那些年我們一起開的搞笑地產公司 五都法拍屋 9月爆量-歪樓篇

或者懷念老祖宗.把前篇版本對照並且把Forward撤掉.發現速度會更好.沒啥太多的問題.
把紅框的規則拿掉.就如同早期的老祖宗.效能更好更快速.歪壞影響幾乎零.如增強版的老祖宗.
這老祖宗厲害了.兩種版本參考.從規則改編效果很不錯更迅速.此回饋於獻給MikroTik.
歪壞影響跟前篇規則很相似.但不會被弄到像無線阻斷式.一下慢一下快.此篇老祖宗改善了速度.
/ip firewall filter
add action=accept chain=forward comment="Established, Related" \
connection-state=established,relatedadd connection-nat-state=!dstnat
add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-nat-state=!dstnat \
connection-state=new in-interface=bridge src-address-list=LAN
add action=reject chain=forward comment="Reject All Forward Packets" log=no \
log-prefix="Reject All Packets" reject-with=icmp-network-unreachabl
NeverGiveUp!! wrote:
規則可採用上篇.已...(恕刪)

/ip firewall address-list
add address=192.168.88.2-192.168.88.254 list=LAN
/ip firewall nat
add action=redirect chain=dstnat comment=DNS dst-port=53 protocol=tcp \
to-ports=53
add action=redirect chain=dstnat dst-port=53 protocol=udp to-ports=53
add action=masquerade chain=srcnat comment="IP Masquerading" \
src-address-list=LAN
/ip firewall filter
add action=reject chain=forward dst-port=53,443 log=yes protocol=udp \
reject-with=icmp-network-unreachable src-address-list=LAN log-prefix=\
Reject LAN -> UDP(53,443)
add action=accept chain=input comment=\
"Accept established and related packets" connection-state=\
established,related connection-nat-state=!srcnat
add action=accept chain=input comment=udp limit=1/365d,0:packet protocol=udp
add action=accept chain=input comment="From our LAN" in-interface=bridge \
connection-state=established,related,new connection-nat-state=!dstnat \
src-address-list=LAN
add action=accept chain=input comment="Allow limited pings" icmp-options=\
!8:0-255 limit=50/5s,2:packet protocol=icmp
add action=reject chain=input comment="Reject login brute forcers 1" dst-port=\
21,22,23,8291 log=yes protocol=tcp reject-with=icmp-network-unreachable \
src-address-list=login_blacklist
add action=add-src-to-address-list address-list=login_blacklist \
address-list-timeout=4d chain=input comment="Reject login brute forcers 2" \
connection-state=new dst-port=21,22,23,8291 protocol=tcp
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment=\
"Reject port scanners\A1GPort scanners to list" log=yes protocol=tcp psd=\
21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP FIN Stealth scan" log=\
yes protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan" log=yes \
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan" log=yes \
protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG scan" log=yes \
protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan" log=yes \
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL scan" log=yes \
protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=reject chain=input comment="dropping port scanners" log=yes \
reject-with=icmp-network-unreachable src-address-list="port scanners"
add action=log chain=input comment="Log everything else" log-prefix=\
"REJECT INPUT"
add action=reject chain=input comment="Reject everything else" reject-with=\
icmp-network-unreachable
/system scheduler
add comment="Check and set NTP servers" interval=6h name=SetNtpServers \
on-event="# SetNtpServers - Check and set NTP servers from NTP pool\\

# v1.2 Tested and Developed on ROS v5.7\\

#\\

# Change the following line as needed as progName should match script na\\
me \\

:local progName \\"SetNtpServers\";\

\

# Array of NTP pools to use (check www.pool.ntp.org) one or a maximum of\
\_two, a primary & secondary\

# Modify the following line and array variable based on your locale (def\
ault is north america).\

:local arrNtpSystems (\"taiwan.pool.ntp.org\", \"asia.pool.ntp.org\");\

# Alternatively the US related pool below can be used. \

#:local arrNtpSystems (\"taiwan.pool.ntp.org\", \"asia.pool.ntp.org\");\

#\

# No modification is necessary beyond this line.\

:put \"\$progName: Running...\";\

:log info \"\$progName: Running...\";\

:set arrNtpSystems [ :toarray \$arrNtpSystems ];\

:if (( [ :len \$arrNtpSystems ] < 1 ) or ( [ :len \$arrNtpSystems ] > 2 \
)) do={ \

:put \"\$progName: ERROR NTP Systems array (\\\$arrNtpSystems) must \
be either one or two DNS names.\";\

:log info \"\$progName: ERROR NTP Systems array (\\\$arrNtpSystems) \
must be either one or two DNS names.\";\

} else={\

:local arrRosNtpSetting (\"primary-ntp\", \"secondary-ntp\");\

:local i 0;\

:foreach strNtpSystem in (\$arrNtpSystems) do={\

:local ipAddrNtpSystem [ :resolve \$strNtpSystem ];\

:local strRosNtpSetting [ :pick \$arrRosNtpSetting \$i ];\

:local strCurrentNtpIp [ /system ntp client get \$strRosNtpSetti\
ng ];\

:put \"\$progName: NTP server DNS name \$strNtpSystem resolves t\
o \$ipAddrNtpSystem.\";\

:log info \"\$progName: NTP server DNS name \$strNtpSystem resol\
ves to \$ipAddrNtpSystem.\";\

:put \"\$progName: Current \$strRosNtpSetting setting is \$strCu\
rrentNtpIp.\";\

:log info \"\$progName: Current \$strRosNtpSetting setting is \$\
strCurrentNtpIp.\";\

:if ( [ :toip \$ipAddrNtpSystem ] != [ :toip \$strCurrentNtpIp ]\
\_) do={\

:put \"\$progName: Changing \$strRosNtpSetting setting to \$\
ipAddrNtpSystem.\";\

:log info \"\$progName: Changing \$strRosNtpSetting setting \
to \$ipAddrNtpSystem.\";\

:local strCommand [ :parse \"/system ntp client set \$strRos\
NtpSetting=\\\"\$ipAddrNtpSystem\\\"\" ];\

\$strCommand;\

} else={\

:put \"\$progName: No changes were made for the \$strRosNtpS\
etting NTP setting.\";\

:log info \"\$progName: No changes were made for the \$strRo\
sNtpSetting NTP setting.\";\

}\

:set i (\$i + 1);\

}\

}\

:put \"\$progName: Done.\";\

:log info \"\$progName: Done.\";" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add comment=Download_Ads_List interval=24h name=DownloadAdsList \
on-event="/system script run Blocklister_download_Ads" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=25h name=DownloadSpywareList on-event=\
"/system script run Blocklister_download_Spyware" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=26h name=DownloadMalwaredomainlistList on-event=\
"/system script run Blocklister_download_Malwaredomainlist" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=27h name=DownloadHijackedList on-event=\
"/system script run \

Blocklister_download_Hijacked" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
/system script
add name=Blocklister_download_Ads owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/ads\" dst-path=\"ads.rsc\";\
\_/import file-name=\"ads.rsc\";"
add name=Blocklister_download_Spyware owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/spyware\" dst-path=\"spywar\
e.rsc\"; /import file-name=\"spyware.rsc\";"
add name=Blocklister_download_Malwaredomainlist owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/malwaredomainlist\" dst-pat\
h=\"malwaredomainlist.rsc\"; /import file-name=\"malwaredomainlist.rsc\";"
add name=Blocklister_download_Hijacked owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/hijacked\" dst-path=\"hijac\
ked.rsc\"; /import file-name=\"hijacked.rsc\";"
/ip firewall raw
add action=drop chain=prerouting dst-address-list=ads_list log=yes
add action=drop chain=prerouting comment="Drop Spyware" dst-address-list=\
spyware_list log=yes
add action=drop chain=prerouting dst-address-list=hijacked_list log=yes
add action=drop chain=prerouting dst-address-list=malwaredomainlist_list \
log=yes
add action=drop chain=prerouting src-address-list=port scanners log=yes
add action=drop chain=prerouting src-address-list=login_blacklist log=yes
add action=drop chain=prerouting comment="Block Teredo IPv6-tunnel" dst-port=\
3544,3545 protocol=udp src-port=1024-65535
--
寶貝:)留言囉!我相信會有人會採用這次改編版的老祖宗規則.
--
Rakim - When I B On Tha Mic
寶貝:)開心最重要!
一般建議老祖宗.也就是上篇規則.缺點也不是沒有.就Forward少部分不經過NAT隱蔽.
優點就是速度快.很棒棒.各有各好.這跟之前原廠版.不一樣就進與出稍有變化.
不過Forward部分就不用擔心.我觀察列表內部出去的時候沒有雙向通.NAT會自主隱蔽.
意思是指.當內部任何裝置出去給對方主機時.僅一小筆約500bps封包傳出.ROS收到後.
在上序接續加工開一條延續經過NAT隱蔽做個雙向傳輸.這部分確認完全沒問題.可以安心使用.
意思是說若內部裝置要呼喚或傳輸給對方主機.在ROS裡面只需要提點.然後ROS就負責打包.
進來也是一樣.對方進來.就直接進來.若出去也一律經過隱蔽.構成雙向傳輸.若有不好的進來.
也是直接進來.但出去也是照樣隱蔽.唯一差別就在RAW.若出去被RAW抓包.就直接關起來.
這意思是說不管封包合法還是非法.ROS僅於中間立場.若沒RAW也沒關係.就無法構成破壞.
ROS就如負責溝通的橋樑.往來是維持一定的.若有人忌妒想打破制度甚至想破壞橋樑.一句話.
就是吃屎吧!意思是說先過橋樑這關吧.就算沒有衛兵.橋樑還是能承受相當而維持封包間的往來.
意思是說當內部裝置要傳輸時.會先告知ROS.ROS就提供另一個管道使其供應傳輸.意思是.
兩邊經過橋樑.橋樑的作用就是傳出前必須告知說要出去的包.然後橋樑直接打包經過橋樑運出去.
不須由裝置親自送去.就是說封包看得到.但無法捉摸裝置的存在.這就是來電50搭起愛的橋樑.
比方內部192.168.1.5裝置要傳給1.1.1.1.會先丟一個這個傳輸訊息給ROS.
192.168.1.5傳出給1.1.1.1請ROS確認.接著ROS收到確認後進行下一步.
就是WAN傳出封包給1.1.1.1做個雙向傳輸.這就類似裝置要發出去而委託ROS的請求.
當ROS接到內部裝置委託請求後.隱蔽導向由WAN端的IP給1.1.1.1而做個雙向傳輸.
這麼做的好處就是超有安全感.對方僅能看到WAN端的IP.無法透視內部LAN端的裝置IP.
--
21 Savage, Offset, Metro Boomin - Ric Flair Drip
寶貝:)開心最重要!
KingDavid520 wrote:
Y大人生閱歷真是豐富 100分

說到IWC,20年前有一回從德國新天鵝堡經波登湖搭船到瑞士,途經歐洲最大的萊因瀑布(Rhine Falls),本想順道去旁邊不遠的IWC總部買錶,可惜時間不夠未能成行 sorry

我當年瘋錶,還曾經委請錶店老闆專程幫我買日本限量20只的IWC雙追針計時錶,透明錶背下的古老啄木鳥雙秒追針機芯閃閃動人,真是漂亮,可惜也不在了 XD

不過有陣子IWC都採用積家或ETA的通用機芯,就很少玩了.......

...(恕刪)


現在新天鵝堡一堆陸客,真的很擠

幸好我也降溫了,不然還真想找那初代啄木鳥機芯來瞧瞧......


有一陣子把焦點放在車子上,什麼牛馬,什麼改裝,無役不與,

最後洗盡鉛華找了三叉戟安頓,幾個月前也被領養走......


自從收入漸有人樣,擔子愈來愈大,膽子愈來愈小,以前憨膽犯傻只能追憶......


午後適合聽個貝多芬第14號鋼琴奏鳴曲升c小調Op.27 No.2......

老實說,Moonlight跟這首曲子一點關係都沒有......

倒是Gould彈琴過程經常跟著哼唱比較讓俺不適應

blessme wrote:
原來大家都有來,小弟沒發現也沒招待到,真不好意思汗

那兩隻魚這幾年歷經風霜,已屬殘破之身了,只是還沒時間找替代品^++^

近兩個月都在忙裝潢收尾,這兩天則跑政府流程,好久沒這麼勞動了,真有點不習慣哈...

14F預算超標50%,這次13F預算超標3%,也算是有進步^^
...(恕刪)


有賺錢才會爆預算啊~~~

剛回來就有南部客戶上門,看情況往B大那邊送,逛101也方便!
舞夜翎 wrote:
y大要介紹給我完成光源式計劃嗎?...(恕刪)


選秀開始!......您自個兒挑......俺知道會選哪一個......

<img
蜜小雪 wrote:
真的, 開會還有這...(恕刪)


蜜姑娘在香港! 前面幾天俺就在隔壁......的路口轉個彎......再搭飛機一個小時就到了......




自從在中環吃過他們家的辣椒朱古力口味......


俺就很少接近那裡~~~~

蜜小雪 wrote:

我們隔壁的那個男生,才35上下吧!!!
不要鐵齒,病要來時擋都擋不住!!
還等你請泰國看護哩....
你在醫院排阿姨,都還要排隊....

至於護士嗎.....

她問小鮮肉肚子有多痛...1-10分的話~~
小鮮肉說"我很確定有十分"
然後....
她就拿著一針止痛,從小鮮肉屁股打下去了!!!
小鮮肉哇哇大叫了好一陣子!!!

護士得罪不得啊!!!...(恕刪)


小鮮肉英俊又帥氣,怎麼能吞下這口氣?

來!怪老伯幫你報仇!

經確認無異.規則可放心採用.歪壞若遭遇干擾.但隸屬正常.跟原版仍有些差異.
封包強制NAT隱蔽.UDP假開放搭配底部機關槍確保清淨.用途僅適合一般家用及小型辦公用.
NeverGiveUp!! wrote:
一般建議老祖宗.也...(恕刪)
--
寶貝:)這非我之願.就是要先經過被暗流針對的問題才會知道這樣子不過如此.很巧剛好都回來.
若沒經歷些修改.原版的問題就不會被知道.包括歪壞人為干擾的主因.所以證實老祖宗是正確的.
根據我隱藏的過濾機制.這版確實是標準符合.一般遇到廣告啥的建議就交給擋廣告軟體過濾即可.
先前確認過比方說DNS.從RAW來對比.中華DNS可能已加入Spy&Malware反制.
像其他的勒索病毒與黑客及社交釣魚相關偵測反制就沒有.至少相關些功能有總比啥都沒有來得好.
--
David Guetta - Turn Me On ft. Nicki Minaj (Official Video)
寶貝:)開心最重要!

yoshi66 wrote:
午後適合聽個貝多芬第14號鋼琴奏鳴曲升c小調Op.27 No.2......
老實說,Moonlight跟這首曲子一點關係都沒有......


Moonlight看怎彈,且只有前面,完整的感覺就不像了,不過一般人不會聽後面的吧
一雙玉臂千人枕、半點朱唇萬客嚐,還君明珠雙淚垂、恨不相逢未嫁時
接著延續到中繼.這時RTS值就可恢復前面的設定放心設為0.這樣就沒問題了.
這樣的目的是降低人為干擾刻意的訊號碰撞.穩定看晶片.這樣做的好處是保持歪壞對裝置的順穩.
Mbps會隨情況而起伏.能做到近於有線的順穩.如同沒固定寬頻的有線上網.在範圍內都受用.


NeverGiveUp!! wrote:
經確認無異.規則可...(恕刪)
--
Jhené Aiko feat. Kurupt -Never Call Me (Slauson Hills Edition)
寶貝:)開心最重要!
關閉廣告
文章分享
評分
評分
複製連結
請輸入您要前往的頁數(1 ~ 9058)

今日熱門文章 網友點擊推薦!