Setting Mikrotik dan Squid Proxy External

Alat Yang di Gunakan :
– Modem Speedy
– RB750 ROS 4.6 atau Mikrotik v5.xx
– Squid proxy yang berjalan transparant pada port 3128 + zph

Topologi :
– Speedy 2M down dan 512 up
– 1M untuk jatah download semua client dengan batasan maksimal 256kbps/client
– Akses tanpa dibatasi limit untuk beberapa IP tertentu (dalam hal ini IP 192.168.2.16 dan 192.168.2.17)
– Browsing tidak dibatasi
– Aplikasi QOS pada outbound/paket yang keluar dari modem speedy

Manifest IP address yang digunakan :
[MODEM]
Public IP Address = 192.168.1.2/24
[CLIENTS]
Client IP Address = 192.168.2.2-192.168.2.17 (ip selain itu tidak konek internet)
[SQUID BOX]
Proxy Ip Address = 192.168.3.2
squid.conf dengan zph
http_port 3128 transparent
zph_mode tos
zph_local 0x30
zph_parent 0
zph_option 136

================Basic Configuration================

/interface ethernet
set 0 comment=”Public Interface” name=Public
set 1 comment=”Local Interface” name=Local
set 2 comment=”Proxy Interface” name=Proxy

/ip address
add address=192.168.2.1/24 broadcast=192.168.2.2 comment=”” disabled=no \
interface=Local network=192.168.2.0
add address=192.168.3.1/24 broadcast=192.168.3.2 comment=”” disabled=no \
interface=Proxy network=192.168.3.0
add address=192.168.1.2/24 broadcast=192.168.1.3 comment=”” disabled=no \
interface=Public network=192.168.1.0

/ip dns
set allow-remote-requests=yes cache-max-ttl=1w cache-size=4096KiB \
max-udp-packet-size=512 servers=”125.160.4.82,203.130.196.155″
(sesuaikan dengan DNS ISP sobat)

/ip route
add gateway=192.168.1.1 comment=”” disabled=no

/ip service
set telnet address=0.0.0.0/0 disabled=yes port=23
set ftp address=0.0.0.0/0 disabled=yes port=21
set www address=0.0.0.0/0 disabled=no port=80
set ssh address=0.0.0.0/0 disabled=yes port=22
set www-ssl address=0.0.0.0/0 certificate=none disabled=yes port=443
set api address=0.0.0.0/0 disabled=yes port=8728
set winbox address=0.0.0.0/0 disabled=no port=8291

/system ntp client
set enabled=yes mode=unicast primary-ntp=152.118.24.8 secondary-ntp=\
202.169.224.16

/ip firewall address-list
add address=192.168.3.1/24 comment=”” disabled=no list=ProxyNET
add address=192.168.2.2-192.168.2.17 comment=”” disabled=no list=localNet
(saya hanya menjalankan client konek internet 2-17 client)

=================end of basic configuration=================

Untuk firewall filternya saya terapkan yang terpentingnya saja.

/ip firewall filter
add action=drop chain=input comment=”Drop Invalid connections” \
connection-state=invalid disabled=no
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”Port scanners to list ” \
disabled=no protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”NMAP FIN Stealth scan” \
disabled=no protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”SYN/FIN scan” disabled=no \
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”SYN/RST scan” disabled=no \
protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”FIN/PSH/URG scan” disabled=\
no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”ALL/ALL scan” disabled=no \
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=”port scanners” \
address-list-timeout=2w chain=input comment=”NMAP NULL scan” disabled=no \
protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment=”Dropping port scanners” disabled=no \
src-address-list=”port scanners”
add action=accept chain=input comment=”Allow Established connections” \
connection-state=established disabled=no
add action=accept chain=input comment=”Allow Related connections” \
connection-state=related disabled=no
add action=accept chain=input comment=”Allow ICMP from LOCAL Network” \
disabled=no protocol=icmp src-address-list=localNet
add action=accept chain=input comment=”Allow ICMP from PROXY Network” \
disabled=no protocol=icmp src-address-list=ProxyNET
add action=accept chain=input comment=”Allow Input from LOCAL Network” \
disabled=no src-address-list=localNet
add action=accept chain=input comment=”Allow Input from PROXY Network” \
disabled=no src-address-list=ProxyNET
add action=drop chain=input comment=”Drop everything else” disabled=no
add action=drop chain=forward comment=”Drop Invalid connections” \
connection-state=invalid disabled=no
add action=jump chain=forward comment=”Bad packets filtering” disabled=no \
jump-target=tcp protocol=tcp
add action=jump chain=forward comment=”” disabled=no jump-target=udp \
protocol=udp
add action=jump chain=forward comment=”” disabled=no jump-target=icmp \
protocol=icmp
add action=drop chain=tcp comment=”deny SMTP” disabled=no dst-port=25 \
protocol=tcp
add action=drop chain=tcp comment=”deny TFTP” disabled=no dst-port=69 \
protocol=tcp
add action=drop chain=tcp comment=”deny RPC portmapper” disabled=no dst-port=\
111 protocol=tcp
add action=drop chain=tcp comment=”deny RPC portmapper” disabled=no dst-port=\
135 protocol=tcp
add action=drop chain=tcp comment=”deny NBT” disabled=no dst-port=137-139 \
protocol=tcp
add action=drop chain=tcp comment=”deny cifs” disabled=no dst-port=445 \
protocol=tcp
add action=drop chain=tcp comment=”deny NFS” disabled=no dst-port=2049 \
protocol=tcp
add action=drop chain=tcp comment=”deny NetBus” disabled=no dst-port=\
12345-12346 protocol=tcp
add action=drop chain=tcp comment=”deny NetBus” disabled=no dst-port=20034 \
protocol=tcp
add action=drop chain=tcp comment=”deny BackOriffice” disabled=no dst-port=\
3133 protocol=tcp
add action=drop chain=tcp comment=”deny DHCP” disabled=no dst-port=67-68 \
protocol=tcp
add action=drop chain=tcp comment=”deny P2P” disabled=no p2p=all-p2p
add action=drop chain=udp comment=”deny TFTP” disabled=no dst-port=69 \
protocol=udp
add action=drop chain=udp comment=”deny PRC portmapper” disabled=no dst-port=\
111 protocol=udp
add action=drop chain=udp comment=”deny PRC portmapper” disabled=no dst-port=\
135 protocol=udp
add action=drop chain=udp comment=”deny NBT” disabled=no dst-port=137-139 \
protocol=udp
add action=drop chain=udp comment=”deny NFS” disabled=no dst-port=2049 \
protocol=udp
add action=drop chain=udp comment=”deny BackOriffice” disabled=no dst-port=\
3133 protocol=udp
add action=accept chain=icmp comment=”limit packets 5/secs” disabled=no \
icmp-options=0:0-255 limit=5,5 protocol=icmp
add action=accept chain=icmp comment=”limit packets 5/secs” disabled=no \
icmp-options=3:0 protocol=icmp
add action=accept chain=icmp comment=”limit packets 5/secs” disabled=no \
icmp-options=3:3 limit=5,5 protocol=icmp
add action=accept chain=icmp comment=”limit packets 5/secs” disabled=no \
icmp-options=3:4 limit=5,5 protocol=icmp
add action=accept chain=icmp comment=”limit packets 5/secs” disabled=no \
icmp-options=8:0-255 limit=5,5 protocol=icmp
add action=accept chain=icmp comment=”limit packets 5/secs” disabled=no \
icmp-options=11:0-255 limit=5,5 protocol=icmp
add action=drop chain=icmp comment=”Drop other icmp packets” disabled=no
add action=accept chain=forward comment=”Allow Established connections” \
connection-state=established disabled=no
add action=accept chain=forward comment=”Allow Forward from LOCAL Network” \
disabled=no src-address-list=localNet
add action=accept chain=forward comment=”Allow Forward from PROXY Network” \
disabled=no src-address-list=ProxyNET
add action=drop chain=forward comment=”Drop everything else” disabled=no

Untuk NAT nya sebagai berikut :

/ip firewall nat
add action=masquerade src-address-list=localNet chain=srcnat comment=”NAT-LOCAL” disabled=no \
out-interface=Public
add action=masquerade src-address-list=ProxyNet chain=srcnat comment=”NAT-PROXY” disabled=no \
out-interface=Public
add action=dst-nat chain=dstnat comment=”TRANSPARENT PROXY” disabled=no \
dst-address-list=!ProxyNET dst-port=80,8080,3128 in-interface=Local \
protocol=tcp to-addresses=192.168.3.2 to-ports=3128
(atau yang saya punya redirect proxy seperti ini :)
add action=dst-nat chain=dstnat comment=”TRANSPARENT PROXY” disabled=no \
src-address=192.168.2.2-192.168.2.17 dst-port=80,8080,3128 in-interface=Local \
protocol=tcp to-addresses=192.168.3.2 to-ports=3128
add action=dst-nat chain=dstnat comment=”TRANSPARENT DNS” disabled=no \
dst-port=53 in-interface=Local protocol=udp to-ports=53
add action=dst-nat chain=dstnat comment=”” disabled=no dst-port=53 \
in-interface=Local protocol=tcp to-ports=53
add action=dst-nat chain=dstnat comment=”” disabled=no dst-port=53 \
in-interface=Proxy protocol=udp to-ports=53
add action=dst-nat chain=dstnat comment=”” disabled=no dst-port=53 \
in-interface=Proxy protocol=tcp to-ports=53

Penjelasan :
- Transparent DNS agar client tidak bisa menggunakan NS selain yang terpasang di mikrotik
  (bisa sobat gunakan atau tidak, tergantung keinginan)
- Mengarahkan request dari client tujuan port 80,8080,3128 ke squid external
  saya beri contoh 2 untuk redirect terserah sobat mo pilih yang mana pastinya keduanya jalan
  jika ada interface lain misalkan hotspot sobat tingal tambahkan tanda ! pada src.address atau   dst.address list

Untuk manglenya biar saya jelaskan satu-persatu biar tidak bingung :

/firewall mangle
add action=mark-packet chain=forward comment=”PROXY-HIT-DSCP 12″ disabled=no \
dscp=12 new-packet-mark=proxy-hit passthrough=no

Menandai paket proxy-hit dari external proxy yang nantinya pada rule queue diberikan kebebasan tanpa proses limitasi
add action=change-dscp chain=postrouting comment=CRITICAL disabled=no \
new-dscp=1 protocol=icmp
add action=change-dscp chain=postrouting comment=”” disabled=no dst-port=53 \
new-dscp=1 protocol=udp
add action=change-dscp chain=postrouting comment=”” disabled=no dst-port=53 \
new-dscp=1 protocol=tcp
add action=mark-connection chain=postrouting comment=”” disabled=no dscp=1 \
new-connection-mark=critical_conn passthrough=yes
add action=mark-packet chain=postrouting comment=”” connection-mark=\
critical_conn disabled=no new-packet-mark=critical_pkt passthrough=no

Menandai paket ICMP dan DNS request untuk diberikan prioritas tertinggi
add action=mark-connection chain=prerouting comment=MARK-ALL-CONN disabled=no \
dst-address-list=!localNet in-interface=Local new-connection-mark=\
all.pre_conn passthrough=yes
add action=mark-connection chain=forward comment=”” disabled=no \
new-connection-mark=all.post_conn out-interface=Local passthrough=yes \
src-address-list=!localNet
add action=mark-packet chain=prerouting comment=”” connection-mark=\
all.pre_conn disabled=no new-packet-mark=all.pre_pkt passthrough=yes
add action=mark-packet chain=forward comment=”” connection-mark=all.post_conn \
disabled=no new-packet-mark=all.post_pkt passthrough=yes

Menandai SEMUA paket keluar masuk dari Local interface SELAIN ke Local Address
add action=mark-connection chain=prerouting comment=GAMES connection-mark=\
all.pre_conn disabled=no dst-port=9339,843 new-connection-mark=games_conn \
passthrough=yes protocol=tcp
add action=mark-connection chain=prerouting comment=”” connection-mark=\
all.pre_conn disabled=no dst-port=40000-40010 new-connection-mark=\
games_conn passthrough=yes protocol=udp
add action=mark-packet chain=forward comment=”” connection-mark=games_conn \
disabled=no new-packet-mark=games_pkt passthrough=no

Menandai Paket GAMES untuk diberikan prioritas KEDUA
add action=mark-connection chain=prerouting comment=HTTP-CLIENT \
connection-mark=all.pre_conn disabled=no new-connection-mark=\
browsing_conn packet-size=0-64 passthrough=yes protocol=tcp tcp-flags=ack
add action=mark-connection chain=prerouting comment=”” connection-mark=\
all.pre_conn disabled=no dst-port=80,443 new-connection-mark=\
browsing_conn passthrough=yes protocol=tcp
add action=mark-packet chain=forward comment=”” connection-bytes=0-131072 \
connection-mark=browsing_conn disabled=no new-packet-mark=browsing_pkt \
passthrough=no protocol=tcp
add action=mark-connection chain=prerouting comment=HTTP-PROXY disabled=no \
dst-address-list=!localNet dst-port=80,443 new-connection-mark=proxy_conn \
passthrough=yes protocol=tcp src-address-list=ProxyNET
add action=mark-packet chain=forward comment=”” connection-mark=proxy_conn \
disabled=no new-packet-mark=proxy_pkt passthrough=no

Menandai paket untuk browsing TERMASUK http req dari external proxy dengan conn-byte=0-131072 serta paket-paket protocol tcp yang berukuran kecil (packet-size=0-64 tcp-flags=ack) untuk diberikan prioritas KETIGA
add action=mark-connection chain=prerouting comment=REALTIME connection-mark=\
all.pre_conn disabled=no dst-port=22,179,110,161,8291 \
new-connection-mark=realtime_conn passthrough=yes protocol=tcp
add action=mark-connection chain=prerouting comment=”” connection-mark=\
all.pre_conn disabled=no dst-port=123 new-connection-mark=realtime_conn \
passthrough=yes protocol=udp
add action=mark-packet chain=forward comment=”” connection-mark=realtime_conn \
disabled=no new-packet-mark=realtime_pkt passthrough=no

Menandai paket-paket REALTIME ACCESS untuk diberikan prioritas KEEMPAT
add action=mark-connection chain=prerouting comment=FILETRANSER \
connection-mark=all.pre_conn disabled=no dst-port=20,21,23 \
new-connection-mark=communication_conn passthrough=yes protocol=tcp
add action=mark-packet chain=forward comment=”” connection-mark=\
communication_conn disabled=no new-packet-mark=communication_pkt \
passthrough=no

Menandai paket-paket FILETRANSFER untuk diberikan prioritas KELIMA
add action=mark-connection chain=prerouting comment=NORMAL connection-mark=\
all.pre_conn disabled=no dst-address-list=!ProxyNET new-connection-mark=\
normal_conn passthrough=yes
add action=mark-packet chain=forward comment=”” connection-mark=normal_conn \
disabled=no new-packet-mark=normal_pkt passthrough=no

Menandai semua paket yang tersisa SELAIN tujuan Proxy untuk diberikan prioritas KEENAM
add action=mark-packet chain=forward comment=DOWNLOAD connection-bytes=\
131072-4294967295 connection-mark=all.post_conn disabled=no dst-address=\
192.168.2.2 new-packet-mark=client1 passthrough=no protocol=tcp
add action=mark-packet chain=forward comment=”” connection-bytes=\
131072-4294967295 connection-mark=all.post_conn disabled=no dst-address=\
192.168.2.3 new-packet-mark=client2 passthrough=no protocol=tcp
………………..dst sampai jumlah client yang di perlukanterpenuhi
add action=mark-packet chain=forward comment=DOWNLOAD-NO-LIMIT connection-bytes=\
131072-4294967295 connection-mark=all.post_conn disabled=no dst-address=\
192.168.2.16 new-packet-mark=client16 passthrough=no protocol=tcp
add action=mark-packet chain=forward comment=”” connection-bytes=\
131072-4294967295 connection-mark=all.post_conn disabled=no dst-address=\
192.168.2.17 new-packet-mark=client17 passthrough=no protocol=tcp

Menandai paket protocol tcp yang diteruskan ke client untuk memberikan batasan download pada masing-masing client dengan conn-byte=131072-4294967295
Setelah itu buat queue type nya
/queue type
add kind=pcq name=pcq_up pcq-classifier=src-address pcq-limit=200 pcq-rate=0 \
pcq-total-limit=8000
add kind=pcq name=pcq_down pcq-classifier=dst-address pcq-limit=200 pcq-rate=\
0 pcq-total-limit=8000
add kind=pfifo name=pfifo-critical pfifo-limit=10
add kind=pcq name=pcq_critical.up pcq-classifier=src-address,src-port \
pcq-limit=20 pcq-rate=0 pcq-total-limit=500
add kind=pcq name=pcq_critical.down pcq-classifier=dst-address,dst-port \
pcq-limit=20 pcq-rate=0 pcq-total-limit=500
di lanjut menambahkan queue tree nya…..
/queue tree
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”A. PROXY HIT” packet-mark=proxy-hit parent=Local \
priority=1 queue=default
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”B. CRITICAL” packet-mark=critical_pkt parent=Public \
priority=1 queue=pfifo-critical

Tanpa limit dengan prioritas pertama untuk proxy hit dan critical

add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”C. INBOUND” packet-mark=all.post_pkt parent=global-out \
priority=8
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”D. OUTBOUND” packet-mark=all.pre_pkt parent=Public \
priority=8

Membuat parent untuk inbound (traffic masuk ke client) dan outbound (traffic keluar dari public)
Untuk child INBOUND nya saya bagi menjadi beberapa prioritas seperti berikut :

add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”A. GAMES” packet-mark=games_pkt parent=”C. INBOUND” \
priority=2 queue=pcq_critical.down
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”B. HTTP” packet-mark=browsing_pkt parent=”C. INBOUND” \
priority=3 queue=pcq_down
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=64k \
max-limit=128k name=”C. REALTIME” packet-mark=realtime_pkt parent=\
“C. INBOUND” priority=4 queue=pcq_critical.down
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=64k \
max-limit=128k name=”D. FILETRANS” packet-mark=communication_pkt parent=\
“C. INBOUND” priority=5 queue=pcq_down
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=64k \
max-limit=128k name=”E. NORMAL” packet-mark=normal_pkt parent=\
“C. INBOUND” priority=6 queue=pcq_down

selanjutnya parent untuk download per client nya :

add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=1024k name=”F. DOWN 1M” parent=”C. INBOUND” priority=8
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”G. DOWN 2M” parent=”C. INBOUND” priority=8

membuat 2 parent untuk 1M dan 2M (atau tanpa limit)
Setelah itu buat child nya, untuk memberikan batasan download per clientnya

add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=256k name=Client1 packet-mark=client1 parent=\
“F. DOWN 1M” priority=8 queue=pcq_down
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=256k name=Client2 packet-mark=client2 parent=\
“F. DOWN 1M” priority=8 queue=pcq_down

…………………..dst sampai semua paket ke client yang di perlukan terpenuhi
Batasan download sebesar 1M untuk semua client dan maksimum 256k per client

add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=Client16 packet-mark=client16 parent=\
“G. DOWN 2M” priority=8 queue=pcq_down
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=Client17 packet-mark=client17 parent=\
“G. DOWN 2M” priority=8 queue=pcq_down

Tanpa batasan download untuk IP 192.168.2.16 dan 192.168.2.17
Kemudiam membuat limit untuk uploadnya

add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 \
max-limit=0 name=”A. GAMES UP” packet-mark=games_pkt parent=”D. OUTBOUND” \
priority=2 queue=pcq_critical.up
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=64k \
max-limit=256k name=”B. HTTP UP” packet-mark=proxy_pkt parent=\
“D. OUTBOUND” priority=3 queue=pcq_up
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=32k \
max-limit=64k name=”C. REALTIME UP” packet-mark=realtime_pkt parent=\
“D. OUTBOUND” priority=4 queue=pcq_critical.up
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=64k \
max-limit=128k name=”D. FILETRANS UP” packet-mark=communication_pkt \
parent=”D. OUTBOUND” priority=5 queue=pcq_up
add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=64k \
max-limit=128k name=”E. NORMAL UP” packet-mark=normal_pkt parent=\
“D. OUTBOUND” priority=6 queue=pcq_up

C a t a t a n
- Silahkan sobat sesuaikan Untuk IP ADDRESS, Nama Ethernet. dll
- Tanda Hijau Biru dan Merah sengaja saya tandai agar sobat tidak tertukar jika sobat sudah memberi nama lain (maksudnya harus di sesuaikan)
- Tanda Jingga da Ping harus sama dengan yang ada di address list (jika sobat mengganti dengan nama lain)
- Silahkan sobat Kopi script yang saya buat dan pastekan dahulu di notepad (maksudnya di di hilangkan keterangan-keteranganya, buat satu block satu block biar tidak pusing eheheh)

About these ads
Ditulis dalam Mikrotik. 9 Comments »

9 Tanggapan to “Setting Mikrotik dan Squid Proxy External”

  1. bobbiqu Says:

    salam kenal bos. ane mau nanya boleh ya bos
    itu pake linux apa ya bos, trimksh
    nls ke email saya ya bos

  2. ineb Says:

    met siang mas, mo tanya donk saya coba ngebelokin dr mikrotik ke eksternal proxy dan bisa jalan, tetapi kenapa traffic HTTPS nya seperti di blok yah? saya sudah menambahkan port 443 selain 40,4040,3128 namun hasilnya tetap sama, kira2 salah dmn yah? terima kasih sebelumnya

  3. dian Says:

    kalau saya pakai proxy bawaan mikrotik 2.9.27 bisa diterapkan gk mas.untuk managemant banwidt pakai rb750.trus script ini lanagsung kopas dari new terminal .tak tunggu yo… maturnuwunnnnn…

  4. sastra Says:

    apa isi squid.conf cukup 4 baris itu saja?
    kalo ada lainnya tlg dong kirim ke email ku.
    trims.

  5. Zulhairy Z Says:

    terima kasih mas, tutorialnya bagus banget, yang jadi pertanyaan saya untuk rule redirect proxy yang benar yang diberi tanda pentung ip proxy external diletakkan di scr address atau dst address. krn dari beberapa informasi yg saya dapatkan dari google ada yg meletakkan di scr address dan yang rule dari mas diletakkan di dst address. saya sudah coba keduanya tetap proxy external bisa berjalan. jadi diletakkan di mana yang benarnya ip proxy yang diberikan tanda pentung. terima kasih….

  6. mikrotik Says:

    bagi yang ingin settingan terbaru proxy dengan cache youtube 1hit full (no-range) dan mikrotik bisa add YM saya : spider84_gun@live.com
    atau FB saya http://www.facebook.com/mikrotik.medan

  7. kuasadewa Says:

    tutorial yang bagus. Konfigurasi yang saya gunakan yaitu untuk dst-nat yang mengarahkan ke squid-proxy eksternal dan beberapa konfigurasi firewall. Untuk firewall saya gunakan versi saya sendiri dengan mengacu pada konsep inclusive dan exclusive. Banyak konfigurasi firewall default saya peroleh dari situs resmi mikrotik (versi help-nya). Namun untuk mangle dan queue, masih belum paham bagaimana cara menggunakannya. Saya lebih senang menggunakan istilah QoS dan Traffic Shapping yang menggunakan alat mangle dan queue di mikrotik.
    By the way, cool bro …

  8. zulhairy Says:

    yang ini : conn-byte=131072-4294967295. mohon bantuan penjelasannya, dan bagaimana hitung-hitungannya jika koneksi yang di gunakan 512 kbps untuk 15 client. terima kasih tutorial diatas mas,. brafo…

  9. hendy Says:

    tengkyu mas tutorial nya keren nih aku dah coba berhasil.tp kenapa yah download yg udah ke hit koq tetep ke limit yah


Tinggalkan Balasan

Isikan data di bawah atau klik salah satu ikon untuk log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Logout / Ubah )

Twitter picture

You are commenting using your Twitter account. Logout / Ubah )

Facebook photo

You are commenting using your Facebook account. Logout / Ubah )

Google+ photo

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s

Ikuti

Get every new post delivered to your Inbox.

Bergabunglah dengan 539 pengikut lainnya.

%d bloggers like this: