Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- {
- "kernel": "5.4.119",
- "hostname": "OpenWrt",
- "system": "MediaTek MT7621 ver:1 eco:3",
- "model": "Netgear R6220",
- "board_name": "netgear,r6220",
- "release": {
- "distribution": "OpenWrt",
- "version": "21.02.0-rc2",
- "revision": "r16122-c2139eef27",
- "target": "ramips/mt7621",
- "description": "OpenWrt 21.02.0-rc2 r16122-c2139eef27"
- }
- }
- network.loopback=interface
- network.loopback.device='lo'
- network.loopback.proto='static'
- network.loopback.ipaddr='127.0.0.1'
- network.loopback.netmask='255.0.0.0'
- network.globals=globals
- network.globals.packet_steering='1'
- network.globals.ula_prefix='fdad:74db:da17::/48'
- network.@device[0]=device
- network.@device[0].name='br-lan'
- network.@device[0].type='bridge'
- network.@device[0].ports='lan1' 'lan2' 'lan3' 'lan4'
- network.lan=interface
- network.lan.device='br-lan'
- network.lan.proto='static'
- network.lan.netmask='255.255.255.0'
- network.lan.ip6assign='60'
- network.lan.ipaddr='10.192.168.1'
- network.wan=interface
- network.wan.device='wan'
- network.wan.proto='dhcp'
- network.wan.peerdns='0'
- network.wan6=interface
- network.wan6.device='wan'
- network.wan6.proto='dhcpv6'
- network.@route[0]=route
- network.@route[0].interface='lan'
- network.@route[0].target='10.192.169.0'
- network.@route[0].netmask='255.255.255.0'
- network.@route[0].gateway='10.192.168.197'
- network.wg0=interface
- network.wg0.proto='wireguard'
- network.wg0.private_key=''
- network.wg0.listen_port='56913'
- network.wg0.addresses='192.168.5.8'
- network.@wireguard_wg0[0]=wireguard_wg0
- network.@wireguard_wg0[0].description='Water'
- network.@wireguard_wg0[0].public_key='mmNRuGe4vfIOre/8u/2xuaUAAJAXIwsJXdzoBpPG5U8='
- network.@wireguard_wg0[0].endpoint_host='water.com'
- network.@wireguard_wg0[0].endpoint_port='56914'
- network.@wireguard_wg0[0].persistent_keepalive='25'
- network.@wireguard_wg0[0].allowed_ips='0.0.0.0/0' '::/0'
- network.@wireguard_wg0[0].route_allowed_ips='1'
- dhcp.@dnsmasq[0]=dnsmasq
- dhcp.@dnsmasq[0].domainneeded='1'
- dhcp.@dnsmasq[0].localise_queries='1'
- dhcp.@dnsmasq[0].rebind_protection='1'
- dhcp.@dnsmasq[0].rebind_localhost='1'
- dhcp.@dnsmasq[0].expandhosts='1'
- dhcp.@dnsmasq[0].authoritative='1'
- dhcp.@dnsmasq[0].readethers='1'
- dhcp.@dnsmasq[0].leasefile='/tmp/dhcp.leases'
- dhcp.@dnsmasq[0].domain='feeney'
- dhcp.@dnsmasq[0].ednspacket_max='1232'
- dhcp.@dnsmasq[0].local='/feeney/'
- dhcp.@dnsmasq[0].resolvfile='/tmp/resolv.conf.d/resolv.conf.auto'
- dhcp.@dnsmasq[0].nohosts='1'
- dhcp.@dnsmasq[0].logqueries='1'
- dhcp.@dnsmasq[0].localservice='1'
- dhcp.lan=dhcp
- dhcp.lan.interface='lan'
- dhcp.lan.start='200'
- dhcp.lan.limit='54'
- dhcp.lan.leasetime='5h'
- dhcp.wan=dhcp
- dhcp.wan.interface='wan'
- dhcp.wan.ignore='1'
- dhcp.odhcpd=odhcpd
- dhcp.odhcpd.maindhcp='0'
- dhcp.odhcpd.leasefile='/tmp/hosts/odhcpd'
- dhcp.odhcpd.leasetrigger='/usr/sbin/odhcpd-update'
- dhcp.odhcpd.loglevel='4'
- dhcp.@host[0]=host
- dhcp.@host[0].mac='A0:CC:2B:6B:67:48'
- dhcp.@host[0].name='aquanta'
- dhcp.@host[0].dns='1'
- dhcp.@host[0].ip='10.192.168.10'
- firewall.@defaults[0]=defaults
- firewall.@defaults[0].input='ACCEPT'
- firewall.@defaults[0].output='ACCEPT'
- firewall.@defaults[0].forward='REJECT'
- firewall.@defaults[0].synflood_protect='1'
- firewall.@zone[0]=zone
- firewall.@zone[0].name='lan'
- firewall.@zone[0].network='lan'
- firewall.@zone[0].input='ACCEPT'
- firewall.@zone[0].output='ACCEPT'
- firewall.@zone[0].forward='ACCEPT'
- firewall.@zone[1]=zone
- firewall.@zone[1].name='wan'
- firewall.@zone[1].network='wan' 'wan6'
- firewall.@zone[1].input='REJECT'
- firewall.@zone[1].output='ACCEPT'
- firewall.@zone[1].forward='REJECT'
- firewall.@zone[1].masq='1'
- firewall.@zone[1].mtu_fix='1'
- firewall.@forwarding[0]=forwarding
- firewall.@forwarding[0].src='lan'
- firewall.@forwarding[0].dest='wan'
- firewall.@rule[0]=rule
- firewall.@rule[0].name='Allow-DHCP-Renew'
- firewall.@rule[0].src='wan'
- firewall.@rule[0].proto='udp'
- firewall.@rule[0].dest_port='68'
- firewall.@rule[0].target='ACCEPT'
- firewall.@rule[0].family='ipv4'
- firewall.@rule[1]=rule
- firewall.@rule[1].name='Allow-Ping'
- firewall.@rule[1].src='wan'
- firewall.@rule[1].proto='icmp'
- firewall.@rule[1].icmp_type='echo-request'
- firewall.@rule[1].family='ipv4'
- firewall.@rule[1].target='ACCEPT'
- firewall.@rule[2]=rule
- firewall.@rule[2].name='Allow-IGMP'
- firewall.@rule[2].src='wan'
- firewall.@rule[2].proto='igmp'
- firewall.@rule[2].family='ipv4'
- firewall.@rule[2].target='ACCEPT'
- firewall.@rule[3]=rule
- firewall.@rule[3].name='Allow-DHCPv6'
- firewall.@rule[3].src='wan'
- firewall.@rule[3].proto='udp'
- firewall.@rule[3].src_ip='fc00::/6'
- firewall.@rule[3].dest_ip='fc00::/6'
- firewall.@rule[3].dest_port='546'
- firewall.@rule[3].family='ipv6'
- firewall.@rule[3].target='ACCEPT'
- firewall.@rule[4]=rule
- firewall.@rule[4].name='Allow-MLD'
- firewall.@rule[4].src='wan'
- firewall.@rule[4].proto='icmp'
- firewall.@rule[4].src_ip='fe80::/10'
- firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
- firewall.@rule[4].family='ipv6'
- firewall.@rule[4].target='ACCEPT'
- firewall.@rule[5]=rule
- firewall.@rule[5].name='Allow-ICMPv6-Input'
- firewall.@rule[5].src='wan'
- firewall.@rule[5].proto='icmp'
- firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
- firewall.@rule[5].limit='1000/sec'
- firewall.@rule[5].family='ipv6'
- firewall.@rule[5].target='ACCEPT'
- firewall.@rule[6]=rule
- firewall.@rule[6].name='Allow-ICMPv6-Forward'
- firewall.@rule[6].src='wan'
- firewall.@rule[6].dest='*'
- firewall.@rule[6].proto='icmp'
- firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
- firewall.@rule[6].limit='1000/sec'
- firewall.@rule[6].family='ipv6'
- firewall.@rule[6].target='ACCEPT'
- firewall.@rule[7]=rule
- firewall.@rule[7].name='Allow-IPSec-ESP'
- firewall.@rule[7].src='wan'
- firewall.@rule[7].dest='lan'
- firewall.@rule[7].proto='esp'
- firewall.@rule[7].target='ACCEPT'
- firewall.@rule[8]=rule
- firewall.@rule[8].name='Allow-ISAKMP'
- firewall.@rule[8].src='wan'
- firewall.@rule[8].dest='lan'
- firewall.@rule[8].dest_port='500'
- firewall.@rule[8].proto='udp'
- firewall.@rule[8].target='ACCEPT'
- firewall.@rule[9]=rule
- firewall.@rule[9].name='Support-UDP-Traceroute'
- firewall.@rule[9].src='wan'
- firewall.@rule[9].dest_port='33434:33689'
- firewall.@rule[9].proto='udp'
- firewall.@rule[9].family='ipv4'
- firewall.@rule[9].target='REJECT'
- firewall.@rule[9].enabled='false'
- firewall.@include[0]=include
- firewall.@include[0].path='/etc/firewall.user'
- firewall.@redirect[0]=redirect
- firewall.@redirect[0].target='DNAT'
- firewall.@redirect[0].src='wan'
- firewall.@redirect[0].dest='lan'
- firewall.@redirect[0].proto='tcp'
- firewall.@redirect[0].src_dport='80'
- firewall.@redirect[0].dest_ip='10.192.168.197'
- firewall.@redirect[0].dest_port='80'
- firewall.@redirect[0].name='http'
- firewall.@redirect[1]=redirect
- firewall.@redirect[1].target='DNAT'
- firewall.@redirect[1].src='wan'
- firewall.@redirect[1].dest='lan'
- firewall.@redirect[1].proto='tcp'
- firewall.@redirect[1].src_dport='443'
- firewall.@redirect[1].dest_ip='10.192.168.197'
- firewall.@redirect[1].dest_port='443'
- firewall.@redirect[1].name='https'
- firewall.@redirect[2]=redirect
- firewall.@redirect[2].target='DNAT'
- firewall.@redirect[2].src='wan'
- firewall.@redirect[2].dest='lan'
- firewall.@redirect[2].proto='tcp'
- firewall.@redirect[2].src_dport='22'
- firewall.@redirect[2].dest_ip='10.192.168.197'
- firewall.@redirect[2].dest_port='22'
- firewall.@redirect[2].name='ssh'
- firewall.@redirect[3]=redirect
- firewall.@redirect[3].target='DNAT'
- firewall.@redirect[3].src='wan'
- firewall.@redirect[3].dest='lan'
- firewall.@redirect[3].proto='udp'
- firewall.@redirect[3].src_dport='1194'
- firewall.@redirect[3].dest_ip='10.192.168.197'
- firewall.@redirect[3].dest_port='1194'
- firewall.@redirect[3].name='ovpbn-udp'
- firewall.@redirect[4]=redirect
- firewall.@redirect[4].target='DNAT'
- firewall.@redirect[4].src='wan'
- firewall.@redirect[4].dest='lan'
- firewall.@redirect[4].proto='tcp'
- firewall.@redirect[4].src_dport='993'
- firewall.@redirect[4].dest_ip='10.192.168.197'
- firewall.@redirect[4].dest_port='993'
- firewall.@redirect[4].name='ovpn-tcp'
- firewall.@redirect[5]=redirect
- firewall.@redirect[5].target='DNAT'
- firewall.@redirect[5].src='wan'
- firewall.@redirect[5].dest='lan'
- firewall.@redirect[5].proto='tcp udp'
- firewall.@redirect[5].src_dport='4080'
- firewall.@redirect[5].dest_ip='10.192.168.20'
- firewall.@redirect[5].dest_port='4080'
- firewall.@redirect[5].name='tivo-1'
- firewall.@redirect[6]=redirect
- firewall.@redirect[6].target='DNAT'
- firewall.@redirect[6].src='wan'
- firewall.@redirect[6].dest='lan'
- firewall.@redirect[6].proto='tcp'
- firewall.@redirect[6].src_dport='4413'
- firewall.@redirect[6].dest_ip='10.192.168.20'
- firewall.@redirect[6].dest_port='413'
- firewall.@redirect[6].name='tivo-2'
- firewall.@redirect[7]=redirect
- firewall.@redirect[7].target='DNAT'
- firewall.@redirect[7].src='wan'
- firewall.@redirect[7].dest='lan'
- firewall.@redirect[7].proto='tcp'
- firewall.@redirect[7].src_dport='4443'
- firewall.@redirect[7].dest_ip='10.192.168.20'
- firewall.@redirect[7].dest_port='443'
- firewall.@redirect[7].name='tivo-3'
- firewall.@redirect[8]=redirect
- firewall.@redirect[8].target='DNAT'
- firewall.@redirect[8].src='wan'
- firewall.@redirect[8].dest='lan'
- firewall.@redirect[8].proto='tcp udp'
- firewall.@redirect[8].src_dport='53'
- firewall.@redirect[8].dest_ip='10.192.168.197'
- firewall.@redirect[8].dest_port='53'
- firewall.@redirect[8].name='ovpn-tcp1'
- firewall.@redirect[9]=redirect
- firewall.@redirect[9].target='DNAT'
- firewall.@redirect[9].src='wan'
- firewall.@redirect[9].dest='lan'
- firewall.@redirect[9].proto='tcp'
- firewall.@redirect[9].src_dport='110'
- firewall.@redirect[9].dest_ip='10.192.168.197'
- firewall.@redirect[9].dest_port='53'
- firewall.@redirect[9].name='ovpn-tcp2'
- firewall.@redirect[10]=redirect
- firewall.@redirect[10].target='DNAT'
- firewall.@redirect[10].src='wan'
- firewall.@redirect[10].dest='lan'
- firewall.@redirect[10].proto='tcp'
- firewall.@redirect[10].src_dport='5004'
- firewall.@redirect[10].dest_ip='10.192.168.198'
- firewall.@redirect[10].name='trac1'
- firewall.@redirect[10].dest_port='5023'
- firewall.@redirect[11]=redirect
- firewall.@redirect[11].target='DNAT'
- firewall.@redirect[11].src='wan'
- firewall.@redirect[11].dest='lan'
- firewall.@redirect[11].proto='tcp udp'
- firewall.@redirect[11].src_dport='5023'
- firewall.@redirect[11].dest_ip='10.192.168.198'
- firewall.@redirect[11].dest_port='5023'
- firewall.@redirect[11].name='trac2'
- firewall.@redirect[12]=redirect
- firewall.@redirect[12].target='DNAT'
- firewall.@redirect[12].src='wan'
- firewall.@redirect[12].dest='lan'
- firewall.@redirect[12].proto='tcp udp'
- firewall.@redirect[12].src_dport='5031'
- firewall.@redirect[12].dest_ip='10.192.168.198'
- firewall.@redirect[12].dest_port='5031'
- firewall.@redirect[12].name='trac3'
- firewall.@redirect[13]=redirect
- firewall.@redirect[13].target='DNAT'
- firewall.@redirect[13].src='wan'
- firewall.@redirect[13].dest='lan'
- firewall.@redirect[13].proto='tcp udp'
- firewall.@redirect[13].src_dport='5036'
- firewall.@redirect[13].dest_ip='10.192.168.198'
- firewall.@redirect[13].dest_port='5036'
- firewall.@redirect[13].name='trac4'
- firewall.@redirect[14]=redirect
- firewall.@redirect[14].target='DNAT'
- firewall.@redirect[14].src='wan'
- firewall.@redirect[14].dest='lan'
- firewall.@redirect[14].proto='tcp udp'
- firewall.@redirect[14].src_dport='5055'
- firewall.@redirect[14].dest_ip='10.192.168.198'
- firewall.@redirect[14].dest_port='5055'
- firewall.@redirect[14].name='trac5'
- firewall.@redirect[15]=redirect
- firewall.@redirect[15].target='DNAT'
- firewall.@redirect[15].src='wan'
- firewall.@redirect[15].dest='lan'
- firewall.@redirect[15].proto='tcp'
- firewall.@redirect[15].src_dport='25'
- firewall.@redirect[15].dest_ip='10.192.168.197'
- firewall.@redirect[15].dest_port='25'
- firewall.@redirect[15].name='smtp'
- firewall.@redirect[16]=redirect
- firewall.@redirect[16].dest_port='4949'
- firewall.@redirect[16].src='wan'
- firewall.@redirect[16].name='munin'
- firewall.@redirect[16].src_dport='4949'
- firewall.@redirect[16].target='DNAT'
- firewall.@redirect[16].dest_ip='10.192.168.230'
- firewall.@redirect[16].dest='lan'
- firewall.@redirect[16].proto='tcp udp'
- firewall.@redirect[17]=redirect
- firewall.@redirect[17].src='wan'
- firewall.@redirect[17].name='wireguard'
- firewall.@redirect[17].target='DNAT'
- firewall.@redirect[17].dest='lan'
- firewall.@redirect[17].dest_ip='10.192.168.197'
- firewall.@redirect[17].proto='tcp udp'
- firewall.@redirect[17].dest_port='56914'
- firewall.@redirect[17].src_dport='56914'
- firewall.@rule[10]=rule
- firewall.@rule[10].dest_port='55955'
- firewall.@rule[10].src='wan'
- firewall.@rule[10].name='wireguard 55955'
- firewall.@rule[10].target='ACCEPT'
- firewall.@rule[10].proto='udp'
- firewall.@rule[11]=rule
- firewall.@rule[11].dest_port='56914'
- firewall.@rule[11].src='wan'
- firewall.@rule[11].target='ACCEPT'
- firewall.@rule[11].proto='udp'
- firewall.@rule[11].name='wireguard water 56914'
- firewall.wg=rule
- firewall.wg.name='Allow-WireGuard'
- firewall.wg.src='wan'
- firewall.wg.dest_port='56913'
- firewall.wg.proto='udp'
- firewall.wg.target='ACCEPT'
- firewall.@forwarding[1]=forwarding
- firewall.@forwarding[1].dest='wan'
- firewall.@forwarding[1].src='lan'
- firewall.@redirect[18]=redirect
- firewall.@redirect[18].dest_port='8883'
- firewall.@redirect[18].src='wan'
- firewall.@redirect[18].name='mosquitto'
- firewall.@redirect[18].src_dport='8883'
- firewall.@redirect[18].target='DNAT'
- firewall.@redirect[18].dest_ip='10.192.168.198'
- firewall.@redirect[18].dest='lan'
- firewall.@zone[2]=zone
- firewall.@zone[2].name='wgclient'
- firewall.@zone[2].input='REJECT'
- firewall.@zone[2].output='REJECT'
- firewall.@zone[2].forward='ACCEPT'
- firewall.@zone[2].masq='1'
- firewall.@zone[2].network='wg0'
- firewall.@forwarding[2]=forwarding
- firewall.@forwarding[2].src='lan'
- firewall.@forwarding[2].dest='wgclient'
- firewall.@redirect[19]=redirect
- firewall.@redirect[19].target='DNAT'
- firewall.@redirect[19].name='amcrest'
- firewall.@redirect[19].src='wan'
- firewall.@redirect[19].src_dport='37890'
- firewall.@redirect[19].dest='lan'
- firewall.@redirect[19].dest_ip='10.192.168.21'
- firewall.@redirect[19].dest_port='37777'
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1504 qdisc fq_codel state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:50 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::1659:c0ff:fec8:c250/64 scope link
- valid_lft forever preferred_lft forever
- 3: lan4@eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue master br-lan state LOWERLAYERDOWN group default qlen 1000
- link/ether 14:59:c0:c8:c2:50 brd ff:ff:ff:ff:ff:ff
- 4: lan3@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:50 brd ff:ff:ff:ff:ff:ff
- 5: lan2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:50 brd ff:ff:ff:ff:ff:ff
- 6: lan1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:50 brd ff:ff:ff:ff:ff:ff
- 7: wan@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:51 brd ff:ff:ff:ff:ff:ff
- inet 71.190.236.237/24 brd 71.190.237.255 scope global wan
- valid_lft forever preferred_lft forever
- inet6 fe80::1659:c0ff:fec8:c251/64 scope link
- valid_lft forever preferred_lft forever
- 9: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:50 brd ff:ff:ff:ff:ff:ff
- inet 192.168.168.1/24 brd 192.168.168.255 scope global br-lan
- valid_lft forever preferred_lft forever
- inet6 fdad:74db:da17::1/60 scope global noprefixroute
- valid_lft forever preferred_lft forever
- inet6 fe80::1659:c0ff:fec8:c250/64 scope link
- valid_lft forever preferred_lft forever
- 10: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
- link/none
- inet 192.168.5.8/32 brd 255.255.255.255 scope global wg0
- valid_lft forever preferred_lft forever
- 11: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether 14:59:c0:c8:c2:54 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::1659:c0ff:fec8:c254/64 scope link
- valid_lft forever preferred_lft forever
- default dev wg0 proto static scope link
- 10.192.168.0/24 dev br-lan proto kernel scope link src 192.168.168.1
- 10.192.169.0/24 via 192.168.168.197 dev br-lan proto static
- 71.190.237.0/24 dev wan proto kernel scope link src 71.190.236.237
- 82.13.137.3 via 71.190.237.1 dev wan proto static
- broadcast 192.168.168.0 dev br-lan table local proto kernel scope link src 192.168.168.1
- local 192.168.168.1 dev br-lan table local proto kernel scope host src 192.168.168.1
- broadcast 192.168.168.255 dev br-lan table local proto kernel scope link src 192.168.168.1
- broadcast 71.190.237.0 dev wan table local proto kernel scope link src 71.190.236.237
- local 71.190.236.237 dev wan table local proto kernel scope host src 71.190.236.237
- broadcast 71.190.237.255 dev wan table local proto kernel scope link src 71.190.236.237
- broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
- local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
- local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
- broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
- local 192.168.5.8 dev wg0 table local proto kernel scope host src 192.168.5.8
- fdad:74db:da17::/64 dev br-lan proto static metric 1024 pref medium
- unreachable fdad:74db:da17::/48 dev lo proto static metric 2147483647 pref medium
- fe80::/64 dev eth0 proto kernel metric 256 pref medium
- fe80::/64 dev br-lan proto kernel metric 256 pref medium
- fe80::/64 dev wan proto kernel metric 256 pref medium
- fe80::/64 dev wlan0 proto kernel metric 256 pref medium
- default dev wg0 proto static metric 1024 pref medium
- local ::1 dev lo table local proto kernel metric 0 pref medium
- anycast fdad:74db:da17:: dev br-lan table local proto kernel metric 0 pref medium
- local fdad:74db:da17::1 dev br-lan table local proto kernel metric 0 pref medium
- anycast fe80:: dev eth0 table local proto kernel metric 0 pref medium
- anycast fe80:: dev wan table local proto kernel metric 0 pref medium
- anycast fe80:: dev br-lan table local proto kernel metric 0 pref medium
- anycast fe80:: dev wlan0 table local proto kernel metric 0 pref medium
- local fe80::1659:c0ff:fec8:c250 dev eth0 table local proto kernel metric 0 pref medium
- local fe80::1659:c0ff:fec8:c250 dev br-lan table local proto kernel metric 0 pref medium
- local fe80::1659:c0ff:fec8:c251 dev wan table local proto kernel metric 0 pref medium
- local fe80::1659:c0ff:fec8:c254 dev wlan0 table local proto kernel metric 0 pref medium
- multicast ff00::/8 dev eth0 table local proto kernel metric 256 pref medium
- multicast ff00::/8 dev br-lan table local proto kernel metric 256 pref medium
- multicast ff00::/8 dev wan table local proto kernel metric 256 pref medium
- multicast ff00::/8 dev wlan0 table local proto kernel metric 256 pref medium
- multicast ff00::/8 dev wg0 table local proto kernel metric 256 pref medium
- 0: from all lookup local
- 32766: from all lookup main
- 32767: from all lookup default
- # Generated by iptables-save v1.8.7 on Sat Aug 14 22:20:25 2021
- *nat
- :PREROUTING ACCEPT [29728044:2028453028]
- :INPUT ACCEPT [29568907:1995273207]
- :OUTPUT ACCEPT [38208977:2580247983]
- :POSTROUTING ACCEPT [11400:986549]
- :postrouting_lan_rule - [0:0]
- :postrouting_rule - [0:0]
- :postrouting_wan_rule - [0:0]
- :postrouting_wgclient_rule - [0:0]
- :prerouting_lan_rule - [0:0]
- :prerouting_rule - [0:0]
- :prerouting_wan_rule - [0:0]
- :prerouting_wgclient_rule - [0:0]
- :zone_lan_postrouting - [0:0]
- :zone_lan_prerouting - [0:0]
- :zone_wan_postrouting - [0:0]
- :zone_wan_prerouting - [0:0]
- :zone_wgclient_postrouting - [0:0]
- :zone_wgclient_prerouting - [0:0]
- -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
- -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
- -A PREROUTING -i wan -m comment --comment "!fw3" -j zone_wan_prerouting
- -A PREROUTING -i wg0 -m comment --comment "!fw3" -j zone_wgclient_prerouting
- -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
- -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
- -A POSTROUTING -o wan -m comment --comment "!fw3" -j zone_wan_postrouting
- -A POSTROUTING -o wg0 -m comment --comment "!fw3" -j zone_wgclient_postrouting
- -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 80 -m comment --comment "!fw3: http (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 443 -m comment --comment "!fw3: https (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 22 -m comment --comment "!fw3: ssh (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p udp -m udp --dport 1194 -m comment --comment "!fw3: ovpbn-udp (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 993 -m comment --comment "!fw3: ovpn-tcp (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.20/32 -p tcp -m tcp --dport 4080 -m comment --comment "!fw3: tivo-1 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.20/32 -p udp -m udp --dport 4080 -m comment --comment "!fw3: tivo-1 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.20/32 -p tcp -m tcp --dport 413 -m comment --comment "!fw3: tivo-2 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.20/32 -p tcp -m tcp --dport 443 -m comment --comment "!fw3: tivo-3 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 53 -m comment --comment "!fw3: ovpn-tcp1 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p udp -m udp --dport 53 -m comment --comment "!fw3: ovpn-tcp1 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 53 -m comment --comment "!fw3: ovpn-tcp2 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p tcp -m tcp --dport 5023 -m comment --comment "!fw3: trac1 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p tcp -m tcp --dport 5023 -m comment --comment "!fw3: trac2 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p udp -m udp --dport 5023 -m comment --comment "!fw3: trac2 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p tcp -m tcp --dport 5031 -m comment --comment "!fw3: trac3 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p udp -m udp --dport 5031 -m comment --comment "!fw3: trac3 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p tcp -m tcp --dport 5036 -m comment --comment "!fw3: trac4 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p udp -m udp --dport 5036 -m comment --comment "!fw3: trac4 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p tcp -m tcp --dport 5055 -m comment --comment "!fw3: trac5 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p udp -m udp --dport 5055 -m comment --comment "!fw3: trac5 (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 25 -m comment --comment "!fw3: smtp (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.230/32 -p tcp -m tcp --dport 4949 -m comment --comment "!fw3: munin (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.230/32 -p udp -m udp --dport 4949 -m comment --comment "!fw3: munin (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p tcp -m tcp --dport 56914 -m comment --comment "!fw3: wireguard (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.197/32 -p udp -m udp --dport 56914 -m comment --comment "!fw3: wireguard (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p tcp -m tcp --dport 8883 -m comment --comment "!fw3: mosquitto (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.198/32 -p udp -m udp --dport 8883 -m comment --comment "!fw3: mosquitto (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.21/32 -p tcp -m tcp --dport 37777 -m comment --comment "!fw3: amcrest (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_postrouting -s 192.168.168.0/24 -d 192.168.168.21/32 -p udp -m udp --dport 37777 -m comment --comment "!fw3: amcrest (reflection)" -j SNAT --to-source 192.168.168.1
- -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 80 -m comment --comment "!fw3: http (reflection)" -j DNAT --to-destination 192.168.168.197:80
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 443 -m comment --comment "!fw3: https (reflection)" -j DNAT --to-destination 192.168.168.197:443
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 22 -m comment --comment "!fw3: ssh (reflection)" -j DNAT --to-destination 192.168.168.197:22
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 1194 -m comment --comment "!fw3: ovpbn-udp (reflection)" -j DNAT --to-destination 192.168.168.197:1194
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 993 -m comment --comment "!fw3: ovpn-tcp (reflection)" -j DNAT --to-destination 192.168.168.197:993
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 4080 -m comment --comment "!fw3: tivo-1 (reflection)" -j DNAT --to-destination 192.168.168.20:4080
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 4080 -m comment --comment "!fw3: tivo-1 (reflection)" -j DNAT --to-destination 192.168.168.20:4080
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 4413 -m comment --comment "!fw3: tivo-2 (reflection)" -j DNAT --to-destination 192.168.168.20:413
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 4443 -m comment --comment "!fw3: tivo-3 (reflection)" -j DNAT --to-destination 192.168.168.20:443
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 53 -m comment --comment "!fw3: ovpn-tcp1 (reflection)" -j DNAT --to-destination 192.168.168.197:53
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 53 -m comment --comment "!fw3: ovpn-tcp1 (reflection)" -j DNAT --to-destination 192.168.168.197:53
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 110 -m comment --comment "!fw3: ovpn-tcp2 (reflection)" -j DNAT --to-destination 192.168.168.197:53
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 5004 -m comment --comment "!fw3: trac1 (reflection)" -j DNAT --to-destination 192.168.168.198:5023
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 5023 -m comment --comment "!fw3: trac2 (reflection)" -j DNAT --to-destination 192.168.168.198:5023
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 5023 -m comment --comment "!fw3: trac2 (reflection)" -j DNAT --to-destination 192.168.168.198:5023
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 5031 -m comment --comment "!fw3: trac3 (reflection)" -j DNAT --to-destination 192.168.168.198:5031
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 5031 -m comment --comment "!fw3: trac3 (reflection)" -j DNAT --to-destination 192.168.168.198:5031
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 5036 -m comment --comment "!fw3: trac4 (reflection)" -j DNAT --to-destination 192.168.168.198:5036
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 5036 -m comment --comment "!fw3: trac4 (reflection)" -j DNAT --to-destination 192.168.168.198:5036
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 5055 -m comment --comment "!fw3: trac5 (reflection)" -j DNAT --to-destination 192.168.168.198:5055
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 5055 -m comment --comment "!fw3: trac5 (reflection)" -j DNAT --to-destination 192.168.168.198:5055
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 25 -m comment --comment "!fw3: smtp (reflection)" -j DNAT --to-destination 192.168.168.197:25
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 4949 -m comment --comment "!fw3: munin (reflection)" -j DNAT --to-destination 192.168.168.230:4949
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 4949 -m comment --comment "!fw3: munin (reflection)" -j DNAT --to-destination 192.168.168.230:4949
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 56914 -m comment --comment "!fw3: wireguard (reflection)" -j DNAT --to-destination 192.168.168.197:56914
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 56914 -m comment --comment "!fw3: wireguard (reflection)" -j DNAT --to-destination 192.168.168.197:56914
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 8883 -m comment --comment "!fw3: mosquitto (reflection)" -j DNAT --to-destination 192.168.168.198:8883
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 8883 -m comment --comment "!fw3: mosquitto (reflection)" -j DNAT --to-destination 192.168.168.198:8883
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p tcp -m tcp --dport 37890 -m comment --comment "!fw3: amcrest (reflection)" -j DNAT --to-destination 192.168.168.21:37777
- -A zone_lan_prerouting -s 192.168.168.0/24 -d 71.190.236.237/32 -p udp -m udp --dport 37890 -m comment --comment "!fw3: amcrest (reflection)" -j DNAT --to-destination 192.168.168.21:37777
- -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
- -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
- -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
- -A zone_wan_prerouting -p tcp -m tcp --dport 80 -m comment --comment "!fw3: http" -j DNAT --to-destination 192.168.168.197:80
- -A zone_wan_prerouting -p tcp -m tcp --dport 443 -m comment --comment "!fw3: https" -j DNAT --to-destination 192.168.168.197:443
- -A zone_wan_prerouting -p tcp -m tcp --dport 22 -m comment --comment "!fw3: ssh" -j DNAT --to-destination 192.168.168.197:22
- -A zone_wan_prerouting -p udp -m udp --dport 1194 -m comment --comment "!fw3: ovpbn-udp" -j DNAT --to-destination 192.168.168.197:1194
- -A zone_wan_prerouting -p tcp -m tcp --dport 993 -m comment --comment "!fw3: ovpn-tcp" -j DNAT --to-destination 192.168.168.197:993
- -A zone_wan_prerouting -p tcp -m tcp --dport 4080 -m comment --comment "!fw3: tivo-1" -j DNAT --to-destination 192.168.168.20:4080
- -A zone_wan_prerouting -p udp -m udp --dport 4080 -m comment --comment "!fw3: tivo-1" -j DNAT --to-destination 192.168.168.20:4080
- -A zone_wan_prerouting -p tcp -m tcp --dport 4413 -m comment --comment "!fw3: tivo-2" -j DNAT --to-destination 192.168.168.20:413
- -A zone_wan_prerouting -p tcp -m tcp --dport 4443 -m comment --comment "!fw3: tivo-3" -j DNAT --to-destination 192.168.168.20:443
- -A zone_wan_prerouting -p tcp -m tcp --dport 53 -m comment --comment "!fw3: ovpn-tcp1" -j DNAT --to-destination 192.168.168.197:53
- -A zone_wan_prerouting -p udp -m udp --dport 53 -m comment --comment "!fw3: ovpn-tcp1" -j DNAT --to-destination 192.168.168.197:53
- -A zone_wan_prerouting -p tcp -m tcp --dport 110 -m comment --comment "!fw3: ovpn-tcp2" -j DNAT --to-destination 192.168.168.197:53
- -A zone_wan_prerouting -p tcp -m tcp --dport 5004 -m comment --comment "!fw3: trac1" -j DNAT --to-destination 192.168.168.198:5023
- -A zone_wan_prerouting -p tcp -m tcp --dport 5023 -m comment --comment "!fw3: trac2" -j DNAT --to-destination 192.168.168.198:5023
- -A zone_wan_prerouting -p udp -m udp --dport 5023 -m comment --comment "!fw3: trac2" -j DNAT --to-destination 192.168.168.198:5023
- -A zone_wan_prerouting -p tcp -m tcp --dport 5031 -m comment --comment "!fw3: trac3" -j DNAT --to-destination 192.168.168.198:5031
- -A zone_wan_prerouting -p udp -m udp --dport 5031 -m comment --comment "!fw3: trac3" -j DNAT --to-destination 192.168.168.198:5031
- -A zone_wan_prerouting -p tcp -m tcp --dport 5036 -m comment --comment "!fw3: trac4" -j DNAT --to-destination 192.168.168.198:5036
- -A zone_wan_prerouting -p udp -m udp --dport 5036 -m comment --comment "!fw3: trac4" -j DNAT --to-destination 192.168.168.198:5036
- -A zone_wan_prerouting -p tcp -m tcp --dport 5055 -m comment --comment "!fw3: trac5" -j DNAT --to-destination 192.168.168.198:5055
- -A zone_wan_prerouting -p udp -m udp --dport 5055 -m comment --comment "!fw3: trac5" -j DNAT --to-destination 192.168.168.198:5055
- -A zone_wan_prerouting -p tcp -m tcp --dport 25 -m comment --comment "!fw3: smtp" -j DNAT --to-destination 192.168.168.197:25
- -A zone_wan_prerouting -p tcp -m tcp --dport 4949 -m comment --comment "!fw3: munin" -j DNAT --to-destination 192.168.168.230:4949
- -A zone_wan_prerouting -p udp -m udp --dport 4949 -m comment --comment "!fw3: munin" -j DNAT --to-destination 192.168.168.230:4949
- -A zone_wan_prerouting -p tcp -m tcp --dport 56914 -m comment --comment "!fw3: wireguard" -j DNAT --to-destination 192.168.168.197:56914
- -A zone_wan_prerouting -p udp -m udp --dport 56914 -m comment --comment "!fw3: wireguard" -j DNAT --to-destination 192.168.168.197:56914
- -A zone_wan_prerouting -p tcp -m tcp --dport 8883 -m comment --comment "!fw3: mosquitto" -j DNAT --to-destination 192.168.168.198:8883
- -A zone_wan_prerouting -p udp -m udp --dport 8883 -m comment --comment "!fw3: mosquitto" -j DNAT --to-destination 192.168.168.198:8883
- -A zone_wan_prerouting -p tcp -m tcp --dport 37890 -m comment --comment "!fw3: amcrest" -j DNAT --to-destination 192.168.168.21:37777
- -A zone_wan_prerouting -p udp -m udp --dport 37890 -m comment --comment "!fw3: amcrest" -j DNAT --to-destination 192.168.168.21:37777
- -A zone_wgclient_postrouting -m comment --comment "!fw3: Custom wgclient postrouting rule chain" -j postrouting_wgclient_rule
- -A zone_wgclient_postrouting -m comment --comment "!fw3" -j MASQUERADE
- -A zone_wgclient_prerouting -m comment --comment "!fw3: Custom wgclient prerouting rule chain" -j prerouting_wgclient_rule
- COMMIT
- # Completed on Sat Aug 14 22:20:25 2021
- # Generated by iptables-save v1.8.7 on Sat Aug 14 22:20:25 2021
- *mangle
- :PREROUTING ACCEPT [2482090:193939785]
- :INPUT ACCEPT [2449238:184366253]
- :FORWARD ACCEPT [28594:8412532]
- :OUTPUT ACCEPT [3000774:226559035]
- :POSTROUTING ACCEPT [2475199:197406884]
- -A FORWARD -o wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -i wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- COMMIT
- # Completed on Sat Aug 14 22:20:25 2021
- # Generated by iptables-save v1.8.7 on Sat Aug 14 22:20:25 2021
- *filter
- :INPUT ACCEPT [0:0]
- :FORWARD DROP [0:0]
- :OUTPUT ACCEPT [0:0]
- :forwarding_lan_rule - [0:0]
- :forwarding_rule - [0:0]
- :forwarding_wan_rule - [0:0]
- :forwarding_wgclient_rule - [0:0]
- :input_lan_rule - [0:0]
- :input_rule - [0:0]
- :input_wan_rule - [0:0]
- :input_wgclient_rule - [0:0]
- :output_lan_rule - [0:0]
- :output_rule - [0:0]
- :output_wan_rule - [0:0]
- :output_wgclient_rule - [0:0]
- :reject - [0:0]
- :syn_flood - [0:0]
- :zone_lan_dest_ACCEPT - [0:0]
- :zone_lan_forward - [0:0]
- :zone_lan_input - [0:0]
- :zone_lan_output - [0:0]
- :zone_lan_src_ACCEPT - [0:0]
- :zone_wan_dest_ACCEPT - [0:0]
- :zone_wan_dest_REJECT - [0:0]
- :zone_wan_forward - [0:0]
- :zone_wan_input - [0:0]
- :zone_wan_output - [0:0]
- :zone_wan_src_REJECT - [0:0]
- :zone_wgclient_dest_ACCEPT - [0:0]
- :zone_wgclient_dest_REJECT - [0:0]
- :zone_wgclient_forward - [0:0]
- :zone_wgclient_input - [0:0]
- :zone_wgclient_output - [0:0]
- :zone_wgclient_src_REJECT - [0:0]
- -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
- -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
- -A INPUT -i wan -m comment --comment "!fw3" -j zone_wan_input
- -A INPUT -i wg0 -m comment --comment "!fw3" -j zone_wgclient_input
- -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
- -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
- -A FORWARD -i wan -m comment --comment "!fw3" -j zone_wan_forward
- -A FORWARD -i wg0 -m comment --comment "!fw3" -j zone_wgclient_forward
- -A FORWARD -m comment --comment "!fw3" -j reject
- -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
- -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
- -A OUTPUT -o wan -m comment --comment "!fw3" -j zone_wan_output
- -A OUTPUT -o wg0 -m comment --comment "!fw3" -j zone_wgclient_output
- -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
- -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
- -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
- -A syn_flood -m comment --comment "!fw3" -j DROP
- -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
- -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wgclient forwarding policy" -j zone_wgclient_dest_ACCEPT
- -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
- -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
- -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
- -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_ACCEPT -o wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wan_dest_ACCEPT -o wan -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_REJECT -o wan -m comment --comment "!fw3" -j reject
- -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
- -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
- -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
- -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
- -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
- -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
- -A zone_wan_input -p udp -m udp --dport 55955 -m comment --comment "!fw3: wireguard 55955" -j ACCEPT
- -A zone_wan_input -p udp -m udp --dport 56914 -m comment --comment "!fw3: wireguard water 56914" -j ACCEPT
- -A zone_wan_input -p udp -m udp --dport 56913 -m comment --comment "!fw3: Allow-WireGuard" -j ACCEPT
- -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
- -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
- -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
- -A zone_wan_src_REJECT -i wan -m comment --comment "!fw3" -j reject
- -A zone_wgclient_dest_ACCEPT -o wg0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wgclient_dest_ACCEPT -o wg0 -m comment --comment "!fw3" -j ACCEPT
- -A zone_wgclient_dest_REJECT -o wg0 -m comment --comment "!fw3" -j reject
- -A zone_wgclient_forward -m comment --comment "!fw3: Custom wgclient forwarding rule chain" -j forwarding_wgclient_rule
- -A zone_wgclient_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_wgclient_forward -m comment --comment "!fw3" -j zone_wgclient_dest_ACCEPT
- -A zone_wgclient_input -m comment --comment "!fw3: Custom wgclient input rule chain" -j input_wgclient_rule
- -A zone_wgclient_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_wgclient_input -m comment --comment "!fw3" -j zone_wgclient_src_REJECT
- -A zone_wgclient_output -m comment --comment "!fw3: Custom wgclient output rule chain" -j output_wgclient_rule
- -A zone_wgclient_output -m comment --comment "!fw3" -j zone_wgclient_dest_REJECT
- -A zone_wgclient_src_REJECT -i wg0 -m comment --comment "!fw3" -j reject
- COMMIT
- # Completed on Sat Aug 14 22:20:25 2021
- ==> /etc/resolv.conf <==
- search feeney
- nameserver 127.0.0.1
- nameserver ::1
- ==> /tmp/resolv.conf <==
- search feeney
- nameserver 127.0.0.1
- nameserver ::1
- ==> /tmp/resolv.conf.d <==
- head: /tmp/resolv.conf.d: I/O error
- ==> /tmp/resolv.conf.d/resolv.conf.auto <==
- # Interface wan
- nameserver 151.202.0.84
- ;; connection timed out; no servers could be reached
- ;; connection timed out; no servers could be reached
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement