Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ip a; ip r; ip ru; iptables-save
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 532
- link/ether 14:91:82:27:7c:b5 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::1691:82ff:fe27:7cb5/64 scope link
- valid_lft forever preferred_lft forever
- 3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 532
- link/ether 16:91:82:27:7c:b5 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::1491:82ff:fe27:7cb5/64 scope link
- valid_lft forever preferred_lft forever
- 7: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
- link/ether 16:91:82:27:7c:b5 brd ff:ff:ff:ff:ff:ff
- inet 192.168.1.1/24 brd 192.168.1.255 scope global br-lan
- valid_lft forever preferred_lft forever
- inet6 2601:182:4200:dfa9::1/64 scope global dynamic
- valid_lft 177802sec preferred_lft 177802sec
- inet6 fde4:faf1:87f3::1/60 scope global
- valid_lft forever preferred_lft forever
- inet6 fe80::1491:82ff:fe27:7cb5/64 scope link
- valid_lft forever preferred_lft forever
- 8: eth0.1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
- link/ether 16:91:82:27:7c:b5 brd ff:ff:ff:ff:ff:ff
- 9: eth1.2@eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
- link/ether 14:91:82:27:7c:b5 brd ff:ff:ff:ff:ff:ff
- inet 24.63.84.229/22 brd 24.63.87.255 scope global eth1.2
- valid_lft forever preferred_lft forever
- inet6 2001:558:6017:136:f4d5:dcc0:d9a1:3464/128 scope global dynamic
- valid_lft 177802sec preferred_lft 177802sec
- inet6 fe80::1691:82ff:fe27:7cb5/64 scope link
- valid_lft forever preferred_lft forever
- 10: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-lan state UP qlen 1000
- link/ether 16:91:82:27:7c:b6 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::1491:82ff:fe27:7cb6/64 scope link
- valid_lft forever preferred_lft forever
- 11: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-lan state UP qlen 1000
- link/ether 16:91:82:27:7c:b7 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::1491:82ff:fe27:7cb7/64 scope link
- valid_lft forever preferred_lft forever
- default via 24.63.84.1 dev eth1.2 src 24.63.84.229
- 24.63.84.0/22 dev eth1.2 scope link src 24.63.84.229
- 192.168.1.0/24 dev br-lan scope link src 192.168.1.1
- 0: from all lookup local
- 32766: from all lookup main
- 32767: from all lookup default
- # Generated by iptables-save v1.6.2 on Fri Sep 6 02:10:39 2019
- *nat
- :PREROUTING ACCEPT [4687:628150]
- :INPUT ACCEPT [862:76802]
- :OUTPUT ACCEPT [1664:118266]
- :POSTROUTING ACCEPT [16:1111]
- :postrouting_lan_rule - [0:0]
- :postrouting_rule - [0:0]
- :postrouting_wan_rule - [0:0]
- :prerouting_lan_rule - [0:0]
- :prerouting_rule - [0:0]
- :prerouting_wan_rule - [0:0]
- :zone_lan_postrouting - [0:0]
- :zone_lan_prerouting - [0:0]
- :zone_wan_postrouting - [0:0]
- :zone_wan_prerouting - [0:0]
- -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
- -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
- -A PREROUTING -i eth1.2 -m comment --comment "!fw3" -j zone_wan_prerouting
- -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
- -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
- -A POSTROUTING -o eth1.2 -m comment --comment "!fw3" -j zone_wan_postrouting
- -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
- -A zone_lan_postrouting -s 192.168.1.0/24 -d 192.168.1.152/32 -p tcp -m tcp --dport 80 -m comment --comment "!fw3: @redirect[0] (reflection)" -j SNAT --to-source 192.168.1.1
- -A zone_lan_postrouting -s 192.168.1.0/24 -d 192.168.1.152/32 -p udp -m udp --dport 80 -m comment --comment "!fw3: @redirect[0] (reflection)" -j SNAT --to-source 192.168.1.1
- -A zone_lan_postrouting -s 192.168.1.0/24 -d 192.168.1.152/32 -p tcp -m tcp --dport 80 -m comment --comment "!fw3: @redirect[1] (reflection)" -j SNAT --to-source 192.168.1.1
- -A zone_lan_postrouting -s 192.168.1.0/24 -d 192.168.1.152/32 -p udp -m udp --dport 80 -m comment --comment "!fw3: @redirect[1] (reflection)" -j SNAT --to-source 192.168.1.1
- -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
- -A zone_lan_prerouting -s 192.168.1.0/24 -d 24.63.84.229/32 -p tcp -m tcp --dport 80 -m comment --comment "!fw3: @redirect[0] (reflection)" -j DNAT --to-destination 192.168.1.152:80
- -A zone_lan_prerouting -s 192.168.1.0/24 -d 24.63.84.229/32 -p udp -m udp --dport 80 -m comment --comment "!fw3: @redirect[0] (reflection)" -j DNAT --to-destination 192.168.1.152:80
- -A zone_lan_prerouting -s 192.168.1.0/24 -d 24.63.84.229/32 -p tcp -m tcp --dport 443 -m comment --comment "!fw3: @redirect[1] (reflection)" -j DNAT --to-destination 192.168.1.152:80
- -A zone_lan_prerouting -s 192.168.1.0/24 -d 24.63.84.229/32 -p udp -m udp --dport 443 -m comment --comment "!fw3: @redirect[1] (reflection)" -j DNAT --to-destination 192.168.1.152:80
- -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
- -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
- -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
- -A zone_wan_prerouting -p tcp -m tcp --dport 80 -m comment --comment "!fw3: @redirect[0]" -j DNAT --to-destination 192.168.1.152:80
- -A zone_wan_prerouting -p udp -m udp --dport 80 -m comment --comment "!fw3: @redirect[0]" -j DNAT --to-destination 192.168.1.152:80
- -A zone_wan_prerouting -p tcp -m tcp --dport 443 -m comment --comment "!fw3: @redirect[1]" -j DNAT --to-destination 192.168.1.152:80
- -A zone_wan_prerouting -p udp -m udp --dport 443 -m comment --comment "!fw3: @redirect[1]" -j DNAT --to-destination 192.168.1.152:80
- COMMIT
- # Completed on Fri Sep 6 02:10:39 2019
- # Generated by iptables-save v1.6.2 on Fri Sep 6 02:10:39 2019
- *mangle
- :PREROUTING ACCEPT [134597:223638137]
- :INPUT ACCEPT [9796:570937]
- :FORWARD ACCEPT [122258:222599600]
- :OUTPUT ACCEPT [3411:311502]
- :POSTROUTING ACCEPT [125506:222904546]
- -A FORWARD -o eth1.2 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- COMMIT
- # Completed on Fri Sep 6 02:10:39 2019
- # Generated by iptables-save v1.6.2 on Fri Sep 6 02:10:39 2019
- *filter
- :INPUT ACCEPT [0:0]
- :FORWARD ACCEPT [0:0]
- :OUTPUT ACCEPT [0:0]
- :forwarding_lan_rule - [0:0]
- :forwarding_rule - [0:0]
- :forwarding_wan_rule - [0:0]
- :input_lan_rule - [0:0]
- :input_rule - [0:0]
- :input_wan_rule - [0:0]
- :output_lan_rule - [0:0]
- :output_rule - [0:0]
- :output_wan_rule - [0:0]
- :reject - [0:0]
- :syn_flood - [0:0]
- :zone_lan_dest_ACCEPT - [0:0]
- :zone_lan_forward - [0:0]
- :zone_lan_input - [0:0]
- :zone_lan_output - [0:0]
- :zone_lan_src_ACCEPT - [0:0]
- :zone_wan_dest_ACCEPT - [0:0]
- :zone_wan_forward - [0:0]
- :zone_wan_input - [0:0]
- :zone_wan_output - [0:0]
- :zone_wan_src_DROP - [0:0]
- -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
- -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
- -A INPUT -i eth1.2 -m comment --comment "!fw3" -j zone_wan_input
- -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
- -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
- -A FORWARD -i eth1.2 -m comment --comment "!fw3" -j zone_wan_forward
- -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
- -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
- -A OUTPUT -o eth1.2 -m comment --comment "!fw3" -j zone_wan_output
- -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
- -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
- -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
- -A syn_flood -m comment --comment "!fw3" -j DROP
- -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
- -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
- -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
- -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
- -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
- -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_ACCEPT -o eth1.2 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wan_dest_ACCEPT -o eth1.2 -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
- -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
- -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
- -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
- -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
- -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
- -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_DROP
- -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
- -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
- -A zone_wan_src_DROP -i eth1.2 -m comment --comment "!fw3" -j DROP
- COMMIT
- # Completed on Fri Sep 6 02:10:39 2019
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement