Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- firewall {
- all-ping enable
- broadcast-ping disable
- ipv6-receive-redirects disable
- ipv6-src-route disable
- ip-src-route disable
- log-martians enable
- modify PBR_policy {
- rule 20 {
- action modify
- description iNET
- modify {
- table 11
- }
- source {
- address 10.0.1.0/24
- }
- }
- rule 30 {
- action modify
- description IPTV
- modify {
- table 12
- }
- source {
- address 10.0.2.0/24
- }
- }
- }
- name IPTV_LOCAL {
- default-action accept
- description "WAN IPTV to router"
- rule 10 {
- action accept
- description "Allow established/related"
- state {
- established enable
- related enable
- }
- }
- rule 20 {
- action accept
- description "Allow ICMP Echo"
- icmp {
- type 8
- }
- limit {
- burst 1
- rate 20/second
- }
- log disable
- protocol icmp
- }
- rule 30 {
- action accept
- description "Allow ICMP Destination Unreachable"
- icmp {
- type 3
- }
- limit {
- burst 1
- rate 20/second
- }
- log disable
- protocol icmp
- }
- rule 40 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- }
- name WAN_IN {
- default-action drop
- description "WAN to internal"
- rule 10 {
- action accept
- description "IPTV Traffic"
- destination {
- address 224.0.0.0/8
- }
- log disable
- protocol udp
- source {
- address 217.166.0.0/16
- }
- }
- rule 20 {
- action accept
- description "Allow IGMP"
- log disable
- protocol igmp
- }
- rule 30 {
- action accept
- description "Allow established/related"
- state {
- established enable
- related enable
- }
- }
- rule 40 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- }
- name WAN_LOCAL {
- default-action drop
- description "WAN to router"
- rule 10 {
- action accept
- description "Allow established/related"
- state {
- established enable
- related enable
- }
- }
- rule 20 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- }
- name WAN_OUT {
- default-action accept
- description ""
- rule 1 {
- action drop
- description "CAM-001 Block traffic to outside"
- log disable
- protocol all
- source {
- address 10.0.1.14
- }
- }
- rule 2 {
- action drop
- description "Block Toon Traffic"
- log disable
- protocol all
- source {
- mac-address 28:c2:dd:e4:8e:c3
- }
- }
- }
- receive-redirects disable
- send-redirects enable
- source-validation disable
- syn-cookies enable
- }
- interfaces {
- ethernet eth0 {
- address dhcp
- description WAN
- duplex auto
- firewall {
- in {
- name WAN_IN
- }
- local {
- name WAN_LOCAL
- }
- out {
- name WAN_OUT
- }
- }
- mac XXXXXXXXXXXXXXX
- speed auto
- vif 4 {
- address dhcp
- description Online_IPTV
- firewall {
- in {
- name WAN_IN
- }
- local {
- name IPTV_LOCAL
- }
- }
- mac XXXXXXXXXXXXXXXXX
- mtu 1500
- }
- }
- ethernet eth1 {
- description Local
- duplex auto
- speed auto
- }
- ethernet eth2 {
- description Local
- duplex auto
- speed auto
- }
- ethernet eth3 {
- description Local
- duplex auto
- speed auto
- }
- ethernet eth4 {
- address 10.0.3.1/24
- description Local
- duplex auto
- poe {
- output off
- }
- speed auto
- }
- loopback lo {
- }
- switch switch0 {
- description Local
- firewall {
- in {
- modify PBR_policy
- }
- }
- mtu 1500
- switch-port {
- interface eth1 {
- vlan {
- pvid 1
- vid 2
- vid 1001
- }
- }
- interface eth2 {
- vlan {
- pvid 1
- }
- }
- interface eth3 {
- vlan {
- pvid 2
- }
- }
- vlan-aware enable
- }
- vif 1 {
- address 10.0.1.1/24
- description LAN
- firewall {
- in {
- modify PBR_policy
- }
- }
- }
- vif 2 {
- address 10.0.2.1/24
- description IPTV
- firewall {
- in {
- modify PBR_policy
- }
- }
- mtu 1500
- }
- vif 1003 {
- address 172.16.1.1/24
- description "Guest LAN"
- mtu 1500
- }
- }
- }
- port-forward {
- auto-firewall enable
- hairpin-nat enable
- lan-interface switch0
- lan-interface switch0.1
- rule 1 {
- description HAWeb
- forward-to {
- address XXXXXXXXXXXX
- port 8123
- }
- original-port 8123
- protocol tcp
- }
- rule 2 {
- description PPTP
- forward-to {
- address 10.0.1.XX
- port 1723
- }
- original-port 1723
- protocol tcp_udp
- }
- rule 3 {
- description "VPN L2TP 500"
- forward-to {
- address 10.0.1.XX
- port 500
- }
- original-port 500
- protocol tcp_udp
- }
- rule 4 {
- description "VPN L2TP 4500"
- forward-to {
- address 10.0.1.XX
- port 4500
- }
- original-port 4500
- protocol tcp_udp
- }
- rule 5 {
- description Website
- forward-to {
- address 10.0.1.XX
- port 80
- }
- original-port 80
- protocol tcp_udp
- }
- wan-interface eth0
- }
- protocols {
- igmp-proxy {
- interface eth0 {
- role disabled
- threshold 1
- }
- interface eth0.4 {
- alt-subnet 0.0.0.0/0
- role upstream
- threshold 1
- }
- interface eth1 {
- role disabled
- threshold 1
- }
- interface eth2 {
- role disabled
- threshold 1
- }
- interface eth3 {
- role disabled
- threshold 1
- }
- interface eth4 {
- role disabled
- threshold 1
- }
- interface switch0 {
- role disabled
- threshold 1
- }
- interface switch0.1 {
- role disabled
- threshold 1
- }
- interface switch0.2 {
- alt-subnet 0.0.0.0/0
- role downstream
- threshold 1
- whitelist 224.0.252.0/24
- }
- interface switch0.1003 {
- role disabled
- threshold 1
- }
- }
- static {
- table 11 {
- route 0.0.0.0/0 {
- next-hop 85.149.0.1 {
- }
- }
- route 10.0.4.0/22 {
- next-hop 10.226.112.1 {
- }
- }
- }
- table 12 {
- route 0.0.0.0/0 {
- next-hop 85.149.0.1 {
- }
- }
- route 10.0.4.0/24 {
- next-hop 10.226.112.1 {
- }
- }
- }
- }
- }
- service {
- dhcp-server {
- disabled false
- hostfile-update disable
- shared-network-name DHCP_Default {
- authoritative disable
- subnet 10.0.1.0/24 {
- default-router 10.0.1.1
- dns-server 10.0.1.1
- lease 86400
- start 10.0.1.50 {
- stop 10.0.1.200
- }
- #leases verwijderd#
- }
- }
- }
- shared-network-name DHCP_Guest {
- authoritative disable
- subnet 172.16.1.0/24 {
- default-router 172.16.1.1
- dns-server 10.0.1.42
- lease 86400
- start 172.16.1.2 {
- stop 172.16.1.100
- }
- }
- }
- shared-network-name DHCP_IPTV {
- authoritative disable
- subnet 10.0.2.0/24 {
- default-router 10.0.2.1
- dns-server 208.67.222.220
- lease 86400
- start 10.0.2.2 {
- stop 10.0.2.50
- }
- }
- }
- static-arp disable
- use-dnsmasq disable
- }
- dns {
- forwarding {
- cache-size 150
- listen-on switch0.1003
- listen-on switch0.1
- }
- }
- gui {
- http-port 80
- https-port 443
- older-ciphers enable
- }
- nat {
- rule 5010 {
- description "masquerade for WAN"
- outbound-interface eth0
- type masquerade
- }
- }
- ssh {
- port 22
- protocol-version v2
- }
- unms {
- disable
- }
- }
- system {
- conntrack {
- expect-table-size 2048
- hash-size 32768
- modules {
- rtsp {
- enable
- }
- sip {
- disable
- }
- }
- table-size 262144
- }
- host-name ubnt
- login {
- user ubnt {
- authentication {
- encrypted-password XXXXXXXXXX.
- plaintext-password ""
- }
- full-name ""
- level admin
- }
- }
- name-server 10.0.1.43
- name-server 8.8.8.8
- ntp {
- server 0.ubnt.pool.ntp.org {
- }
- server 1.ubnt.pool.ntp.org {
- }
- server 2.ubnt.pool.ntp.org {
- }
- server 3.ubnt.pool.ntp.org {
- }
- }
- syslog {
- global {
- facility all {
- level notice
- }
- facility protocols {
- level debug
- }
- }
- }
- time-zone UTC
- traffic-analysis {
- dpi enable
- export enable
- }
- }
Advertisement
Add Comment
Please, Sign In to add comment