Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- BusyBox v1.35.0 (2023-04-09 12:27:46 UTC) built-in shell (ash)
- _______ ________ __
- | |.-----.-----.-----.| | | |.----.| |_
- | - || _ | -__| || | | || _|| _|
- |_______|| __|_____|__|__||________||__| |____|
- |__| W I R E L E S S F R E E D O M
- -----------------------------------------------------
- OpenWrt 22.03.4, r20123-38ccc47687
- -----------------------------------------------------
- root@GL-X750:~# nft list ruleset
- table ip filter {
- chain INPUT {
- type filter hook input priority filter; policy accept;
- }
- chain FORWARD {
- type filter hook forward priority filter; policy accept;
- # xt_set counter packets 0 bytes 0 drop
- }
- }
- table inet fw4 {
- chain input {
- type filter hook input priority filter; policy accept;
- iifname "lo" accept comment "!fw4: Accept traffic from loopback"
- ct state established,related accept comment "!fw4: Allow inbound established and related flows"
- tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets"
- iifname "br-lan" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
- iifname { "eth0", "wwan0" } jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
- iifname "wgclient" jump input_wgclient comment "!fw4: Handle wgclient IPv4/IPv6 input traffic"
- }
- chain forward {
- type filter hook forward priority filter; policy drop;
- ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
- iifname "br-lan" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
- iifname { "eth0", "wwan0" } jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
- iifname "wgclient" jump forward_wgclient comment "!fw4: Handle wgclient IPv4/IPv6 forward traffic"
- jump handle_reject
- }
- chain output {
- type filter hook output priority filter; policy accept;
- oifname "lo" accept comment "!fw4: Accept traffic towards loopback"
- ct state established,related accept comment "!fw4: Allow outbound established and related flows"
- oifname "br-lan" jump output_lan comment "!fw4: Handle lan IPv4/IPv6 output traffic"
- oifname { "eth0", "wwan0" } jump output_wan comment "!fw4: Handle wan IPv4/IPv6 output traffic"
- oifname "wgclient" jump output_wgclient comment "!fw4: Handle wgclient IPv4/IPv6 output traffic"
- }
- chain prerouting {
- type filter hook prerouting priority filter; policy accept;
- iifname "br-lan" jump helper_lan comment "!fw4: Handle lan IPv4/IPv6 helper assignment"
- iifname "wgclient" jump helper_wgclient comment "!fw4: Handle wgclient IPv4/IPv6 helper assignment"
- }
- chain handle_reject {
- meta l4proto tcp reject with tcp reset comment "!fw4: Reject TCP traffic"
- reject comment "!fw4: Reject any other traffic"
- }
- chain syn_flood {
- limit rate 25/second burst 50 packets return comment "!fw4: Accept SYN packets below rate-limit"
- drop comment "!fw4: Drop excess packets"
- }
- chain input_guest {
- udp dport 67-68 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCP"
- tcp dport 53 counter packets 0 bytes 0 accept comment "!fw4: Allow-DNS"
- udp dport 53 counter packets 0 bytes 0 accept comment "!fw4: Allow-DNS"
- jump accept_from_guest
- }
- chain output_guest {
- jump accept_to_guest
- }
- chain forward_guest {
- jump accept_to_wgclient comment "!fw4: Accept guest to wgclient forwarding"
- jump accept_to_guest
- }
- chain helper_guest {
- }
- chain accept_from_guest {
- }
- chain accept_to_guest {
- }
- chain input_lan {
- jump accept_from_lan
- }
- chain output_lan {
- jump accept_to_lan
- }
- chain forward_lan {
- jump accept_to_wgclient comment "!fw4: Accept lan to wgclient forwarding"
- jump accept_to_lan
- }
- chain helper_lan {
- }
- chain accept_from_lan {
- iifname "br-lan" counter packets 205 bytes 14753 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
- }
- chain accept_to_lan {
- oifname "br-lan" counter packets 20 bytes 2309 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
- }
- chain input_wan {
- meta nfproto ipv4 udp dport 68 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCP-Renew"
- meta nfproto ipv4 meta l4proto igmp counter packets 0 bytes 0 accept comment "!fw4: Allow-IGMP"
- meta nfproto ipv6 udp dport 546 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCPv6"
- ip6 saddr fe80::/10 icmpv6 type . icmpv6 code { mld-listener-query . no-route, mld-listener-report . no-route, mld-listener-done . no-route, mld2-listener-report . no-route } counter packets 0 bytes 0 accept comment "!fw4: Allow-MLD"
- icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply, nd-router-solicit, nd-router-advert } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Input"
- icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, parameter-problem . admin-prohibited, nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Input"
- jump drop_from_wan
- }
- chain output_wan {
- jump accept_to_wan
- }
- chain forward_wan {
- icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
- icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, parameter-problem . admin-prohibited } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
- meta l4proto esp counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-IPSec-ESP"
- udp dport 500 counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-ISAKMP"
- jump reject_to_wan
- }
- chain accept_to_wan {
- oifname { "eth0", "wwan0" } counter packets 124 bytes 10416 accept comment "!fw4: accept wan IPv4/IPv6 traffic"
- }
- chain reject_to_wan {
- oifname { "eth0", "wwan0" } counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject wan IPv4/IPv6 traffic"
- }
- chain drop_from_wan {
- iifname { "eth0", "wwan0" } counter packets 0 bytes 0 drop comment "!fw4: drop wan IPv4/IPv6 traffic"
- }
- chain input_wgclient {
- jump accept_from_wgclient
- }
- chain output_wgclient {
- jump accept_to_wgclient
- }
- chain forward_wgclient {
- jump accept_to_wan comment "!fw4: Accept wgclient to wan forwarding"
- jump accept_to_lan comment "!fw4: Accept wgclient to lan forwarding"
- jump accept_to_guest comment "!fw4: Accept wgclient to guest forwarding"
- jump drop_to_wgclient
- }
- chain helper_wgclient {
- }
- chain accept_from_wgclient {
- iifname "wgclient" counter packets 52 bytes 2704 accept comment "!fw4: accept wgclient IPv4/IPv6 traffic"
- }
- chain accept_to_wgclient {
- oifname "wgclient" counter packets 405 bytes 46226 accept comment "!fw4: accept wgclient IPv4/IPv6 traffic"
- }
- chain drop_to_wgclient {
- oifname "wgclient" counter packets 0 bytes 0 drop comment "!fw4: drop wgclient IPv4/IPv6 traffic"
- }
- chain dstnat {
- type nat hook prerouting priority dstnat; policy accept;
- }
- chain srcnat {
- type nat hook postrouting priority srcnat; policy accept;
- oifname { "eth0", "wwan0" } jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
- }
- chain srcnat_wan {
- meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 wan traffic"
- }
- chain raw_prerouting {
- type filter hook prerouting priority raw; policy accept;
- }
- chain raw_output {
- type filter hook output priority raw; policy accept;
- }
- chain mangle_prerouting {
- type filter hook prerouting priority mangle; policy accept;
- }
- chain mangle_postrouting {
- type filter hook postrouting priority mangle; policy accept;
- }
- chain mangle_input {
- type filter hook input priority mangle; policy accept;
- }
- chain mangle_output {
- type route hook output priority mangle; policy accept;
- meta skgid 65533 counter packets 0 bytes 0 meta mark set meta mark | 0x00008000
- ip protocol tcp ct mark & 0x00008000 == 0x00008000 counter packets 0 bytes 0 meta mark set ct mark comment "out_conn_mark_restore"
- ip protocol udp ct mark & 0x00008000 == 0x00008000 counter packets 0 bytes 0 meta mark set ct mark comment "out_conn_mark_restore"
- }
- chain mangle_forward {
- type filter hook forward priority mangle; policy accept;
- iifname { "eth0", "wwan0" } tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 ingress MTU fixing"
- oifname { "eth0", "wwan0" } tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 egress MTU fixing"
- iifname "wgclient" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wgclient IPv4/IPv6 ingress MTU fixing"
- oifname "wgclient" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wgclient IPv4/IPv6 egress MTU fixing"
- }
- }
- table ip mangle {
- chain PREROUTING {
- type filter hook prerouting priority mangle; policy accept;
- counter packets 7244 bytes 4624840 jump mwan3_hook
- counter packets 6957 bytes 4582956 jump VPN_SER_POLICY
- }
- chain mwan3_ifaces_in {
- # xt_mark counter packets 839 bytes 104801 jump mwan3_iface_in_modem_1_1_2
- }
- chain mwan3_connected {
- # xt_set counter packets 1081 bytes 171880 # xt_MARK
- }
- chain mwan3_rules {
- # xt_mark counter packets 499 bytes 53452 jump mwan3_policy_default_poli
- }
- chain mwan3_hook {
- counter packets 12354 bytes 6573179 # xt_CONNMARK
- # xt_mark counter packets 913 bytes 116579 jump mwan3_ifaces_in
- # xt_mark counter packets 913 bytes 116579 jump mwan3_connected
- # xt_mark counter packets 564 bytes 61025 jump mwan3_rules
- counter packets 12354 bytes 6573179 # xt_CONNMARK
- # xt_mark counter packets 1668 bytes 208666 jump mwan3_connected
- }
- chain OUTPUT {
- type route hook output priority mangle; policy accept;
- counter packets 5110 bytes 1948339 jump mwan3_hook
- counter packets 4744 bytes 1569220 jump ROUTE_POLICY_DNS
- }
- chain mwan3_policy_default_poli {
- # xt_mark # xt_comment counter packets 499 bytes 53452 # xt_MARK
- }
- chain mwan3_policy_default_poli_v6 {
- # xt_mark # xt_comment counter packets 0 bytes 0 # xt_MARK
- }
- chain mwan3_iface_in_modem_1_1_2 {
- iifname "wwan0" # xt_set # xt_mark # xt_comment counter packets 0 bytes 0 # xt_MARK
- iifname "wwan0" # xt_mark # xt_comment counter packets 0 bytes 0 # xt_MARK
- }
- chain ROUTE_POLICY_DNS {
- meta l4proto tcp ip daddr 62.87.92.201 # xt_tcp counter packets 0 bytes 0 # xt_MARK
- meta l4proto udp ip daddr 62.87.92.201 # xt_udp counter packets 0 bytes 0 # xt_MARK
- meta l4proto tcp ip daddr 212.166.167.71 # xt_tcp counter packets 0 bytes 0 # xt_MARK
- meta l4proto udp ip daddr 212.166.167.71 # xt_udp counter packets 0 bytes 0 # xt_MARK
- }
- chain VPN_SER_POLICY {
- }
- }
- table ip6 mangle {
- chain mwan3_ifaces_in {
- }
- chain mwan3_connected {
- # xt_set counter packets 0 bytes 0 # xt_MARK
- }
- chain mwan3_rules {
- # xt_mark counter packets 0 bytes 0 jump mwan3_policy_default_poli_v6
- }
- chain mwan3_hook {
- meta l4proto ipv6-icmp # xt_icmp6 counter packets 0 bytes 0 return
- meta l4proto ipv6-icmp # xt_icmp6 counter packets 0 bytes 0 return
- meta l4proto ipv6-icmp # xt_icmp6 counter packets 0 bytes 0 return
- meta l4proto ipv6-icmp # xt_icmp6 counter packets 0 bytes 0 return
- meta l4proto ipv6-icmp # xt_icmp6 counter packets 0 bytes 0 return
- meta l4proto ipv6-icmp # xt_set # xt_icmp6 counter packets 0 bytes 0 return
- counter packets 40 bytes 4482 # xt_CONNMARK
- # xt_mark counter packets 40 bytes 4482 jump mwan3_ifaces_in
- # xt_mark counter packets 40 bytes 4482 jump mwan3_connected
- # xt_mark counter packets 40 bytes 4482 jump mwan3_rules
- counter packets 40 bytes 4482 # xt_CONNMARK
- # xt_mark counter packets 40 bytes 4482 jump mwan3_connected
- }
- chain PREROUTING {
- type filter hook prerouting priority mangle; policy accept;
- counter packets 20 bytes 2241 jump mwan3_hook
- }
- chain OUTPUT {
- type route hook output priority mangle; policy accept;
- counter packets 20 bytes 2241 jump mwan3_hook
- }
- chain mwan3_policy_default_poli {
- # xt_mark # xt_comment counter packets 0 bytes 0 # xt_MARK
- }
- chain mwan3_policy_default_poli_v6 {
- # xt_mark # xt_comment counter packets 0 bytes 0 # xt_MARK
- }
- }
- root@GL-X750:~#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement