Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@OpenWrt:~# ip route show table all
- default via XXX.XXX.XXY.1 dev eth0.2 proto static src XXX.XXX.XXX.89
- XXX.XXX.XXY.0/22 dev eth0.2 proto kernel scope link src XXX.XXX.XXX.89
- 192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.1
- 192.168.100.0/24 dev eth0.2 proto kernel scope link src 192.168.100.10
- broadcast XXX.XXX.XXY.0 dev eth0.2 table local proto kernel scope link src XXX.XXX.XXX.89
- local XXX.XXX.XXX.89 dev eth0.2 table local proto kernel scope host src XXX.XXX.XXX.89
- broadcast XXX.XXX.XXZ.255 dev eth0.2 table local proto kernel scope link src XXX.XXX.XXX.89
- broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
- local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
- local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
- broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
- broadcast 192.168.1.0 dev br-lan table local proto kernel scope link src 192.168.1.1
- local 192.168.1.1 dev br-lan table local proto kernel scope host src 192.168.1.1
- broadcast 192.168.1.255 dev br-lan table local proto kernel scope link src 192.168.1.1
- broadcast 192.168.100.0 dev eth0.2 table local proto kernel scope link src 192.168.100.10
- local 192.168.100.10 dev eth0.2 table local proto kernel scope host src 192.168.100.10
- broadcast 192.168.100.255 dev eth0.2 table local proto kernel scope link src 192.168.100.10
- XXXX:XXXX:XXXX::/64 dev br-lan proto static metric 1024 pref medium
- unreachable XXXX:XXXX:XXXX::/48 dev lo proto static metric 2147483647 error 4294967183 pref medium
- fe80::/64 dev eth1 proto kernel metric 256 pref medium
- fe80::/64 dev br-lan proto kernel metric 256 pref medium
- fe80::/64 dev eth0 proto kernel metric 256 pref medium
- fe80::/64 dev eth0.2 proto kernel metric 256 pref medium
- fe80::/64 dev wlan1 proto kernel metric 256 pref medium
- fe80::/64 dev wlan0 proto kernel metric 256 pref medium
- fe80::/64 dev ifb4eth0.2 proto kernel metric 256 pref medium
- local ::1 dev lo table local proto kernel metric 0 pref medium
- anycast XXXX:XXXX:XXXX:: dev br-lan table local proto kernel metric 0 pref medium
- local XXXX:XXXX:XXXX::1 dev br-lan table local proto kernel metric 0 pref medium
- anycast fe80:: dev br-lan table local proto kernel metric 0 pref medium
- anycast fe80:: dev eth1 table local proto kernel metric 0 pref medium
- anycast fe80:: dev eth0.2 table local proto kernel metric 0 pref medium
- anycast fe80:: dev eth0 table local proto kernel metric 0 pref medium
- anycast fe80:: dev wlan0 table local proto kernel metric 0 pref medium
- anycast fe80:: dev wlan1 table local proto kernel metric 0 pref medium
- anycast fe80:: dev ifb4eth0.2 table local proto kernel metric 0 pref medium
- local fe80::3a94:edff:feb6:8632 dev br-lan table local proto kernel metric 0 pref medium
- local fe80::3a94:edff:feb6:8632 dev eth1 table local proto kernel metric 0 pref medium
- local fe80::3a94:edff:feb6:8633 dev eth0.2 table local proto kernel metric 0 pref medium
- local fe80::3a94:edff:feb6:8633 dev eth0 table local proto kernel metric 0 pref medium
- local fe80::3a94:edff:feb6:8634 dev wlan0 table local proto kernel metric 0 pref medium
- local fe80::3a94:edff:feb6:8635 dev wlan1 table local proto kernel metric 0 pref medium
- local fe80::c089:81ff:fe5e:201d dev ifb4eth0.2 table local proto kernel metric 0 pref medium
- ff00::/8 dev br-lan table local proto kernel metric 256 pref medium
- ff00::/8 dev eth1 table local proto kernel metric 256 pref medium
- ff00::/8 dev eth0 table local proto kernel metric 256 pref medium
- ff00::/8 dev eth0.2 table local proto kernel metric 256 pref medium
- ff00::/8 dev wlan1 table local proto kernel metric 256 pref medium
- ff00::/8 dev wlan0 table local proto kernel metric 256 pref medium
- ff00::/8 dev ifb4eth0.2 table local proto kernel metric 256 pref medium
- root@OpenWrt:~# ip address show
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:33 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::3a94:edff:feb6:8633/64 scope link
- valid_lft forever preferred_lft forever
- 3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:32 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::3a94:edff:feb6:8632/64 scope link
- valid_lft forever preferred_lft forever
- 5: sit0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN group default qlen 1000
- link/sit 0.0.0.0 brd 0.0.0.0
- 6: ifb0: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN group default qlen 32
- link/ether XX:XX:XX:XX:XX:XX brd ff:ff:ff:ff:ff:ff
- 7: ifb1: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN group default qlen 32
- link/ether XX:XX:XX:XX:XX:XX brd ff:ff:ff:ff:ff:ff
- 8: gre0@NONE: <NOARP> mtu 1476 qdisc noop state DOWN group default qlen 1000
- link/gre 0.0.0.0 brd 0.0.0.0
- 9: gretap0@NONE: <BROADCAST,MULTICAST> mtu 1462 qdisc noop state DOWN group default qlen 1000
- link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
- 10: erspan0@NONE: <BROADCAST,MULTICAST> mtu 1450 qdisc noop state DOWN group default qlen 1000
- link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
- 13: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:32 brd ff:ff:ff:ff:ff:ff
- inet 192.168.1.1/24 brd 192.168.1.255 scope global br-lan
- valid_lft forever preferred_lft forever
- inet6 fd93:31ef:a315::1/60 scope global noprefixroute
- valid_lft forever preferred_lft forever
- inet6 fe80::3a94:edff:feb6:8632/64 scope link
- valid_lft forever preferred_lft forever
- 14: eth1.1@eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:32 brd ff:ff:ff:ff:ff:ff
- 15: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc htb state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:33 brd ff:ff:ff:ff:ff:ff
- inet XXX.XXX.XXX.89/22 brd XXX.XXX.XXY.255 scope global eth0.2
- valid_lft forever preferred_lft forever
- inet 192.168.100.10/24 brd 192.168.100.255 scope global eth0.2
- valid_lft forever preferred_lft forever
- inet6 fe80::3a94:edff:feb6:8633/64 scope link
- valid_lft forever preferred_lft forever
- 20: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:35 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::3a94:edff:feb6:8635/64 scope link
- valid_lft forever preferred_lft forever
- 21: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
- link/ether XX:XX:XX:XX:XX:34 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::3a94:edff:feb6:8634/64 scope link
- valid_lft forever preferred_lft forever
- 45: ifb4eth0.2: <BROADCAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc htb state UNKNOWN group default qlen 32
- link/ether XX:XX:XX:XX:XX:XX brd ff:ff:ff:ff:ff:ff
- inet6 fe80::c089:81ff:fe5e:201d/64 scope link
- valid_lft forever preferred_lft forever
- ip rule show
- 0: from all lookup local
- 32766: from all lookup main
- 32767: from all lookup default
- iptables-save
- # Generated by iptables-save v1.8.3 on Sat Feb 27 00:17:37 2021
- *nat
- :PREROUTING ACCEPT [4267:890435]
- :INPUT ACCEPT [1112:108445]
- :OUTPUT ACCEPT [1542:108556]
- :POSTROUTING ACCEPT [276:20309]
- :MINIUPNPD - [0:0]
- :MINIUPNPD-POSTROUTING - [0:0]
- :postrouting_lan_rule - [0:0]
- :postrouting_rule - [0:0]
- :postrouting_wan_rule - [0:0]
- :prerouting_lan_rule - [0:0]
- :prerouting_rule - [0:0]
- :prerouting_wan_rule - [0:0]
- :zone_lan_postrouting - [0:0]
- :zone_lan_prerouting - [0:0]
- :zone_wan_postrouting - [0:0]
- :zone_wan_prerouting - [0:0]
- -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
- -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
- -A PREROUTING -i eth0.2 -m comment --comment "!fw3" -j zone_wan_prerouting
- -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
- -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
- -A POSTROUTING -o eth0.2 -m comment --comment "!fw3" -j zone_wan_postrouting
- -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
- -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
- -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
- -A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
- -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
- -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
- -A zone_wan_prerouting -j MINIUPNPD
- COMMIT
- # Completed on Sat Feb 27 00:17:37 2021
- # Generated by iptables-save v1.8.3 on Sat Feb 27 00:17:37 2021
- *raw
- :PREROUTING ACCEPT [688507:635848102]
- :OUTPUT ACCEPT [21588:5986955]
- :zone_lan_helper - [0:0]
- -A PREROUTING -i br-lan -m comment --comment "!fw3: lan CT helper assignment" -j zone_lan_helper
- COMMIT
- # Completed on Sat Feb 27 00:17:37 2021
- # Generated by iptables-save v1.8.3 on Sat Feb 27 00:17:37 2021
- *mangle
- :PREROUTING ACCEPT [688511:635848438]
- :INPUT ACCEPT [21569:3139538]
- :FORWARD ACCEPT [662672:632459916]
- :OUTPUT ACCEPT [21589:5987583]
- :POSTROUTING ACCEPT [684072:638438416]
- :QOS_MARK_eth0.2 - [0:0]
- -A PREROUTING -i vtun+ -p tcp -j MARK --set-xmark 0x2/0xff
- -A PREROUTING -i eth0.2 -m dscp ! --dscp 0x00 -j DSCP --set-dscp 0x00
- -A FORWARD -o eth0.2 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A FORWARD -i eth0.2 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
- -A OUTPUT -p udp -m multiport --ports 123,53 -j DSCP --set-dscp 0x24
- -A POSTROUTING -o eth0.2 -m mark --mark 0x0/0xff -g QOS_MARK_eth0.2
- -A QOS_MARK_eth0.2 -j MARK --set-xmark 0x2/0xff
- -A QOS_MARK_eth0.2 -m dscp --dscp 0x08 -j MARK --set-xmark 0x3/0xff
- -A QOS_MARK_eth0.2 -m dscp --dscp 0x30 -j MARK --set-xmark 0x1/0xff
- -A QOS_MARK_eth0.2 -m dscp --dscp 0x2e -j MARK --set-xmark 0x1/0xff
- -A QOS_MARK_eth0.2 -m dscp --dscp 0x24 -j MARK --set-xmark 0x1/0xff
- -A QOS_MARK_eth0.2 -m tos --tos 0x10/0x3f -j MARK --set-xmark 0x1/0xff
- COMMIT
- # Completed on Sat Feb 27 00:17:37 2021
- # Generated by iptables-save v1.8.3 on Sat Feb 27 00:17:37 2021
- *filter
- :INPUT ACCEPT [0:0]
- :FORWARD DROP [0:0]
- :OUTPUT ACCEPT [0:0]
- :MINIUPNPD - [0:0]
- :banIP - [0:0]
- :forwarding_lan_rule - [0:0]
- :forwarding_rule - [0:0]
- :forwarding_wan_rule - [0:0]
- :input_lan_rule - [0:0]
- :input_rule - [0:0]
- :input_wan_rule - [0:0]
- :output_lan_rule - [0:0]
- :output_rule - [0:0]
- :output_wan_rule - [0:0]
- :reject - [0:0]
- :syn_flood - [0:0]
- :zone_lan_dest_ACCEPT - [0:0]
- :zone_lan_forward - [0:0]
- :zone_lan_input - [0:0]
- :zone_lan_output - [0:0]
- :zone_lan_src_ACCEPT - [0:0]
- :zone_wan_dest_ACCEPT - [0:0]
- :zone_wan_dest_REJECT - [0:0]
- :zone_wan_forward - [0:0]
- :zone_wan_input - [0:0]
- :zone_wan_output - [0:0]
- :zone_wan_src_REJECT - [0:0]
- -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
- -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
- -A INPUT -i eth0.2 -m comment --comment "!fw3" -j zone_wan_input
- -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
- -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
- -A FORWARD -i eth0.2 -m comment --comment "!fw3" -j zone_wan_forward
- -A FORWARD -m comment --comment "!fw3" -j reject
- -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
- -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
- -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
- -A OUTPUT -o eth0.2 -m comment --comment "!fw3" -j zone_wan_output
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set bogon src -j DROP
- -A banIP -o eth0.2 -m conntrack --ctstate NEW -m set --match-set bogon dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set DoH src -j DROP
- -A banIP -o eth0.2 -m conntrack --ctstate NEW -m set --match-set DoH dst -j REJECT --reject-with icmp-port-unreachable
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set tor src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set threat src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set debl src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set yoyo src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set sslbl src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set feodo src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set dshield src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set drop src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set edrop src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set firehol1 src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set firehol2 src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set firehol3 src -j DROP
- -A banIP -i eth0.2 -m conntrack --ctstate NEW -m set --match-set firehol4 src -j DROP
- -A forwarding_lan_rule -j banIP
- -A forwarding_wan_rule -j banIP
- -A input_lan_rule -p udp -m udp --sport 67:68 --dport 67:68 -j RETURN
- -A input_lan_rule -j banIP
- -A input_wan_rule -p udp -m udp --sport 67:68 --dport 67:68 -j RETURN
- -A input_wan_rule -j banIP
- -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
- -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
- -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
- -A syn_flood -m comment --comment "!fw3" -j DROP
- -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
- -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
- -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
- -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
- -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
- -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
- -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_ACCEPT -o eth0.2 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
- -A zone_wan_dest_ACCEPT -o eth0.2 -m comment --comment "!fw3" -j ACCEPT
- -A zone_wan_dest_REJECT -o eth0.2 -m comment --comment "!fw3" -j reject
- -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
- -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
- -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
- -A zone_wan_forward -j MINIUPNPD
- -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
- -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
- -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
- -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
- -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
- -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
- -A zone_wan_input -j MINIUPNPD
- -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
- -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
- -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
- -A zone_wan_src_REJECT -i eth0.2 -m comment --comment "!fw3" -j reject
- COMMIT
- # Completed on Sat Feb 27 00:17:37 2021
Add Comment
Please, Sign In to add comment