Jalan-jalan di blog

Selasa, 09 November 2010

Tugas Wireless

1.Adhoc


1. Konfigurasi Komputer Host

* Klik Start -> Control Panel -> Network Connections.
* Klik kanan pada wireless network connection, lalu klik Properties







2. * Pada Wireless Network Connection Properties, klik tab Wireless Networks.
* Klik Add pada bagian Preferred networks.



3. * Selanjutnya isilah Network Name (SSID) untuk jaringan yang akan Anda buat.
* Jangan lupa untuk mencentang check box This is a computer-to-computer (ad hoc)network: wireless access point are not used.
* Anda juga dapat membubuhkan WEP Password agar koneksi anda aman.


4. * Klik OK dan OK lagi untuk menyimpan konfigurasi Anda.
Konfigurasi Komputer Klien
Windows XP otomatis akan mendeteksi jika ada Wireless Network yang aktif



5. * Klik kanan pada icon Wireless Network yang berada pada taskbar, lalu klik View Available Wireless Networks.


6. * Wireless Network Connection akan menampilkan list SSID wireless anda. Klik SSID wireless Anda lalu klik Connect .


7. Jika pada komputer host , Anda bubuhkan WEP Password maka windows XP meminta anda untuk mengisi password sebelum anda terkoneksi ke jaringan Ad Hoc Anda.

Rabu, 04 Agustus 2010

Memanage Bandhwith



ketikkan di terminal :


1. Mark all packets with packet-mark all:

/ip firewall mangle add chain=prerouting action=mark-packet new-packet-mark=all \
passthrough=no
2. Setup two PCQ queue types – one for download and one for upload. dst-address is classifier for user’s download traffic, src-address for upload traffic:

/queue type add name="PCQ_download" kind=pcq pcq-rate=64000 pcq-classifier=dst-address
/queue type add name="PCQ_upload" kind=pcq pcq-rate=32000 pcq-classifier=src-address
3. Finally, two queue rules are required, one for download and one for upload:

/queue tree add parent=global-in queue=PCQ_download packet-mark=all
/queue tree add parent=global-out queue=PCQ_upload packet-mark=all

Memblok virus di Winbox



1.Buka Winbox
2.klik new terminal dan ketikkan :

/ip firewall filter
add chain=forward connection-state=established comment="allow established connections"
add chain=forward connection-state=related comment="allow related connections"
add chain=forward connection-state=invalid action=drop comment="drop invalid connections"
add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop Messenger Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Conficker Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment="Drop Kido Worm"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid"
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K"
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot"

3.Lalu klik IP -> firewall
4.jika di tabel firewall sudah ada daftar virus yg tertulis,maka memblok virus sudah berhasil