2011年7月21日 星期四

ie8 速度慢

有查到原因了,用 IE6 就正常了,但用IE7時,在登錄檔裡的資料會被改成如下:
[HKEY_CLASSES_ROOT\TypeLib\{EAB22AC0-30C1-11CF-A7EB-0000C05BAE0B}\1.1\win32]
@="C:\\WINNT\\system32\\ieframe.dll"
只要把 ieframe.dll 改成 shdocvw.dll(原 IE6 的設定值) 就恢復正常了。

重要連結

歷史套件
http://rosdl.minitw.com/

國內網站
http://www.minitw.com/

啟用內部服務

內部電腦的服務(例如:Web、SSH、SQL Server...等)
IP -> Firewall -> NAT -> 加入一筆新的規則
如果你是ADSL撥接上網的,In Interface請選該ADSL的介面
dstnat 
dst port 80
Action的部份則是選dst-nat,IP與Port則是依自已的需求填寫
192.168.1.220
80
最後記得把該新建立的規則拉到原本masquerade的上面

2011年7月20日 星期三

開放port

開放客戶 出去的port
forward
src.addreds  192.168.0.2-192.168.0.100
6 (tcp)
dst port 80,53,21,20,23,443,445,3128,8080,8180
accept


最後新增一條 其他port關閉
 forward
src.addreds  192.168.0.2-192.168.0.100
drop

常用port

80 tcp
53 udp
8180 tcp
20:21 tcp
23 tcp
443 tcp
445 tcp
3128 tcp
8080 tcp

2011年7月19日 星期二

常用腳本

時間限制
--------------------------------------------
一天
address-list-timeout=1d
一小時
address-list-timeout=1h
20分鐘
address-list-timeout=20m
------------------------------------------

fire2

/ ip firewall filter
add chain=forward protocol=tcp dst-port=135-139 action=drop comment="" \
   disabled=no
add chain=forward protocol=tcp dst-port=82 action=drop \
   comment="Worm.NetSky.Y@mm"
add chain=forward protocol=tcp dst-port=113 action=drop \
   comment="W32.Korgo.A/B/C/D/E/F-1"
add chain=forward protocol=tcp dst-port=2041 action=drop \
   comment="W33.Korgo.A/B/C/D/E/F-2"
add chain=forward protocol=tcp dst-port=3067 action=drop \
   comment="W32.Korgo.A/B/C/D/E/F-3"
add chain=forward protocol=tcp dst-port=6667 action=drop \
   comment="W32.Korgo.A/B/C/D/E/F-4"
add chain=forward protocol=tcp dst-port=445 action=drop \
   comment="W32.Korgo.A/B/C/D/E/F-5"
add chain=forward protocol=tcp dst-port=1000-1001 action=drop \
   comment="Backdoor.Nibu.B-1"
add chain=forward protocol=tcp dst-port=2283 action=drop \
   comment="Backdoor.Nibu.B-2"
add chain=forward protocol=tcp dst-port=3422 action=drop \
   comment="Backdoor.IRC.Aladinz.R-1"
add chain=forward protocol=tcp dst-port=43958 action=drop \
   comment="Backdoor.IRC.Aladinz.R-2"
add chain=forward protocol=tcp dst-port=5554 action=drop \
   comment="W32.Dabber.A/B-1"
add chain=forward protocol=tcp dst-port=8967 action=drop \
   comment="W32.Dabber.A/B-2"
add chain=forward protocol=tcp dst-port=6789 action=drop \
   comment="Worm.NetSky.S/T/U@mm"
add chain=forward protocol=tcp dst-port=8787 action=drop \
   comment="Back.Orifice.2000.Trojan-1"
add chain=forward protocol=tcp dst-port=8879 action=drop \
   comment="Back.Orifice.2000.Trojan-2"
add chain=forward protocol=tcp dst-port=31666 action=drop \
   comment="Back.Orifice.2000.Trojan-3"
add chain=forward protocol=tcp dst-port=31337-31338 action=drop \
   comment="Back.Orifice.2000.Trojan-4"
add chain=forward protocol=tcp dst-port=54320-54321 action=drop \
   comment="Back.Orifice.2000.Trojan-5"
add chain=forward protocol=tcp dst-port=12345-12346 action=drop \
   comment="Block.NetBus.Trojan-1"
add chain=forward protocol=tcp dst-port=20034 action=drop \
   comment="Block.NetBus.Trojan-2"
add chain=forward protocol=tcp dst-port=21554 action=drop \
   comment="GirlFriend.Trojan-1"
add chain=forward protocol=tcp dst-port=41 action=drop \
   comment="DeepThroat.Trojan-1"
add chain=forward protocol=tcp dst-port=3150 action=drop \
   comment="DeepThroat.Trojan-2"
add chain=forward protocol=tcp dst-port=999 action=drop \
   comment="DeepThroat.Trojan-3"
add chain=forward protocol=tcp dst-port=6670 action=drop \
   comment="DeepThroat.Trojan-4"
add chain=forward protocol=tcp dst-port=6771 action=drop \
   comment="DeepThroat.Trojan-5"
add chain=forward protocol=tcp dst-port=60000 action=drop \
   comment="DeepThroat.Trojan-6"
add chain=forward protocol=tcp dst-port=2140 action=drop \
   comment="DeepThroat.Trojan-7"
add chain=forward protocol=tcp dst-port=10067 action=drop \
   comment="Portal.of.Doom.Trojan-1"
add chain=forward protocol=tcp dst-port=10167 action=drop \
   comment="Portal.of.Doom.Trojan-2"
add chain=forward protocol=tcp dst-port=3700 action=drop \
   comment="Portal.of.Doom.Trojan-3"
add chain=forward protocol=tcp dst-port=9872-9875 action=drop \
   comment="Portal.of.Doom.Trojan-4"
add chain=forward protocol=tcp dst-port=6883 action=drop \
   comment="Delta.Source.Trojan-1"
add chain=forward protocol=tcp dst-port=26274 action=drop \
   comment="Delta.Source.Trojan-2"
add chain=forward protocol=tcp dst-port=4444 action=drop \
   comment="Delta.Source.Trojan-3"
add chain=forward protocol=tcp dst-port=47262 action=drop \
   comment="Delta.Source.Trojan-4"
add chain=forward protocol=tcp dst-port=3791 action=drop \
   comment="Eclypse.Trojan-1"
add chain=forward protocol=tcp dst-port=3801 action=drop \
   comment="Eclypse.Trojan-2"
add chain=forward protocol=tcp dst-port=65390 action=drop \
   comment="Eclypse.Trojan-3"
add chain=forward protocol=tcp dst-port=5880-5882 action=drop \
   comment="Y3K.RAT.Trojan-1"
add chain=forward protocol=tcp dst-port=5888-5889 action=drop \
   comment="Y3K.RAT.Trojan-2"
add chain=forward protocol=tcp dst-port=30100-30103 action=drop \
   comment="NetSphere.Trojan-1"
add chain=forward protocol=tcp dst-port=30133 action=drop \
   comment="NetSphere.Trojan-2"
add chain=forward protocol=tcp dst-port=7300-7301 action=drop \
   comment="NetMonitor.Trojan-1"
add chain=forward protocol=tcp dst-port=7306-7308 action=drop \
   comment="NetMonitor.Trojan-2"
add chain=forward protocol=tcp dst-port=79 action=drop \
   comment="FireHotcker.Trojan-1"
add chain=forward protocol=tcp dst-port=5031 action=drop \
   comment="FireHotcker.Trojan-2"
add chain=forward protocol=tcp dst-port=5321 action=drop \
   comment="FireHotcker.Trojan-3"
add chain=forward protocol=tcp dst-port=6400 action=drop \
   comment="TheThing.Trojan-1"
add chain=forward protocol=tcp dst-port=1047 action=drop \
   comment="GateCrasher.Trojan-1"
add chain=forward protocol=tcp dst-port=6969-6970 action=drop \
   comment="GateCrasher.Trojan-2"
add chain=forward protocol=tcp dst-port=2774 action=drop comment="SubSeven-1" \
   disabled=no
add chain=forward protocol=tcp dst-port=27374 action=drop comment="SubSeven-2" \
   disabled=no
add chain=forward protocol=tcp dst-port=1243 action=drop comment="SubSeven-3" \
   disabled=no
add chain=forward protocol=tcp dst-port=1234 action=drop comment="SubSeven-4" \
   disabled=no
add chain=forward protocol=tcp dst-port=6711-6713 action=drop \
   comment="SubSeven-5"
add chain=forward protocol=tcp dst-port=16959 action=drop comment="SubSeven-7" \
   disabled=no
add chain=forward protocol=tcp dst-port=25685-25686 action=drop \
   comment="Moonpie.Trojan-1"
add chain=forward protocol=tcp dst-port=25982 action=drop \
   comment="Moonpie.Trojan-2"
add chain=forward protocol=tcp dst-port=1024-1030 action=drop \
   comment="NetSpy.Trojan-1"
add chain=forward protocol=tcp dst-port=1033 action=drop \
   comment="NetSpy.Trojan-2"
add chain=forward protocol=tcp dst-port=31337-31339 action=drop \
   comment="NetSpy.Trojan-3"
add chain=forward protocol=tcp dst-port=8102 action=drop comment="Trojan" \
   disabled=no
add chain=forward protocol=tcp dst-port=7306 action=drop \
   comment="Netspy3.0Trojan"
add chain=forward protocol=tcp dst-port=8011 action=drop comment="WAY.Trojan" \
   disabled=no
add chain=forward protocol=tcp dst-port=7626 action=drop \
   comment="Trojan.BingHe"
add chain=forward protocol=tcp dst-port=19191 action=drop \
   comment="Trojan.NianSeHoYian"
add chain=forward protocol=tcp dst-port=23444-23445 action=drop \
   comment="NetBull.Trojan"
add chain=forward protocol=tcp dst-port=2583 action=drop \
   comment="WinCrash.Trojan-1"
add chain=forward protocol=tcp dst-port=3024 action=drop \
   comment="WinCrash.Trojan-2"
add chain=forward protocol=tcp dst-port=4092 action=drop \
   comment="WinCrash.Trojan-3"
add chain=forward protocol=tcp dst-port=5714 action=drop \
   comment="WinCrash.Trojan-4"
add chain=forward protocol=tcp dst-port=1010-1012 action=drop \
   comment="Doly1.0/1.35/1.5trojan-1"
add chain=forward protocol=tcp dst-port=1015 action=drop \
   comment="Doly1.0/1.35/1.5trojan-2"
add chain=forward protocol=tcp dst-port=9878 action=drop \
   comment="TransScout.Trojan-2"
add chain=forward protocol=tcp dst-port=2773 action=drop \
   comment="Backdoor.YAI..Trojan-1"
add chain=forward protocol=tcp dst-port=7215 action=drop \
   comment="Backdoor.YAI.Trojan-2"
add chain=forward protocol=tcp dst-port=54283 action=drop \
   comment="Backdoor.YAI.Trojan-3"
add chain=forward protocol=tcp dst-port=1003 action=drop \
   comment="BackDoorTrojan-1"
add chain=forward protocol=tcp dst-port=5598 action=drop \
   comment="BackDoorTrojan-2"
add chain=forward protocol=tcp dst-port=5698 action=drop \
   comment="BackDoorTrojan-3"
add chain=forward protocol=tcp dst-port=2716 action=drop \
   comment="PrayerTrojan-1"
add chain=forward protocol=tcp dst-port=9999 action=drop \
   comment="PrayerTrojan-2"
add chain=forward protocol=tcp dst-port=21544 action=drop \
   comment="SchwindlerTrojan-1"
add chain=forward protocol=tcp dst-port=31554 action=drop \
   comment="SchwindlerTrojan-2"
add chain=forward protocol=tcp dst-port=18753 action=drop \
   comment="Shaft.DDoS.Trojan-1"
add chain=forward protocol=tcp dst-port=20432 action=drop \
   comment="Shaft.DDoS.Trojan-2"
add chain=forward protocol=tcp dst-port=65000 action=drop \
   comment="Devil.DDoS.Trojan"
add chain=forward protocol=tcp dst-port=11831 action=drop \
   comment="LatinusTrojan-1"
add chain=forward protocol=tcp dst-port=29559 action=drop \
   comment="LatinusTrojan-2"
add chain=forward protocol=tcp dst-port=1784 action=drop \
   comment="Snid.X2Trojan-1"
add chain=forward protocol=tcp dst-port=3586 action=drop \
   comment="Snid.X2Trojan-2"
add chain=forward protocol=tcp dst-port=7609 action=drop \
   comment="Snid.X2Trojan-3"
add chain=forward protocol=tcp dst-port=12348-12349 action=drop \
   comment="BionetTrojan-1"
add chain=forward protocol=tcp dst-port=12478 action=drop \
   comment="BionetTrojan-2"
add chain=forward protocol=tcp dst-port=57922 action=drop \
   comment="BionetTrojan-3"
add chain=forward protocol=tcp dst-port=3127-3198 action=drop \
   comment="Worm.Novarg.a.Mydoom.a.-1"
add chain=forward protocol=tcp dst-port=4444 action=drop \
   comment="Worm.MsBlaster-1"
add chain=forward protocol=tcp dst-port=6777 action=drop \
   comment="Worm.BBeagle.a.Bagle.a."
add chain=forward protocol=tcp dst-port=8866 action=drop \
   comment="Worm.BBeagle.b"
add chain=forward protocol=tcp dst-port=2745 action=drop \
   comment="Worm.BBeagle.c-g/j-l"
add chain=forward protocol=tcp dst-port=2556 action=drop \
   comment="Worm.BBeagle.p/q/r/n"
add chain=forward protocol=tcp dst-port=20742 action=drop \
   comment="Worm.BBEagle.m-2"
add chain=forward protocol=tcp dst-port=4751 action=drop \
   comment="Worm.BBeagle.s/t/u/v"
add chain=forward protocol=tcp dst-port=2535 action=drop \
   comment="Worm.BBeagle.aa/ab/w/x-z-2"
add chain=forward protocol=tcp dst-port=5238 action=drop \
   comment="Worm.LovGate.r.RpcExploit"
add chain=forward protocol=tcp dst-port=1068 action=drop \
   comment="Worm.Sasser.a"
add chain=forward protocol=tcp dst-port=5554 action=drop \
   comment="Worm.Sasser.b/c/f"
add chain=forward protocol=tcp dst-port=9996 action=drop \
   comment="Worm.Sasser.b/c/f"
add chain=forward protocol=tcp dst-port=9995 action=drop \
   comment="Worm.Sasser.d"
add chain=forward protocol=tcp dst-port=10168 action=drop \
   comment="Worm.Lovgate.a/b/c/d"
add chain=forward protocol=tcp dst-port=20808 action=drop \
   comment="Worm.Lovgate.v.QQ"
add chain=forward protocol=tcp dst-port=1092 action=drop \
   comment="Worm.Lovgate.f/g"
add chain=forward protocol=tcp dst-port=20168 action=drop \
   comment="Worm.Lovgate.f/g"
add chain=forward protocol=tcp dst-port=593 action=drop comment=""
add chain=forward protocol=tcp dst-port=1214 action=drop comment="" \
   disabled=no
add chain=forward protocol=tcp dst-port=1363-1364 action=drop \
   comment="ndm.requester"
add chain=forward protocol=tcp dst-port=1368 action=drop comment="screen.cast" \
   disabled=no
add chain=forward protocol=tcp dst-port=1373 action=drop comment="hromgrafx" \
   disabled=no
add chain=forward protocol=tcp dst-port=1377 action=drop comment="cichlid" \
   disabled=no
add chain=forward protocol=tcp dst-port=3410 action=drop \
   comment="Backdoor.OptixPro"
add chain=forward protocol=udp dst-port=135-139 action=drop comment="" \
   disabled=no
add chain=forward protocol=udp dst-port=8787 action=drop \
   comment="Back.Orifice.2000.Trojan-6"
add chain=forward protocol=udp dst-port=8879 action=drop \
   comment="Back.Orifice.2000.Trojan-7"
add chain=forward protocol=udp dst-port=31666 action=drop \
   comment="Back.Orifice.2000.Trojan-8"
add chain=forward protocol=udp dst-port=31337-31338 action=drop \
   comment="Back.Orifice.2000.Trojan-9"
add chain=forward protocol=udp dst-port=54320-54321 action=drop \
   comment="Back.Orifice.2000.Trojan-10"
add chain=forward protocol=udp dst-port=12345-12346 action=drop \
   comment="Block.NetBus.Trojan-3"
add chain=forward protocol=udp dst-port=20034 action=drop \
   comment="Block.NetBus.Trojan-4"
add chain=forward protocol=udp dst-port=21554 action=drop \
   comment="GirlFriend.Trojan-2"
add chain=forward protocol=udp dst-port=41 action=drop \
   comment="DeepThroat.Trojan-8"
add chain=forward protocol=udp dst-port=3150 action=drop \
   comment="DeepThroat.Trojan-9"
add chain=forward protocol=udp dst-port=999 action=drop \
   comment="DeepThroat.Trojan-10"
add chain=forward protocol=udp dst-port=6670 action=drop \
   comment="DeepThroat.Trojan-11"
add chain=forward protocol=udp dst-port=6771 action=drop \
   comment="DeepThroat.Trojan-12"
add chain=forward protocol=udp dst-port=60000 action=drop \
   comment="DeepThroat.Trojan-13"
add chain=forward protocol=udp dst-port=10067 action=drop \
   comment="Portal.of.Doom.Trojan-5"
add chain=forward protocol=udp dst-port=10167 action=drop \
   comment="Portal.of.Doom.Trojan-6"
add chain=forward protocol=udp dst-port=3700 action=drop \
   comment="Portal.of.Doom.Trojan-7"
add chain=forward protocol=udp dst-port=9872-9875 action=drop \
   comment="Portal.of.Doom.Trojan-8"
add chain=forward protocol=udp dst-port=6883 action=drop \
   comment="Delta.Source.Trojan-5"
add chain=forward protocol=udp dst-port=26274 action=drop \
   comment="Delta.Source.Trojan-6"
add chain=forward protocol=udp dst-port=44444 action=drop \
   comment="Delta.Source.Trojan-7"
add chain=forward protocol=udp dst-port=47262 action=drop \
   comment="Delta.Source.Trojan-8"
add chain=forward protocol=udp dst-port=3791 action=drop \
   comment="Eclypse.Trojan-1"
add chain=forward protocol=udp dst-port=3801 action=drop \
   comment="Eclypse.Trojan-2"
add chain=forward protocol=udp dst-port=5880-5882 action=drop \
   comment="Eclypse.Trojan-3"
add chain=forward protocol=udp dst-port=5888-5889 action=drop \
   comment="Eclypse.Trojan-4"
add chain=forward protocol=udp dst-port=34555 action=drop \
   comment="Trin00.DDoS.Trojan-1"
add chain=forward protocol=udp dst-port=35555 action=drop \
   comment="Trin00.DDoS.Trojan-2"
add chain=forward protocol=udp dst-port=31338 action=drop \
   comment="NetSpy.DK.Trojan-1"
add chain=forward protocol=udp dst-port=69 action=drop \
   comment="Worm.MsBlaster-2"
add chain=forward protocol=udp dst-port=123 action=drop \
   comment="Worm.Sobig.f-1"
add chain=forward protocol=udp dst-port=995-999 action=drop \
   comment="Worm.Sobig.f-2"
add chain=forward protocol=udp dst-port=8998 action=drop \
   comment="Worm.Sobig.f-3"

fire1

/ ip firewall connection tracking
set enabled=yes tcp-syn-sent-timeout=1m tcp-syn-received-timeout=1m \
tcp-established-timeout=1d tcp-fin-wait-timeout=10s \
tcp-close-wait-timeout=10s tcp-last-ack-timeout=10s \
tcp-time-wait-timeout=10s tcp-close-timeout=10s udp-timeout=10s \
udp-stream-timeout=3m icmp-timeout=10s generic-timeout=10m
# + 防火牆部分 +
#
/ ip firewall filter
# 關135-139端口 不用多說了
add chain=input protocol=tcp dst-port=135-139 action=drop comment="drop Port"
add chain=input protocol=udp dst-port=135-139 action=drop
# + 對本機數據包相關 +
#
# 允許已建立的連接
add chain=input connection-state=established action=accept comment="input"
add chain=input connection-state=related action=accept
# 允許本機對本機

add chain=input src-address=127.0.0.1 dst-address=127.0.0.1 action=accept
# 丟棄明顯異常包
add chain=input connection-state=invalid action=drop
# 丟棄目標非本機的包
add chain=input dst-address-type=!local action=drop
# 丟棄多播包
add chain=input src-address-type=!unicast action=drop
# + 安全相關 +
#
# 在短時間內從同一地址用不斷變化的端口向本機發送大量數據包,視為端口掃瞄
add chain=input protocol=tcp psd=21,3s,3,1 action=drop comment="..."
# 短時間內同時建立大量TCP連接(超過10),視為DoS拒絕服務攻擊,進黑名單一天!
# 開proxy時要將次數加大,例如100,否則會因而無法上網
# 針對有proxy用戶設一規則或除外!,沒有proxy用戶一規則
add chain=input protocol=tcp connection-limit=10,32 action=add-src-to-address-list address-list=black_list address-list-timeout=1d disabled=no
# 黑名單上的只能建立3個並發連接,tarpit
# 開proxy時要將次數加大,例如30,否則會因而無法上網
add chain=input protocol=tcp connection-limit=3,32 src-address-list=black_list action=tarpit disabled=no
# + ICMP相關 +
#
# 允許常見命令ping tracert,其它ICMP丟棄
add chain=input protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept
add chain=input protocol=icmp icmp-options=3:3 limit=5,5 action=accept
add chain=input protocol=icmp icmp-options=3:4 limit=5,5 action=accept
add chain=input protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept
add chain=input protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept
add chain=output protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept
add chain=output protocol=icmp icmp-options=3:3 limit=5,5 action=accept
add chain=output protocol=icmp icmp-options=3:4 limit=5,5 action=accept
add chain=output protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept
add chain=output protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept
add chain=forward protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept
add chain=forward protocol=icmp icmp-options=3:3 limit=5,5 action=accept
add chain=forward protocol=icmp icmp-options=3:4 limit=5,5 action=accept
add chain=forward protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept
add chain=forward protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept
add chain=input protocol=icmp action=drop
add chain=output protocol=icmp action=drop
add chain=forward protocol=icmp action=drop
/ ip firewall service-port
set ftp ports=21 disabled=no
#set tftp ports=69 disabled=no
#set irc ports=6667 disabled=no
#set h323 disabled=no
#set quake3 disabled=no
#set mms disabled=no
#set gre disabled=no
set pptp disabled=no
# + MMS值 +
# 一定要設置的哦...不然某些網頁打不開的...
/ip firewall mangle
add chain=forward protocol=tcp tcp-flags=syn action=change-mss new-mss=1440

330安裝

2011.07.19

光盤啟動後,菜單選項,
sata硬碟要設定ide相容
不要選擇xen,mpls-test,routing-test。

1安裝
a
i
2.自動計算並重寫ID,大概5分鐘左右,
根據機器不同,算的時間也不同
,然後自動重啟就表示OK了~
router os 3.20的正式版+授權 可安裝在任何機器上
設IP
◇int 進入網卡設定
print檢視網卡是否啟動
(網卡名字前面R,例如ether1前面R表示啟動。
沒有顯示x,啟動指令en 0和en 1)。
修改名稱
set 0 name=Lan
set 1 name=Wan
輸入 /
setup
a
a
(注意,若這裡出現的不是Lan,而是Wan,你要改為Lan)
192.168.1.1/24
輸入g
設網關0.0.0.0,要設喔 ??
x 退出
x 退出
使用winbox
使用另一台電腦ip設192.168.1.3遮罩255.255.255.0,
網關192.168.1.1  dns 192.168.1.1
------------------------------------
◇註冊
用Winbox連接,
admin 空白然後System -> license ->import
導入光盤中的AK73-PET.key文件,提示重啟,重啟後OK~.
AK73-PET.key文件光盤上有提供
注: 如果用sata硬盤破解不了,請確認BIOS裡開啟了硬盤sata兼容模式
破解時間根據CPU而定
--------------------------------------------
◇interface設定wan
ip/address, +,interface > Wan,
ex:192.168.0.1/24
network broadcast 打勾即可
apply,OK
ftp routing 套件
IP-Routes  點 +
ip不必輸入0.0.0.0
gateway 設定連外網關
例如192.168.0.1、x.x.x.254

做MASQ偽裝,區網可以上網
ip /firewall /nat/ ,+ ,chain >srcnat,
action,action>  masquerade ,apply,OK
DNS:ip > dns > settings
168.95.1.1
192.168.1.1
一定要勾 allow Remote Requsets
可以將cache稍微設置大一點,前提是你的內存要夠大

◇備份設定檔winbox
Files > backup
利用Ftp 下載下來

◇防火規則
建立1.rc規則
ftp到routeros
用winbox的New Terminal
import 1.rsc
違規者記在 ip /firewall > address list裡
◇綁網卡
IP-ARP、IP前D符號消失(表示綁定)
按右鍵 make static
INTERFACE裡也有設定 、Lan 最後一項arp
replay-only
◇新加入網卡
INTERFACE、Lan、arp先改回enabled
綁好新網卡
◇或者使用tools >IP Scan
寫下新網卡mac
IP-ARP中加入新網卡

◇安裝dhcp套件
傳到ftp
system > reboot
◇dhcp
IP POOL在這裡添加pool1,
NAME設置為DHCP,ADDRESSES設置192.168.0.2-192.168.0.100
然後進入IP-DHCPSERVER設置網關和DNS
NAME=DHCP,INTERFACE=LAN ,lease-time=3d, ADDRESS POOL=DHCP,
在設置ip->dhcp-server->network,
address=192.168.0.0/24,gateway=192.168.0.1,netmask=24 \
dns-server=192.168.0.1 

◇防火牆過濾網頁
IP --> firewall
forward (6)tcp
advence content slime.com
drop

◇Web Proxy 過濾
IP --> Web Proxy --> Access -->
點 Web Proxy Setting -->General 設置網頁代理
勾 enable
cache on disk
apply
新增Access 中可以設置 使用代理的權限,可以對部
分IP地址做限制,相當與 ip的firewall,
然後在 IP --> Firewall --> NAT 中新加一個規則:
一般
dsnat tcp dst port 80  in介面lan2
action redirect 8080
web proxy新增access規則
src 192.168.2.0/24
dst. host tw.yahoo.com deny

◇ADSL
setup
p
wan
輸入帳號密碼
winbox
ppp > ppoe client
v add Default route
v UsePeerDns=yes
nat
srcnat masquerade
--------------------------------
常用指令
◇回上一層目錄 ..   
◇重啟/關機 /sy reboot   /sy showdown  
◇補全命令  TAB
◇設置機器名  /sy ide set name=機器名     
◇查看配置   /export
◇查看IP配置  /ip export                 
◇恢復原始狀態 /sy reset
◇激活0網卡  /int  en 0                  
◇禁掉0網卡   /int  di 0
◇查看網卡狀態   /interface print                        
0 X ether1 ether 1500 這個是網卡沒有開啟   
0 R ether1 ether 1500 這個是正常狀態                              
◇查看當前所有網絡邊接    /ip fir con print                       
◇改變www服務端口為81   /ip service set www port=81             
◇增加用戶   /ip hotspot user add name=user1 password=1 
◇備份/恢復路由  
/sy BACKUP 迴車   
save name=文件名
load name=Mi 然後按 tab補齊檔名


----------------------------------------------------------
◇PPPTP-Server
interface > 新增 pptp server
ppp > pptp server
Enabled  ok
profiles > default-encryption
Local 192.168.100.1
Remote 192.168.100.2
Limits 選項 only one > yes
Secrets選項 +
設定
name password
service > pptp
profile > default-encryption
ppp > + > pptp client > dial-out
輸入server位址 59.126.227.225
或122.117.100.65
或59.126.227.226
輸入 user 和 密碼
winbox開啟New Terminal
新增靜態路由
ip route
add dst-address=192.168.100.0/24 gateway=192.168.0.250
---------------------------------------
問題
------------------------------------
客戶端常掉線
1、在routeros上手工建立arp表,綁定所有arp。
2、用戶機器上綁定網關arp。

webproxy網頁過濾