Advertisement
Guest User

mtik firewall filter rules

a guest
Dec 27th, 2018
385
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.17 KB | None | 0 0
  1. Flags: X - disabled, I - invalid, D - dynamic
  2. 0 chain=input action=accept protocol=icmp
  3.  
  4. 1 chain=input action=accept connection-state=established
  5.  
  6. 2 chain=input action=accept connection-state=related
  7.  
  8. 3 ;;; allow IPsec NAT
  9. chain=input action=accept protocol=udp dst-port=4500
  10.  
  11. 4 ;;; allow IKE
  12. chain=input action=accept protocol=udp dst-port=500
  13.  
  14. 5 ;;; allow l2tp
  15. chain=input action=accept protocol=udp dst-port=1701
  16.  
  17. 6 ;;; allow pptp
  18. chain=input action=accept protocol=tcp dst-port=1723
  19.  
  20. 7 ;;; allow sstp
  21. chain=input action=accept protocol=tcp dst-port=443
  22.  
  23. 8 chain=input action=drop in-interface=pppoe-out1
  24.  
  25.  
  26. 3 ;;; allow IPsec NAT
  27. chain=input action=accept protocol=udp dst-port=4500
  28.  
  29. 4 ;;; allow IKE
  30. chain=input action=accept protocol=udp dst-port=500
  31.  
  32. 5 ;;; allow l2tp
  33. chain=input action=accept protocol=udp dst-port=1701
  34.  
  35. 6 ;;; allow pptp
  36. chain=input action=accept protocol=tcp dst-port=1723
  37.  
  38. 7 ;;; allow sstp
  39. chain=input action=accept protocol=tcp dst-port=443
  40.  
  41. 8 chain=input action=drop in-interface=pppoe-out1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement