Planning Internet Cafe With Speedy Internet Connection

  • Uploaded by: Achmad Muzaqi
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Planning Internet Cafe With Speedy Internet Connection as PDF for free.

More details

  • Words: 3,792
  • Pages: 19
Planning Internet Cafe With Speedy internet Connection Using PC LINUX and router Mikrotik Network Schema 192.168.1.2/29 Modem 4 Port ———-Mikrotik —Hub——-Client 192.168.0.0/24 192.168.1.1/29 192.168.0.254/24 Linux proxy 192.168.1.3/29 A. Router Mikrotik Configuration a. Interface / interface ethernet set Local name=”Local” mtu=1500 mac-address=00:50:DA:5F:AB:16 arp=enabled \ disable-running-check=yes auto-negotiation=yes full-duplex=yes \ cable-settings=default speed=100Mbps comment=”" disabled=no set Public name=”Public” mtu=1500 mac-address=00:A0:D2:11:C2:79 arp=enabled \ disable-running-check=yes auto-negotiation=yes full-duplex=yes \ cable-settings=default speed=100Mbps comment=”" disabled=no b. ARP / ip arp add address=192.168.0.7 mac-address=00:19:21:14:4A:E7 interface=Local \ comment=”" disabled=no add address=192.168.0.4 mac-address=00:E0:4D:2F:81:6E interface=Local \ comment=”" disabled=no add address=192.168.0.1 mac-address=00:1B:B9:57:79:75 interface=Local \ comment=”" disabled=no add address=192.168.0.6 mac-address=00:E0:4D:2F:4D:F3 interface=Local \ comment=”" disabled=no add address=192.168.0.11 mac-address=00:1B:B9:57:7E:31 interface=Local \ comment=”" disabled=no add address=192.168.0.2 mac-address=00:E0:4D:2F:81:6D interface=Local \ comment=”" disabled=no add address=192.168.0.5 mac-address=00:19:21:DD:90:F4 interface=Local \ comment=”" disabled=no add address=192.168.0.10 mac-address=00:1B:B9:95:EB:6D interface=Local \ comment=”" disabled=no

add address=192.168.0.253 mac-address=00:1A:92:56:79:5E interface=Local \ comment=”" disabled=no add address=192.168.1.1 mac-address=00:18:6E:CA:4F:2E interface=Public \ comment=”" disabled=no add address=192.168.1.3 mac-address=00:1B:11:66:2A:69 interface=Public \ comment=”" disabled=no c. DNS ISP / ip dns set primary-dns=192.168.1.3 secondary-dns=202.134.0.155 \ allow-remote-requests=yes cache-size=2048KiB cache-max-ttl=1w d. IP address / ip address add address=192.168.1.2/29 network=192.168.1.0 broadcast=192.168.1.7 \ interface=Public comment=”" disabled=no add address=192.168.0.254/24 network=192.168.0.0 broadcast=192.168.0.255 \ interface=Local comment=”" disabled=no e. Mangle / ip firewall mangle add chain=prerouting src-address=192.168.0.0/24 protocol=icmp \ action=mark-connection new-connection-mark=ICMP-CM passthrough=yes \ comment=”ToS” disabled=no add chain=prerouting connection-mark=ICMP-CM action=mark-packet \ new-packet-mark=ICMP-PM passthrough=yes comment=”" disabled=no add chain=prerouting packet-mark=ICMP-PM action=change-tos new-tos=min-delay \ comment=”" disabled=no add chain=prerouting src-address=192.168.0.0/24 protocol=tcp dst-port=53 \ action=mark-connection new-connection-mark=DNS-CM passthrough=yes \ comment=”" disabled=no add chain=prerouting src-address=192.168.0.0/24 protocol=udp dst-port=53 \ action=mark-connection new-connection-mark=DNS-CM passthrough=yes \ comment=”" disabled=no add chain=prerouting connection-mark=DNS-CM action=mark-packet \ new-packet-mark=DNS-PM passthrough=yes comment=”" disabled=no add chain=prerouting packet-mark=DNS-PM action=change-tos new-tos=min-delay \ comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=80 action=mark-connection \ new-connection-mark=http_conn passthrough=yes comment=”Services” \ disabled=no add chain=prerouting protocol=tcp dst-port=443 action=mark-connection \ new-connection-mark=http_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=8080 action=mark-connection \ new-connection-mark=http_conn passthrough=yes comment=”" disabled=no

add chain=prerouting protocol=tcp dst-port=3128 action=mark-connection \ new-connection-mark=http_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=http_conn action=mark-packet \ new-packet-mark=http passthrough=no comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=5050-5061 action=mark-connection \ new-connection-mark=ym_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=ym_conn action=mark-packet \ new-packet-mark=ym passthrough=no comment=”" disabled=no add chain=prerouting protocol=udp dst-port=27015 action=mark-connection \ new-connection-mark=cs_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=cs_conn action=mark-packet \ new-packet-mark=cs passthrough=no comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=6667-7000 action=mark-connection \ new-connection-mark=irc_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=irc_conn action=mark-packet \ new-packet-mark=irc passthrough=no comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=8291 action=mark-connection \ new-connection-mark=mt_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=mt_conn action=mark-packet \ new-packet-mark=mt passthrough=no comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=110 action=mark-connection \ new-connection-mark=email_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=25 action=mark-connection \ new-connection-mark=email_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=email_conn action=mark-packet \ new-packet-mark=email passthrough=no comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=22 action=mark-connection \ new-connection-mark=ssh_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=ssh_conn action=mark-packet \ new-packet-mark=ssh passthrough=no comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=500-3127 action=mark-connection \ new-connection-mark=games_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=3129-6665 action=mark-connection \ new-connection-mark=games_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=tcp dst-port=7001-65535 action=mark-connection \ new-connection-mark=games_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=udp dst-port=500-3127 action=mark-connection \ new-connection-mark=games_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=udp dst-port=3129-6665 action=mark-connection \ new-connection-mark=games_conn passthrough=yes comment=”" disabled=no add chain=prerouting protocol=udp dst-port=7001-65535 action=mark-connection \ new-connection-mark=games_conn passthrough=yes comment=”" disabled=no add chain=prerouting connection-mark=games_conn action=mark-packet \ new-packet-mark=games passthrough=no comment=”" disabled=no add chain=prerouting src-address=192.168.0.0/24 action=mark-packet \ new-packet-mark=Naik passthrough=no comment=”Up Traffic” disabled=no

add chain=forward src-address=192.168.0.0/24 action=mark-connection \ new-connection-mark=Koneksi passthrough=yes comment=”Conn-Mark” \ disabled=no add chain=forward in-interface=Public connection-mark=Koneksi \ action=mark-packet new-packet-mark=Turun passthrough=no \ comment=”Down-Direct Connection” disabled=no add chain=output out-interface=Local dst-address=192.168.0.0/24 \ action=mark-packet new-packet-mark=Turun passthrough=no comment=”Down-Via \ Proxy” disabled=no f. ip nat / ip firewall nat add chain=srcnat out-interface=Public action=masquerade comment=”" disabled=no add chain=dstnat src-address=192.168.0.0/24 protocol=tcp dst-port=80 \ dst-address-list=!servergames action=dst-nat to-addresses=192.168.1.3 \ to-ports=8080 comment=”Pakai Proxy Linux” disabled=no add chain=dstnat src-address=192.168.0.0/24 protocol=tcp dst-port=3128 \ dst-address-list=!servergames action=dst-nat to-addresses=192.168.1.3 \ to-ports=8080 comment=”" disabled=no add chain=dstnat src-address=192.168.0.0/24 protocol=tcp dst-port=8080 \ dst-address-list=!servergames action=dst-nat to-addresses=192.168.1.3 \ to-ports=8080 comment=”" disabled=no add chain=dstnat src-address=192.168.0.0/24 protocol=tcp dst-port=80 \ action=redirect to-ports=8080 comment=”Tanpa proxy Linux” disabled=yes add chain=dstnat src-address=192.168.0.0/24 protocol=tcp dst-port=3128 \ action=redirect to-ports=8080 comment=”" disabled=yes add chain=dstnat src-address=192.168.0.0/24 protocol=tcp dst-port=8080 \ action=redirect to-ports=8080 comment=”" disabled=yes g. filter / ip firewall filter add chain=input connection-state=invalid action=drop comment=”Drop invalid \ connections” disabled=no add chain=input connection-state=established action=accept comment=”Allow \ esatblished connections” disabled=no add chain=input connection-state=related action=accept comment=”Allow related \ connections” disabled=no add chain=input protocol=udp action=accept comment=”Allow UDP” disabled=no add chain=input protocol=icmp action=accept comment=”Allow ICMP” disabled=no add chain=input in-interface=!Public action=accept comment=”Allow connection \ to router from local network” disabled=no add chain=input action=drop comment=”Drop everything else” disabled=no add chain=input protocol=tcp dst-port=1337 action=add-src-to-address-list \ address-list=knock address-list-timeout=15s comment=”" disabled=no add chain=input protocol=tcp dst-port=7331 src-address-list=knock \

action=add-src-to-address-list address-list=safe address-list-timeout=15m \ comment=”" disabled=no add chain=input connection-state=established action=accept comment=”accept \ established connection packets” disabled=no add chain=input connection-state=related action=accept comment=”accept related \ connection packets” disabled=no add chain=input connection-state=invalid action=drop comment=”drop invalid \ packets” disabled=no add chain=input protocol=tcp psd=21,3s,3,1 action=drop comment=”detect and \ drop port scan connections” disabled=no add chain=input protocol=tcp connection-limit=3,32 src-address-list=black_list \ action=tarpit comment=”suppress DoS attack” disabled=no add chain=input protocol=tcp connection-limit=10,32 \ action=add-src-to-address-list address-list=black_list \ address-list-timeout=1d comment=”detect DoS attack” disabled=no add chain=input protocol=icmp action=jump jump-target=ICMP comment=”jump to \ chain ICMP” disabled=no add chain=input action=jump jump-target=services comment=”jump to chain \ services” disabled=no add chain=input dst-address-type=broadcast action=accept comment=”Allow \ Broadcast Traffic” disabled=no add chain=input action=log log-prefix=”Filter:” comment=”" disabled=no add chain=input action=accept comment=”Allow access to router from known \ network” disabled=no add chain=input src-address=192.168.0.0/24 action=accept comment=”" \ disabled=no add chain=input src-address=192.168.5.0/29 action=accept comment=”" \ disabled=no add chain=input src-address=192.168.4.0/29 action=accept comment=”" \ disabled=no add chain=input src-address=63.219.6.0/24 action=accept comment=”" disabled=no add chain=input src-address=125.0.0.0/8 action=accept comment=”" disabled=no add chain=input action=drop comment=”drop everything else” disabled=no add chain=ICMP protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept \ comment=”0:0 and limit for 5pac/s” disabled=no add chain=ICMP protocol=icmp icmp-options=3:3 limit=5,5 action=accept \ comment=”3:3 and limit for 5pac/s” disabled=no add chain=ICMP protocol=icmp icmp-options=3:4 limit=5,5 action=accept \ comment=”3:4 and limit for 5pac/s” disabled=no add chain=ICMP protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept \ comment=”8:0 and limit for 5pac/s” disabled=no add chain=ICMP protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept \ comment=”11:0 and limit for 5pac/s” disabled=no add chain=ICMP protocol=icmp action=drop comment=”Drop everything else” \ disabled=no add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list \

address-list=”port scanners” address-list-timeout=2w comment=”Port \ scanners to list ” disabled=no add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg \ action=add-src-to-address-list address-list=”port scanners” \ address-list-timeout=2w comment=”NMAP FIN Stealth scan” disabled=no add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list \ address-list=”port scanners” address-list-timeout=2w comment=”SYN/FIN \ scan” disabled=no add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list \ address-list=”port scanners” address-list-timeout=2w comment=”SYN/RST \ scan” disabled=no add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack \ action=add-src-to-address-list address-list=”port scanners” \ address-list-timeout=2w comment=”FIN/PSH/URG scan” disabled=no add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg \ action=add-src-to-address-list address-list=”port scanners” \ address-list-timeout=2w comment=”ALL/ALL scan” disabled=no add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg \ action=add-src-to-address-list address-list=”port scanners” \ address-list-timeout=2w comment=”NMAP NULL scan” disabled=no add chain=input src-address-list=”port scanners” action=drop comment=”dropping \ port scanners” disabled=no add chain=forward connection-state=established action=accept comment=”allow \ established connections” disabled=no add chain=forward connection-state=related action=accept comment=”allow \ related connections” disabled=no add chain=forward connection-state=invalid action=drop comment=”drop invalid \ connections” disabled=no add chain=virus protocol=tcp dst-port=135-139 action=drop comment=”Drop \ Blaster Worm” disabled=no add chain=virus protocol=udp dst-port=135-139 action=drop comment=”Drop \ Messenger Worm” disabled=no add chain=virus protocol=tcp dst-port=445 action=drop comment=”Drop Blaster \ Worm” disabled=no add chain=virus protocol=udp dst-port=445 action=drop comment=”Drop Blaster \ Worm” disabled=no add chain=virus protocol=tcp dst-port=593 action=drop comment=”________” \ disabled=no add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment=”________” \ disabled=no add chain=virus protocol=tcp dst-port=1080 action=drop comment=”Drop MyDoom” \ disabled=no add chain=virus protocol=tcp dst-port=1214 action=drop comment=”________” \ disabled=no add chain=virus protocol=tcp dst-port=1363 action=drop comment=”ndm requester” \ disabled=no

add chain=virus protocol=tcp dst-port=1364 action=drop comment=”ndm server” \ disabled=no add chain=virus protocol=tcp dst-port=1368 action=drop comment=”screen cast” \ disabled=no add chain=virus protocol=tcp dst-port=1373 action=drop comment=”hromgrafx” \ disabled=no add chain=virus protocol=tcp dst-port=1377 action=drop comment=”cichlid” \ disabled=no add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=”Worm” \ disabled=no add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Bagle Virus” \ disabled=no add chain=virus protocol=tcp dst-port=2283 action=drop comment=”Drop Dumaru.Y” \ disabled=no add chain=virus protocol=tcp dst-port=2535 action=drop comment=”Drop Beagle” \ disabled=no add chain=virus protocol=tcp dst-port=2745 action=drop comment=”Drop \ Beagle.C-K” disabled=no add chain=virus protocol=tcp dst-port=3127 action=drop comment=”Drop MyDoom” \ disabled=no add chain=virus protocol=tcp dst-port=3410 action=drop comment=”Drop Backdoor \ OptixPro” disabled=no add chain=virus protocol=tcp dst-port=4444 action=drop comment=”Worm” \ disabled=no add chain=virus protocol=udp dst-port=4444 action=drop comment=”Worm” \ disabled=no add chain=virus protocol=tcp dst-port=5554 action=drop comment=”Drop Sasser” \ disabled=no add chain=virus protocol=tcp dst-port=8866 action=drop comment=”Drop Beagle.B” \ disabled=no add chain=virus protocol=tcp dst-port=9898 action=drop comment=”Drop \ Dabber.A-B” disabled=no add chain=virus protocol=tcp dst-port=10000 action=drop comment=”Drop \ Dumaru.Y” disabled=no add chain=virus protocol=tcp dst-port=10080 action=drop comment=”Drop \ MyDoom.B” disabled=no add chain=virus protocol=tcp dst-port=12345 action=drop comment=”Drop NetBus” \ disabled=no add chain=virus protocol=tcp dst-port=17300 action=drop comment=”Drop Kuang2″ \ disabled=no add chain=virus protocol=tcp dst-port=27374 action=drop comment=”Drop \ SubSeven” disabled=no add chain=virus protocol=tcp dst-port=65506 action=drop comment=”Drop PhatBot, \ Agobot, Gaobot” disabled=no add chain=forward action=jump jump-target=virus comment=”jump to the virus \ chain” disabled=no

add chain=input connection-state=invalid action=drop comment=”Drop Invalid \ connections” disabled=no add chain=input connection-state=established action=accept comment=”Allow \ Established connections” disabled=no add chain=input protocol=udp action=accept comment=”Allow UDP” disabled=no add chain=input protocol=icmp action=accept comment=”Allow ICMP” disabled=no add chain=input action=drop comment=”Drop anything else” disabled=no add chain=forward protocol=tcp connection-state=invalid action=drop \ comment=”drop invalid connections” disabled=no add chain=forward connection-state=established action=accept comment=”allow \ already established connections” disabled=no add chain=forward connection-state=related action=accept comment=”allow \ related connections” disabled=no add chain=forward src-address=0.0.0.0/8 action=drop comment=”" disabled=no add chain=forward dst-address=0.0.0.0/8 action=drop comment=”" disabled=no add chain=forward src-address=127.0.0.0/8 action=drop comment=”" disabled=no add chain=forward dst-address=127.0.0.0/8 action=drop comment=”" disabled=no add chain=forward src-address=224.0.0.0/3 action=drop comment=”" disabled=no add chain=forward dst-address=224.0.0.0/3 action=drop comment=”" disabled=no add chain=forward protocol=tcp action=jump jump-target=tcp comment=”" \ disabled=no add chain=forward protocol=udp action=jump jump-target=udp comment=”" \ disabled=no add chain=forward protocol=icmp action=jump jump-target=icmp comment=”" \ disabled=no add chain=tcp protocol=tcp dst-port=69 action=drop comment=”deny TFTP” \ disabled=no add chain=tcp protocol=tcp dst-port=111 action=drop comment=”deny RPC \ portmapper” disabled=no add chain=tcp protocol=tcp dst-port=135 action=drop comment=”deny RPC \ portmapper” disabled=no add chain=tcp protocol=tcp dst-port=137-139 action=drop comment=”deny NBT” \ disabled=no add chain=tcp protocol=tcp dst-port=445 action=drop comment=”deny cifs” \ disabled=no add chain=tcp protocol=tcp dst-port=2049 action=drop comment=”deny NFS” \ disabled=no add chain=tcp protocol=tcp dst-port=12345-12346 action=drop comment=”deny \ NetBus” disabled=no add chain=tcp protocol=tcp dst-port=20034 action=drop comment=”deny NetBus” \ disabled=no add chain=tcp protocol=tcp dst-port=3133 action=drop comment=”deny \ BackOriffice” disabled=no add chain=tcp protocol=tcp dst-port=67-68 action=drop comment=”deny DHCP” \ disabled=no add chain=udp protocol=udp dst-port=69 action=drop comment=”deny TFTP” \

disabled=no add chain=udp protocol=udp dst-port=111 action=drop comment=”deny PRC \ portmapper” disabled=no add chain=udp protocol=udp dst-port=135 action=drop comment=”deny PRC \ portmapper” disabled=no add chain=udp protocol=udp dst-port=137-139 action=drop comment=”deny NBT” \ disabled=no add chain=udp protocol=udp dst-port=2049 action=drop comment=”deny NFS” \ disabled=no add chain=udp protocol=udp dst-port=3133 action=drop comment=”deny \ BackOriffice” disabled=no add chain=icmp protocol=icmp icmp-options=0:0 action=accept comment=”drop \ invalid connections” disabled=no add chain=icmp protocol=icmp icmp-options=3:0 action=accept comment=”allow \ established connections” disabled=no add chain=icmp protocol=icmp icmp-options=3:1 action=accept comment=”allow \ already established connections” disabled=no add chain=icmp protocol=icmp icmp-options=4:0 action=accept comment=”allow \ source quench” disabled=no add chain=icmp protocol=icmp icmp-options=8:0 action=accept comment=”allow \ echo request” disabled=no add chain=icmp protocol=icmp icmp-options=11:0 action=accept comment=”allow \ time exceed” disabled=no add chain=icmp protocol=icmp icmp-options=12:0 action=accept comment=”allow \ parameter bad” disabled=no add chain=icmp action=drop comment=”deny all other types” disabled=no add chain=input connection-state=established action=accept comment=”Accept \ established connections” disabled=no add chain=input connection-state=related action=accept comment=”Accept related \ connections” disabled=no add chain=input connection-state=invalid action=drop comment=”Drop invalid \ connections” disabled=no add chain=input protocol=udp action=accept comment=”UDP” disabled=no add chain=input protocol=icmp limit=50/5s,2 action=accept comment=”Allow \ limited pings” disabled=no add chain=input protocol=icmp action=drop comment=”Drop excess pings” \ disabled=no add chain=input protocol=tcp dst-port=22 action=accept comment=”SSH for secure \ shell” disabled=no add chain=input protocol=tcp dst-port=8291 action=accept comment=”winbox” \ disabled=no add chain=input src-address=159.148.172.192/28 action=accept comment=”From \ Mikrotikls network” disabled=no add chain=input src-address=192.168.0.0/24 action=accept comment=”From our \ private LAN” disabled=no add chain=input action=log log-prefix=”DROP INPUT” comment=”Log everything \

else” disabled=no add chain=tcp protocol=tcp p2p=all-p2p action=drop comment=”deny DHCP” \ disabled=no add chain=tcp src-address=192.168.0.2 protocol=tcp dst-port=3133 p2p=all-p2p \ action=drop comment=”deny BackOriffice” disabled=no h. ip firewaal address list / ip firewall address-list add list=servergames address=202.93.20.201 comment=”" disabled=no i.queue type / queue type set default name=”default” kind=pfifo pfifo-limit=50 set ethernet-default name=”ethernet-default” kind=pfifo pfifo-limit=50 set wireless-default name=”wireless-default” kind=sfq sfq-perturb=5 \ sfq-allot=1514 set synchronous-default name=”synchronous-default” kind=red red-limit=60 \ red-min-threshold=10 red-max-threshold=50 red-burst=20 red-avg-packet=1000 set hotspot-default name=”hotspot-default” kind=sfq sfq-perturb=5 \ sfq-allot=1514 add name=”PFIFO-64″ kind=pfifo pfifo-limit=64 add name=”default-small” kind=pfifo pfifo-limit=10 add name=”pcq-download” kind=pcq pcq-rate=384000 pcq-limit=50 \ pcq-classifier=dst-address pcq-total-limit=2000 add name=”pcq-upload” kind=pcq pcq-rate=64000 pcq-limit=50 \ pcq-classifier=src-address pcq-total-limit=2000 j.queue tree / queue tree add name=”ICMP” parent=global-in packet-mark=ICMP-PM limit-at=8000 \ queue=PFIFO-64 priority=1 max-limit=16000 burst-limit=0 burst-threshold=0 \ burst-time=0s disabled=no add name=”DNS” parent=global-in packet-mark=DNS-PM limit-at=8000 \ queue=PFIFO-64 priority=1 max-limit=16000 burst-limit=0 burst-threshold=0 \ burst-time=0s disabled=no add name=”downstream” parent=Local packet-mark=Turun limit-at=0 \ queue=pcq-download priority=1 max-limit=0 burst-limit=0 burst-threshold=0 \ burst-time=0s disabled=no add name=”upstream” parent=global-in packet-mark=Naik limit-at=0 \ queue=pcq-upload priority=1 max-limit=0 burst-limit=0 burst-threshold=0 \ burst-time=0s disabled=no k. queue simple / queue simple add name=”Fantasy.net” dst-address=0.0.0.0/0 interface=Local parent=none \ priority=1 queue=default/default limit-at=0/786000 max-limit=0/786000 \

total-queue=default disabled=no add name=”01″ target-addresses=192.168.0.1/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default time=0s-0s, p2p=fasttrack \ disabled=no add name=”02″ target-addresses=192.168.0.2/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default disabled=no add name=”03″ target-addresses=192.168.0.3/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default disabled=no add name=”04″ target-addresses=192.168.0.4/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default time=0s-0s, disabled=no add name=”06″ target-addresses=192.168.0.6/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default p2p=fasttrack disabled=no add name=”05″ target-addresses=192.168.0.5/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/60000 total-queue=default disabled=no add name=”07″ target-addresses=192.168.0.7/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default disabled=no add name=”08″ target-addresses=192.168.0.8/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default disabled=no add name=”09″ target-addresses=192.168.0.9/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default disabled=no add name=”10″ target-addresses=192.168.0.10/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 queue=default/default \ limit-at=0/16000 max-limit=8000/48000 total-queue=default disabled=no add name=”11″ target-addresses=192.168.0.11/32 dst-address=0.0.0.0/0 \ interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/48000 total-queue=default p2p=all-p2p disabled=no add name=”Server” target-addresses=192.168.0.253/32 dst-address=0.0.0.0/0 \

interface=Local parent=Fantasy.net priority=8 \ queue=ethernet-default/ethernet-default limit-at=0/16000 \ max-limit=8000/120000 total-queue=default disabled=yes B. LINUX Proxy a. vi /etc/sysconfig/network-scripts/ifcfg-eth0 DEVICE=eth0 BOOTPROTO=static BROADCAST=192.168.1.255 HWADDR=00:1B:11:66:2A:69 IPADDR=192.168.1.3 NETMASK=255.255.255.0 NETWORK=192.168.1.0 ONBOOT=yes TYPE=Ethernet b. Routing Proxy Ke Modem [root@proxies squid]# netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 192.168.1.0 * 255.255.255.0 U 0 0 0 eth0 169.254.0.0 * 255.255.0.0 U 0 0 0 eth0 default . 192.168.1.1 UG 0 0 0 eth0 c. named.conf tambahkan opsi fowarder di named.conf // query-source address * port 53; forwarders { 203.130.193.74; 202.134.0.155; 202.134.2.5; }; }; d. resolve.conf

[root@proxies squid]# cat /etc/resolv.conf nameserver 192.168.1.1 nameserver 203.130.193.74 nameserver 202.134.0.155 nameserver 202.134.2.5 e. Squid.conf http_port 8080 #icp_port 3130 icp_query_timeout 0 maximum_icp_query_timeout 5000 mcast_icp_query_timeout 2000 dead_peer_timeout 10 seconds hierarchy_stoplist cgi-bin ? localhost acl QUERY urlpath_regex cgi-bin \? localhost ### Opsi Cache cache_mem 6 MB cache_swap_low 98 cache_swap_high 99 maximum_object_size 128 MB minimum_object_size 0 KB maximum_object_size_in_memory 32 KB ipcache_size 10240 ipcache_low 98 ipcache_high 99 fqdncache_size 256 cache_replacement_policy heap LFUDA memory_replacement_policy heap GDSF ### Opsi Tuning Squid refresh_pattern -i \.(swfpngjpgjpegbmptiffpnggif) 43200 90% 129600 reload-into-ims override-lastmod refresh_pattern -i \.(movmpgmpegflvavimp33gpsiswma) 43200 90% 129600 reload-intoims override-lastmod refresh_pattern -i \.(zipraracebzbz2targzexe) 43200 90% 129600 reload-into-ims override-lastmod refresh_pattern -i (.*html$.*htm.*shtml.*aspx.*asp) 43200 90% 1440 reload-into-ims override-lastmod refresh_pattern -i \.(classcssjsgifjpg)$ 10080 100% 43200 override-expire refresh_pattern -i \.(jpejpegpngbmptif)$ 10080 100% 43200 override-expire refresh_pattern -i \.(tiffmovaviqtmpeg)$ 10080 100% 43200 override-expire refresh_pattern -i \.(mpgmpewavaumid)$ 10080 100% 43200 override-expire refresh_pattern -i \.(zipgzarjlhalzh)$ 10080 100% 43200 override-expire

refresh_pattern -i \.(rartgztarexebin)$ 10080 100% 43200 override-expire refresh_pattern -i \.(hqxpdfrtfdocswf)$ 10080 100% 43200 override-expire refresh_pattern -i \.(inccabadtxtdll)$ 10080 100% 43200 override-expire refresh_pattern -i \.(aspacgiplshtmlphp3php)$ 2 20% 4320 reload-into-ims refresh_pattern ^http://*.google.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*korea.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*.akamai.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*.windowsmedia.*/.* 720 100% 4320 reload-into-ims overridelastmod refresh_pattern ^http://*.googlesyndication.*/.* 720 100% 4320 reload-into-ims overridelastmod refresh_pattern ^http://*.plasa.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*.telkom.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://www.friendster.com/.* 720 100% 4320 reload-into-ims overridelastmod refresh_pattern ^http://mail.yahoo.com/.* 720 100% 4320 reload-into-ims overridelastmod refresh_pattern ^http://*.yahoo.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*.yimg.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*.gmail.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^http://*.detik.*/.* 720 100% 4320 reload-into-ims override-lastmod refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern ^ftp: 43200 90% 129600 reload-into-ims override-expire #refresh_pattern ^ftp: 1440 20% 10080 #refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern . 0 20% 4320 #refresh_pattern . 180 95% 120960 reload-into-ims override-lastmod ### Direktori cache #cache_dir aufs /cache 20000 16 256 #cache_dir diskd /cache 7000 16 256 Q1=72 Q2=88 cache_dir aufs /cache 50000 16 256 ### Log cache_access_log /var/log/squid/access.log logfile_rotate 1 cache_log none cache_store_log none emulate_httpd_log off log_ip_on_direct on log_fqdn off log_icp_queries off ### DNS server dns_nameservers 127.0.0.1

quick_abort_min 0 quick_abort_max 0 quick_abort_pct 98% negative_ttl 15 minute positive_dns_ttl 24 hours negative_dns_ttl 5 minutes range_offset_limit 0 KB ### Opsi Timeout connect_timeout 1 minute peer_connect_timeout 5 seconds read_timeout 30 minute request_timeout 1 minute #client_lifetime 10 hour half_closed_clients off pconn_timeout 15 second shutdown_lifetime 15 second ### Opsi ACL acl manager proto cache_object acl all src 0.0.0.0/0.0.0.0 acl client src 192.168.1.0/29 acl tidakbebasdownload time 08:00-22:00 acl porn url_regex -i /usr/local/squid/etc/bokep.txt time 08:00-22:00 acl noporn url_regex -i /usr/local/squid/etc/nobokep.txt time 08:00-22:00 acl file_terlarang url_regex -i hot_indonesia.exe acl file_terlarang url_regex -i hotsurprise_id.exe acl file_terlarang url_regex -i best-mp3-download.exe acl file_terlarang url_regex -i R32.exe acl file_terlarang url_regex -i rb32.exe acl file_terlarang url_regex -i mp3.exe acl file_terlarang url_regex -i HOTSEX.exe acl file_terlarang url_regex -i Browser_Plugin.exe acl file_terlarang url_regex -i DDialer.exe acl file_terlarang url_regex -i od-teen acl file_terlarang url_regex -i URLDownload.exe acl file_terlarang url_regex -i od-stnd67.exe acl file_terlarang url_regex -i Download_Plugin.exe acl file_terlarang url_regex -i od-teen52.exe acl file_terlarang url_regex -i malaysex acl file_terlarang url_regex -i edita.html acl file_terlarang url_regex -i info.exe acl file_terlarang url_regex -i run.exe acl file_terlarang url_regex -i Lovers2Go acl file_terlarang url_regex -i GlobalDialer acl file_terlarang url_regex -i WebDialer

acl file_terlarang url_regex -i britneynude acl file_terlarang url_regex -i download.exe acl file_terlarang url_regex -i backup.exe acl file_terlarang url_regex -i GnoOS2003 acl file_terlarang url_regex -i wintrim.exe acl file_terlarang url_regex -i MPREXE.EXE acl file_terlarang url_regex -i exengd.EXE acl file_terlarang url_regex -i xxxvideo.exe acl file_terlarang url_regex -i Save.exe acl file_terlarang url_regex -i ATLBROWSER.DLL acl file_terlarang url_regex -i NawaL_rm acl file_terlarang url_regex -i Socks32.dll acl file_terlarang url_regex -i Sc32Lnch.exe acl file_terlarang url_regex -i dat0.exe acl IIX dst_as 7713 4622 4795 7597 4787 4795 4800 acl block url_regex -i \.(aiffasfavidifdivxmovmoviemp3mpe?g?mpv2oggra?msndqtwavwmfwmv)$ acl local-domain dstdomain localhost acl Bad_ports port 7 9 11 19 22 23 25 53 110 119 513 514 acl Safe_ports port 21 70 80 210 443 488 563 591 777 1025-65535 acl Virus urlpath_regex winnt/system32/cmd.exe? acl connect method CONNECT acl post method POST acl ssl method CONNECT acl purge method PURGE acl IpAddrProbeUA browser ^Mozilla/4.0.\(compatible;.MSIE.5.5;.Windows.98\)$ acl IpAddrProbeURL url_regex //[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/$ no_cache deny QUERY manager http_access allow manager IIX Safe_ports http_access allow client http_access deny porn !noporn http_access deny Bad_ports Virus IpAddrProbeUA IpAddrProbeURL http_access deny file_terlarang http_access deny all ### Paramater Administratif cache_mgr [email protected] cache_effective_user squid cache_effective_group squid visible_hostname proxy.fantasy.war.net.id ### Opsi Akselerator memory_pools off forwarded_for on log_icp_queries off

icp_hit_stale on minimum_direct_hops 4 minimum_direct_rtt 400 store_avg_object_size 13 KB store_objects_per_bucket 20 client_db on netdb_low 9900 netdb_high 10000 netdb_ping_period 30 seconds query_icmp off pipeline_prefetch on reload_into_ims on pipeline_prefetch on vary_ignore_expire on max_open_disk_fds 100 nonhierarchical_direct on prefer_direct off ### Pendukung Transparan Proxy httpd_accel_host virtual httpd_accel_port 80 httpd_accel_with_proxy on httpd_accel_uses_host_header on ### Membatasi Besar File untuk download reply_body_max_size 3512000 allow client block tidakbebasdownload ### SNMP #snmp_port 3401 #acl snmppublic snmp_community public #snmp_access allow all header_access User-Agent deny all header_replace User-Agent Mozilla/5.0 (compatible; MSIE 6.0) header_access Accept deny all header_replace Accept */* header_access Accept-Language deny all header_replace Accept-Language id, en f. firewall tambahan di proxy #05-12-05 /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 12 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 12 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 12 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 12 -j

REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 16 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 16 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 16 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 16 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 17 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 17 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 17 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 17 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 12:20 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 12:20 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 12:20 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 12:20 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 110 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 110 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 110 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 110 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 25 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 25 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 25 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 25 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 24 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 24 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 123 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 123 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 123 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 123 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 24 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 24 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 24 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 24 -j REJECT /sbin/iptables -I INPUT -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 23 -j DROP /sbin/iptables -A FORWARD -p tcp -s 192.168.0.0/32 -d 0/0 –destination-port 23 -j REJECT /sbin/iptables -N syn-flood /sbin/iptables -A INPUT -i input_interface -p tcp –syn -j syn-flood

/sbin/iptables -A syn-flood -m limit –limit 1/s –limit-burst 4 -j RETURN /sbin/iptables -A syn-flood -j DROP /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 199 -j DROP /sbin/iptables -I INPUT -p udp -s 0/0 -d 0/0 –destination-port 199 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 199 -j REJECT /sbin/iptables -A FORWARD -p udp -s 0/0 -d 0/0 –destination-port 199 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 119 -j DROP /sbin/iptables -I INPUT -p udp -s 0/0 -d 0/0 –destination-port 119 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 119 -j REJECT /sbin/iptables -A FORWARD -p udp -s 0/0 -d 0/0 –destination-port 119 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 111 -j DROP /sbin/iptables -I INPUT -p udp -s 0/0 -d 0/0 –destination-port 111 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 111 -j REJECT /sbin/iptables -A FORWARD -p udp -s 0/0 -d 0/0 –destination-port 111 -j REJECT /sbin/iptables -I INPUT -p tcp -s 0/0 -d 0/0 –destination-port 411 -j DROP /sbin/iptables -I INPUT -p udp -s 0/0 -d 0/0 –destination-port 411 -j DROP /sbin/iptables -A FORWARD -p tcp -s 0/0 -d 0/0 –destination-port 67:68 -j REJECT /sbin/iptables -A FORWARD -p udp -s 0/0 -d 0/0 –destination-port 67:68 -j REJECT

Related Documents


More Documents from ""

Index
May 2020 16
Dns Untuk Intranet
May 2020 14
Load Balanced Quangga
May 2020 16
Konfigurasi Apache
May 2020 20
Konsep Dan Kerja Dns
May 2020 20