Cara Setting Mikrotik RB Indoor Seperti RB750,RB450,RB1100,RB1000 Di Set Bridge dan Setting Pengaturan Bandwidthnya
Biasanya saya postingkan setting RB Indoor seperti RB750,RB450,RB1100,RB1000 settingan nya routing,sekarang kita set Bridge (sebagai penghubung ke Modem) saja,misalnya ip modem 192.168.1.1 dan client tetap dalam satu network yaitu 192.168.1.2 sampai 192.168.1.254 dengan bandwidth tetap bisa di atur di mikrotik indoor tersebut.ok mari kita mulai:
Topologi jaringan saya:
IP Modem = 192.168.1.1
Netmask=255.255.255.0
- Pertama hubungkan LAN dari Mikrotik Ethernet nomor 2 ke PC dan masukkan ip di PC=
- Ip Address=192.168.1.2 (sesuaikan dengan network anda)
- Netmask=255.255.255.0
- Gateway=192.168.1.1 (sesuaikan dengan network anda)
- DNS=192.168.1.1 (sesuaikan dengan network anda)
- Selanjutnya remote Mikrotik anda dengan winbox,download winbox ((DISINI))
- Setelah masuk ke halaman winbox,pastikan winbox bersih dari settingan lama dengan mereset mikrotik tersebut,di halaman utama winbox klik “New Terminal” kemudian ketik system reset dan tekan ENTER di keyboard dan tekan huruf Y seperti gambar di bawah ini:
- Tunggu 2 menit Mikrotik mereset system,dan kembali buka remote mikrotik dengan winbox, di halaman utama winbox klik “Remove Configuration” seperti gambar di bawah ini:
- Selanjutnya di halaman utama winbox klik “Bridge” dan klik + dan klik “OK” seperti gambar di bawah ini:
- Selanjutnya klik bagian TAB yaitu “Port” dan + di bagian interface nya pilih “ether1 dan di bagian Bridge nya pilih “bridge1” dan klik “OK” seperti gambar di bawah ini:
- Klik bagian TAB yaitu “Port” lagi dan + di bagian interface nya pilih “ether2” dan di bagian Bridge nya pilih “bridge1” dan klik “OK” seperti gambar di bawah ini:
- Selanjutnya kembali ke TAB “Bridge” dan klik “Setting” dan centang “Use Ip Firewall” dan klik “OK” seperti gambar di bawah ini:
- Selanjutnya sambungkan LAN=
- Ethernet1 Mikrotik Ke Modem
- Ethernet2 Mikrotik Ke HUB
- PC Ke HUB
- Selanjtunya test ping 192.168.1.1 –t dari cmd pc,dan test browsing , seperti gambar di bawah ini:
- PC telah terkoneksi ke internet melalui Mikrotik yang di Bridge,sekarang kita buat pengaturan bandwidthnya,untuk pengaturan bandwidth saya gunakan Queue Tree membagi otomatis rata bandwidth setiap client nya.
- Pertama kita buat Firewall filter drop virus dan anti netcut,di halaman utama winbox pilih “New Terminal” kemudian Copy scripts di bawah dan pastekan di “New Terminal” winbox...
/ip firewall filter
add action=accept chain=input disabled=no dst-port=8291 protocol=tcp
add action=drop chain=forward connection-state=invalid disabled=no
add action=drop chain=virus disabled=no dst-port=135-139 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1433-1434 protocol=tcp
add action=drop chain=virus disabled=no dst-port=445 protocol=tcp
add action=drop chain=virus disabled=no dst-port=445 protocol=udp
add action=drop chain=virus disabled=no dst-port=593 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1024-1030 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1080 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1214 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1363 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1364 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1368 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1373 protocol=tcp
add action=drop chain=virus disabled=no dst-port=1377 protocol=tcp
add action=drop chain=virus disabled=no dst-port=2745 protocol=tcp
add action=drop chain=virus disabled=no dst-port=2283 protocol=tcp
add action=drop chain=virus disabled=no dst-port=2535 protocol=tcp
add action=drop chain=virus disabled=no dst-port=2745 protocol=tcp
add action=drop chain=virus disabled=no dst-port=3127 protocol=tcp
add action=drop chain=virus disabled=no dst-port=3410 protocol=tcp
add action=drop chain=virus disabled=no dst-port=4444 protocol=tcp
add action=drop chain=virus disabled=no dst-port=4444 protocol=udp
add action=drop chain=virus disabled=no dst-port=5554 protocol=tcp
add action=drop chain=virus disabled=no dst-port=8866 protocol=tcp
add action=drop chain=virus disabled=no dst-port=9898 protocol=tcp
add action=drop chain=virus disabled=no dst-port=10080 protocol=tcp
add action=drop chain=virus disabled=no dst-port=12345 protocol=tcp
add action=drop chain=virus disabled=no dst-port=17300 protocol=tcp
add action=drop chain=virus disabled=no dst-port=27374 protocol=tcp
add action=drop chain=virus disabled=no dst-port=65506 protocol=tcp
add action=jump chain=forward disabled=no jump-target=virus
add action=drop chain=input connection-state=invalid disabled=no
add action=accept chain=input disabled=no protocol=udp
add action=accept chain=input disabled=no limit=50/5s,2 protocol=icmp
add action=drop chain=input disabled=no protocol=icmp
add action=accept chain=input disabled=no dst-port=21 protocol=tcp
add action=accept chain=input disabled=no dst-port=22 protocol=tcp
add action=accept chain=input disabled=no dst-port=23 protocol=tcp
add action=accept chain=input disabled=no dst-port=80 protocol=tcp
add action=accept chain=input disabled=no dst-port=8291 protocol=tcp
add action=accept chain=input disabled=no dst-port=1723 protocol=tcp
add action=accept chain=input disabled=no dst-port=23 protocol=tcp
add action=accept chain=input disabled=no dst-port=80 protocol=tcp
add action=accept chain=input disabled=no dst-port=1723 protocol=tcp
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15s
\
chain=input disabled=no dst-port=1337 protocol=tcp
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15m
\
chain=input disabled=no dst-port=7331 protocol=tcp
src-address-list=knock
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="Port scanners
to list " \
disabled=no protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan"
disabled=no \
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan"
disabled=no \
protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG
scan" disabled=\
no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan"
disabled=no \
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL
scan" disabled=no \
protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=61.213.183.1-61.213.183.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=67.195.134.1-67.195.134.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=68.142.233.1-68.142.233.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=68.180.217.1-68.180.217.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=203.84.204.1-203.84.204.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp src-address=69.63.176.1-69.63.176.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp src-address=69.63.181.1-69.63.181.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=63.245.209.1-63.245.209.254
add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=\
0-65535 protocol=tcp
src-address=63.245.213.1-63.245.213.254
- Hasilnya bisa di lihat di halaman utama winbox pilih “Ip” kemudian “Firewall” kemudian TAB “Filter Rules”,seperti gambar di bawah ini:
- Selanjutnya kita buat setting mangle untuk queue tree download dan upload,di halaman utama winbox pilih “New Terminal” dan Copy Scripts di bawah dan pastekan di “New Terminal” winbox..
/ip firewall mangle add action=mark-connection \
chain=forward comment="SEMUA KONEKSI" disabled=no \
new-connection-mark="SEMUA KONEKSI" passthrough=yes
/ip firewall mangle add action=mark-packet \
chain=forward comment="PAKET DOWNLOAD" \
connection-mark="SEMUA KONEKSI" disabled=no \
dst-address=192.168.1.0/24 \
new-packet-mark="PAKET DOWNLOAD" \
passthrough=no
/ip firewall mangle add action=mark-packet \
chain=forward comment="PAKET UPLOAD" \
connection-mark="SEMUA KONEKSI" disabled=no \
new-packet-mark="PAKET UPLOAD" passthrough=no \
src-address=192.168.1.0/24
- Bisa di lihat di halaman utama winbox pilih “Ip” kemudian “Firewall” kemudian TAB “Mangle”,seperti gambar di bawah ini:
- Selanjutnya Queue Type,Copy Paste scripts di bawah di “New Terminal” Winbox:
/queue type add kind=pcq name=DOWNLOAD \
pcq-classifier=dst-address,dst-port
/queue type add kind=pcq name=UPLOAD \
pcq-classifier=src-address,src-port
- Selanjutnya kita set Queue tree untuk membagi otomatis rata bandwidth setiap client nya, Copy Paste scripts di bawah di “New Terminal” Winbox:
/queue tree add name=DOWNLOAD \
packet-mark="PAKET DOWNLOAD" \
parent=global-out \
priority=1 queue=DOWNLOAD
/queue tree add name=UPLOAD \
packet-mark="PAKET UPLOAD" \
parent=ether1 \
priority=1 queue=UPLOAD
- Bisa di lihat di halaman utama winbox pilih “Queues” kemudian TAB “Queue Tree”,seperti gambar di bawah ini:
- Selanjutnya test browsing sambil melihat traffic di Queue Tree ..apakah sudah berjalan Avg.Rate nya? ..jika sudah berjalan maka setting sudah benar seperti gambar di bawah ini:
Selesai dan selamat mencoba...
sumber : http://www.wirelessrouterproxy.com/2012/01/cara-setting-mikrotik-rb-indoor-seperti.html