|
我在win7 win10 win11 winServer08R2 winSerVer2012 WinServer2016上都测试过均有次情况的,且被勒索基本都是内网穿透这一点未能拦截是一个大漏洞 以下是我的规则
{
"ver":"6.0",
"tag":"ipproto",
"data":[
{
"rport":"*",
"recname":"禁用3389",
"priority":2,
"laddr":"*",
"direction":1,
"tmp_field_sel":true,
"enabled":true,
"protocol":260,
"procname":"*",
"tmp_field_desc_detail":"本地IP:任意IP 本地端口:3389 远程IP:任意IP 远程端口:任意端口 ",
"log":true,
"block":1,
"icmp_type":0,
"lport":"3389",
"raddr":"*",
"notlog":false,
"tmp_field_desc_overview":"操作:阻止 方向:入站 协议:TCP/UDP",
"id":1
},
{
"rport":"*",
"priority":1,
"recname":"允许",
"laddr":"*",
"direction":0,
"tmp_field_sel":true,
"enabled":true,
"protocol":260,
"procname":"*",
"block":0,
"log":true,
"tmp_field_desc_detail":"本地IP:任意IP 本地端口:3389 远程IP:192.168.202.0/24 远程端口:任意端口 ",
"lport":"3389",
"icmp_type":0,
"raddr":"192.168.202.0/24",
"notlog":false,
"tmp_field_desc_overview":"操作:放行 方向:所有 协议:TCP/UDP",
"id":2
}
]
} |
|