Jumat, 09 Agustus 2019
Rabu, 07 Agustus 2019
Setting Mikrotik : Auto Blokir Website Berdasarkan Keyword
Setting Mikrotik : Auto Blokir Website Berdasarkan Keyword
SYSTEM | SCRIPT | Add
:foreach iDNS in=[/ip dns cache all find where (name~"poker" || name~"porn" || name~"indoxxi" || name~"bokep" || name~"indoxx1" || name~"duniafilm" || name~"filmsemi" || name~"xvideos") && (type="A") ] do={
# find and filtering keyword and only find record for type A
# for keyword just add keyword || name~"KEYWORD") before && (type="A")
:local tmpDNSsite [/ip dns cache get $iDNS name] ;
:local tmpDNSip [/ip dns cache get $iDNS address];
:local nameList "BLOCK_SITE";
# save to local cache by string
delay delay-time=10ms
# wait for 10ms
:if ( [/ip firewall address-list find where address=$tmpDNSip] = "") do={
# chek for no more duplicate site on cache
:log warning ("Added site to block on dns: $tmpDNSsite : $tmpDNSip");
# show info on warning log
/ip firewall address-list add address=$tmpDNSip list=$nameList comment=$tmpDNSsite;
# add site to add list entry.
}
}
SYSTEM | SCRIPT | Add
:foreach iDNS in=[/ip dns cache all find where (name~"poker" || name~"porn" || name~"indoxxi" || name~"bokep" || name~"indoxx1" || name~"duniafilm" || name~"filmsemi" || name~"xvideos") && (type="A") ] do={
# find and filtering keyword and only find record for type A
# for keyword just add keyword || name~"KEYWORD") before && (type="A")
:local tmpDNSsite [/ip dns cache get $iDNS name] ;
:local tmpDNSip [/ip dns cache get $iDNS address];
:local nameList "BLOCK_SITE";
# save to local cache by string
delay delay-time=10ms
# wait for 10ms
:if ( [/ip firewall address-list find where address=$tmpDNSip] = "") do={
# chek for no more duplicate site on cache
:log warning ("Added site to block on dns: $tmpDNSsite : $tmpDNSip");
# show info on warning log
/ip firewall address-list add address=$tmpDNSip list=$nameList comment=$tmpDNSsite;
# add site to add list entry.
}
}
Scipt Mikrotik : Blokir IP Address Yang Mencoba Login di Router Mikrotik Secara Brute Force
berikut cara block IP yang mencoba login ke router mikrotik (secara brute force) kita secara otomatis.
BUKA TERMINAL MIKROTIK
/ ip firewall filter
add chain=input in-interface=ether1 protocol=tcp dst-port=21-23 src-address-list=ftp_blacklist action=drop
add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,4,dst-address/1m
add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" address-list=blacklist address-list-timeout=48h
note : maksud dari langkah diatas adalah saat seseorang mencoba login ke router mikrotik kita (brute force) dalam minimal sebanyak empat kali dalam satu menit ( dst-limit=1/1m,4)
maka akses login yang ke lima router akan memasukkan Ip tersebut ke dalam daftar blacklist address dan membannednya selama 48 Jam (address-list=blacklist address-list-timeout=48h).
Artikel TERKAIT MENGAMANKAN ROUTER MIKROTIK
Langkah Pertama Menjaga Keamanan Router
BUKA TERMINAL MIKROTIK
/ ip firewall filter
add chain=input in-interface=ether1 protocol=tcp dst-port=21-23 src-address-list=ftp_blacklist action=drop
add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,4,dst-address/1m
add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" address-list=blacklist address-list-timeout=48h
note : maksud dari langkah diatas adalah saat seseorang mencoba login ke router mikrotik kita (brute force) dalam minimal sebanyak empat kali dalam satu menit ( dst-limit=1/1m,4)
maka akses login yang ke lima router akan memasukkan Ip tersebut ke dalam daftar blacklist address dan membannednya selama 48 Jam (address-list=blacklist address-list-timeout=48h).
Artikel TERKAIT MENGAMANKAN ROUTER MIKROTIK
Langkah Pertama Menjaga Keamanan Router
Selasa, 06 Agustus 2019
Sejak China Banned IP DNS Google, apa alternatifnya?
Sejak China Banned IP DNS Google, apa alternatifnya?
Pertanyaan diatas pernah dijawab James Smith dalam salah satu forum QUORA.
DNS yang direcomendasikan yaitu menggunakan openDNS.
OpenDNS :
208.67.222.222
208.67.220.220
Google DNS :
8.8.8.8
8.8.4.4
CloudFlare DNS :
1.1.1.1
1.0.0.1
note : Google DNS is fast and great, but it’s not a reliable choice in China
You can check your setup for dns leaks at https://ipx.ac/ and leak test suite or dnsleaktest.com
Pertanyaan diatas pernah dijawab James Smith dalam salah satu forum QUORA.
DNS yang direcomendasikan yaitu menggunakan openDNS.
OpenDNS :
208.67.222.222
208.67.220.220
Google DNS :
8.8.8.8
8.8.4.4
CloudFlare DNS :
1.1.1.1
1.0.0.1
note : Google DNS is fast and great, but it’s not a reliable choice in China
You can check your setup for dns leaks at https://ipx.ac/ and leak test suite or dnsleaktest.com