Kamis, 12 Januari 2012

Bandwidth Manajemen

Mikrotik Router fitur
lengkap buat Bandwidth Management,Berikut ini saya post untuk anda bagaimana cara melimit download berdasarkan jenis-jenis file nya saja seperti .exe .rar .flv .zip .wmv dan lain lain, beserta queue tree nya supaya adil,dan browsing,poker dan pointblank tetap lancar termasuk download .doc .pdf .docx, dan semua jenis gambar.
Remote Mikrotik anda menggunakan winbox,kemudian di halaman utama winbox pilih “Ip” kemudian “Firewall” kemudian “Layer7 Protocol” selanjut klik tanda + warna merah,seperti gambar di bawah ini:
 

--Selanjutnya isikan
Name:YOUTUBE
Regexp: http/(0\.9|1\.0|1\.1)[\x09-\x0d ][1-5][0-9][0-9][\x09-\x0d -~]*(content-type: video)

Seperti gambar di bawah ini:
 

--Setelah itu klik Ok,selanjutnya di halaman utama winbox pilih “New terminal”kemudian Copy perintah di bawah ini dan pastekan di “New Terminal” winbox:

/ip firewall layer7-protocol add name=”EXE” regexp="\\.(exe)"
/ip firewall layer7-protocol add name=”RAR” regexp="\\.(rar)"
/ip firewall layer7-protocol add name=”ZIP” regexp="\\.(zip)"
/ip firewall layer7-protocol add name="7z" regexp="\\.(7z)"
/ip firewall layer7-protocol add name="CAB" regexp="\\.(cab)"
/ip firewall layer7-protocol add name="ASF" regexp="\\.(asf)"
/ip firewall layer7-protocol add name="MOV" regexp="\\.(mov)"
/ip firewall layer7-protocol add name="WMV" regexp="\\.(wmv)"
/ip firewall layer7-protocol add name="MPG" regexp="\\.(mpg)"
/ip firewall layer7-protocol add name="MPEG" regexp="\\.(mpeg)"
/ip firewall layer7-protocol add name="MKV" regexp="\\.(mkv)"
/ip firewall layer7-protocol add name="AVI" regexp="\\.(avi)"
/ip firewall layer7-protocol add name="FLV" regexp="\\.(flv)"
/ip firewall layer7-protocol add name="WAV" regexp="\\.(wav)"
/ip firewall layer7-protocol add name="RM" regexp="\\.(rm)"
/ip firewall layer7-protocol add name="MP3" regexp="\\.(mp3)"
/ip firewall layer7-protocol add name="MP4" regexp="\\.(mp4)"
/ip firewall layer7-protocol add name="RAM" regexp="\\.(ram)"
/ip firewall layer7-protocol add name="RMVB" regexp="\\.(rmvb)"
/ip firewall layer7-protocol add name="DAT" regexp="\\.(dat)"
/ip firewall layer7-protocol add name="DAA" regexp="\\.(daa)"
/ip firewall layer7-protocol add name="ISO" regexp="\\.(iso)"
/ip firewall layer7-protocol add name="NRG" regexp="\\.(nrg)"
/ip firewall layer7-protocol add name="BIN" regexp="\\.(bin)"
/ip firewall layer7-protocol add name="VCD" regexp="\\.(vcd)"

--Kemudian kita buat manglenya...Copykan Mangle di bawah dan pastekan di "New Terminal" winbox:
/ip firewall mangle add action=mark-packet \
chain=prerouting comment="YOUTUBE MARK PACKET " disabled=no \
layer7-protocol=YOUTUBE new-packet-mark=YOUTUBE passthrough=no


/ip firewall mangle add action=mark-packet \
chain=prerouting comment="EXE MARK PACKET " disabled=no \
layer7-protocol=EXE new-packet-mark=EXE passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="RAR MARK PACKET " disabled=no \
layer7-protocol=RAR new-packet-mark=RAR passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="ZIP MARK PACKET " disabled=no \
layer7-protocol=ZIP new-packet-mark=ZIP passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="7z MARK PACKET " disabled=no \
layer7-protocol=7z new-packet-mark=7z passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="CAB MARK PACKET " disabled=no \
layer7-protocol=CAB new-packet-mark=CAB passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="ASF MARK PACKET " disabled=no \
layer7-protocol=ASF new-packet-mark=ASF passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="MOV MARK PACKET " disabled=no \
layer7-protocol=MOV new-packet-mark=MOV passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="WMV MARK PACKET " disabled=no \
layer7-protocol=WMV new-packet-mark=WMV passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="MPG MARK PACKET " disabled=no \
layer7-protocol=MPG new-packet-mark=MPG passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="MPEG MARK PACKET " disabled=no \
layer7-protocol=MPEG new-packet-mark=MPEG passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="MKV MARK PACKET " disabled=no \
layer7-protocol=MKV new-packet-mark=MKV passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="AVI MARK PACKET " disabled=no \
layer7-protocol=AVI new-packet-mark=AVI passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="FLV MARK PACKET " disabled=no \
layer7-protocol=FLV new-packet-mark=FLV passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="WAV MARK PACKET " disabled=no \
layer7-protocol=WAV new-packet-mark=WAV passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="RM MARK PACKET " disabled=no \
layer7-protocol=RM new-packet-mark=RM passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="MP3 MARK PACKET " disabled=no \
layer7-protocol=MP3 new-packet-mark=MP3 passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="MP4 MARK PACKET " disabled=no \
layer7-protocol=MP4 new-packet-mark=MP4 passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="RAM MARK PACKET " disabled=no \
layer7-protocol=RAM new-packet-mark=RAM passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="RMVB MARK PACKET " disabled=no \
layer7-protocol=RMVB new-packet-mark=RMVB passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="DAT MARK PACKET " disabled=no \
layer7-protocol=DAT new-packet-mark=DAT passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="DAA MARK PACKET " disabled=no \
layer7-protocol=DAA new-packet-mark=DAA passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="ISO MARK PACKET " disabled=no \
layer7-protocol=ISO new-packet-mark=ISO passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="NRG MARK PACKET " disabled=no \
layer7-protocol=NRG new-packet-mark=NRG passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="BIN MARK PACKET " disabled=no \
layer7-protocol=BIN new-packet-mark=BIN passthrough=no

/ip firewall mangle add action=mark-packet \
chain=prerouting comment="VCD MARK PACKET " disabled=no \
layer7-protocol=VCD new-packet-mark=VCD passthrough=no


--Selanjutnya di limit dengan queue tree,di sini saya buat 512kb bandwidth untuk download .wmv rar. .zip .exe .flv dll ….dan jika client download bersamaan file file tersebut,maka bagi rata dengan 512kbps bandwidth,silahkan anda ubah kecepatan limitnya sesuai dengan selera anda masing – masing
--Copykan queue tree di bawah ini dan pastekan di “New Terminal” Winbox:

/queue tree add name="LIMIT FILE EXTENTION" parent=global-out \
limit-at=0 priority=3 max-limit=512000 burst-limit=\
0 burst-threshold=0 burst-time=0s
/queue tree add name="YOUTUBE" parent="LIMIT FILE EXTENTION" \
packet-mark=YOUTUBE limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="7z" parent="LIMIT FILE EXTENTION" \
packet-mark=7z limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="ASF" parent="LIMIT FILE EXTENTION" \
packet-mark=ASF limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="AVI" parent="LIMIT FILE EXTENTION" \
packet-mark=AVI limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="BIN" parent="LIMIT FILE EXTENTION" \
packet-mark=BIN limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="CAB" parent="LIMIT FILE EXTENTION" \
packet-mark=CAB limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="DAA" parent="LIMIT FILE EXTENTION" \
packet-mark=DAA limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="DAT" parent="LIMIT FILE EXTENTION" \
packet-mark=DAT limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="EXE" parent="LIMIT FILE EXTENTION" \
packet-mark=EXE limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="FLV" parent="LIMIT FILE EXTENTION" \
packet-mark=FLV limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="ISO" parent="LIMIT FILE EXTENTION" \
packet-mark=ISO limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="MKV" parent="LIMIT FILE EXTENTION" \
packet-mark=MKV limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="MOV" parent="LIMIT FILE EXTENTION" \
packet-mark=MOV limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="MP3" parent="LIMIT FILE EXTENTION" \
packet-mark=MP3 limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="MP4" parent="LIMIT FILE EXTENTION" \
packet-mark=MP4 limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="MPEG" parent="LIMIT FILE EXTENTION" \
packet-mark=MPEG limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="MPG" parent="LIMIT FILE EXTENTION" \
packet-mark=MPG limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="NRG" parent="LIMIT FILE EXTENTION" \
packet-mark=NRG limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="RAM" parent="LIMIT FILE EXTENTION" \
packet-mark=RAM limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="RAR" parent="LIMIT FILE EXTENTION" \
packet-mark=RAR limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="RM" parent="LIMIT FILE EXTENTION" \
packet-mark=RM limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="RMVB" parent="LIMIT FILE EXTENTION" \
packet-mark=RMVB limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="VCD" parent="LIMIT FILE EXTENTION" \
packet-mark=VCD limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="WAV" parent="LIMIT FILE EXTENTION" \
packet-mark=WAV limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="WMV" parent="LIMIT FILE EXTENTION" \
packet-mark=WMV limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s
/queue tree add name="ZIP" parent="LIMIT FILE EXTENTION" \
packet-mark=ZIP limit-at=0 queue=default priority=1 max-limit=\
0 burst-limit=0 burst-threshold=0 burst-time=0s

--Sekarang saya test untuk download….saya test download satu file .exe menggunakan IDM ,kelihatan di bawah bahwa file exe telah terlimit 512kb bandwidth,kemudian terlihat juga di bawah queue tree file extention berubah warna dari warna hijau ke warna merah,berarti limit sedang berjalan,dan browsing tetap lancar,dan juga terlihat bahwa exe terlimit dengan Avg-Rate 512kbps:
 

--Selanjut nya saya download lagi dengan IDM file .rar,terlihat di bawah bahwa file .rar juga terlimit oleh queue tree dan file .exe dan file .rar bagi rata yaitu 512kbps bagi dua berarti 256kbps untuk .exe dan 256kbps untuk .rar,dan browsing tetap lancar ,seperti gambar di bawah ini:
 

--sekarang saya coba disabled kan queue tree nya,download jadi kencang,ini sangat berpengaruh pada browsing dan game online,seperti gambar di bawah ini:
 

--Kemudian saya enablekan lagi queue tree nya…dan terlimit lagi,dan client tidak terganggu…..seperti gambar di bawah:
 

--Selamat Mencoba--

Senin, 05 Desember 2011

Protect Warnet Dari Keylogger di Mikrotik

Assalamualaikum , kembali dengan saya disini , El-Farhatz mau sedikit berbagi , barusan dapat curhat dari temen pengelola warnet (doi termasuk client ane ) bahwa akun akun email , facebook dan sejenisnya milik pelanggannya dibajak oleh peretas ( baca : hacker or lamer) i dont know :smile

mungkin analisa ane seh biasa pake keylogger dan sejenisnya ,pertama mungkin kita bisa menggunakan scan dengan anti virus , kaspersky ato ang lainnya , ato pake anti keylogger juga bisa , bisa dicari2 di gugel , piss bisa juga pake deepfreeze tapi bisa juga di undepfreeze Ketawa , kalo keyloggernya rada nakal kita bisa blok keylogger tadi di network kita

akhirnya ane inisiatip blok lewat port aje , kebetulan jaringan di warnet ini pake mikrotik. langsng saja , jadi judulnye berubah blok keylogger di jaringan mikrotik piss

keylogger biasanya report akun2 kepada si bos nya menggunakan beberapa port ,

1. ftp
2. email

port ftp berada di angka 21

sementara port yang digunakan untuk layanan email berada pada port :
1. 25
2. 995
3. 465
4. 587
5. 110
6. dll

mari kita block port-port tersebut di mikrotik, ini cara yang menurut ane bagus untuk owner warnet ato op op warnet, karena kebanyakan keylogger menggunakan metode penyimpanan log 3 metode:

1. ftp
2. email

ane googling ada juga yang melalui dumping file , tapi ane kurang gt mudeng system ini,

dan bagusnya setau ane semua port diatas tidak digunakan oleh game online indonesia manapun. karena kebanyakan warnet gabung dengan game online Ketawa

dibawah ini ada script mikrotik yang bisa langsung di paste di terminal mikrotik anda ntar src address nya sesuaikan dengan ip network LAN warnet tujuan.


Code:
1    ip firewall filter add chain=forward protocol=tcp src-address=110.110.1.0/24 action=drop port=21 comment="BLOCK FTP"
2    ip firewall filter add chain=forward protocol=tcp src-address=110.110.1.0/24 action=drop port=995 comment="BLOCK MAIL"
3    ip firewall filter add chain=forward protocol=tcp src-address=110.110.1.0/24 action=drop port=25 comment="BLOCK PORT"
4    ip firewall filter add chain=forward protocol=tcp src-address=110.110.1.0/24 action=drop port=465 comment="BLOCK PORT"
5    ip firewall filter add chain=forward protocol=tcp src-address=110.110.1.0/24 action=drop port=587 comment="BLOCK PORT"
6    ip firewall filter add chain=forward protocol=tcp src-address=110.110.1.0/24 action=drop port=110 comment="BLOCK PORT"

ane contohkan disini pake 110.110.1.0/24 karena jaringan network dimarkas ane pake 110.110.1.0/24 , bisa disesuaikan dengan ip lan warnet nya
nah dengan begitu kita bisa agak merasa aman karena si empunya keylogger ga bisa nerima setoran dari si program keylogger ini terkecuali si keylogger mengganti port email / ftp, tapi carai ini agak sedikit advance, dan sangat jarang lamer / orang yang iseng mempunyai skill seperti itu. :asik

kalo ada user mau ftpan ato mau menggunakan port2 tadi bisa aja tinggal bilang ke server sementara di disable aja blok nya Ketawa , hehe its so easy kan ?


semoga bermanfaat

.thz
Regards

El-Farhatz

sumber : http://devilzc0de.org/forum/thread-6324.html?highlight=mikrotik

Mikrotik PCC LoadBalance

Contoh berikut adalah penggunaan PCC untuk loadbalance 3 Line PPPoE

5 Interface yang kita pakai yaitu :
- Public1
- Public2
- Public3
- Proxy
- Local

dan PPPoE name = Speedy1, Speedy2 dan Speedy3

Code:
{{{
/interface ethernet
set 0 name=Public1
set 1 name=Public2
set 2 name=Public3
set 3 name=Proxy
set 4 name=Local
}}}
Dengan IP Address sbb :

Code:
{{{
/ip address
add address=192.168.11.2/30 interface=Public1
add address=192.168.22.2/30 interface=Public2
add address=192.168.33.2/30 interface=Public3
add address=192.168.3.1/30 interface=Proxy
add address=192.168.2.30/27 interface=Local
}}}

Untuk dialup PPPoE nya jangan centang add-default-route nya, kita bikin manual di ip route seperti dibawah ini :
Code:
{{{
/interface pppoe-client
add ac-name="" add-default-route=no allow=pap,chap,mschap1,mschap2 comment="PPPOE 1" dial-on-demand=no disabled=no interface=Public1 max-mru=1480 max-mtu=\
    1480 mrru=disabled name=Speedy1 password=XXXXXXXXX profile=default service-name="" use-peer-dns=no user=XXXXXXXXX@telkom.net
add ac-name="" add-default-route=no allow=pap,chap,mschap1,mschap2 comment="PPPOE 2" dial-on-demand=no disabled=no interface=Public2 max-mru=1480 max-mtu=\
    1480 mrru=disabled name=Speedy2 password=XXXXXXXXX profile=default service-name="" use-peer-dns=no user=XXXXXXXXX@telkom.net
add ac-name="" add-default-route=no allow=pap,chap,mschap1,mschap2 comment="PPPOE 3" dial-on-demand=no disabled=no interface=Public3 max-mru=1480 max-mtu=\
    1480 mrru=disabled name=Speedy3 password=XXXXXXXXX profile=default service-name="" use-peer-dns=no user=XXXXXXXXX@telkom.net
Code:
{{{
/ip route
add check-gateway=arp comment="Default Route - Distance 1" disabled=no distance=1 gateway=Speedy1
add check-gateway=arp comment="Default Route - Distance 2" disabled=no distance=2 gateway=Speedy2
add check-gateway=arp comment="Default Route - Distance 3" disabled=no distance=3 gateway=Speedy3
add check-gateway=arp comment="PPPoE1 - Distance 1" disabled=no distance=1 gateway=Speedy1 routing-mark=pppoe_1
add check-gateway=arp comment="PPPoE2 - Distance 1" disabled=no distance=1 gateway=Speedy2 routing-mark=pppoe_2
add check-gateway=arp comment="PPPoE2 - Distance 1" disabled=no distance=1 gateway=Speedy3 routing-mark=pppoe_3
}}}

Kemudian untuk rule PCC nya adalah sebagai berikut :
 

Code:
{{{
/ip firewall mangle
add action=mark-connection chain=prerouting comment="PROXY PCC" disabled=no dst-address-type=!local dst-port=80,81,8080,8088,3128 in-interface=Proxy \
    new-connection-mark=proxy.pppoe_1 passthrough=yes per-connection-classifier=both-addresses-and-ports:3/0 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=80,81,8080,8088,3128 in-interface=Proxy \
    new-connection-mark=proxy.pppoe_2 passthrough=yes per-connection-classifier=both-addresses-and-ports:3/1 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=80,81,8080,8088,3128 in-interface=Proxy \
    new-connection-mark=proxy.pppoe_3 passthrough=yes per-connection-classifier=both-addresses-and-ports:3/2 protocol=tcp
add action=mark-routing chain=prerouting comment="PROXY ROUTE" connection-mark=proxy.pppoe_1 disabled=no in-interface=Proxy new-routing-mark=pppoe_1 \
passthrough=no
add action=mark-routing chain=prerouting comment="" connection-mark=proxy.pppoe_2 disabled=no in-interface=Proxy new-routing-mark=pppoe_2 passthrough=no
add action=mark-routing chain=prerouting comment="" connection-mark=proxy.pppoe_3 disabled=no in-interface=Proxy new-routing-mark=pppoe_3 passthrough=no
add action=mark-connection chain=prerouting comment="LOCAL PCC" disabled=no dst-address-list=!Transparent dst-address-type=!local dst-port=\
    !80,81,8080,8088,3128 in-interface=Local new-connection-mark=local.pppoe_1 passthrough=yes per-connection-classifier=src-address:3/0 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-list=!Transparent dst-address-type=!local dst-port=!80,81,8080,8088,3128 \
    in-interface=Local new-connection-mark=local.pppoe_2 passthrough=yes per-connection-classifier=src-address:3/1 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-list=!Transparent dst-address-type=!local dst-port=!80,81,8080,8088,3128 \
    in-interface=Local new-connection-mark=local.pppoe_3 passthrough=yes per-connection-classifier=src-address:3/2 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=!53 in-interface=Local new-connection-mark=local.pppoe_1 \
    passthrough=yes per-connection-classifier=src-address:3/0 protocol=udp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=!53 in-interface=Local new-connection-mark=local.pppoe_2 \
    passthrough=yes per-connection-classifier=src-address:3/1 protocol=udp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=!53 in-interface=Local new-connection-mark=local.pppoe_3 \
    passthrough=yes per-connection-classifier=src-address:3/2 protocol=udp
add action=mark-routing chain=prerouting comment="LOCAL ROUTE" connection-mark=local.pppoe_1 disabled=no in-interface=Local new-routing-mark=pppoe_1 \
    passthrough=no
add action=mark-routing chain=prerouting comment="" connection-mark=local.pppoe_2 disabled=no in-interface=Local new-routing-mark=pppoe_2 passthrough=no
add action=mark-routing chain=prerouting comment="" connection-mark=local.pppoe_3 disabled=no in-interface=Local new-routing-mark=pppoe_3 passthrough=no
}}}
 

Code:
http://code.google.com/p/warneter/source/browse/wiki/MikrotikPCC.wiki?r=13

kalo output line nya ada 2 gimana,misal 1 lan 1 hotspot?


Jawabannya


Code:
add action=mark-connection chain=prerouting comment="LOCAL PCC" disabled=no dst-address-list=!Transparent dst-address-type=!local dst-port=\
    !80,81,8080,8088,3128 in-interface=Local new-connection-mark=local.pppoe_1 passthrough=yes per-connection-classifier=src-address:3/0 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-list=!Transparent dst-address-type=!local dst-port=!80,81,8080,8088,3128 \
    in-interface=Local new-connection-mark=local.pppoe_2 passthrough=yes per-connection-classifier=src-address:3/1 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-list=!Transparent dst-address-type=!local dst-port=!80,81,8080,8088,3128 \
    in-interface=Local new-connection-mark=local.pppoe_3 passthrough=yes per-connection-classifier=src-address:3/2 protocol=tcp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=!53 in-interface=Local new-connection-mark=local.pppoe_1 \
    passthrough=yes per-connection-classifier=src-address:3/0 protocol=udp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=!53 in-interface=Local new-connection-mark=local.pppoe_2 \
    passthrough=yes per-connection-classifier=src-address:3/1 protocol=udp
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local dst-port=!53 in-interface=Local new-connection-mark=local.pppoe_3 \
    passthrough=yes per-connection-classifier=src-address:3/2 protocol=udp
add action=mark-routing chain=prerouting comment="LOCAL ROUTE" connection-mark=local.pppoe_1 disabled=no in-interface=Local new-routing-mark=pppoe_1 \
    passthrough=no
add action=mark-routing chain=prerouting comment="" connection-mark=local.pppoe_2 disabled=no in-interface=Local new-routing-mark=pppoe_2 passthrough=no
add action=mark-routing chain=prerouting comment="" connection-mark=local.pppoe_3 disabled=no in-interface=Local new-routing-mark=pppoe_3 passthrough=no


rubah in interface=local jadi interface hotspot

Minggu, 04 Desember 2011

Buat voucher di MikroTik

langsung saja tanpa bicara panjang kali lebar sisi kali sisi

rempah-rempahnya

=========================================================================

=========================================================================
dosis penggunaaan





efek samping


Load Balance menggunakan Metode PCC

Load balance pada mikrotik adalah teknik untuk mendistribusikan beban trafik pada dua atau lebih jalur koneksi secara seimbang, agar trafik dapat berjalan optimal, memaksimalkan throughput, memperkecil waktu tanggap dan menghindari overload pada salah satu jalur koneksi.
Selama ini banyak dari kita yang beranggapan salah, bahwa dengan menggunakan loadbalance dua jalur koneksi , maka besar bandwidth yang akan kita dapatkan menjadi dua kali lipat dari bandwidth sebelum menggunakan loadbalance (akumulasi dari kedua bandwidth tersebut). Hal ini perlu kita perjelas dahulu, bahwa loadbalance tidak akan menambah besar bandwidth yang kita peroleh, tetapi hanya bertugas untuk membagi trafik dari kedua bandwidth tersebut agar dapat terpakai secara seimbang.
Dengan artikel ini, kita akan membuktikan bahwa dalam penggunaan loadbalancing tidak seperti rumus matematika 512 + 256 = 768, akan tetapi 512 + 256 = 512 + 256, atau 512 + 256 = 256 + 256 + 256.
Pada artikel ini kami menggunakan RB433UAH dengan kondisi sebagai berikut :
1. Ether1 dan Ether2 terhubung pada ISP yang berbeda dengan besar bandwdith yang berbeda. ISP1 sebesar 512kbps dan ISP2 sebesar 256kbps.
2. Kita akan menggunakan web-proxy internal dan menggunakan openDNS.
3. Mikrotik RouterOS anda menggunakan versi 4.5 karena fitur PCC mulai dikenal pada versi 3.24.
Jika pada kondisi diatas berbeda dengan kondisi jaringan ditempat anda, maka konfigurasi yang akan kita jabarkan disini harus anda sesuaikan dengan konfigurasi untuk jaringan ditempat anda.

Konfigurasi Dasar

Berikut ini adalah Topologi Jaringan dan IP address yang akan kita gunakan
Quote:/ip address
add address=192.168.101.2/30 interface=ether1
add address=192.168.102.2/30 interface=ether2
add address=10.10.10.1/24 interface=wlan2
/ip dns
set allow-remote-requests=yes primary-dns=208.67.222.222 secondary-dns=208.67.220.220


Untuk koneksi client, kita menggunakan koneksi wireless pada wlan2 dengan range IP client 10.10.10.2 s/d 10.10.10.254 netmask 255.255.255.0, dimana IP 10.10.10.1 yang dipasangkan pada wlan2 berfungsi sebagai gateway dan dns server dari client. Jika anda menggunakan DNS dari salah satu isp anda, maka akan ada tambahan mangle yang akan kami berikan tanda tebal

Setelah pengkonfigurasian IP dan DNS sudah benar, kita harus memasangkan default route ke masing-masing IP gateway ISP kita agar router meneruskan semua trafik yang tidak terhubung padanya ke gateway tersebut. Disini kita menggunakan fitur check-gateway berguna jika salah satu gateway kita putus, maka koneksi akan dibelokkan ke gateway lainnya.
Quote:/ip route
add dst-address=0.0.0.0/0 gateway=192.168.101.1 distance=1 check-gateway=ping
add dst-address=0.0.0.0/0 gateway=192.168.102.1 distance=2 check-gateway=ping

Untuk pengaturan Access Point sehingga PC client dapat terhubung dengan wireless kita, kita menggunakan perintah
Quote:/interface wireless
set wlan2 mode=ap-bridge band=2.4ghz-b/g ssid=Mikrotik disabled=no


Agar pc client dapat melakukan koneksi ke internet, kita juga harus merubah IP privat client ke IP publik yang ada di interface publik kita yaitu ether1 dan ether2.
Quote:/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
add action=masquerade chain=srcnat out-interface=ether2

Sampai langkah ini, router dan pc client sudah dapat melakukan koneksi internet. Lakukan ping baik dari router ataupun pc client ke internet. Jika belum berhasil, cek sekali lagi konfigurasi anda.

Webproxy Internal
Pada routerboard tertentu, seperti RB450G, RB433AH, RB433UAH, RB800 dan RB1100 mempunyai expansion slot (USB, MicroSD, CompactFlash) untuk storage tambahan. Pada contoh berikut, kita akan menggunakan usb flashdisk yang dipasangkan pada slot USB. Untuk pertama kali pemasangan, storage tambahan ini akan terbaca statusnya invalid di /system store. Agar dapat digunakan sebagai media penyimpan cache, maka storage harus diformat dahulu dan diaktifkan Nantinya kita tinggal mengaktifkan webproxy dan set cache-on-disk=yes untuk menggunakan media storage kita. Jangan lupa untuk membelokkan trafik HTTP (tcp port 80) kedalam webproxy kita.
Quote:/store disk format-drive usb1
/store
add disk=usb1 name=cache-usb type=web-proxy
activate cache-usb

/ip proxy
set cache-on-disk=yes enabled=yes max-cache-size=200000KiB port=8080

/ip firewall nat
add chain=dstnat protocol=tcp dst-port=80 in-interface=wlan2 action=redirect to-ports=8080



Pengaturan Mangle
Pada loadbalancing kali ini kita akan menggunakan fitur yang disebut PCC (Per Connection Classifier). Dengan PCC kita bisa mengelompokan trafik koneksi yang melalui atau keluar masuk router menjadi beberapa kelompok. Pengelompokan ini bisa dibedakan berdasarkan src-address, dst-address, src-port dan atau dst-port. Router akan mengingat-ingat jalur gateway yang dilewati diawal trafik koneksi, sehingga pada paket-paket selanjutnya yang masih berkaitan dengan koneksi awalnya akan dilewatkan pada jalur gateway yang sama juga. Kelebihan dari PCC ini yang menjawab banyaknya keluhan sering putusnya koneksi pada teknik loadbalancing lainnya sebelum adanya PCC karena perpindahan gateway..
Sebelum membuat mangle loadbalance, untuk mencegah terjadinya loop routing pada trafik, maka semua trafik client yang menuju network yang terhubung langsung dengan router, harus kita bypass dari loadbalancing. Kita bisa membuat daftar IP yang masih dalam satu network router dan memasang mangle pertama kali sebagai berikut
Quote:/ip firewall address-list
add address=192.168.101.0/30 list=lokal
add address=192.168.102.0/30 list=lokal
add address=10.10.10.0/24 list=lokal

/ip firewall mangle
add action=accept chain=prerouting dst-address-list=lokal in-interface=wlan2 comment=”trafik lokal”
add action=accept chain=output dst-address-list=lokal

Pada kasus tertentu, trafik pertama bisa berasal dari Internet, seperti penggunaan remote winbox atau telnet dari internet dan sebagainya, oleh karena itu kita juga memerlukan mark-connection untuk menandai trafik tersebut agar trafik baliknya juga bisa melewati interface dimana trafik itu masuk
Quote:/ip firewall mangle
add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=ether1 new-connection-mark=con-from-isp1 passthrough=yes comment=”trafik dari isp1”
add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=ether2 new-connection-mark=con-from-isp2 passthrough=yes comment=”trafik dari isp2”

Umumnya, sebuah ISP akan membatasi akses DNS servernya dari IP yang hanya dikenalnya, jadi jika anda menggunakan DNS dari salah satu ISP anda, anda harus menambahkan mangle agar trafik DNS tersebut melalui gateway ISP yang bersangkutan bukan melalui gateway ISP lainnya. Disini kami berikan mangle DNS ISP1 yang melalui gateway ISP1. Jika anda menggunakan publik DNS independent, seperti opendns, anda tidak memerlukan mangle dibawah ini.
Quote:/ip firewall mangle
add action=mark-connection chain=output comment=dns dst-address=202.65.112.21 dst-port=53 new-connection-mark=dns passthrough=yes protocol=tcp comment=”trafik DNS citra.net.id”
add action=mark-connection chain=output dst-address=202.65.112.21 dst-port=53 new-connection-mark=dns passthrough=yes protocol=udp
add action=mark-routing chain=output connection-mark=dns new-routing-mark=route-to-isp1 passthrough=no

Karena kita menggunakan webproxy pada router, maka trafik yang perlu kita loadbalance ada 2 jenis. Yang pertama adalah trafik dari client menuju internet (non HTTP), dan trafik dari webproxy menuju internet. Agar lebih terstruktur dan mudah dalam pembacaannya, kita akan menggunakan custom-chain sebagai berikut :
Quote:/ip firewall mangle
add action=jump chain=prerouting comment=”lompat ke client-lb” connection-mark=no-mark in-interface=wlan2 jump-target=client-lb
add action=jump chain=output comment=”lompat ke lb-proxy” connection-mark=no-mark out-interface=!wlan2 jump-target=lb-proxy


Pada mangle diatas, untuk trafik loadbalance client pastikan parameter in-interface adalah interface yang terhubung dengan client, dan untuk trafik loadbalance webproxy, kita menggunakan chain output dengan parameter out-interface yang bukan terhubung ke interface client. Setelah custom chain untuk loadbalancing dibuat, kita bisa membuat mangle di custom chain tersebut sebagai berikut
Quote:/ip firewall mangle
add action=mark-connection chain=client-lb dst-address-type=!local new-connection-mark=to-isp1 passthrough=yes per-connection-classifier=both-addresses:3/0 comment=”awal loadbalancing klien”
add action=mark-connection chain=client-lb dst-address-type=!local new-connection-mark=to-isp1 passthrough=yes per-connection-classifier=both-addresses:3/1
add action=mark-connection chain=client-lb dst-address-type=!local new-connection-mark=to-isp2 passthrough=yes per-connection-classifier=both-addresses:3/2
add action=return chain=client-lb comment=”akhir dari loadbalancing”

/ip firewall mangle
add action=mark-connection chain=lb-proxy dst-address-type=!local new-connection-mark=con-from-isp1 passthrough=yes per-connection-classifier=both-addresses:3/0 comment=”awal load balancing proxy”
add action=mark-connection chain=lb-proxy dst-address-type=!local new-connection-mark=con-from-isp1 passthrough=yes per-connection-classifier=both-addresses:3/1
add action=mark-connection chain=lb-proxy dst-address-type=!local new-connection-mark=con-from-isp2 passthrough=yes per-connection-classifier=both-addresses:3/2
add action=return chain=lb-proxy comment=”akhir dari loadbalancing”
Untuk contoh diatas, pada loadbalancing client dan webproxy menggunakan parameter pemisahan trafik pcc yang sama, yaitu both-address, sehingga router akan mengingat-ingat berdasarkan src-address dan dst-address dari sebuah koneksi. Karena trafik ISP kita yang berbeda (512kbps dan 256kbps), kita membagi beban trafiknya menjadi 3 bagian. 2 bagian pertama akan melewati gateway ISP1, dan 1 bagian terakhir akan melewati gateway ISP2. Jika masing-masing trafik dari client dan proxy sudah ditandai, langkah berikutnya kita tinggal membuat mangle mark-route yang akan digunakan dalam proses routing nantinya
Quote:/ip firewall mangle
add action=jump chain=prerouting comment=”marking route client” connection-mark=!no-mark in-interface=wlan2 jump-target=route-client
add action=mark-routing chain=route-client connection-mark=to-isp1 new-routing-mark=route-to-isp1 passthrough=no
add action=mark-routing chain=route-client connection-mark=to-isp2 new-routing-mark=route-to-isp2 passthrough=no
add action=mark-routing chain=route-client connection-mark=con-from-isp1 new-routing-mark=route-to-isp1 passthrough=no
add action=mark-routing chain=route-client connection-mark=con-from-isp2 new-routing-mark=route-to-isp2 passthrough=no
add action=return chain=route-client disabled=no

/ip firewall mangle
add action=mark-routing chain=output comment=”marking route proxy” connection-mark=con-from-isp1 new-routing-mark=route-to-isp1 out-interface=!wlan2 passthrough=no
add action=mark-routing chain=output connection-mark=con-from-isp2 new-routing-mark=route-to-isp2 out-interface=!wlan2 passthrough=no


Pengaturan Routing
Pengaturan mangle diatas tidak akan berguna jika anda belum membuat routing berdasar mark-route yang sudah kita buat. Disini kita juga akan membuat routing backup, sehingga apabila sebuah gateway terputus, maka semua koneksi akan melewati gateway yang masing terhubung
Quote:/ip route
add check-gateway=ping dst-address=0.0.0.0/0 gateway=192.168.101.1 routing-mark=route-to-isp1 distance=1
add check-gateway=ping dst-address=0.0.0.0/0 gateway=192.168.102.1 routing-mark=route-to-isp1 distance=2
add check-gateway=ping dst-address=0.0.0.0/0 gateway=192.168.102.1 routing-mark=route-to-isp2 distance=1
add check-gateway=ping dst-address=0.0.0.0/0 gateway=192.168.101.1 routing-mark=route-to-isp2 distance=2

NB : Kalau ngk jalan, kuncinya satu banyakin amal... org dah ane coba puluhan kali jalan kok [Image: 21.gif]



sumber : http://devilzc0de.org/forum/archive/index.php/thread-4976.html

Pisahin Bandwint Lokal sama Interllokal dengan ip firewall + Mangle

Code:
/ip firewall address-list
add list=nice address="1.2.3.4"
add list=nice address="125.166.0.0/15"
add list=nice address="125.162.0.0/16"
add list=nice address="125.163.0.0/16"
add list=nice address="125.160.0.0/16"
add list=nice address="125.161.0.0/16"
add list=nice address="125.164.0.0/16"
add list=nice address="125.165.0.0/16"
add list=nice address="222.124.0.0/16"
add list=nice address="61.94.0.0/16"
add list=nice address="167.205.0.0/16"
add list=nice address="202.158.0.0/17"
add list=nice address="61.5.0.0/17"
add list=nice address="124.195.0.0/17"
add list=nice address="117.102.64.0/18"
add list=nice address="152.118.128.0/18"
add list=nice address="152.118.192.0/18"
add list=nice address="152.118.0.0/18"
add list=nice address="152.118.64.0/18"
add list=nice address="207.209.192.0/18"
add list=nice address="221.132.192.0/18"
add list=nice address="125.208.128.0/18"
add list=nice address="124.153.0.0/18"
add list=nice address="61.14.0.0/18"
add list=nice address="203.130.192.0/18"
add list=nice address="210.210.128.0/18"
add list=nice address="206.182.192.0/18"
add list=nice address="114.57.0.0/18"
add list=nice address="202.152.0.0/18"
add list=nice address="209.93.224.0/19"
add list=nice address="202.173.64.0/19"
add list=nice address="114.199.96.0/19"
add list=nice address="202.171.0.0/19"
add list=nice address="202.47.192.0/19"
add list=nice address="202.169.32.0/19"
add list=nice address="202.182.160.0/19"
add list=nice address="117.102.224.0/19"
add list=nice address="202.51.192.0/19"
add list=nice address="202.149.128.0/19"
add list=nice address="202.147.224.0/19"
add list=nice address="202.146.224.0/19"
add list=nice address="202.159.64.0/19"
add list=nice address="202.95.128.0/19"
add list=nice address="202.152.224.0/19"
add list=nice address="61.247.0.0/19"
add list=nice address="61.247.32.0/19"
add list=nice address="117.104.192.0/19"
add list=nice address="118.98.160.0/19"
add list=nice address="118.98.192.0/19"
add list=nice address="118.136.0.0/19"
add list=nice address="118.136.32.0/19"
add list=nice address="118.136.64.0/19"
add list=nice address="118.136.96.0/19"
add list=nice address="118.136.128.0/19"
add list=nice address="118.136.160.0/19"
add list=nice address="118.136.192.0/19"
add list=nice address="118.136.224.0/19"
add list=nice address="118.137.0.0/19"
add list=nice address="118.137.32.0/19"
add list=nice address="118.137.64.0/19"
add list=nice address="118.137.96.0/19"
add list=nice address="118.137.128.0/19"
add list=nice address="118.137.160.0/19"
add list=nice address="118.137.192.0/19"
add list=nice address="118.137.224.0/19"
add list=nice address="121.52.64.0/19"
add list=nice address="124.81.0.0/19"
add list=nice address="124.81.32.0/19"
add list=nice address="124.81.64.0/19"
add list=nice address="124.81.96.0/19"
add list=nice address="124.81.128.0/19"
add list=nice address="124.81.192.0/19"
add list=nice address="124.81.224.0/19"
add list=nice address="202.10.32.0/19"
add list=nice address="202.53.224.0/19"
add list=nice address="202.57.0.0/19"
add list=nice address="202.73.96.0/19"
add list=nice address="202.77.96.0/19"
add list=nice address="202.81.32.0/19"
add list=nice address="202.137.0.0/19"
add list=nice address="202.138.224.0/19"
add list=nice address="202.148.0.0/19"
add list=nice address="202.150.64.0/19"
add list=nice address="202.153.128.0/19"
add list=nice address="202.154.0.0/19"
add list=nice address="202.154.32.0/19"
add list=nice address="202.155.0.0/19"
add list=nice address="202.155.32.0/19"
add list=nice address="202.155.128.0/19"
add list=nice address="202.159.0.0/19"
add list=nice address="202.159.32.0/19"
add list=nice address="202.162.192.0/19"
add list=nice address="203.128.64.0/19"
add list=nice address="219.83.0.0/19"
add list=nice address="219.83.32.0/19"
add list=nice address="219.83.64.0/19"
add list=nice address="60.253.112.0/20"
add list=nice address="61.8.64.0/20"
add list=nice address="114.57.160.0/20"
add list=nice address="114.199.80.0/20"
add list=nice address="116.68.160.0/20"
add list=nice address="117.20.48.0/20"
add list=nice address="117.103.0.0/20"
add list=nice address="118.98.240.0/20"
add list=nice address="119.2.64.0/20"
add list=nice address="119.82.224.0/20"
add list=nice address="119.110.64.0/20"
add list=nice address="119.235.208.0/20"
add list=nice address="119.252.160.0/20"
add list=nice address="121.50.128.0/20"
add list=nice address="122.129.192.0/20"
add list=nice address="122.200.0.0/20"
add list=nice address="124.81.176.0/20"
add list=nice address="202.3.208.0/20"
add list=nice address="202.6.208.0/20"
add list=nice address="202.6.224.0/20"
add list=nice address="202.43.176.0/20"
add list=nice address="202.46.64.0/20"
add list=nice address="202.46.144.0/20"
add list=nice address="202.47.64.0/20"
add list=nice address="202.51.96.0/20"
add list=nice address="202.51.224.0/20"
add list=nice address="202.58.64.0/20"
add list=nice address="202.58.160.0/20"
add list=nice address="202.59.160.0/20"
add list=nice address="202.65.112.0/20"
add list=nice address="202.67.32.0/20"
add list=nice address="202.69.96.0/20"
add list=nice address="202.72.208.0/20"
add list=nice address="202.73.224.0/20"
add list=nice address="202.77.64.0/20"
add list=nice address="202.80.112.0/20"
add list=nice address="202.80.208.0/20"
add list=nice address="202.87.176.0/20"
add list=nice address="202.93.16.0/20"
add list=nice address="202.93.32.0/20"
add list=nice address="202.93.128.0/20"
add list=nice address="202.93.224.0/20"
add list=nice address="202.123.224.0/20"
add list=nice address="202.127.96.0/20"
add list=nice address="202.133.80.0/20"
add list=nice address="202.143.32.0/20"
add list=nice address="202.145.0.0/20"
add list=nice address="202.146.48.0/20"
add list=nice address="202.147.192.0/20"
add list=nice address="202.152.160.0/20"
add list=nice address="202.152.192.0/20"
add list=nice address="202.153.16.0/20"
add list=nice address="202.153.240.0/20"
add list=nice address="202.155.64.0/20"
add list=nice address="202.155.112.0/20"
add list=nice address="202.159.112.0/20"
add list=nice address="202.165.32.0/20"
add list=nice address="202.182.48.0/20"
add list=nice address="203.78.112.0/20"
add list=nice address="203.83.32.0/20"
add list=nice address="203.89.16.0/20"
add list=nice address="203.123.224.0/20"
add list=nice address="203.153.96.0/20"
add list=nice address="203.161.16.0/20"
add list=nice address="203.166.192.0/20"
add list=nice address="203.201.160.0/20"
add list=nice address="207.83.112.0/20"
add list=nice address="210.23.64.0/20"
add list=nice address="210.57.208.0/20"
add list=nice address="210.79.208.0/20"
add list=nice address="219.83.96.0/20"
add list=nice address="220.157.96.0/20"
add list=nice address="58.65.240.0/21"
add list=nice address="60.253.96.0/21"
add list=nice address="61.45.224.0/21"
add list=nice address="114.57.232.0/21"
add list=nice address="114.134.64.0/21"
add list=nice address="114.141.48.0/21"
add list=nice address="114.141.88.0/21"
add list=nice address="116.0.0.0/21"
add list=nice address="116.12.40.0/21"
add list=nice address="116.50.24.0/21"
add list=nice address="116.68.224.0/21"
add list=nice address="116.68.248.0/21"
add list=nice address="116.90.208.0/21"
add list=nice address="116.197.128.0/21"
add list=nice address="116.254.96.0/21"
add list=nice address="117.18.16.0/21"
add list=nice address="117.74.120.0/21"
add list=nice address="117.103.32.0/21"
add list=nice address="117.103.48.0/21"
add list=nice address="117.103.168.0/21"
add list=nice address="118.98.232.0/21"
add list=nice address="119.2.40.0/21"
add list=nice address="119.10.176.0/21"
add list=nice address="119.82.240.0/21"
add list=nice address="119.110.80.0/21"
add list=nice address="119.160.200.0/21"
add list=nice address="119.235.248.0/21"
add list=nice address="120.29.152.0/21"
add list=nice address="121.58.184.0/21"
add list=nice address="121.100.16.0/21"
add list=nice address="121.101.128.0/21"
add list=nice address="121.101.184.0/21"
add list=nice address="122.49.224.0/21"
add list=nice address="122.128.16.0/21"
add list=nice address="122.144.0.0/21"
add list=nice address="122.200.48.0/21"
add list=nice address="122.200.144.0/21"
add list=nice address="124.66.160.0/21"
add list=nice address="124.81.168.0/21"
add list=nice address="124.158.128.0/21"
add list=nice address="202.43.160.0/21"
add list=nice address="202.43.248.0/21"
add list=nice address="202.46.24.0/21"
add list=nice address="202.46.80.0/21"
add list=nice address="202.51.16.0/21"
add list=nice address="202.58.176.0/21"
add list=nice address="202.59.200.0/21"
add list=nice address="202.62.16.0/21"
add list=nice address="202.72.192.0/21"
add list=nice address="202.74.72.0/21"
add list=nice address="202.75.16.0/21"
add list=nice address="202.87.248.0/21"
add list=nice address="202.89.208.0/21"
add list=nice address="202.91.8.0/21"
add list=nice address="202.91.24.0/21"
add list=nice address="202.93.240.0/21"
add list=nice address="202.122.8.0/21"
add list=nice address="202.129.184.0/21"
add list=nice address="202.133.0.0/21"
add list=nice address="202.134.0.0/21"
add list=nice address="202.146.40.0/21"
add list=nice address="202.149.64.0/21"
add list=nice address="202.149.80.0/21"
add list=nice address="202.150.128.0/21"
add list=nice address="202.153.224.0/21"
add list=nice address="202.155.80.0/21"
add list=nice address="202.155.104.0/21"
add list=nice address="202.158.136.0/21"
add list=nice address="202.159.96.0/21"
add list=nice address="202.162.32.0/21"
add list=nice address="202.164.216.0/21"
add list=nice address="202.169.224.0/21"
add list=nice address="202.169.240.0/21"
add list=nice address="202.179.184.0/21"
add list=nice address="203.77.224.0/21"
add list=nice address="203.80.8.0/21"
add list=nice address="203.84.136.0/21"
add list=nice address="203.84.152.0/21"
add list=nice address="203.123.240.0/21"
add list=nice address="203.134.232.0/21"
add list=nice address="203.135.176.0/21"
add list=nice address="203.142.64.0/21"
add list=nice address="203.142.80.0/21"
add list=nice address="203.153.24.0/21"
add list=nice address="203.153.112.0/21"
add list=nice address="203.174.8.0/21"
add list=nice address="203.176.176.0/21"
add list=nice address="203.190.48.0/21"
add list=nice address="203.190.112.0/21"
add list=nice address="203.190.184.0/21"
add list=nice address="203.190.240.0/21"
add list=nice address="203.191.40.0/21"
add list=nice address="210.211.16.0/21"
add list=nice address="219.83.112.0/21"
add list=nice address="220.247.168.0/21"
add list=nice address="222.229.80.0/21"
add list=nice address="58.145.168.0/22"
add list=nice address="60.253.104.0/22"
add list=nice address="61.45.232.0/22"
add list=nice address="114.30.80.0/22"
add list=nice address="114.31.240.0/22"
add list=nice address="116.66.200.0/22"
add list=nice address="116.90.176.0/22"
add list=nice address="116.199.204.0/22"
add list=nice address="117.102.160.0/22"
add list=nice address="117.103.56.0/22"
add list=nice address="118.98.228.0/22"
add list=nice address="119.2.48.0/22"
add list=nice address="119.18.156.0/22"
add list=nice address="119.235.16.0/22"
add list=nice address="120.29.224.0/22"
add list=nice address="121.52.52.0/22"
add list=nice address="122.102.48.0/22"
add list=nice address="124.6.32.0/22"
add list=nice address="124.81.164.0/22"
add list=nice address="146.23.252.0/22"
add list=nice address="202.2.92.0/22"
add list=nice address="202.46.0.0/22"
add list=nice address="202.46.88.0/22"
add list=nice address="202.51.28.0/22"
add list=nice address="202.51.252.0/22"
add list=nice address="202.52.12.0/22"
add list=nice address="202.55.164.0/22"
add list=nice address="202.55.168.0/22"
add list=nice address="202.59.196.0/22"
add list=nice address="202.62.8.0/22"
add list=nice address="202.62.24.0/22"
add list=nice address="202.67.8.0/22"
add list=nice address="202.70.52.0/22"
add list=nice address="202.70.60.0/22"
add list=nice address="202.72.200.0/22"
add list=nice address="202.78.196.0/22"
add list=nice address="202.81.4.0/22"
add list=nice address="202.87.240.0/22"
add list=nice address="202.93.112.0/22"
add list=nice address="202.146.0.0/22"
add list=nice address="202.146.128.0/22"
add list=nice address="202.146.176.0/22"
add list=nice address="202.149.72.0/22"
add list=nice address="202.149.88.0/22"
add list=nice address="202.153.236.0/22"
add list=nice address="202.154.184.0/22"
add list=nice address="202.155.92.0/22"
add list=nice address="202.155.96.0/22"
add list=nice address="202.158.132.0/22"
add list=nice address="202.159.108.0/22"
add list=nice address="202.162.40.0/22"
add list=nice address="202.173.16.0/22"
add list=nice address="202.180.0.0/22"
add list=nice address="202.180.16.0/22"
add list=nice address="202.180.52.0/22"
add list=nice address="203.77.208.0/22"
add list=nice address="203.77.236.0/22"
add list=nice address="203.77.248.0/22"
add list=nice address="203.81.184.0/22"
add list=nice address="203.99.96.0/22"
add list=nice address="203.123.60.0/22"
add list=nice address="203.123.248.0/22"
add list=nice address="203.128.248.0/22"
add list=nice address="203.142.76.0/22"
add list=nice address="203.160.56.0/22"
add list=nice address="203.190.40.0/22"
add list=nice address="219.83.120.0/22"
add list=nice address="222.165.192.0/22"
add list=nice address="222.165.252.0/22"
add list=nice address="32.234.170.0/23"
add list=nice address="32.234.172.0/23"
add list=nice address="60.253.108.0/23"
add list=nice address="61.45.236.0/23"
add list=nice address="116.66.204.0/23"
add list=nice address="116.199.202.0/23"
add list=nice address="116.212.100.0/23"
add list=nice address="117.102.166.0/23"
add list=nice address="117.103.60.0/23"
add list=nice address="118.82.0.0/23"
add list=nice address="118.82.12.0/23"
add list=nice address="119.235.20.0/23"
add list=nice address="120.136.18.0/23"
add list=nice address="121.52.50.0/23"
add list=nice address="121.52.58.0/23"
add list=nice address="121.52.134.0/23"
add list=nice address="123.176.120.0/23"
add list=nice address="124.158.136.0/23"
add list=nice address="194.146.106.0/23"
add list=nice address="202.20.106.0/23"
add list=nice address="202.43.168.0/23"
add list=nice address="202.46.4.0/23"
add list=nice address="202.46.14.0/23"
add list=nice address="202.46.92.0/23"
add list=nice address="202.46.130.0/23"
add list=nice address="202.46.240.0/23"
add list=nice address="202.46.252.0/23"
add list=nice address="202.51.56.0/23"
add list=nice address="202.58.196.0/23"
add list=nice address="202.59.194.0/23"
add list=nice address="202.62.28.0/23"
add list=nice address="202.65.236.0/23"
add list=nice address="202.67.12.0/23"
add list=nice address="202.70.50.0/23"
add list=nice address="202.70.56.0/23"
add list=nice address="202.75.26.0/23"
add list=nice address="202.78.192.0/23"
add list=nice address="202.78.200.0/23"
add list=nice address="202.78.204.0/23"
add list=nice address="202.89.216.0/23"
add list=nice address="202.89.222.0/23"
add list=nice address="202.93.116.0/23"
add list=nice address="202.135.6.0/23"
add list=nice address="202.135.134.0/23"
add list=nice address="202.146.4.0/23"
add list=nice address="202.146.132.0/23"
add list=nice address="202.149.78.0/23"
add list=nice address="202.149.92.0/23"
add list=nice address="202.153.232.0/23"
add list=nice address="202.154.176.0/23"
add list=nice address="202.155.100.0/23"
add list=nice address="202.158.130.0/23"
add list=nice address="202.159.106.0/23"
add list=nice address="202.162.46.0/23"
add list=nice address="202.169.232.0/23"
add list=nice address="202.169.236.0/23"
add list=nice address="202.173.20.0/23"
add list=nice address="202.180.4.0/23"
add list=nice address="202.180.8.0/23"
add list=nice address="202.180.50.0/23"
add list=nice address="202.191.2.0/23"
add list=nice address="203.31.164.0/23"
add list=nice address="203.77.214.0/23"
add list=nice address="203.77.220.0/23"
add list=nice address="203.77.232.0/23"
add list=nice address="203.77.246.0/23"
add list=nice address="203.81.190.0/23"
add list=nice address="203.123.252.0/23"
add list=nice address="203.153.120.0/23"
add list=nice address="203.160.60.0/23"
add list=nice address="203.189.88.0/23"
add list=nice address="203.190.36.0/23"
add list=nice address="203.190.46.0/23"
add list=nice address="203.194.70.0/23"
add list=nice address="206.73.208.0/23"
add list=nice address="206.73.234.0/23"
add list=nice address="206.73.238.0/23"
add list=nice address="219.83.124.0/23"
add list=nice address="32.234.175.0/24"
add list=nice address="58.145.173.0/24"
add list=nice address="58.145.175.0/24"
add list=nice address="58.147.185.0/24"
add list=nice address="58.147.189.0/24"
add list=nice address="60.253.110.0/24"
add list=nice address="61.45.238.0/24"
add list=nice address="87.237.160.0/24"
add list=nice address="114.4.0.0/24"
add list=nice address="116.66.207.0/24"
add list=nice address="116.90.163.0/24"
add list=nice address="116.90.164.0/24"
add list=nice address="116.90.166.0/24"
add list=nice address="116.212.96.0/24"
add list=nice address="117.102.164.0/24"
add list=nice address="118.82.14.0/24"
add list=nice address="118.82.18.0/24"
add list=nice address="118.82.31.0/24"
add list=nice address="119.2.55.0/24"
add list=nice address="120.136.16.0/24"
add list=nice address="120.136.23.0/24"
add list=nice address="121.52.25.0/24"
add list=nice address="121.52.35.0/24"
add list=nice address="121.52.42.0/24"
add list=nice address="121.52.49.0/24"
add list=nice address="121.52.61.0/24"
add list=nice address="121.52.129.0/24"
add list=nice address="121.52.130.0/24"
add list=nice address="122.102.52.0/24"
add list=nice address="122.201.39.0/24"
add list=nice address="123.176.122.0/24"
add list=nice address="123.176.127.0/24"
add list=nice address="124.81.160.0/24"
add list=nice address="124.81.162.0/24"
add list=nice address="124.158.138.0/24"
add list=nice address="144.5.46.0/24"
add list=nice address="152.158.247.0/24"
add list=nice address="156.146.3.0/24"
add list=nice address="192.5.5.0/24"
add list=nice address="192.23.186.0/24"
add list=nice address="192.36.148.0/24"
add list=nice address="192.92.81.0/24"
add list=nice address="194.0.1.0/24"
add list=nice address="194.0.2.0/24"
add list=nice address="194.146.108.0/24"
add list=nice address="202.14.255.0/24"
add list=nice address="202.22.31.0/24"
add list=nice address="202.43.170.0/24"
add list=nice address="202.43.173.0/24"
add list=nice address="202.43.175.0/24"
add list=nice address="202.46.9.0/24"
add list=nice address="202.46.11.0/24"
add list=nice address="202.46.94.0/24"
add list=nice address="202.46.129.0/24"
add list=nice address="202.51.122.0/24"
add list=nice address="202.51.126.0/24"
add list=nice address="202.52.8.0/24"
add list=nice address="202.55.160.0/24"
add list=nice address="202.55.172.0/24"
add list=nice address="202.58.203.0/24"
add list=nice address="202.58.204.0/24"
add list=nice address="202.59.192.0/24"
add list=nice address="202.62.31.0/24"
add list=nice address="202.65.227.0/24"
add list=nice address="202.65.238.0/24"
add list=nice address="202.67.15.0/24"
add list=nice address="202.70.49.0/24"
add list=nice address="202.70.59.0/24"
add list=nice address="202.75.25.0/24"
add list=nice address="202.75.29.0/24"
add list=nice address="202.75.30.0/24"
add list=nice address="202.78.195.0/24"
add list=nice address="202.78.203.0/24"
add list=nice address="202.78.207.0/24"
add list=nice address="202.87.245.0/24"
add list=nice address="202.87.247.0/24"
add list=nice address="202.92.192.0/24"
add list=nice address="202.92.200.0/24"
add list=nice address="202.92.207.0/24"
add list=nice address="202.122.162.0/24"
add list=nice address="202.122.165.0/24"
add list=nice address="202.122.166.0/24"
add list=nice address="202.135.5.0/24"
add list=nice address="202.135.23.0/24"
add list=nice address="202.135.28.0/24"
add list=nice address="202.135.42.0/24"
add list=nice address="202.135.54.0/24"
add list=nice address="202.135.129.0/24"
add list=nice address="202.135.133.0/24"
add list=nice address="202.135.145.0/24"
add list=nice address="202.135.155.0/24"
add list=nice address="202.135.161.0/24"
add list=nice address="202.135.248.0/24"
add list=nice address="202.146.32.0/24"
add list=nice address="202.146.34.0/24"
add list=nice address="202.146.135.0/24"
add list=nice address="202.146.180.0/24"
add list=nice address="202.149.77.0/24"
add list=nice address="202.150.160.0/24"
add list=nice address="202.151.9.0/24"
add list=nice address="202.154.183.0/24"
add list=nice address="202.154.190.0/24"
add list=nice address="202.155.88.0/24"
add list=nice address="202.155.91.0/24"
add list=nice address="202.155.102.0/24"
add list=nice address="202.158.129.0/24"
add list=nice address="202.160.254.0/24"
add list=nice address="202.162.44.0/24"
add list=nice address="202.167.97.0/24"
add list=nice address="202.169.234.0/24"
add list=nice address="202.180.6.0/24"
add list=nice address="202.180.10.0/24"
add list=nice address="202.180.20.0/24"
add list=nice address="202.180.49.0/24"
add list=nice address="203.14.176.0/24"
add list=nice address="203.77.212.0/24"
add list=nice address="203.77.216.0/24"
add list=nice address="203.77.223.0/24"
add list=nice address="203.77.252.0/24"
add list=nice address="203.77.255.0/24"
add list=nice address="203.99.100.0/24"
add list=nice address="203.99.103.0/24"
add list=nice address="203.99.119.0/24"
add list=nice address="203.99.120.0/24"
add list=nice address="203.99.127.0/24"
add list=nice address="203.119.13.0/24"
add list=nice address="203.119.17.0/24"
add list=nice address="203.123.254.0/24"
add list=nice address="203.153.122.0/24"
add list=nice address="203.160.62.0/24"
add list=nice address="203.163.66.0/24"
add list=nice address="203.163.76.0/24"
add list=nice address="203.163.81.0/24"
add list=nice address="203.163.88.0/24"
add list=nice address="203.163.95.0/24"
add list=nice address="203.163.113.0/24"
add list=nice address="203.173.89.0/24"
add list=nice address="203.173.90.0/24"
add list=nice address="203.174.5.0/24"
add list=nice address="203.194.90.0/24"
add list=nice address="205.248.57.0/24"
add list=nice address="205.248.151.0/24"
add list=nice address="205.248.158.0/24"
add list=nice address="206.73.79.0/24"
add list=nice address="206.73.80.0/24"
add list=nice address="206.73.194.0/24"
add list=nice address="206.73.203.0/24"
add list=nice address="206.73.205.0/24"
add list=nice address="206.73.222.0/24"
add list=nice address="206.73.227.0/24"
add list=nice address="206.73.228.0/24"
add list=nice address="206.73.240.0/24"
add list=nice address="206.73.244.0/24"
add list=nice address="206.73.248.0/24"
add list=nice address="206.182.36.0/24"
add list=nice address="207.117.234.0/24"
add list=nice address="218.100.32.0/24"
add list=nice address="222.165.196.0/24"
add list=nice address="222.165.200.0/24"
add list=nice address="222.165.203.0/24"
add list=nice address="222.165.218.0/24"
add list=nice address="222.165.220.0/24"
add list=nice address="222.165.222.0/24"
add list=nice address="222.165.251.0/24"

/ip firewall mangle
add chain=prerouting in-interface=bridge1 dst-address-list=nice action=mark-connection new-connection-mark=conn-iix passthrough=yes
add chain=prerouting connection-mark=conn-iix action=mark-packet new-packet-mark=packet-iix passthrough=no
add chain=prerouting action=mark-packet new-packet-mark=packet-intl passthrough=no

/queue simple
add name="client02-iix" target-addresses=192.168.0.2/32 dst-address=0.0.0.0/0 interface=all parent=none packet-marks=packet-iix priority=8 queue=default-small/default-small limit-at=0/0 max-limit=64000/256000 total-queue=default-small
add name="client02-intl" target-addresses=192.168.0.2/32 dst-address=0.0.0.0/0 interface=all parent=none packet-marks=packet-intl priority=8 queue=default-small/default-small limit-at=0/0 max-limit=32000/128000 total-queue=default-small
 
sumber : http://devilzc0de.org/forum/archive/index.php/thread-592.html

Konfigurasi simple queue dan queue tree

ini adalah configurasi simple queue:


Code:
[kiddies@Mikrotik] queue> simple
[kiddies@Mikrotik] queue simple

add name=”WARNET” target-addresses=192.168.0.0/24 dst-address=0.0.0.0/0 interface=all parent=none direction=both \
priority=8 queue=default-small/default-small limit-at=0/0 max-limit=1000000/1000000 total-queue=default-small \
disabled=no
add name=”USER” target-addresses=192.168.0.2/32,192.168.0.3/32,192.168.0.4/32,192.168.0.5/32,192.168.0.6/32,192.168.0.7/32\
,192.168.0.8/32,192.168.0.9/32,192.168.0.10/32 dst-address=0.0.0.0/0 interface=all parent=WARNET direction=both \
priority=8 queue=default-small/default-small limit-at=0/0 max-limit=384000/384000 total-queue=default-small \
disabled=no
add name=”Client-1″ target-addresses=192.168.0.2/32 dst-address=0.0.0.0/0 interface=Lan parent=USER direction=both \
priority=8 queue=default-small/default-small limit-at=16000/16000 max-limit=32000/64000 total-queue=default-small \
disabled=no

configurasi queue tree

Code:
Mangle

Sebelum kita Meng konfigure Queue Tree kita buat dulu Connection-mark di table mangle.

[kiddies@Mikrotik] > ip firewall mangle
[kiddies@Mikrotik] ip firewall mangle>

add chain=forward src-address=192.168.10.0/24 action=mark-connection new-connection-mark=lokal passthrough=yes comment=”" \
disabled=no
add chain=forward dst-address=192.168.10.0/24 action=mark-connection new-connection-mark=lokal passthrough=yes comment=”" \
disabled=no
add chain=forward protocol=icmp connection-mark=lokal action=mark-packet new-packet-mark=lokal-icmp passthrough=no \
comment=”" disabled=no
add chain=forward src-address=192.168.10.1 protocol=!icmp connection-mark=lokal action=mark-packet \
new-packet-mark=lokal-1 passthrough=no comment=”" disabled=no
add chain=forward dst-address=192.168.10.1 protocol=!icmp connection-mark=lokal action=mark-packet \
new-packet-mark=lokal-1 passthrough=no comment=”" disabled=no
add chain=forward src-address=192.168.10.2 protocol=!icmp connection-mark=lokal action=mark-packet \
new-packet-mark=lokal-2 passthrough=no comment=”" disabled=no
add chain=forward dst-address=192.168.10.2 protocol=!icmp connection-mark=lokal action=mark-packet \
new-packet-mark=lokal-2 passthrough=no comment=”" disabled=no

Queue-tree:

[kiddies@LimiTer] queue> tree

[kiddies@LimiTer] queue tree>
add name=”upload” parent=ether1 packet-mark=”" limit-at=0 queue=default priority=1 max-limit=256000 burst-limit=0 \
burst-threshold=0 burst-time=0s disabled=no
add name=”icmd-upload” parent=upload packet-mark=lokal-icmp limit-at=0 queue=default priority=3 max-limit=32000 \
burst-limit=0 burst-threshold=0 burst-time=0s disabled=no
add name=”lokal-1-upload” parent=upload packet-mark=lokal-1 limit-at=0 queue=default priority=5 max-limit=64000 \
burst-limit=0 burst-threshold=0 burst-time=0s disabled=no
add name=”lokal-2-upload” parent=upload packet-mark=lokal-2 limit-at=0 queue=default priority=5 max-limit=64000 \
burst-limit=0 burst-threshold=0 burst-time=0s disabled=no
add name=”download” parent=global-out packet-mark=”" limit-at=0 queue=default priority=1 max-limit=512000 burst-limit=0 \
burst-threshold=0 burst-time=0s disabled=no
add name=”icmp-download” parent=download packet-mark=lokal-icmp limit-at=0 queue=default priority=3 max-limit=64000 \
burst-limit=0 burst-threshold=0 burst-time=0s disabled=no
add name=”lokal-1-download” parent=download packet-mark=lokal-1 limit-at=0 queue=default priority=5 max-limit=128000 \
burst-limit=0 burst-threshold=0 burst-time=0s disabled=no
add name=”lokal-2-download” parent=download packet-mark=lokal-2 limit-at=0 queue=default priority=5 max-limit=128000 \
burst-limit=0 burst-threshold=0 burst-time=0s disabled=no

Note : Disini anda bisa membuat alokasi bandwith kusus buat icmp download dan upload.
 
 
sumber : http://devilzc0de.org/forum/archive/index.php/thread-471.html