Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 1000
- link/ether b0:7f:b9:12:63:30 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::b27f:b9ff:fe12:6330/64 scope link
- valid_lft forever preferred_lft forever
- 3: wlan0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
- link/ether b0:7f:b9:12:63:30 brd ff:ff:ff:ff:ff:ff
- 5: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
- link/ether b0:7f:b9:12:63:30 brd ff:ff:ff:ff:ff:ff
- inet 192.168.10.1/24 brd 192.168.10.255 scope global br-lan
- valid_lft forever preferred_lft forever
- inet6 fd9d:6bfa:4278::1/60 scope global noprefixroute
- valid_lft forever preferred_lft forever
- inet6 fe80::b27f:b9ff:fe12:6330/64 scope link
- valid_lft forever preferred_lft forever
- 6: eth0.1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether b0:7f:b9:12:63:30 brd ff:ff:ff:ff:ff:ff
- 7: br-wan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
- link/ether b0:7f:b9:12:63:31 brd ff:ff:ff:ff:ff:ff
- inet 192.168.1.172/24 brd 192.168.1.255 scope global br-wan
- valid_lft forever preferred_lft forever
- inet6 fe80::b27f:b9ff:fe12:6331/64 scope link
- valid_lft forever preferred_lft forever
- 8: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-wan state UP group default qlen 1000
- link/ether b0:7f:b9:12:63:31 brd ff:ff:ff:ff:ff:ff
- 9: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
- link/none
- inet 10.8.0.5/24 brd 10.8.0.255 scope global wg0
- valid_lft forever preferred_lft forever
- 10: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether b0:7f:b9:12:63:34 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::b27f:b9ff:fe12:6334/64 scope link
- valid_lft forever preferred_lft forever
- default dev wg0 proto static scope link
- 10.8.0.0/24 dev wg0 proto kernel scope link src 10.8.0.5
- xxxxxxxxxxx via 192.168.1.254 dev br-wan proto static
- 192.168.1.0/24 dev br-wan proto kernel scope link src 192.168.1.172
- 192.168.10.0/24 dev br-lan proto kernel scope link src 192.168.10.1
- broadcast 10.8.0.0 dev wg0 table local proto kernel scope link src 10.8.0.5
- local 10.8.0.5 dev wg0 table local proto kernel scope host src 10.8.0.5
- broadcast 10.8.0.255 dev wg0 table local proto kernel scope link src 10.8.0.5
- broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
- local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
- local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
- broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
- broadcast 192.168.1.0 dev br-wan table local proto kernel scope link src 192.168.1.172
- local 192.168.1.172 dev br-wan table local proto kernel scope host src 192.168.1.172
- broadcast 192.168.1.255 dev br-wan table local proto kernel scope link src 192.168.1.172
- broadcast 192.168.10.0 dev br-lan table local proto kernel scope link src 192.168.10.1
- local 192.168.10.1 dev br-lan table local proto kernel scope host src 192.168.10.1
- broadcast 192.168.10.255 dev br-lan table local proto kernel scope link src 192.168.10.1
- fd9d:6bfa:4278::/64 dev br-lan proto static metric 1024 pref medium
- unreachable fd9d:6bfa:4278::/48 dev lo proto static metric 2147483647 error 4294967148 pref medium
- fe80::/64 dev eth0 proto kernel metric 256 pref medium
- fe80::/64 dev br-wan proto kernel metric 256 pref medium
- fe80::/64 dev br-lan proto kernel metric 256 pref medium
- fe80::/64 dev wlan1 proto kernel metric 256 pref medium
- local ::1 dev lo table local proto kernel metric 0 pref medium
- anycast fd9d:6bfa:4278:: dev br-lan table local proto kernel metric 0 pref medium
- local fd9d:6bfa:4278::1 dev br-lan table local proto kernel metric 0 pref medium
- anycast fe80:: dev br-wan table local proto kernel metric 0 pref medium
- anycast fe80:: dev eth0 table local proto kernel metric 0 pref medium
- anycast fe80:: dev br-lan table local proto kernel metric 0 pref medium
- anycast fe80:: dev wlan1 table local proto kernel metric 0 pref medium
- local fe80::b27f:b9ff:fe12:6330 dev eth0 table local proto kernel metric 0 pref medium
- local fe80::b27f:b9ff:fe12:6330 dev br-lan table local proto kernel metric 0 pref medium
- local fe80::b27f:b9ff:fe12:6331 dev br-wan table local proto kernel metric 0 pref medium
- local fe80::b27f:b9ff:fe12:6334 dev wlan1 table local proto kernel metric 0 pref medium
- ff00::/8 dev eth0 table local metric 256 pref medium
- ff00::/8 dev br-wan table local metric 256 pref medium
- ff00::/8 dev br-lan table local metric 256 pref medium
- ff00::/8 dev wg0 table local metric 256 pref medium
- ff00::/8 dev wlan1 table local metric 256 pref medium
- 0: from all lookup local
- 32766: from all lookup main
- 32767: from all lookup default
- # Generated by iptables-save v1.8.3 on Sat Jan 30 12:31:42 2021
- *nat
- :PREROUTING ACCEPT [17122:1814476]
- :INPUT ACCEPT [3884:264570]
- :OUTPUT ACCEPT [2808:192859]
- :POSTROUTING ACCEPT [102:8497]
- :postrouting_lan_rule - [0:0]
- :postrouting_rule - [0:0]
- :postrouting_wan_rule - [0:0]
- :postrouting_wired_rule - [0:0]
- :prerouting_lan_rule - [0:0]
- :prerouting_rule - [0:0]
- :prerouting_wan_rule - [0:0]
- :prerouting_wired_rule - [0:0]
- :zone_lan_postrouting - [0:0]
- :zone_lan_prerouting - [0:0]
- :zone_wan_postrouting - [0:0]
- :zone_wan_prerouting - [0:0]
- :zone_wired_postrouting - [0:0]
- :zone_wired_prerouting - [0:0]
- -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
- -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
- -A PREROUTING -i br-wan -m comment --comment "!fw3" -j zone_wan_prerouting
- -A PREROUTING -i wg0 -m comment --comment "!fw3" -j zone_wan_prerouting
- -A PREROUTING -i wg0 -m comment --comment "!fw3" -j zone_wired_prerouting
- -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
- -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
- -A POSTROUTING -o br-wan -m comment --comment "!fw3" -j zone_wan_postrouting
- -A POSTROUTING -o wg0 -m comment --comment "!fw3" -j zone_wan_postrouting
- -A POSTROUTING -o wg0 -m comment --comment "!fw3" -j zone_wired_postrouting
- -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
- -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
- -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
- -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
- -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
- -A zone_wired_postrouting -m comment --comment "!fw3: Custom wired postrouting rule chain" -j postrouting_wired_rule
- -A zone_wired_postrouting -m comment --comment "!fw3" -j MASQUERADE
- -A zone_wired_prerouting -m comment --comment "!fw3: Custom wired prerouting rule chain" -j prerouting_wired_rule
- COMMIT
- # Completed on Sat Jan 30 12:31:42 2021
- # Generated by iptables-save v1.8.3 on Sat Jan 30 12:31:42 2021
- *mangle
- :PREROUTING ACCEPT [4236164:7663680835]
- :INPUT ACCEPT [2827751:3967875148]
- :FORWARD ACCEPT [1405265:3695248541]
- :OUTPUT ACCEPT [716657:157985443]
- :POSTROUTING ACCEPT [2121765:3853223807]
- -A FORWARD -o br-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -i br-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -o wg0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -i wg0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -o wg0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wired MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -i wg0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wired MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- COMMIT
- # Completed on Sat Jan 30 12:31:42 2021
- # Generated by iptables-save v1.8.3 on Sat Jan 30 12:31:42 2021
- *filter
- :INPUT ACCEPT [36:1872]
- :FORWARD DROP [0:0]
- :OUTPUT ACCEPT [0:0]
- :banIP - [0:0]
- :forwarding_lan_rule - [0:0]
- :forwarding_rule - [0:0]
- :forwarding_wan_rule - [0:0]
- :forwarding_wired_rule - [0:0]
- :input_lan_rule - [0:0]
- :input_rule - [0:0]
- :input_wan_rule - [0:0]
- :input_wired_rule - [0:0]
- :output_lan_rule - [0:0]
- :output_rule - [0:0]
- :output_wan_rule - [0:0]
- :output_wired_rule - [0:0]
- :reject - [0:0]
- :syn_flood - [0:0]
- :zone_lan_dest_ACCEPT - [0:0]
- :zone_lan_forward - [0:0]
- :zone_lan_input - [0:0]
- :zone_lan_output - [0:0]
- :zone_lan_src_ACCEPT - [0:0]
- :zone_wan_dest_ACCEPT - [0:0]
- :zone_wan_forward - [0:0]
- :zone_wan_input - [0:0]
- :zone_wan_output - [0:0]
- :zone_wan_src_ACCEPT - [0:0]
- :zone_wired_dest_ACCEPT - [0:0]
- :zone_wired_forward - [0:0]
- :zone_wired_input - [0:0]
- :zone_wired_output - [0:0]
- :zone_wired_src_ACCEPT - [0:0]
- -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
- -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
- -A INPUT -i br-wan -m comment --comment "!fw3" -j zone_wan_input
- -A INPUT -i wg0 -m comment --comment "!fw3" -j zone_wan_input
- -A INPUT -i wg0 -m comment --comment "!fw3" -j zone_wired_input
- -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
- -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
- -A FORWARD -i br-wan -m comment --comment "!fw3" -j zone_wan_forward
- -A FORWARD -i wg0 -m comment --comment "!fw3" -j zone_wan_forward
- -A FORWARD -i wg0 -m comment --comment "!fw3" -j zone_wired_forward
- -A FORWARD -m comment --comment "!fw3" -j reject
- -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
- -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
- -A OUTPUT -o br-wan -m comment --comment "!fw3" -j zone_wan_output
- -A OUTPUT -o wg0 -m comment --comment "!fw3" -j zone_wan_output
- -A OUTPUT -o wg0 -m comment --comment "!fw3" -j zone_wired_output
- -A banIP -i br-wan6 -m conntrack --ctstate NEW -m set --match-set blacklist src -j DROP
- -A banIP -o br-wan6 -m conntrack --ctstate NEW -m set --match-set blacklist dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set blacklist src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set blacklist src -j DROP
- -A banIP -o br-wan -m conntrack --ctstate NEW -m set --match-set blacklist dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -o wg0 -m conntrack --ctstate NEW -m set --match-set blacklist dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set DoH src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set DoH src -j DROP
- -A banIP -o br-wan -m conntrack --ctstate NEW -m set --match-set DoH dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -o wg0 -m conntrack --ctstate NEW -m set --match-set DoH dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set tor src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set threat src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set threat src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set tor src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set proxy src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set proxy src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set yoyo src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set yoyo src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set debl src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set debl src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set edrop src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set edrop src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set drop src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set drop src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set firehol1 src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set firehol1 src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set iblocklist src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set iblocklist src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set firehol2 src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set firehol2 src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set firehol3 src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set firehol3 src -j DROP
- -A banIP -i br-wan -m conntrack --ctstate NEW -m set --match-set firehol4 src -j DROP
- -A banIP -i wg0 -m conntrack --ctstate NEW -m set --match-set firehol4 src -j DROP
- -A forwarding_lan_rule -j banIP
- -A forwarding_wan_rule -j banIP
- -A input_lan_rule -p udp -m udp --sport 67:68 --dport 67:68 -j RETURN
- -A input_lan_rule -j banIP
- -A input_wan_rule -p udp -m udp --sport 67:68 --dport 67:68 -j RETURN
- -A input_wan_rule -j banIP
- -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
- -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
- -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
- -A syn_flood -m comment --comment "!fw3" -j DROP
- -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
- -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
- -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
- -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
- -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
- -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_ACCEPT -o br-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wan_dest_ACCEPT -o br-wan -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_ACCEPT -o wg0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wan_dest_ACCEPT -o wg0 -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
- -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -m comment --comment "!fw3: Zone wan to wired forwarding policy" -j zone_wired_dest_ACCEPT
- -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
- -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
- -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
- -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
- -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
- -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_ACCEPT
- -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
- -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
- -A zone_wan_src_ACCEPT -i br-wan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_src_ACCEPT -i wg0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- -A zone_wired_dest_ACCEPT -o wg0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wired_dest_ACCEPT -o wg0 -m comment --comment "!fw3" -j ACCEPT
- -A zone_wired_forward -m comment --comment "!fw3: Custom wired forwarding rule chain" -j forwarding_wired_rule
- -A zone_wired_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_wired_forward -m comment --comment "!fw3" -j zone_wired_dest_ACCEPT
- -A zone_wired_input -m comment --comment "!fw3: Custom wired input rule chain" -j input_wired_rule
- -A zone_wired_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_wired_input -m comment --comment "!fw3" -j zone_wired_src_ACCEPT
- -A zone_wired_output -m comment --comment "!fw3: Custom wired output rule chain" -j output_wired_rule
- -A zone_wired_output -m comment --comment "!fw3" -j zone_wired_dest_ACCEPT
- -A zone_wired_src_ACCEPT -i wg0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- COMMIT
- # Completed on Sat Jan 30 12:31:42 2021
- net.ipv4.conf.all.forwarding = 1
- net.ipv4.conf.all.mc_forwarding = 0
- net.ipv4.conf.br-lan.forwarding = 1
- net.ipv4.conf.br-lan.mc_forwarding = 0
- net.ipv4.conf.br-wan.forwarding = 1
- net.ipv4.conf.br-wan.mc_forwarding = 0
- net.ipv4.conf.default.forwarding = 1
- net.ipv4.conf.default.mc_forwarding = 0
- net.ipv4.conf.eth0.forwarding = 1
- net.ipv4.conf.eth0.mc_forwarding = 0
- net.ipv4.conf.eth0.1.forwarding = 1
- net.ipv4.conf.eth0.1.mc_forwarding = 0
- net.ipv4.conf.eth0.2.forwarding = 1
- net.ipv4.conf.eth0.2.mc_forwarding = 0
- net.ipv4.conf.lo.forwarding = 1
- net.ipv4.conf.lo.mc_forwarding = 0
- net.ipv4.conf.wg0.forwarding = 1
- net.ipv4.conf.wg0.mc_forwarding = 0
- net.ipv4.conf.wlan0.forwarding = 1
- net.ipv4.conf.wlan0.mc_forwarding = 0
- net.ipv4.conf.wlan1.forwarding = 1
- net.ipv4.conf.wlan1.mc_forwarding = 0
- net.ipv4.ip_forward = 1
- net.ipv4.ip_forward_use_pmtu = 0
- net.ipv6.conf.all.forwarding = 1
- net.ipv6.conf.all.mc_forwarding = 0
- net.ipv6.conf.br-lan.forwarding = 1
- net.ipv6.conf.br-lan.mc_forwarding = 0
- net.ipv6.conf.br-wan.forwarding = 1
- net.ipv6.conf.br-wan.mc_forwarding = 0
- net.ipv6.conf.default.forwarding = 1
- net.ipv6.conf.default.mc_forwarding = 0
- net.ipv6.conf.eth0.forwarding = 1
- net.ipv6.conf.eth0.mc_forwarding = 0
- net.ipv6.conf.eth0.1.forwarding = 1
- net.ipv6.conf.eth0.1.mc_forwarding = 0
- net.ipv6.conf.eth0.2.forwarding = 1
- net.ipv6.conf.eth0.2.mc_forwarding = 0
- net.ipv6.conf.lo.forwarding = 1
- net.ipv6.conf.lo.mc_forwarding = 0
- net.ipv6.conf.wg0.forwarding = 1
- net.ipv6.conf.wg0.mc_forwarding = 0
- net.ipv6.conf.wlan0.forwarding = 1
- net.ipv6.conf.wlan0.mc_forwarding = 0
- net.ipv6.conf.wlan1.forwarding = 1
- net.ipv6.conf.wlan1.mc_forwarding = 0
- interface: wg0
- public key: xxxxxxxxxxxxxx
- private key: (hidden)
- listening port: 52360
- peer: xxxxxxxxxx
- preshared key: (hidden)
- endpoint: xxxxxxxxx:51820
- allowed ips: 0.0.0.0/0
- latest handshake: 58 seconds ago
- transfer: 3.59 GiB received, 84.48 MiB sent
- persistent keepalive: every 25 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement