Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@OpenWrt:~# ubus call system board
- {
- "kernel": "5.15.167",
- "hostname": "OpenWrt",
- "system": "ARMv8 Processor rev 4",
- "model": "GL.iNet GL-MT6000",
- "board_name": "glinet,gl-mt6000",
- "rootfs_type": "squashfs",
- "release": {
- "distribution": "OpenWrt",
- "version": "23.05.5",
- "revision": "r24106-10cc5fcd00",
- "target": "mediatek/filogic",
- "description": "OpenWrt 23.05.5 r24106-10cc5fcd00"
- }
- }
- root@OpenWrt:~# uci export dhcp
- package dhcp
- config dnsmasq
- option domainneeded '1'
- option localise_queries '1'
- option rebind_protection '0'
- option local '/lan/'
- option domain 'lan'
- option expandhosts '1'
- option cachesize '1000'
- option authoritative '1'
- option readethers '1'
- option leasefile '/tmp/dhcp.leases'
- option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
- option localservice '1'
- option ednspacket_max '1232'
- option noresolv '0'
- option port '54'
- list server '192.168.1.1'
- config dhcp 'lan'
- option interface 'lan'
- option start '100'
- option limit '150'
- option leasetime '12h'
- option dhcpv4 'server'
- option dhcpv6 'server'
- option ra 'server'
- option ra_slaac '1'
- list ra_flags 'managed-config'
- list ra_flags 'other-config'
- option force '1'
- list dhcp_option '6,192.168.1.1'
- list dhcp_option '3,192.168.1.1'
- list dns 'fd3b:aadf:29cc::1'
- config dhcp 'wan'
- option interface 'wan'
- option ignore '1'
- config odhcpd 'odhcpd'
- option maindhcp '0'
- option leasefile '/tmp/hosts/odhcpd'
- option leasetrigger '/usr/sbin/odhcpd-update'
- option loglevel '4'
- config host
- option mac '00:1E:06:42:34:A8'
- option ip '192.168.1.30'
- config host
- option ip '192.168.1.60'
- option mac '60:B7:6E:4A:60:BD'
- config host
- option ip '192.168.1.70'
- option mac '58:24:29:E3:BE:BA'
- config host
- option mac '54:6C:EB:33:17:60'
- option ip '192.168.1.80'
- config host
- option mac '10:3D:1C:67:C6:D1'
- option ip '192.168.1.90'
- config host
- option mac '64:BC:58:EA:7D:EC'
- option ip '192.168.1.50'
- config host
- option mac '34:73:5A:B2:CB:A9'
- option ip '192.168.1.10'
- config host
- option mac 'F6:60:A2:B3:E7:85'
- option ip '192.168.1.100'
- config host
- option mac 'DC:E5:5B:5A:8F:76'
- option ip '192.168.1.110'
- config host
- option mac 'F0:2F:9E:4C:34:8B'
- option ip '192.168.1.130'
- config host
- list mac '2C:7B:A0:4E:AF:AC'
- option ip '192.168.1.140'
- config host
- list mac '00:E0:4C:68:0F:20'
- option ip '192.168.1.239'
- root@OpenWrt:~# uci export firewall
- package firewall
- config defaults
- option syn_flood '1'
- option input 'REJECT'
- option output 'ACCEPT'
- option forward 'REJECT'
- config zone
- option name 'lan'
- list network 'lan'
- option input 'ACCEPT'
- option output 'ACCEPT'
- option forward 'ACCEPT'
- config zone
- option name 'wan'
- list network 'wan'
- list network 'wan6'
- option input 'REJECT'
- option output 'ACCEPT'
- option forward 'REJECT'
- option masq '1'
- option mtu_fix '1'
- config forwarding
- option src 'lan'
- option dest 'wan'
- config rule
- option name 'Allow-DHCP-Renew'
- option src 'wan'
- option proto 'udp'
- option dest_port '68'
- option target 'ACCEPT'
- option family 'ipv4'
- config rule
- option name 'Allow-Ping'
- option src 'wan'
- option proto 'icmp'
- option icmp_type 'echo-request'
- option family 'ipv4'
- option target 'ACCEPT'
- config rule
- option name 'Allow-IGMP'
- option src 'wan'
- option proto 'igmp'
- option family 'ipv4'
- option target 'ACCEPT'
- config rule
- option name 'Allow-DHCPv6'
- option src 'wan'
- option proto 'udp'
- option dest_port '546'
- option family 'ipv6'
- option target 'ACCEPT'
- config rule
- option name 'Allow-MLD'
- option src 'wan'
- option proto 'icmp'
- option src_ip 'fe80::/10'
- list icmp_type '130/0'
- list icmp_type '131/0'
- list icmp_type '132/0'
- list icmp_type '143/0'
- option family 'ipv6'
- option target 'ACCEPT'
- config rule
- option name 'Allow-ICMPv6-Input'
- option src 'wan'
- option proto 'icmp'
- list icmp_type 'echo-request'
- list icmp_type 'echo-reply'
- list icmp_type 'destination-unreachable'
- list icmp_type 'packet-too-big'
- list icmp_type 'time-exceeded'
- list icmp_type 'bad-header'
- list icmp_type 'unknown-header-type'
- list icmp_type 'router-solicitation'
- list icmp_type 'neighbour-solicitation'
- list icmp_type 'router-advertisement'
- list icmp_type 'neighbour-advertisement'
- option limit '1000/sec'
- option family 'ipv6'
- option target 'ACCEPT'
- config rule
- option name 'Allow-ICMPv6-Forward'
- option src 'wan'
- option dest '*'
- option proto 'icmp'
- list icmp_type 'echo-request'
- list icmp_type 'echo-reply'
- list icmp_type 'destination-unreachable'
- list icmp_type 'packet-too-big'
- list icmp_type 'time-exceeded'
- list icmp_type 'bad-header'
- list icmp_type 'unknown-header-type'
- option limit '1000/sec'
- option family 'ipv6'
- option target 'ACCEPT'
- config rule
- option name 'Allow-IPSec-ESP'
- option src 'wan'
- option dest 'lan'
- option proto 'esp'
- option target 'ACCEPT'
- config rule
- option name 'Allow-ISAKMP'
- option src 'wan'
- option dest 'lan'
- option dest_port '500'
- option proto 'udp'
- option target 'ACCEPT'
- config include 'pbr'
- option fw4_compatible '1'
- option type 'script'
- option path '/usr/share/pbr/firewall.include'
- config zone
- option name 'wg0'
- option input 'ACCEPT'
- option output 'ACCEPT'
- option forward 'ACCEPT'
- option masq '1'
- list network 'wg0'
- config forwarding
- option src 'lan'
- option dest 'wg0'
- root@OpenWrt:~# uci export network
- package network
- config interface 'loopback'
- option device 'lo'
- option proto 'static'
- option ipaddr '127.0.0.1'
- option netmask '255.0.0.0'
- config globals 'globals'
- option ula_prefix 'fd3b:aadf:29cc::/48'
- config device
- option name 'br-lan'
- option type 'bridge'
- list ports 'lan1'
- list ports 'lan2'
- list ports 'lan3'
- list ports 'lan4'
- list ports 'lan5'
- config device
- option name 'lan1'
- option macaddr '94:83:c4:a6:7d:3b'
- config device
- option name 'lan2'
- option macaddr '94:83:c4:a6:7d:3b'
- config device
- option name 'lan3'
- option macaddr '94:83:c4:a6:7d:3b'
- config device
- option name 'lan4'
- option macaddr '94:83:c4:a6:7d:3b'
- config device
- option name 'lan5'
- option macaddr '94:83:c4:a6:7d:3b'
- config interface 'lan'
- option device 'br-lan'
- option proto 'static'
- option ipaddr '192.168.1.1'
- option netmask '255.255.255.0'
- option ip6assign '60'
- config device
- option name 'eth1'
- option macaddr '94:83:c4:a6:7d:39'
- config interface 'wan'
- option device 'eth1'
- option proto 'dhcp'
- config interface 'wan6'
- option device 'eth1'
- option proto 'dhcpv6'
- config interface 'wg0'
- option proto 'wireguard'
- option peerdns '0'
- option mtu '1382'
- option private_key 'uIiJvPqEbNU3yVO1rbvfB7QzTZJGmS62f0upHSFG1lM='
- list addresses '10.65.106.171/32'
- list addresses 'fc00:bbbb:bbbb:bb01::2:6aaa/128'
- config wireguard_wg0
- list allowed_ips '0.0.0.0/1'
- list allowed_ips '::0/1'
- list allowed_ips '128.0.0.1/1'
- option route_allowed_ips '1'
- option persistent_keepalive '25'
- option public_key '***'
- option endpoint_host '185.209.196.76'
- config wireguard_wg0
- list allowed_ips '0.0.0.0/1'
- list allowed_ips '::0/1'
- list allowed_ips '128.0.0.1/1'
- option route_allowed_ips '1'
- option persistent_keepalive '25'
- option public_key '***'
- option endpoint_host '193.32.248.70'
- root@OpenWrt:~# uci export pbr
- package pbr
- config pbr 'config'
- option enabled '1'
- option verbosity '2'
- option strict_enforcement '1'
- option resolver_set 'dnsmasq.nftset'
- list resolver_instance '*'
- option ipv6_enabled '0'
- option boot_timeout '30'
- list ignored_interface 'vpnserver'
- list ignored_interface 'wgserver'
- list supported_interface 'wg0'
- option rule_create_option 'add'
- option procd_boot_delay '0'
- option procd_reload_delay '1'
- option webui_show_ignore_target '0'
- option nft_rule_counter '1'
- option nft_set_auto_merge '1'
- option nft_set_counter '1'
- option nft_set_flags_interval '1'
- option nft_set_flags_timeout '0'
- option nft_set_policy 'performance'
- list webui_supported_protocol 'all'
- list webui_supported_protocol 'tcp'
- list webui_supported_protocol 'udp'
- list webui_supported_protocol 'tcp udp'
- list webui_supported_protocol 'icmp'
- config include
- option path '/usr/share/pbr/pbr.user.aws'
- option enabled '0'
- config include
- option path '/usr/share/pbr/pbr.user.netflix'
- option enabled '0'
- config include
- option path '/usr/share/pbr/pbr.user.wg_server_and_client'
- option enabled '0'
- config dns_policy
- option name 'Redirect Local IP DNS'
- option src_addr '192.168.1.5'
- option dest_dns '1.1.1.1'
- option enabled '0'
- config policy
- option name 'Ignore Local Requests'
- option interface 'ignore'
- option dest_addr '10.0.0.0/24 10.0.1.0/24 192.168.100.0/24 192.168.1.0/24'
- option enabled '0'
- config policy
- option name 'Plex/Emby Local Server'
- option interface 'wan'
- option src_port '8096 8920 32400'
- option enabled '0'
- config policy
- option name 'Plex/Emby Remote Servers'
- option interface 'wan'
- option dest_addr 'plex.tv my.plexapp.com emby.media app.emby.media tv.emby.media'
- option enabled '0'
- config policy
- option name 'direct-remote'
- option interface 'wan'
- option dest_port '7 53 80 443 9418 22'
- config policy
- option name 'direct-local'
- option src_port '7 53 80 443 9418 22'
- option interface 'wan'
- config policy
- option name 'libtorrent'
- option src_port '6800-7000'
- option dest_addr '1.1.1.1'
- option interface 'wg0'
- option enabled '0'
- config policy
- option name 'dns-google'
- option dest_addr '1.1.1.1'
- option interface 'wan'
- config policy
- option name 'dns-cloud'
- option dest_addr '8.8.8.8'
- option interface 'wan'
- config policy
- option name 'direct-4a'
- option interface 'wan'
- option src_addr '192.168.1.70'
- config policy
- option name 'direct-4a-5g'
- option interface 'wan'
- option src_addr '192.168.1.60'
- config policy
- option name 'direct-mipad'
- option src_addr '192.168.1.130'
- option interface 'wan'
- config policy
- option name 'direct-citrix'
- option interface 'wan'
- option dest_port '1494 2598 8080 8008 16500-16509 9002 3478-3481'
- config policy
- option name 'phone-4a'
- option src_addr '192.168.1.60'
- option interface 'wan'
- config policy
- option name 'phone-4a-5g'
- option src_addr '192.168.1.70'
- option interface 'wan'
- config policy
- option name 'k8-route'
- option src_addr '192.168.1.140'
- option interface 'wan'
- config policy
- option name '845-eth-test'
- option src_addr '192.168.1.239'
- option interface 'wan'
- config policy
- option name 'icmp'
- option proto 'icmp'
- option interface 'wan'
- option enabled '0'
- config policy
- option name '845-wifi-test'
- option src_addr '192.168.1.90'
- option interface 'wan'
- root@OpenWrt:~# /etc/init.d/pbr status
- pbr - environment
- pbr 1.1.6-22 running on OpenWrt 23.05.5.
- Dnsmasq version 2.90 Copyright (c) 2000-2024 Simon Kelley
- Compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack no-ipset nftset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
- pbr fw4 nft file: /usr/share/nftables.d/ruleset-post/30-pbr.nft
- add chain inet fw4 pbr_mark_0x010000
- add rule inet fw4 pbr_mark_0x010000 mark set mark and 0xff00ffff xor 0x010000
- add rule inet fw4 pbr_mark_0x010000 return
- add chain inet fw4 pbr_mark_0x020000
- add rule inet fw4 pbr_mark_0x020000 mark set mark and 0xff00ffff xor 0x020000
- add rule inet fw4 pbr_mark_0x020000 return
- add rule inet fw4 pbr_prerouting tcp dport { 7, 53, 80, 443, 9418, 22 } goto pbr_mark_0x010000 comment "direct-remote"
- add rule inet fw4 pbr_prerouting udp dport { 7, 53, 80, 443, 9418, 22 } goto pbr_mark_0x010000 comment "direct-remote"
- add rule inet fw4 pbr_prerouting tcp sport { 7, 53, 80, 443, 9418, 22 } goto pbr_mark_0x010000 comment "direct-local"
- add rule inet fw4 pbr_prerouting udp sport { 7, 53, 80, 443, 9418, 22 } goto pbr_mark_0x010000 comment "direct-local"
- add rule inet fw4 pbr_prerouting ip daddr { 1.1.1.1 } goto pbr_mark_0x010000 comment "dns-google"
- add rule inet fw4 pbr_prerouting ip daddr { 8.8.8.8 } goto pbr_mark_0x010000 comment "dns-cloud"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.70 } goto pbr_mark_0x010000 comment "direct-4a"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.60 } goto pbr_mark_0x010000 comment "direct-4a-5g"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.130 } goto pbr_mark_0x010000 comment "direct-mipad"
- add rule inet fw4 pbr_prerouting tcp dport { 1494, 2598, 8080, 8008, 16500-16509, 9002, 3478-3481 } goto pbr_mark_0x010000 comment "direct-citrix"
- add rule inet fw4 pbr_prerouting udp dport { 1494, 2598, 8080, 8008, 16500-16509, 9002, 3478-3481 } goto pbr_mark_0x010000 comment "direct-citrix"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.60 } goto pbr_mark_0x010000 comment "phone-4a"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.70 } goto pbr_mark_0x010000 comment "phone-4a-5g"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.140 } goto pbr_mark_0x010000 comment "k8-route"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.239 } goto pbr_mark_0x010000 comment "845-eth-test"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.90 } goto pbr_mark_0x010000 comment "845-wifi-test"
- pbr chains - policies
- chain pbr_forward { # handle 39
- }
- chain pbr_input { # handle 40
- }
- chain pbr_output { # handle 41
- }
- chain pbr_postrouting { # handle 43
- }
- chain pbr_prerouting { # handle 42
- tcp dport { 7, 22, 53, 80, 443, 9418 } goto pbr_mark_0x010000 comment "direct-remote" # handle 1790
- udp dport { 7, 22, 53, 80, 443, 9418 } goto pbr_mark_0x010000 comment "direct-remote" # handle 1792
- tcp sport { 7, 22, 53, 80, 443, 9418 } goto pbr_mark_0x010000 comment "direct-local" # handle 1794
- udp sport { 7, 22, 53, 80, 443, 9418 } goto pbr_mark_0x010000 comment "direct-local" # handle 1796
- ip daddr 1.1.1.1 goto pbr_mark_0x010000 comment "dns-google" # handle 1797
- ip daddr 8.8.8.8 goto pbr_mark_0x010000 comment "dns-cloud" # handle 1798
- ip saddr 192.168.1.70 goto pbr_mark_0x010000 comment "direct-4a" # handle 1799
- ip saddr 192.168.1.60 goto pbr_mark_0x010000 comment "direct-4a-5g" # handle 1800
- ip saddr 192.168.1.130 goto pbr_mark_0x010000 comment "direct-mipad" # handle 1801
- tcp dport { 1494, 2598, 3478-3481, 8008, 8080, 9002, 16500-16509 } goto pbr_mark_0x010000 comment "direct-citrix" # handle 1803
- udp dport { 1494, 2598, 3478-3481, 8008, 8080, 9002, 16500-16509 } goto pbr_mark_0x010000 comment "direct-citrix" # handle 1805
- ip saddr 192.168.1.60 goto pbr_mark_0x010000 comment "phone-4a" # handle 1806
- ip saddr 192.168.1.70 goto pbr_mark_0x010000 comment "phone-4a-5g" # handle 1807
- ip saddr 192.168.1.140 goto pbr_mark_0x010000 comment "k8-route" # handle 1808
- ip saddr 192.168.1.239 goto pbr_mark_0x010000 comment "845-eth-test" # handle 1809
- ip saddr 192.168.1.90 goto pbr_mark_0x010000 comment "845-wifi-test" # handle 1810
- }
- chain pbr_dstnat { # handle 38
- }
- pbr chains - marking
- chain pbr_mark_0x010000 { # handle 1783
- meta mark set meta mark & 0xff01ffff | 0x00010000 # handle 1784
- return # handle 1785
- }
- chain pbr_mark_0x020000 { # handle 1786
- meta mark set meta mark & 0xff02ffff | 0x00020000 # handle 1787
- return # handle 1788
- }
- pbr nft sets
- IPv4 table 256 route: default via 89.77.142.1 dev eth1
- IPv4 table 256 rule(s):
- 30000: from all fwmark 0x10000/0xff0000 lookup pbr_wan
- IPv4 table 257 route: default via 10.65.106.171 dev wg0
- IPv4 table 257 rule(s):
- 29998: from all fwmark 0x20000/0xff0000 lookup pbr_wg0
- root@OpenWrt:~# /etc/init.d/pbr reload
- Using wan interface (on_start): wan
- Found wan gateway (on_start): 89.77.142.1
- Setting up routing for 'wan/eth1/89.77.142.1' [✓]
- Setting up routing for 'wg0/10.65.106.171' [✓]
- Routing 'direct-remote' via wan [✓]
- Routing 'direct-local' via wan [✓]
- Routing 'dns-google' via wan [✓]
- Routing 'dns-cloud' via wan [✓]
- Routing 'direct-4a' via wan [✓]
- Routing 'direct-4a-5g' via wan [✓]
- Routing 'direct-mipad' via wan [✓]
- Routing 'direct-citrix' via wan [✓]
- Routing 'phone-4a' via wan [✓]
- Routing 'phone-4a-5g' via wan [✓]
- Routing 'k8-route' via wan [✓]
- Routing '845-eth-test' via wan [✓]
- Routing '845-wifi-test' via wan [✓]
- Installing fw4 nft file [✓]
- pbr 1.1.6-22 monitoring interfaces: wan wg0
- pbr 1.1.6-22 (fw4 nft file mode) started with gateways:
- wan/eth1/89.77.142.1
- wg0/10.65.106.171 [✓]
- root@OpenWrt:~# /etc/init.d/pbr status
- pbr - environment
- pbr 1.1.6-22 running on OpenWrt 23.05.5.
- Dnsmasq version 2.90 Copyright (c) 2000-2024 Simon Kelley
- Compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack no-ipset nftset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
- pbr fw4 nft file: /usr/share/nftables.d/ruleset-post/30-pbr.nft
- add chain inet fw4 pbr_mark_0x010000
- add rule inet fw4 pbr_mark_0x010000 counter mark set mark and 0xff00ffff xor 0x010000
- add rule inet fw4 pbr_mark_0x010000 return
- add chain inet fw4 pbr_mark_0x020000
- add rule inet fw4 pbr_mark_0x020000 counter mark set mark and 0xff00ffff xor 0x020000
- add rule inet fw4 pbr_mark_0x020000 return
- add rule inet fw4 pbr_prerouting tcp dport { 7, 53, 80, 443, 9418, 22 } counter goto pbr_mark_0x010000 comment "direct-remote"
- add rule inet fw4 pbr_prerouting udp dport { 7, 53, 80, 443, 9418, 22 } counter goto pbr_mark_0x010000 comment "direct-remote"
- add rule inet fw4 pbr_prerouting tcp sport { 7, 53, 80, 443, 9418, 22 } counter goto pbr_mark_0x010000 comment "direct-local"
- add rule inet fw4 pbr_prerouting udp sport { 7, 53, 80, 443, 9418, 22 } counter goto pbr_mark_0x010000 comment "direct-local"
- add rule inet fw4 pbr_prerouting ip daddr { 1.1.1.1 } counter goto pbr_mark_0x010000 comment "dns-google"
- add rule inet fw4 pbr_prerouting ip daddr { 8.8.8.8 } counter goto pbr_mark_0x010000 comment "dns-cloud"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.70 } counter goto pbr_mark_0x010000 comment "direct-4a"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.60 } counter goto pbr_mark_0x010000 comment "direct-4a-5g"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.130 } counter goto pbr_mark_0x010000 comment "direct-mipad"
- add rule inet fw4 pbr_prerouting tcp dport { 1494, 2598, 8080, 8008, 16500-16509, 9002, 3478-3481 } counter goto pbr_mark_0x010000 comment "direct-citrix"
- add rule inet fw4 pbr_prerouting udp dport { 1494, 2598, 8080, 8008, 16500-16509, 9002, 3478-3481 } counter goto pbr_mark_0x010000 comment "direct-citrix"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.60 } counter goto pbr_mark_0x010000 comment "phone-4a"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.70 } counter goto pbr_mark_0x010000 comment "phone-4a-5g"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.140 } counter goto pbr_mark_0x010000 comment "k8-route"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.239 } counter goto pbr_mark_0x010000 comment "845-eth-test"
- add rule inet fw4 pbr_prerouting ip saddr { 192.168.1.90 } counter goto pbr_mark_0x010000 comment "845-wifi-test"
- pbr chains - policies
- chain pbr_forward { # handle 39
- }
- chain pbr_input { # handle 40
- }
- chain pbr_output { # handle 41
- }
- chain pbr_postrouting { # handle 43
- }
- chain pbr_prerouting { # handle 42
- tcp dport { 7, 22, 53, 80, 443, 9418 } counter packets 20 bytes 968 goto pbr_mark_0x010000 comment "direct-remote" # handle 1983
- udp dport { 7, 22, 53, 80, 443, 9418 } counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "direct-remote" # handle 1985
- tcp sport { 7, 22, 53, 80, 443, 9418 } counter packets 6 bytes 516 goto pbr_mark_0x010000 comment "direct-local" # handle 1987
- udp sport { 7, 22, 53, 80, 443, 9418 } counter packets 2 bytes 260 goto pbr_mark_0x010000 comment "direct-local" # handle 1989
- ip daddr 1.1.1.1 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "dns-google" # handle 1990
- ip daddr 8.8.8.8 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "dns-cloud" # handle 1991
- ip saddr 192.168.1.70 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "direct-4a" # handle 1992
- ip saddr 192.168.1.60 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "direct-4a-5g" # handle 1993
- ip saddr 192.168.1.130 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "direct-mipad" # handle 1994
- tcp dport { 1494, 2598, 3478-3481, 8008, 8080, 9002, 16500-16509 } counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "direct-citrix" # handle 1996
- udp dport { 1494, 2598, 3478-3481, 8008, 8080, 9002, 16500-16509 } counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "direct-citrix" # handle 1998
- ip saddr 192.168.1.60 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "phone-4a" # handle 1999
- ip saddr 192.168.1.70 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "phone-4a-5g" # handle 2000
- ip saddr 192.168.1.140 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "k8-route" # handle 2001
- ip saddr 192.168.1.239 counter packets 0 bytes 0 goto pbr_mark_0x010000 comment "845-eth-test" # handle 2002
- ip saddr 192.168.1.90 counter packets 1 bytes 60 goto pbr_mark_0x010000 comment "845-wifi-test" # handle 2003
- }
- chain pbr_dstnat { # handle 38
- }
- pbr chains - marking
- chain pbr_mark_0x010000 { # handle 1976
- counter packets 40 bytes 4463 meta mark set meta mark & 0xff01ffff | 0x00010000 # handle 1977
- return # handle 1978
- }
- chain pbr_mark_0x020000 { # handle 1979
- counter packets 0 bytes 0 meta mark set meta mark & 0xff02ffff | 0x00020000 # handle 1980
- return # handle 1981
- }
- pbr nft sets
- IPv4 table 256 route: default via 89.77.142.1 dev eth1
- IPv4 table 256 rule(s):
- 30000: from all fwmark 0x10000/0xff0000 lookup pbr_wan
- IPv4 table 257 route: default via 10.65.106.171 dev wg0
- IPv4 table 257 rule(s):
- 29998: from all fwmark 0x20000/0xff0000 lookup pbr_wg0
- root@OpenWrt:~#
Add Comment
Please, Sign In to add comment