Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- firewall {
- all-ping enable
- broadcast-ping disable
- group {
- address-group LAN_adresgroep {
- address 192.168.2.1-192.168.2.254
- description ""
- }
- address-group Shodan {
- address 208.180.20.97
- address 198.20.69.74
- address 198.20.69.98
- address 198.20.70.114
- address 198.20.99.130
- address 93.120.27.62
- address 66.240.236.119
- address 71.6.135.131
- address 66.240.192.138
- address 71.6.167.142
- address 82.221.105.6
- address 82.221.105.7
- address 71.6.165.200
- address 188.138.9.50
- address 85.25.103.50
- address 85.25.43.94
- address 71.6.146.185
- address 71.6.158.166
- address 198.20.87.98
- address 66.240.219.146
- address 209.126.110.38
- address 104.236.198.48
- address 184.105.247.196
- address 141.212.122.112
- address 125.237.220.106
- address 192.81.128.37
- address 74.82.47.2
- address 216.218.206.66
- address 37.187.114.171
- address 184.105.139.67
- address 54.81.158.232
- address 141.212.122.144
- address 141.212.122.128
- address 54.206.70.29
- description "Shodan and other scanners"
- }
- network-group BOGONS {
- description BOGONS
- network 10.0.0.0/8
- network 100.64.0.0/10
- network 127.0.0.0/8
- network 169.254.0.0/16
- network 172.16.0.0/12
- network 192.0.0.0/24
- network 192.0.2.0/24
- network 192.168.0.0/16
- network 198.18.0.0/15
- network 198.51.100.0/24
- network 203.0.113.0/24
- network 224.0.0.0/3
- }
- network-group Blocklist {
- description "Block scanners by CIDR"
- network 74.82.47.0/24
- network 184.105.139.0/24
- network 184.105.247.0/24
- network 216.218.206.0/24
- network 185.35.62.0/24
- network 185.35.63.0/24
- }
- network-group Gasten {
- description ""
- network 192.168.10.0/24
- }
- network-group LAN {
- description ""
- network 192.168.2.0/24
- }
- port-group Router_poorten {
- description "Router Poorten"
- port ssh
- port https
- port telnet
- port http
- port ftp
- }
- }
- ipv6-name WANv6_IN {
- default-action drop
- description "WAN inbound traffic forwarded to LAN"
- enable-default-log
- rule 10 {
- action accept
- description "Allow established/related sessions"
- state {
- established enable
- related enable
- }
- }
- rule 20 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- }
- ipv6-name WANv6_LOCAL {
- default-action drop
- description "WAN inbound traffic to the router"
- enable-default-log
- rule 10 {
- action accept
- description "Allow established/related sessions"
- state {
- established enable
- related enable
- }
- }
- rule 20 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- rule 30 {
- action accept
- description "Allow IPv6 icmp"
- protocol ipv6-icmp
- }
- rule 40 {
- action accept
- description "allow dhcpv6"
- destination {
- port 546
- }
- protocol udp
- source {
- port 547
- }
- }
- }
- ipv6-receive-redirects disable
- ipv6-src-route disable
- ip-src-route disable
- log-martians enable
- name Gasten_IN {
- default-action accept
- description Gasten_IN
- rule 10 {
- action accept
- description "Accept Established/Related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new disable
- related enable
- }
- }
- rule 20 {
- action drop
- description "DROP to LAN"
- destination {
- address 192.168.2.254/24
- }
- log disable
- protocol all
- }
- rule 30 {
- action drop
- description "DROP to LAN"
- destination {
- address 192.168.2.0/24
- }
- log disable
- protocol all
- }
- rule 40 {
- action drop
- description "DROP access to LAN"
- destination {
- group {
- network-group LAN
- }
- }
- log disable
- protocol all
- }
- }
- name Gasten_LOCAL {
- default-action drop
- description Gasten_LOCAL
- rule 10 {
- action accept
- description "ACCEPT access to DNS"
- destination {
- port 53
- }
- log disable
- protocol udp
- }
- rule 20 {
- action accept
- description "ACCEPT access to DHCP"
- destination {
- port 67
- }
- log disable
- protocol udp
- }
- rule 40 {
- action drop
- description "DROP access to router"
- destination {
- group {
- port-group Router_poorten
- }
- }
- log disable
- protocol all
- }
- }
- name LAN_LOCAL {
- default-action drop
- description LAN_LOCAL
- rule 20 {
- action accept
- description "PC to router"
- destination {
- address 192.168.2.254
- }
- log disable
- protocol all
- source {
- address 192.168.2.50
- mac-address
- }
- }
- rule 30 {
- action accept
- description "iPhone to router"
- destination {
- address 192.168.2.254
- }
- log disable
- protocol all
- source {
- mac-address
- }
- }
- }
- name WAN_IN {
- default-action drop
- description "WAN to Internal"
- enable-default-log
- rule 10 {
- action accept
- description "Allow established/related"
- log enable
- protocol all
- state {
- established enable
- invalid disable
- new disable
- related enable
- }
- }
- rule 20 {
- action drop
- description "Drop invalid state"
- log enable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 21 {
- action drop
- description "DROP Bogons"
- log enable
- protocol all
- source {
- group {
- network-group BOGONS
- }
- }
- }
- rule 22 {
- action drop
- description "DROP CIDRs scanners"
- log enable
- protocol all
- source {
- group {
- network-group Blocklist
- }
- }
- }
- rule 23 {
- action drop
- description "DROP Shodan scanners"
- log enable
- protocol all
- source {
- group {
- address-group Shodan
- }
- }
- }
- }
- name WAN_LOCAL {
- default-action drop
- description "WAN to router"
- enable-default-log
- rule 10 {
- action accept
- description "Allow established/related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new disable
- related enable
- }
- }
- rule 20 {
- action drop
- description "Drop invalid state"
- log disable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 21 {
- action drop
- description "Drop Shodan scanners"
- log enable
- protocol all
- source {
- group {
- address-group Shodan
- }
- }
- }
- rule 22 {
- action drop
- description "DROP Bogons"
- log enable
- protocol all
- source {
- group {
- network-group BOGONS
- }
- }
- }
- rule 23 {
- action drop
- description "DROP CIDRs scanners"
- log enable
- protocol all
- source {
- group {
- network-group Blocklist
- }
- }
- }
- }
- options {
- }
- receive-redirects disable
- send-redirects enable
- source-validation disable
- syn-cookies enable
- }
- interfaces {
- bridge br0 {
- aging 300
- bridged-conntrack disable
- description "br0 - Telefonie"
- hello-time 2
- max-age 20
- priority 32768
- promiscuous disable
- stp false
- }
- ethernet eth0 {
- description "eth0 - FTTH"
- duplex auto
- mtu 1512
- speed auto
- vif 4 {
- address dhcp
- description "eth0.4 - IPTV"
- dhcp-options {
- client-option "send vendor-class-identifier "IPTV_RG";"
- client-option "request subnet-mask, routers, rfc3442-classless-static-routes;"
- default-route no-update
- default-route-distance 210
- name-server update
- }
- }
- vif 6 {
- description "eth0.6 - Internet"
- mtu 1508
- pppoe 0 {
- default-route auto
- dhcpv6-pd {
- no-dns
- pd 0 {
- interface eth1 {
- prefix-id :1
- service slaac
- }
- prefix-length /48
- }
- rapid-commit disable
- }
- firewall {
- in {
- ipv6-name WANv6_IN
- name WAN_IN
- }
- local {
- ipv6-name WANv6_LOCAL
- name WAN_LOCAL
- }
- }
- idle-timeout 180
- ipv6 {
- address {
- autoconf
- }
- dup-addr-detect-transmits 1
- enable {
- }
- }
- mtu 1500
- name-server auto
- password ppp
- user-id mac@internet
- }
- }
- vif 7 {
- bridge-group {
- bridge br0
- }
- description "eth0.7 - Telefonie"
- mtu 1500
- }
- }
- ethernet eth1 {
- address 192.168.2.254/24
- description "eth1 - LAN"
- duplex auto
- firewall {
- in {
- }
- local {
- name LAN_LOCAL
- }
- }
- ipv6 {
- dup-addr-detect-transmits 1
- router-advert {
- cur-hop-limit 64
- link-mtu 0
- managed-flag false
- max-interval 600
- name-server 2001:1608:10:25::1c04:b12f
- name-server 2001:1608:10:25::9249:d69b
- other-config-flag false
- prefix ::/64 {
- autonomous-flag true
- on-link-flag true
- valid-lifetime 2592000
- }
- radvd-options "RDNSS 2001:1608:10:25::1c04:b12f 2001:1608:10:25::9249:d69b {};"
- reachable-time 0
- retrans-timer 0
- send-advert true
- }
- }
- speed auto
- vif 10 {
- address 192.168.10.254/24
- description "eth1.10 - Gasten"
- firewall {
- in {
- name Gasten_IN
- }
- local {
- name Gasten_LOCAL
- }
- }
- mtu 1500
- }
- }
- ethernet eth2 {
- description "eth2 - ExperiaBox"
- duplex auto
- speed auto
- vif 7 {
- bridge-group {
- bridge br0
- }
- description "eth2.7 - ExperiaBox VOIP"
- mtu 1500
- }
- }
- loopback lo {
- }
- }
- port-forward {
- auto-firewall enable
- hairpin-nat enable
- lan-interface eth1
- wan-interface pppoe0
- }
- protocols {
- igmp-proxy {
- interface eth0 {
- role downstream
- threshold 1
- }
- interface eth1.4 {
- alt-subnet 10.16.12.0/16
- alt-subnet 213.75.0.0/16
- role upstream
- threshold 1
- }
- }
- static {
- interface-route6 ::/0 {
- next-hop-interface pppoe0 {
- }
- }
- route 213.75.112.0/21 {
- next-hop 10.200.180.1 {
- }
- }
- }
- }
- service {
- dhcp-server {
- disabled false
- global-parameters "option vendor-class-identifier code 60 = string;"
- global-parameters "option broadcast-address code 28 = ip-address;"
- hostfile-update disable
- shared-network-name Gasten {
- authoritative disable
- subnet 192.168.10.0/24 {
- default-router 192.168.10.254
- dns-server 84.200.69.80
- dns-server 84.200.70.40
- lease 86400
- start 192.168.10.50 {
- stop 192.168.10.200
- }
- }
- }
- shared-network-name LAN {
- authoritative enable
- subnet 192.168.2.0/24 {
- default-router 192.168.2.254
- dns-server 84.200.69.80
- dns-server 84.200.70.40
- lease 86400
- start 192.168.2.50 {
- stop 192.168.2.200
- }
- static-mapping PC {
- ip-address 192.168.2.50
- mac-address
- }
- static-mapping UniFi {
- ip-address 192.168.2.250
- mac-address
- }
- static-mapping UniFi {
- ip-address 192.168.2.251
- mac-address
- }
- }
- }
- use-dnsmasq disable
- }
- dns {
- forwarding {
- cache-size 150
- listen-on eth1
- listen-on eth1.10
- name-server 84.200.69.80
- name-server 84.200.70.40
- options listen-address=192.168.2.254
- }
- }
- gui {
- http-port 80
- https-port 443
- older-ciphers enable
- }
- nat {
- rule 5000 {
- description IPTV
- destination {
- address 213.75.112.0/21
- }
- log disable
- outbound-interface eth0.4
- protocol all
- source {
- }
- type masquerade
- }
- rule 5001 {
- description IPTV
- destination {
- address 10.16.0.0/16
- }
- log disable
- outbound-interface eth0.4
- protocol all
- source {
- }
- type masquerade
- }
- rule 5002 {
- description "KPN Internet"
- log enable
- outbound-interface pppoe0
- protocol all
- source {
- address 192.168.2.0/24
- }
- type masquerade
- }
- rule 5003 {
- description "Gasten Internet"
- log enable
- outbound-interface pppoe0
- protocol all
- source {
- address 192.168.10.0/24
- }
- type masquerade
- }
- }
- ssh {
- port 22
- protocol-version v2
- }
- }
- system {
- host-name ubnt
- login {
- user ubnt {
- authentication {
- encrypted-password
- plaintext-password ""
- }
- full-name Hendrik
- level admin
- }
- }
- name-server 2001:1608:10:25::1c04:b12f
- name-server 2001:1608:10:25::9249:d69b
- name-server 84.200.69.80
- name-server 84.200.70.40
- ntp {
- server 0.ubnt.pool.ntp.org {
- }
- server 1.ubnt.pool.ntp.org {
- }
- server 2.ubnt.pool.ntp.org {
- }
- server 3.ubnt.pool.ntp.org {
- }
- }
- offload {
- hwnat disable
- ipv4 {
- forwarding enable
- pppoe enable
- vlan enable
- }
- ipv6 {
- forwarding enable
- pppoe enable
- }
- }
- syslog {
- global {
- facility all {
- level notice
- }
- facility protocols {
- level debug
- }
- }
- }
- time-zone Europe/Amsterdam
- traffic-analysis {
- dpi enable
- export enable
- }
- }
- vpn {
- }
- /* Warning: Do not remove the following line. */
- /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-unms@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
- /* Release version: v1.9.7+hotfix.3.5013619.170830.0242 */
Advertisement
Add Comment
Please, Sign In to add comment