Advertisement
xxorza

works

Sep 7th, 2019
283
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.51 KB | None | 0 0
  1. WORKS
  2.  
  3. root@OpenWrt:~# uci show network; uci show firewall
  4. network.loopback=interface
  5. network.loopback.ifname='lo'
  6. network.loopback.proto='static'
  7. network.loopback.ipaddr='127.0.0.1'
  8. network.loopback.netmask='255.0.0.0'
  9. network.globals=globals
  10. network.globals.ula_prefix='fd55:f0a5:8ae9::/48'
  11. network.lan=interface
  12. network.lan.type='bridge'
  13. network.lan.ifname='eth0.1'
  14. network.lan.proto='static'
  15. network.lan.ipaddr='192.168.1.1'
  16. network.lan.netmask='255.255.255.0'
  17. network.lan.ip6assign='60'
  18. network.wan=interface
  19. network.wan.ifname='eth1.2'
  20. network.wan.proto='static'
  21. network.wan.ipaddr='162.211.151.92'
  22. network.wan.netmask='255.255.255.0'
  23. network.wan.gateway='162.211.151.1'
  24. network.wan.dns='8.8.8.8'
  25. network.wan6=interface
  26. network.wan6.ifname='eth1.2'
  27. network.wan6.proto='dhcpv6'
  28. network.@switch[0]=switch
  29. network.@switch[0].name='switch0'
  30. network.@switch[0].reset='1'
  31. network.@switch[0].enable_vlan='1'
  32. network.@switch_vlan[0]=switch_vlan
  33. network.@switch_vlan[0].device='switch0'
  34. network.@switch_vlan[0].vlan='1'
  35. network.@switch_vlan[0].ports='0 1 2 3 5t'
  36. network.@switch_vlan[1]=switch_vlan
  37. network.@switch_vlan[1].device='switch0'
  38. network.@switch_vlan[1].vlan='2'
  39. network.@switch_vlan[1].ports='4 6t'
  40. firewall.@defaults[0]=defaults
  41. firewall.@defaults[0].syn_flood='1'
  42. firewall.@defaults[0].input='ACCEPT'
  43. firewall.@defaults[0].output='ACCEPT'
  44. firewall.@defaults[0].forward='REJECT'
  45. firewall.@zone[0]=zone
  46. firewall.@zone[0].name='lan'
  47. firewall.@zone[0].network='lan'
  48. firewall.@zone[0].input='ACCEPT'
  49. firewall.@zone[0].output='ACCEPT'
  50. firewall.@zone[0].forward='ACCEPT'
  51. firewall.@zone[1]=zone
  52. firewall.@zone[1].name='wan'
  53. firewall.@zone[1].network='wan' 'wan6'
  54. firewall.@zone[1].input='REJECT'
  55. firewall.@zone[1].output='ACCEPT'
  56. firewall.@zone[1].forward='REJECT'
  57. firewall.@zone[1].masq='1'
  58. firewall.@zone[1].mtu_fix='1'
  59. firewall.@forwarding[0]=forwarding
  60. firewall.@forwarding[0].src='lan'
  61. firewall.@forwarding[0].dest='wan'
  62. firewall.@rule[0]=rule
  63. firewall.@rule[0].name='Allow-DHCP-Renew'
  64. firewall.@rule[0].src='wan'
  65. firewall.@rule[0].proto='udp'
  66. firewall.@rule[0].dest_port='68'
  67. firewall.@rule[0].target='ACCEPT'
  68. firewall.@rule[0].family='ipv4'
  69. firewall.@rule[1]=rule
  70. firewall.@rule[1].name='Allow-Ping'
  71. firewall.@rule[1].src='wan'
  72. firewall.@rule[1].proto='icmp'
  73. firewall.@rule[1].icmp_type='echo-request'
  74. firewall.@rule[1].family='ipv4'
  75. firewall.@rule[1].target='ACCEPT'
  76. firewall.@rule[2]=rule
  77. firewall.@rule[2].name='Allow-IGMP'
  78. firewall.@rule[2].src='wan'
  79. firewall.@rule[2].proto='igmp'
  80. firewall.@rule[2].family='ipv4'
  81. firewall.@rule[2].target='ACCEPT'
  82. firewall.@rule[3]=rule
  83. firewall.@rule[3].name='Allow-DHCPv6'
  84. firewall.@rule[3].src='wan'
  85. firewall.@rule[3].proto='udp'
  86. firewall.@rule[3].src_ip='fc00::/6'
  87. firewall.@rule[3].dest_ip='fc00::/6'
  88. firewall.@rule[3].dest_port='546'
  89. firewall.@rule[3].family='ipv6'
  90. firewall.@rule[3].target='ACCEPT'
  91. firewall.@rule[4]=rule
  92. firewall.@rule[4].name='Allow-MLD'
  93. firewall.@rule[4].src='wan'
  94. firewall.@rule[4].proto='icmp'
  95. firewall.@rule[4].src_ip='fe80::/10'
  96. firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
  97. firewall.@rule[4].family='ipv6'
  98. firewall.@rule[4].target='ACCEPT'
  99. firewall.@rule[5]=rule
  100. firewall.@rule[5].name='Allow-ICMPv6-Input'
  101. firewall.@rule[5].src='wan'
  102. firewall.@rule[5].proto='icmp'
  103. firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
  104. firewall.@rule[5].limit='1000/sec'
  105. firewall.@rule[5].family='ipv6'
  106. firewall.@rule[5].target='ACCEPT'
  107. firewall.@rule[6]=rule
  108. firewall.@rule[6].name='Allow-ICMPv6-Forward'
  109. firewall.@rule[6].src='wan'
  110. firewall.@rule[6].dest='*'
  111. firewall.@rule[6].proto='icmp'
  112. firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
  113. firewall.@rule[6].limit='1000/sec'
  114. firewall.@rule[6].family='ipv6'
  115. firewall.@rule[6].target='ACCEPT'
  116. firewall.@rule[7]=rule
  117. firewall.@rule[7].name='Allow-IPSec-ESP'
  118. firewall.@rule[7].src='wan'
  119. firewall.@rule[7].dest='lan'
  120. firewall.@rule[7].proto='esp'
  121. firewall.@rule[7].target='ACCEPT'
  122. firewall.@rule[8]=rule
  123. firewall.@rule[8].name='Allow-ISAKMP'
  124. firewall.@rule[8].src='wan'
  125. firewall.@rule[8].dest='lan'
  126. firewall.@rule[8].dest_port='500'
  127. firewall.@rule[8].proto='udp'
  128. firewall.@rule[8].target='ACCEPT'
  129. firewall.@include[0]=include
  130. firewall.@include[0].path='/etc/firewall.user'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement