Kamis, 15 Januari 2015

Pengertian Mikrotik

hai para pejuang mikrotik..
gue akan share beberapa ilmu yang gue dapat dari pelajaran kelas 11 SMK, terutama buat kalian para TKJ.
kali ini gue akan kasih loe loe pada Pengertian Mikrotik.

unutk orang awam, mungkin sebagian besar belum tahu banyak tentang Mikrotik.
nah, apa sebenarnya apa itu mikrotik??

Mikrotik adalah sebuah  sistem Operasi berbasis Linux, yang dikenal sebagai MikroTik RouterOS.

Mikrotik dijalankan di komputer personal atau orang awam biasa mengenalnya dengan PC juga dapat dijalankan di komputer server.
RouterOS mikrotik ini merubah komputer menjadi Router jaringan yang dapat mengimplementasikan fitur-fitur seperti Firewall, VPN Server & Client, Bandwidth Shaping dan QoS.
jugta fungsi Akses Point nirkabel dan fitur-fitur lainnya yang biasa digunakan untuk interkoneksi jaringan.
Sistem ini juga dapat digunakan untuk sistem hotspot berbasis captive-portal.
Sistem operasi ini memiliki lisensi yang bertingkat, semakin tinggi tingkatan lisensi maka semakin banyak fitur yang bisa digunakan.
Sebuah aplikasi Windows yang bernama Winbox menyajikan antarmuka secara grafis untuk konfigurasi RouterOS dan monitoring.
Winbox itu juga mampu menjalankan koneksi FTP, Ternet, dan SSH.
selain Winbox, ada juga aplikasi Windows yang digunakan untuk Konfigurasi RouterOS, yaitu PUTTY tetapi antarmukanya berbasis Teks.
mikrotik sendiri mampu memberikan kelebihan pada sistem jaringan milik kita, karena dengan menggunakan mikrotik, jaringan kita 
akan lebih stabil dari pada tidak menggunakan Mikrotik.


Banyak Fitur yang bisa di dapatkan dari mikrotik, seperti :

- Firewall dan NAT
- Routing ± Static routing
- Data Rate Management
- Hotspot
- Point-to-Point tunneling protocols
- Simple tunnels
- IPsec
- Web proxy
- Caching DNS client
- DHCP
- Universal Client
- VRRP
- UPnP
- NTP
- Monitoring/Accounting
- SNMP
- M3P
- MNDP
- Tools

Kemampuan yang di miliki oleh mikrotik sebagai router memang menakjubkan.
mulai dari management bandwidth, data user, hingga menggabungkan 2 line Jaringan atau lebih kedalam satu router (load balance).

dibawah ini adalah contoh beberapa mikrotik





sekian info dari gue.. :D semoga bermanfaat ...

VLAN di Mikrotik


hai para pejuang mikrotik..
kali ini gue kasih ilmu tentang VLAN pada Mikrotik.

kalian pasti belum familiar dengan kata VLAN kan .. karna itu gue akan kasih tau sama loe loe pade..

VLAN adalah singkatan dari Virtual Local Area Network,]
VLAN sendiri adalah suatu model topologi jaringan yang konfigurasinya melalui virtual.

peralatan yang dapat digunakan untuk membangun Vlan :

- ACCESS POINT
- Mikrotik Router
- MODEM
- PC USER

 berikut adalah contoh topologinya ...




kelebihan dari VLAN
1. Tidak menggunakan banyak Switch
2. Lebih efisien karna tidak membutuhkan banyak peralatan
3. mencegah terjadinya collision domain ( tabrakan domain )
4. pembagian IP lebih efektif karna terbagi sendiri sendiri
5. sangat dianjurkan untuk digunakan di Sekolah - sekolah

sekian dari gue...semoga bermanfaat...

Block Virus dan Spyware di Mikrotik


hei para pejuang mikrotik..ketemu lagi sama gue.. :D

kali ini gue akan kasih sedikit info tentang cara Blok Virus dan Spyware pada Mikrotik, tapi yang berbasis Teks..
hehehe :D

diketik di NotePad dulu tuh jangan lupa.
nih gue kasih script Block Virus dan Spyware.


- pertama buka dulu New Terminal pada daftar menu di Mikrotik


- kemudian ketik ip firewall filter
- lalu enter


nah, copy script di bawah terus paste kan di New Terminal.

add chain=forward src-address=0.0.0.0/8 action=drop comment="Block Bogus IP Address" disabled=no
add chain=forward dst-address=0.0.0.0/8 action=drop comment="" disabled=no
add chain=forward src-address=127.0.0.0/8 action=drop comment="" disabled=no
add chain=forward dst-address=127.0.0.0/8 action=drop comment="" disabled=no
add chain=forward src-address=224.0.0.0/3 action=drop comment="" disabled=no
add chain=forward dst-address=224.0.0.0/3 action=drop comment="" disabled=no
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklistaction=drop comment="Drop SSH brute forcers" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=newsrc-address-list=ssh_stage3 action=add-src-to-address-listaddress-list=ssh_blacklist address-list-timeout=1w3d comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=newsrc-address-list=ssh_stage2 action=add-src-to-address-listaddress-list=ssh_stage3 address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=newsrc-address-list=ssh_stage1 action=add-src-to-address-listaddress-list=ssh_stage2 address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=newaction=add-src-to-address-list address-list=ssh_stage1address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-listaddress-list="port scanners" address-list-timeout=2w comment="Port Scanners to list " disabled=no
add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urgaction=add-src-to-address-list address-list="port scanners"address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-listaddress-list="port scanners" address-list-timeout=2w comment=""disabled=no
add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-listaddress-list="port scanners" address-list-timeout=2w comment=""disabled=no
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ackaction=add-src-to-address-list address-list="port scanners"address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urgaction=add-src-to-address-list address-list="port scanners"address-list-timeout=2w comment="" disabled=no
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urgaction=add-src-to-address-list address-list="port scanners"address-list-timeout=2w comment="" disabled=no
add chain=input src-address-list="port scanners" action=drop comment=""disabled=no
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklistaction=drop comment="Filter FTP to Box" disabled=no
add chain=output protocol=tcp content="530 Login incorrect"dst-limit=1/1m,9,dst-address/1m action=accept comment="" disabled=no
add chain=output protocol=tcp content="530 Login incorrect"action=add-dst-to-address-list address-list=ftp_blacklistaddress-list-timeout=3h comment="" disabled=no
add chain=forward protocol=tcp action=jump jump-target=tcp comment="Separate Protocol into Chains" disabled=no
add chain=forward protocol=udp action=jump jump-target=udp comment=""disabled=no
add chain=forward protocol=icmp action=jump jump-target=icmp comment=""disabled=no
add chain=udp protocol=udp dst-port=69 action=drop comment="Blocking UDP Packet" disabled=no
add chain=udp protocol=udp dst-port=111 action=drop comment="" disabled=no
add chain=udp protocol=udp dst-port=135 action=drop comment="" disabled=no
add chain=udp protocol=udp dst-port=137-139 action=drop comment="" disabled=no
add chain=udp protocol=udp dst-port=2049 action=drop comment="" disabled=no
add chain=udp protocol=udp dst-port=3133 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=69 action=drop comment="Bloking TCP Packet" disabled=no
add chain=tcp protocol=tcp dst-port=111 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=119 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=135 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=137-139 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=445 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=2049 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=12345-12346 action=drop comment=""disabled=no
add chain=tcp protocol=tcp dst-port=20034 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=3133 action=drop comment="" disabled=no
add chain=tcp protocol=tcp dst-port=67-68 action=drop comment="" disabled=no
add chain=icmp protocol=icmp icmp-options=0:0-255 limit=5,5 action=acceptcomment="Limited Ping Flood" disabled=no
add chain=icmp protocol=icmp icmp-options=3:3 limit=5,5 action=acceptcomment="" disabled=no
add chain=icmp protocol=icmp icmp-options=3:4 limit=5,5 action=acceptcomment="" disabled=no
add chain=icmp protocol=icmp icmp-options=8:0-255 limit=5,5 action=acceptcomment="" disabled=no
add chain=icmp protocol=icmp icmp-options=11:0-255 limit=5,5 action=acceptcomment="" disabled=no
add chain=icmp protocol=icmp action=drop comment="" disabled=no
add chain=input dst-address-type=broadcast action=accept comment="Allow Broadcast Traffic" disabled=no
add chain=input connection-state=established action=accept comment="Connection State" disabled=no
add chain=input connection-state=related action=accept comment="" disabled=no
add chain=input connection-state=invalid action=drop comment="" disabled=no
add chain=virus protocol=udp action=drop dst-port=1 comment="Sockets des Troie"
add chain=virus protocol=tcp action=drop dst-port=2 comment="Death"
add chain=virus protocol=tcp action=drop dst-port=20 comment="Senna Spy FTP server"
add chain=virus protocol=tcp action=drop dst-port=21 comment="Back Construction, Blade Runner, Cattivik FTP Server, CC Invader, Dark FTP, Doly Trojan, Fore, Invisible FTP, Juggernaut 42, Larva, MotIv FTP, Net Administrator, Ramen, Senna Spy FTP server, The Flu, Traitor 21, WebEx, WinCrash"
add chain=virus protocol=tcp action=drop dst-port=22 comment="Shaft"
add chain=virus protocol=tcp action=drop dst-port=23 comment="Fire HacKer, Tiny Telnet Server TTS, Truva Atl"
add chain=virus protocol=tcp action=drop dst-port=25 comment="Ajan, Antigen, Barok, Email Password Sender EPS, EPS II, Gip, Gris, Happy99, Hpteam mail, Hybris, I love you, Kuang2, Magic Horse, MBT Mail Bombing Trojan, Moscow Email trojan, Naebi, NewApt worm, ProMail trojan, Shtirlitz, Stealth, Tapiras, Terminator, WinPC, WinSpy"
add chain=virus protocol=tcp action=drop dst-port=30 comment="Agent 40421"
add chain=virus protocol=tcp action=drop dst-port=31 comment="Agent 31, Hackers Paradise, Masters Paradise"
add chain=virus protocol=tcp action=drop dst-port=41 comment="Deep Throat, Foreplay"
add chain=virus protocol=tcp action=drop dst-port=48 comment="DRAT"
add chain=virus protocol=tcp action=drop dst-port=50 comment="DRAT"
add chain=virus protocol=tcp action=drop dst-port=58 comment="DMSetup"
add chain=virus protocol=tcp action=drop dst-port=59 comment="DMSetup"
add chain=virus protocol=tcp action=drop dst-port=79 comment="CDK, Firehotcker"
add chain=virus protocol=tcp action=drop dst-port=80 comment="711 trojan, Seven Eleven, AckCmd, Back End, Back Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Executor, God Message, God Message Creator, Hooker, IISworm, MTX, NCX, Reverse WWW Tunnel Backdoor, RingZero, Seeker, WAN Remote, Web Server CT, WebDownloader"
add chain=virus protocol=tcp action=drop dst-port=81 comment="RemoConChubo"
add chain=virus protocol=tcp action=drop dst-port=99 comment="Hidden Port, NCX"
add chain=virus protocol=tcp action=drop dst-port=110 comment="ProMail trojan"
add chain=virus protocol=tcp action=drop dst-port=113 comment="Invisible Identd Deamon, Kazimas"
add chain=virus protocol=tcp action=drop dst-port=119 comment="Happy99"
add chain=virus protocol=tcp action=drop dst-port=121 comment="Attack Bot, God Message, JammerKillah"
add chain=virus protocol=tcp action=drop dst-port=123 comment="Net Controller"
add chain=virus protocol=tcp action=drop dst-port=133 comment="Farnaz"
add chain=virus protocol=tcp action=drop dst-port=135-139 comment="Blaster worm"
add chain=virus protocol=udp action=drop dst-port=135-139 comment="messenger worm"
add chain=virus protocol=tcp action=drop dst-port=142 comment="NetTaxi"
add chain=virus protocol=tcp action=drop dst-port=146 comment="Infector"
add chain=virus protocol=udp action=drop dst-port=146 comment="Infector"
add chain=virus protocol=tcp action=drop dst-port=170 comment="A-trojan"
add chain=virus protocol=tcp action=drop dst-port=334 comment="Backage"
add chain=virus protocol=tcp action=drop dst-port=411 comment="Backage"
add chain=virus protocol=tcp action=drop dst-port=420 comment="Breach, Incognito"
add chain=virus protocol=tcp action=drop dst-port=421 comment="TCP Wrappers trojan"
add chain=virus protocol=tcp action=drop dst-port=445 comment="Blaster worm"
add chain=virus protocol=udp action=drop dst-port=445 comment="Blaster worm"
add chain=virus protocol=tcp action=drop dst-port=455 comment="Fatal Connections"
add chain=virus protocol=tcp action=drop dst-port=456 comment="Hackers Paradise"
add chain=virus protocol=tcp action=drop dst-port=513 comment="Grlogin"
add chain=virus protocol=tcp action=drop dst-port=514 comment="RPC Backdoor"
add chain=virus protocol=tcp action=drop dst-port=531 comment="Net666, Rasmin"
add chain=virus protocol=tcp action=drop dst-port=555 comment="711 trojan, Seven Eleven, Ini-Killer, Net Administrator, Phase Zero, Phase-0, Stealth Spy"
add chain=virus protocol=tcp action=drop dst-port=605 comment="Secret Service"
add chain=virus protocol=tcp action=drop dst-port=666 comment="Attack FTP, Back Construction, BLA trojan, Cain & Abel, NokNok, Satans Back Door SBD, ServU, Shadow Phyre, th3r1pp3rz Therippers"
add chain=virus protocol=tcp action=drop dst-port=667 comment="SniperNet"
add chain=virus protocol=tcp action=drop dst-port=669 comment="DP trojan"
add chain=virus protocol=tcp action=drop dst-port=692 comment="GayOL"
add chain=virus protocol=tcp action=drop dst-port=777 comment="AimSpy, Undetected"
add chain=virus protocol=tcp action=drop dst-port=808 comment="WinHole"
add chain=virus protocol=tcp action=drop dst-port=911 comment="Dark Shadow"
add chain=virus protocol=tcp action=drop dst-port=999 comment="Deep Throat, Foreplay, WinSatan"
add chain=virus protocol=tcp action=drop dst-port=1000 comment="Der Spaeher, Direct Connection"
add chain=virus protocol=tcp action=drop dst-port=1001 comment="Der Spaeher, Le Guardien, Silencer, WebEx"
add chain=virus protocol=tcp action=drop dst-port=1010-1016 comment="Doly Trojan"
add chain=virus protocol=tcp action=drop dst-port=1020 comment="Vampire"
add chain=virus protocol=tcp action=drop dst-port=1024 comment="Jade, Latinus, NetSpy"
add chain=virus protocol=tcp action=drop dst-port=1025 comment="Remote Storm"
add chain=virus protocol=udp action=drop dst-port=1025 comment="Remote Storm"
add chain=virus protocol=tcp action=drop dst-port=1035 comment="Multidropper"
add chain=virus protocol=tcp action=drop dst-port=1042 comment="BLA trojan"
add chain=virus protocol=tcp action=drop dst-port=1045 comment="Rasmin"
add chain=virus protocol=tcp action=drop dst-port=1049 comment="sbin initd"
add chain=virus protocol=tcp action=drop dst-port=1050 comment="MiniCommand"
add chain=virus protocol=tcp action=drop dst-port=1053 comment="The Thief"
add chain=virus protocol=tcp action=drop dst-port=1054 comment="AckCmd"
add chain=virus protocol=tcp action=drop dst-port=1080-1083 comment="WinHole"
add chain=virus protocol=tcp action=drop dst-port=1090 comment="Xtreme"
add chain=virus protocol=tcp action=drop dst-port=1095-1098 comment="Remote Administration Tool RAT"
add chain=virus protocol=tcp action=drop dst-port=1099 comment="Blood Fest Evolution, Remote Administration Tool RAT"
add chain=virus protocol=tcp action=drop dst-port=1150-1151 comment="Orion"
add chain=virus protocol=tcp action=drop dst-port=1170 comment="Psyber Stream Server PSS, Streaming Audio Server, Voice"
add chain=virus protocol=udp action=drop dst-port=1200-1201 comment="NoBackO"
add chain=virus protocol=tcp action=drop dst-port=1207 comment="SoftWAR"
add chain=virus protocol=tcp action=drop dst-port=1208 comment="Infector"
add chain=virus protocol=tcp action=drop dst-port=1212 comment="Kaos"
add chain=virus protocol=tcp action=drop dst-port=1234 comment="SubSeven Java client, Ultors Trojan"
add chain=virus protocol=tcp action=drop dst-port=1243 comment="BackDoor-G, SubSeven, SubSeven Apocalypse, Tiles"
add chain=virus protocol=tcp action=drop dst-port=1245 comment="VooDoo Doll"
add chain=virus protocol=tcp action=drop dst-port=1255 comment="Scarab"
add chain=virus protocol=tcp action=drop dst-port=1256 comment="Project nEXT"
add chain=virus protocol=tcp action=drop dst-port=1269 comment="Matrix"
add chain=virus protocol=tcp action=drop dst-port=1272 comment="The Matrix"
add chain=virus protocol=tcp action=drop dst-port=1313 comment="NETrojan"
add chain=virus protocol=tcp action=drop dst-port=1338 comment="Millenium Worm"
add chain=virus protocol=tcp action=drop dst-port=1349 comment="Bo dll"
add chain=virus protocol=tcp action=drop dst-port=1394 comment="GoFriller, Backdoor G-1"
add chain=virus protocol=tcp action=drop dst-port=1441 comment="Remote Storm"
add chain=virus protocol=tcp action=drop dst-port=1492 comment="FTP99CMP"
add chain=virus protocol=tcp action=drop dst-port=1524 comment="Trinoo"
add chain=virus protocol=tcp action=drop dst-port=1568 comment="Remote Hack"
add chain=virus protocol=tcp action=drop dst-port=1600 comment="Direct Connection, Shivka-Burka"
add chain=virus protocol=tcp action=drop dst-port=1703 comment="Exploiter"
add chain=virus protocol=tcp action=drop dst-port=1777 comment="Scarab"
add chain=virus protocol=tcp action=drop dst-port=1807 comment="SpySender"
add chain=virus protocol=tcp action=drop dst-port=1966 comment="Fake FTP"
add chain=virus protocol=tcp action=drop dst-port=1967 comment="WM FTP Server"
add chain=virus protocol=tcp action=drop dst-port=1969 comment="OpC BO"
add chain=virus protocol=tcp action=drop dst-port=1981 comment="Bowl, Shockrave"
add chain=virus protocol=tcp action=drop dst-port=1999 comment="Back Door, SubSeven, TransScout"
add chain=virus protocol=tcp action=drop dst-port=2000 comment="Der Spaeher, Insane Network, Last 2000, Remote Explorer 2000, Senna Spy Trojan Generator"
add chain=virus protocol=tcp action=drop dst-port=2001 comment="Der Spaeher, Trojan Cow"
add chain=virus protocol=tcp action=drop dst-port=2023 comment="Ripper Pro"
add chain=virus protocol=tcp action=drop dst-port=2080 comment="WinHole"
add chain=virus protocol=tcp action=drop dst-port=2115 comment="Bugs"
add chain=virus protocol=udp action=drop dst-port=2130 comment="Mini Backlash"
add chain=virus protocol=tcp action=drop dst-port=2140 comment="The Invasor"
add chain=virus protocol=udp action=drop dst-port=2140 comment="Deep Throat, Foreplay"
add chain=virus protocol=tcp action=drop dst-port=2155 comment="Illusion Mailer"
add chain=virus protocol=tcp action=drop dst-port=2255 comment="Nirvana"
add chain=virus protocol=tcp action=drop dst-port=2283 comment="Hvl RAT"
add chain=virus protocol=tcp action=drop dst-port=2300 comment="Xplorer"
add chain=virus protocol=tcp action=drop dst-port=2311 comment="Studio 54"
add chain=virus protocol=tcp action=drop dst-port=2330-2339 comment="Contact"
add chain=virus protocol=udp action=drop dst-port=2339 comment="Voice Spy"
add chain=virus protocol=tcp action=drop dst-port=2345 comment="Doly Trojan"
add chain=virus protocol=tcp action=drop dst-port=2565 comment="Striker trojan"
add chain=virus protocol=tcp action=drop dst-port=2583 comment="WinCrash"
add chain=virus protocol=tcp action=drop dst-port=2600 comment="Digital RootBeer"
add chain=virus protocol=tcp action=drop dst-port=2716 comment="The Prayer"
add chain=virus protocol=tcp action=drop dst-port=2773-2774 comment="SubSeven, SubSeven 2.1 Gold"
add chain=virus protocol=tcp action=drop dst-port=2801 comment="Phineas Phucker"
add chain=virus protocol=udp action=drop dst-port=2989 comment="Remote Administration Tool RAT"
add chain=virus protocol=tcp action=drop dst-port=3000 comment="Remote Shut"
add chain=virus protocol=tcp action=drop dst-port=3024 comment="WinCrash"
add chain=virus protocol=tcp action=drop dst-port=3031 comment="Microspy"
add chain=virus protocol=tcp action=drop dst-port=3128 comment="Reverse WWW Tunnel Backdoor, RingZero"
add chain=virus protocol=tcp action=drop dst-port=3129 comment="Masters Paradise"
add chain=virus protocol=tcp action=drop dst-port=3150 comment="The Invasor"
add chain=virus protocol=udp action=drop dst-port=3150 comment="Deep Throat, Foreplay, Mini Backlash"
add chain=virus protocol=tcp action=drop dst-port=3456 comment="Terror trojan"
add chain=virus protocol=tcp action=drop dst-port=3459 comment="Eclipse 2000, Sanctuary"
add chain=virus protocol=tcp action=drop dst-port=3700 comment="Portal of Doom"
add chain=virus protocol=tcp action=drop dst-port=3777 comment="PsychWard"
add chain=virus protocol=tcp action=drop dst-port=3791-3801 comment="Total Solar Eclypse"
add chain=virus protocol=tcp action=drop dst-port=4000 comment="SkyDance"
add chain=virus protocol=tcp action=drop dst-port=4092 comment="WinCrash"
add chain=virus protocol=tcp action=drop dst-port=4242 comment="Virtual Hacking Machine VHM"
add chain=virus protocol=tcp action=drop dst-port=4321 comment="BoBo"
add chain=virus protocol=tcp action=drop dst-port=4444 comment="Prosiak, Swift Remote"
add chain=virus protocol=tcp action=drop dst-port=4567 comment="File Nail"
add chain=virus protocol=tcp action=drop dst-port=4590 comment="ICQ Trojan"
add chain=virus protocol=tcp action=drop dst-port=4950 comment="ICQ Trogen Lm"
add chain=virus protocol=tcp action=drop dst-port=5000 comment="Back Door Setup, Blazer5, Bubbel, ICKiller, Ra1d, Sockets des Troie"
add chain=virus protocol=tcp action=drop dst-port=5001 comment="Back Door Setup, Sockets des Troie"
add chain=virus protocol=tcp action=drop dst-port=5002 comment="cd00r, Shaft"
add chain=virus protocol=tcp action=drop dst-port=5010 comment="Solo"
add chain=virus protocol=tcp action=drop dst-port=5011 comment="One of the Last Trojans OOTLT, One of the Last Trojans OOTLT, modified"
add chain=virus protocol=tcp action=drop dst-port=5025 comment="WM Remote KeyLogger"
add chain=virus protocol=tcp action=drop dst-port=5031-5032 comment="Net Metropolitan"
add chain=virus protocol=tcp action=drop dst-port=5321 comment="Firehotcker"
add chain=virus protocol=tcp action=drop dst-port=5333 comment="Backage, NetDemon"
add chain=virus protocol=tcp action=drop dst-port=5343 comment="wCrat WC Remote Administration Tool"
add chain=virus protocol=tcp action=drop dst-port=5400-5402 comment="Back Construction, Blade Runner"
add chain=virus protocol=tcp action=drop dst-port=5512 comment="Illusion Mailer"
add chain=virus protocol=tcp action=drop dst-port=5534 comment="The Flu"
add chain=virus protocol=tcp action=drop dst-port=5550 comment="Xtcp"
add chain=virus protocol=tcp action=drop dst-port=5555 comment="ServeMe"
add chain=virus protocol=tcp action=drop dst-port=5556-5557 comment="BO Facil"
add chain=virus protocol=tcp action=drop dst-port=5569 comment="Robo-Hack"
add chain=virus protocol=tcp action=drop dst-port=5637-5638 comment="PC Crasher"
add chain=virus protocol=tcp action=drop dst-port=5742 comment="WinCrash"
add chain=virus protocol=tcp action=drop dst-port=5760 comment="Portmap Remote Root Linux Exploit"
add chain=virus protocol=tcp action=drop dst-port=5880-5889 comment="Y3K RAT"
add chain=virus protocol=tcp action=drop dst-port=6000 comment="The Thing"
add chain=virus protocol=tcp action=drop dst-port=6006 comment="Bad Blood"
add chain=virus protocol=tcp action=drop dst-port=6272 comment="Secret Service"

sekian dulu info dari gue.. semoga bermanfaat ... :)

Rabu, 14 Januari 2015

UPK TKJ SMKN 1 BAWANG

hay para pejuang mikrotik.. :D
udah lama banget gue kaga ng-posting di blog..
sory ye... besok gue posting deh UPK TKJ SMKN 1 BAWANG...hehe
gue sekarang lagi males ngetik nih...

Senin, 17 November 2014

Menjadi Seorang ADMIN

untuk menjadi seorang admin.
langkah-langkah yang perlu di pelajari yaitu :


harus mengetahui :
- Username dan Password pada modem
- Mode PPOE atau Bridge



untuk langkah selanjutnya harus mengetahui :
- Username dan Password pada Modem
- Mode PPOE atau Bridge
- DHCP Server
- DHCP Client



untuk langkah selanjutnya harus mengetahui :
- Username dan Password pada Modem
- Mode PPOE atau Bridge
- DHCP Server
- DHCP Client
- Pada Access Point Harus Mnegetahui :
Enskripsi
Mode Setting Acces Point
Backbone





untuk langkah selanjutnya harus mengetahui :
- Username dan Password pada Modem
- Mode PPOE atau Bridge
- DHCP Server
- DHCP Client
- Pada Access Point Harus Mengetahui :
Enskripsi
Mode Setting Acces Point
Backbone
- Pada Acces Point Client Harus mengetahui :
Settingan Access Point Client





untuk langkah terakhir harus mengetahui :
- Username dan Password pada Modem
- Mode PPOE atau Bridge
- DHCP Server
- DHCP Client
- Pada Access Point Harus Mengetahui :
Enskripsi
Mode Setting Acces Point
Backbone
- Pada Acces Point Client Harus mengetahui :
Settingan Access Point Client
jika jaraknya berjauhan antara Access Point dengan Access Point Client.
misalnya dari Banjarnegara - Purbalingga. Seorang admin harus mengetahui :
- Jarak
- Bandwith yang ideal
- AP Outdor yang akan digunakan
- Tinggi Tower
- antena Sektoral yangt akan digunakan





sekian artikel dari saya..semoga bermanfaat ..... :)

Kisi-Kisi Mikrotik

Kisi-Kisi Mikrotik Unutk Semester 5 Program Keahlian Teknik Komputer dan Jaringan tahun pelajaran 2014/2015



1. Sejarah Internet
2. Instalasi Mikrotik
3. Konfigurasi Interface
4. Konfigurasi Ip Address
5. Konfigurasi DNS
6. Konfigurasi Firewall
7. Konfigurasi DHCP
8. Konfigurasi Hotspot
9. Konfigurasi Proxy
10. Konfigurasi Gateway atau Ip Route
11. Konfigurasi Queue Simple
12. Konfigurasi Queue Tree
13. Konfigurasi VLAN
14. Konfigurasi Bridge
15. Konfigurasi Access Point
      - Mode Access
      - Enskripsi ( WPA PSK , WPA2 PSK )
      - Standart 802.11 a/b/g/n
16. Konversi Bilangan Biner-Desimal
17. Konversi Bilangan Desimal-Biner
18. Subneting
19. Perangkat-Perangkat Jaringan
20. Pengkabelan
      -Cross
      -Straight