How to detect and block Ultra Surf Vpn on Mikrotik
Detect and Block UltraSurf program traffic
/ip firewall filter
add action=drop chain=forward comment=”Block UltraSurf” disabled=no dst-port=\
443 protocol=tcp src-address-list=UltraSurfUsers
/ip firewall mangle
add action=add-src-to-address-list address-list=UltraSurfUsers \
address-list-timeout=5m chain=prerouting comment=UltraSurfUsers disabled=\
no dst-address-list=UltraSurfServers dst-port=443 protocol=tcp
/ip firewall address-list
add address=65.49.0.0/17 comment=”" disabled=no list=UltraSurfServers
add address=204.107.140.0/24 comment=”" disabled=no list=UltraSurfServers
————————————————
Block DNS
/ip firewall filter
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.194.50 dst-port=53 protocol=tcp
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.194.50 dst-port=53 protocol=udp
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.192.50 dst-port=53 protocol=tcp
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.192.50 dst-port=53 protocol=udp
add action=drop chain=forward comment=DNS disabled=no dst-port=53 protocol=tcp
add action=drop chain=forward comment=DNS disabled=no dst-port=53 protocol=udp
/ip firewall filter
add action=drop chain=forward comment=”Block UltraSurf” disabled=no dst-port=\
443 protocol=tcp src-address-list=UltraSurfUsers
/ip firewall mangle
add action=add-src-to-address-list address-list=UltraSurfUsers \
address-list-timeout=5m chain=prerouting comment=UltraSurfUsers disabled=\
no dst-address-list=UltraSurfServers dst-port=443 protocol=tcp
/ip firewall address-list
add address=65.49.0.0/17 comment=”" disabled=no list=UltraSurfServers
add address=204.107.140.0/24 comment=”" disabled=no list=UltraSurfServers
————————————————
Block DNS
/ip firewall filter
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.194.50 dst-port=53 protocol=tcp
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.194.50 dst-port=53 protocol=udp
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.192.50 dst-port=53 protocol=tcp
add action=accept chain=forward comment=DNS disabled=no dst-address=198.153.192.50 dst-port=53 protocol=udp
add action=drop chain=forward comment=DNS disabled=no dst-port=53 protocol=tcp
add action=drop chain=forward comment=DNS disabled=no dst-port=53 protocol=udp
The client can then scan any Internet webpage regularly utilizing IE. Every single activity channel through the nearby Ultrasurf intermediary. Since the activity in the middle of Ultrasurf and IE is altogether on the localhost, it never goes to the system and can't be hindered by a system gadget.
ReplyDeleteUltrasurf then sets up a scrambled association with a remote server in its system of intermediary servers
The association with the remote intermediary server is made over port 443, which is the standard HTTPS port
write my paper for cheap