


Vlad писал(а):Возьми Kaspersky AntiHacker Стащить можно с www.avp.ru, а ключик сам найдешь - большой уже
Mistakila писал(а):Есть такая штука Cisco PIX-525-UR-BUN PIX 525-UR Bundle за 14945$
оч классный, не хочешь?
А настроить..... там инструкция к нему идет, где-то как "Война и Мир"
)

Anonymous писал(а):Где достать FireWall для защиты компа в локалке с руским интэрфэйсом..

/ ip firewall filter
add chain=input protocol=tcp dst-port=137-139 action=drop comment="========= \
Firewall Mikrotik RouterOS ==========" disabled=no
add chain=input connection-state=invalid action=drop comment="1- drop invalid \
inputs to router" disabled=no
add chain=input connection-state=established action=accept comment="2 - accept \
established inputs to router" disabled=no
add chain=input protocol=udp action=accept comment="3 - allow UDP, ICMP to \
router" disabled=no
add chain=input protocol=icmp action=accept comment="" disabled=no
add chain=input protocol=tcp dst-port=8291 action=accept comment="4 - allow \
remote WinBox" disabled=no
add chain=input src-address-list=USER action=accept comment="" disabled=no
add chain=input action=drop comment="5 - all other inputs drop" disabled=no

/ ip firewall filter
add chain=input protocol=tcp dst-port=137-139 action=drop comment="========= \
Firewall Mikrotik RouterOS ==========" disabled=no
add chain=input connection-state=invalid action=drop comment="1- drop invalid \
inputs to router" disabled=no
add chain=input connection-state=established action=accept comment="2 - accept \
established inputs to router" disabled=no
add chain=input protocol=udp action=accept comment="3 - allow UDP, ICMP to \
router" disabled=no
add chain=input protocol=icmp action=accept comment="" disabled=no
add chain=input protocol=tcp dst-port=8291 action=accept comment="4 - allow \
remote WinBox" disabled=no
add chain=input src-address-list=USER action=accept comment="" disabled=no
add chain=input action=drop comment="5 - all other inputs drop" disabled=no
add chain=forward in-interface=!LAN protocol=tcp dst-port=3128 action=reject \
reject-with=icmp-network-unreachable comment="======== Firewall Local Area \
Network ========" disabled=no
add chain=forward in-interface=!LAN src-address=192.168.0.0/24 action=drop \
comment="drop fake networks 192.168.0.0/24 from Internet" disabled=no
add chain=forward connection-state=invalid action=drop comment="1 - drop \
invalid forward packets" disabled=no
add chain=forward connection-state=established action=accept comment="2 - \
accept established forward packets" disabled=no
add chain=forward connection-state=related action=accept comment="3 - accept \
related forward packets" disabled=no
add chain=forward protocol=udp action=accept comment="3 - allow UDP, ICMP to \
router, others ports" disabled=no
add chain=forward protocol=icmp action=accept comment="" disabled=no
add chain=forward protocol=tcp dst-port=4898-4899 action=accept comment="" \
disabled=no
add chain=forward protocol=tcp dst-port=21 action=accept comment="" \
disabled=no
add chain=forward in-interface=LAN src-address-list=debitors \
dst-address-list=!local action=reject reject-with=icmp-admin-prohibited \
comment="4 - reject debitors" disabled=no
add chain=forward protocol=tcp dst-port=45000-45100 action=accept comment="" \
disabled=no
add chain=forward protocol=tcp dst-port=6110-6122 action=accept comment="" \
disabled=no
add chain=forward protocol=tcp dst-port=27015-27025 action=accept comment="" \
disabled=no
add chain=forward src-address-list=USER action=accept comment="5 - accept \
forward Users" disabled=no
add chain=forward action=drop comment="6 - drop all others forwards " \
disabled=no
add chain=forward action=log log-prefix="drop" comment="============ Log \
=============" disabled=no
add chain=input action=log log-prefix="drop" comment="" disabled=no
Вернуться в Безопасность компьютерных сетей
Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 1