anyone knows the spyware n virus port....?
and how can we block them in mikrotik....is it in forward...!
28 ;;; Accept Internet Established
chain=forward in-interface=Internet connection-state=established
action=accept
29 ;;; Accept Internet Related
chain=forward in-interface=Internet connection-state=related
action=accept
add chain=guest-network connection-state=invalid action=drop comment="Drop Invalid" disabled=no
add chain=guest-network connection-state=established action=accept comment="Accept Established" disabled=no
add chain=guest-network connection-state=related action=accept comment="Accept Related" disabled=no
add chain=guest-network protocol=tcp dst-port=80 action=accept comment="HTTP" disabled=no
add chain=guest-network protocol=tcp dst-port=20-21 action=accept comment="FTP" disabled=no
add chain=guest-network protocol=tcp dst-port=110 action=accept comment="POP3" disabled=no
add chain=guest-network protocol=tcp dst-port=25 action=accept comment="SMTP" disabled=no
add chain=guest-network protocol=udp action=accept comment="UDP" disabled=no
add chain=guest-network protocol=tcp dst-port=5190 action=accept comment="AIM" disabled=no
add chain=guest-network protocol=tcp dst-port=443 action=accept comment="SSL" disabled=no
add chain=guest-network protocol=tcp dst-port=1863 action=accept comment="MSN Messenger" disabled=no
add chain=guest-network protocol=tcp dst-port=6891-6901 action=accept comment="MSN Messenger" disabled=no
add chain=guest-network protocol=tcp dst-port=143 action=accept comment="IMAP" disabled=no
add chain=guest-network protocol=tcp dst-port=993 action=accept comment="IMAP-SSL" disabled=no
add chain=guest-network action=log log-prefix="Guest Chain" comment="Log Dropped Packets" disabled=no
add chain=guest-network action=drop comment="Drop Everything" disabled=no
add chain=customer connection-state=invalid action=drop comment="Drop Invalid" disabled=no
add chain=customer connection-state=established action=accept comment="Accept Established" disabled=no
add chain=customer connection-state=related action=accept comment="Accept Related" disabled=no
add chain=customer in-interface="LAN" out-interface=WAN action=accept comment="Accept Outgoing Connections" \
disabled=no
add chain=customer action=log log-prefix="Customer Chain" comment="Log Dropped" disabled=no
add chain=customer action=drop comment="Drop and log everything else" disabled=no
Yeah you do not need to specify the interface..well i think the problem is that you should accept established and related connections in all directions. i think its dropping replies to connections made to 8080. so if u accept related and established in both directions the problem should be solved
2. chain=forward ; connect-state=established ; action=accept
3. chain=forward ; connct-state=related ; action=accept
that should be ur new line 2 n 3
add chain=forward action=jump jump-target=customer comment="Jump to customer chain"