粤公网安备44010602008359号 ) |网站地图

GMT+8, 2024-4-24 22:52

返回顶部 返回列表