pada saat kita menyisipkan file table excell pada ms word
kita menemukan tulisan emmbeded seperti di bawah ini :
solusinya cukup mudah
anda block saja tulusan embed itu seluruhnya
lalu tekan alt + f9
alt ( ditahan jangan di lepas ) + f9 ( pada keyboard anda )
lihat apakah tulisan embede itu teha hilang atau tidak
bila belum juga berhasil , silahkan instal ulang pc anda kemungkinan kena virus system 32 nya.
terimakasih
Tuesday, February 26, 2019
Thursday, February 21, 2019
Wednesday, February 6, 2019
Blokir Proxy dan DNS Mikrotik dari Luar
/ip firewall rule
add comment=”BLOKIR DNS DARI LUAR” chain=input action=drop connection-state=new protocol=udp in-interface=[interface internet ip publik] dst-port=53 log=no log-prefix=””
add comment=”BLOKIR PROXY DARI LUAR” chain=input action=drop connection-state=new protocol=tcp in-interface=[interface internet ip publik] dst-port=[port proxy kita] log=no log-prefix=””
sumber
add comment=”BLOKIR DNS DARI LUAR” chain=input action=drop connection-state=new protocol=udp in-interface=[interface internet ip publik] dst-port=53 log=no log-prefix=””
add comment=”BLOKIR PROXY DARI LUAR” chain=input action=drop connection-state=new protocol=tcp in-interface=[interface internet ip publik] dst-port=[port proxy kita] log=no log-prefix=””
sumber
Filter Rule Mikrotik Mode Dasar
add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input src-address-list=”port scanners” action=drop comment=”” disabled=yes
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment=”Filter FTP to Box” disabled=yes
add chain=output protocol=tcp content=”530 Login incorrect” dst-limit=1/1m,9,dst-address/1m action=accept comment=”” disabled=yes
add chain=output protocol=tcp content=”530 Login incorrect” action=add-dst-to-address-list address-list=ftp_blacklist address-list-timeout=3h comment=”” disabled=yes
add chain=forward protocol=tcp action=jump jump-target=tcp comment=”Separate Protocol into Chains” disabled=yes
add chain=forward protocol=udp action=jump jump-target=udp comment=”” disabled=yes
add chain=forward protocol=icmp action=jump jump-target=icmp comment=”” disabled=yes
add chain=udp protocol=udp dst-port=69 action=drop comment=”Blocking UDP Packet” disabled=yes
add chain=udp protocol=udp dst-port=111 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=135 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=137-139 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=2049 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=3133 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=69 action=drop comment=”Bloking TCP Packet” disabled=yes
add chain=tcp protocol=tcp dst-port=111 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=119 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=135 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=137-139 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=445 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=2049 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=12345-12346 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=20034 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=3133 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=67-68 action=drop comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept comment=”Limited Ping Flood” disabled=yes
add chain=icmp protocol=icmp icmp-options=3:3 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=3:4 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp action=drop comment=”” disabled=yes
add chain=input dst-address-type=broadcast action=accept comment=”Allow Broadcast Traffic” disabled=yes
add chain=input connection-state=established action=accept comment=”Connection State” disabled=yes
add chain=input connection-state=related action=accept comment=”” disabled=yes
add chain=input connection-state=invalid action=drop comment=”” disabled=yes
sumber
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input src-address-list=”port scanners” action=drop comment=”” disabled=yes
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment=”Filter FTP to Box” disabled=yes
add chain=output protocol=tcp content=”530 Login incorrect” dst-limit=1/1m,9,dst-address/1m action=accept comment=”” disabled=yes
add chain=output protocol=tcp content=”530 Login incorrect” action=add-dst-to-address-list address-list=ftp_blacklist address-list-timeout=3h comment=”” disabled=yes
add chain=forward protocol=tcp action=jump jump-target=tcp comment=”Separate Protocol into Chains” disabled=yes
add chain=forward protocol=udp action=jump jump-target=udp comment=”” disabled=yes
add chain=forward protocol=icmp action=jump jump-target=icmp comment=”” disabled=yes
add chain=udp protocol=udp dst-port=69 action=drop comment=”Blocking UDP Packet” disabled=yes
add chain=udp protocol=udp dst-port=111 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=135 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=137-139 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=2049 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=3133 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=69 action=drop comment=”Bloking TCP Packet” disabled=yes
add chain=tcp protocol=tcp dst-port=111 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=119 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=135 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=137-139 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=445 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=2049 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=12345-12346 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=20034 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=3133 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=67-68 action=drop comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept comment=”Limited Ping Flood” disabled=yes
add chain=icmp protocol=icmp icmp-options=3:3 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=3:4 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp action=drop comment=”” disabled=yes
add chain=input dst-address-type=broadcast action=accept comment=”Allow Broadcast Traffic” disabled=yes
add chain=input connection-state=established action=accept comment=”Connection State” disabled=yes
add chain=input connection-state=related action=accept comment=”” disabled=yes
add chain=input connection-state=invalid action=drop comment=”” disabled=yes
sumber
Protect Ddos Mikrotik
/ip firewal filter
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15s chain=input disabled=no dst-port=1337 protocol=tcp
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15m chain=input disabled=no dst-port=7331 protocol=tcp src-address-list=knock
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”Port scanners to list ” disabled=no protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”SYN/FIN scan” disabled=no protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”SYN/RST scan” disabled=no protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”FIN/PSH/URG scan” disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”ALL/ALL scan” disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”NMAP NULL scan” disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
sumber
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15s chain=input disabled=no dst-port=1337 protocol=tcp
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15m chain=input disabled=no dst-port=7331 protocol=tcp src-address-list=knock
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”Port scanners to list ” disabled=no protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”SYN/FIN scan” disabled=no protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”SYN/RST scan” disabled=no protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”FIN/PSH/URG scan” disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”ALL/ALL scan” disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”NMAP NULL scan” disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
sumber
Load Balancing PCC Mikrotik
WAN1 =192.168.165.2/24 interface=ether1-Modem1
WAN2 =192.168.166.2/24 interface=ether2-Modem2
WAN3 =192.168.167.2/24 interface=ether3-Modem3
Local =192.168.77.1/24 interface=ether4-Lan
WAN2 =192.168.166.2/24 interface=ether2-Modem2
WAN3 =192.168.167.2/24 interface=ether3-Modem3
Local =192.168.77.1/24 interface=ether4-Lan
/ip firewall mangle
add action=accept chain=prerouting disabled=no in-interface=ether1-Modem1
add action=accept chain=prerouting disabled=no in-interface=ether2-Modem2
add action=accept chain=prerouting disabled=no in-interface=ether3-Modem3
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan1_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/0 src-address=192.168.77.0/24
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan2_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/1 src-address=192.168.77.0/24
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan3_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/2 src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan1_conn disabled=no new-routing-mark=to_wan1 passthrough=yes src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan2_conn disabled=no new-routing-mark=to_wan2 passthrough=yes src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan3_conn disabled=no new-routing-mark=to_wan3 passthrough=yes src-address=192.168.77.0/24
/ip firewall nat
add action=masquerade chain=srcnat disabled=no out-interface=ether1-Modem1 src-address=192.168.77.0/24
add action=masquerade chain=srcnat disabled=no out-interface=ether2-Modem2 src-address=192.168.77.0/24
add action=masquerade chain=srcnat disabled=no out-interface=ether3-Modem3 src-address=192.168.77.0/24
/ip route
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.165.1 routing-mark=to_wan1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.166.1 routing-mark=to_wan2 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.167.1 routing-mark=to_wan3 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.165.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.166.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.167.1 scope=30 target-scope=10
Agar perlu di ingat, bagi anda yang menggunakan dial pppoe langsung di mikrotik untuk interfacenya di arahkan langsung ke interface pppoenya bukan interface ethernet mikrotiknya.
add action=accept chain=prerouting disabled=no in-interface=ether1-Modem1
add action=accept chain=prerouting disabled=no in-interface=ether2-Modem2
add action=accept chain=prerouting disabled=no in-interface=ether3-Modem3
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan1_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/0 src-address=192.168.77.0/24
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan2_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/1 src-address=192.168.77.0/24
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan3_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/2 src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan1_conn disabled=no new-routing-mark=to_wan1 passthrough=yes src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan2_conn disabled=no new-routing-mark=to_wan2 passthrough=yes src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan3_conn disabled=no new-routing-mark=to_wan3 passthrough=yes src-address=192.168.77.0/24
/ip firewall nat
add action=masquerade chain=srcnat disabled=no out-interface=ether1-Modem1 src-address=192.168.77.0/24
add action=masquerade chain=srcnat disabled=no out-interface=ether2-Modem2 src-address=192.168.77.0/24
add action=masquerade chain=srcnat disabled=no out-interface=ether3-Modem3 src-address=192.168.77.0/24
/ip route
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.165.1 routing-mark=to_wan1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.166.1 routing-mark=to_wan2 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.167.1 routing-mark=to_wan3 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.165.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.166.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.167.1 scope=30 target-scope=10
Agar perlu di ingat, bagi anda yang menggunakan dial pppoe langsung di mikrotik untuk interfacenya di arahkan langsung ke interface pppoenya bukan interface ethernet mikrotiknya.
sumber : master Isur Ganteng's
Subscribe to:
Posts (Atom)