Aha, so the way that thread does it is by referencing $WAN_IP to compute iptables rules... and if you are on a dynamic IP connection (DSL, Cable) then this cannot be done just once per boot because the IP address changes.
# Note: Firewall must be re-run if WAN IP address changes
WANIP=`ifconfig vlan1 | grep inet\ addr | sed -r 's/.*inet addr:(.+) Bcast:.*/\1/'`
So basically the difference here is that iptables must be rerun everytime your connection goes down. The Kamikaze sacrifices a few features by using only interface names, and not IP addresses. But in return the advantage is you must only run your firewall once, no matter if you restart your wan connection.
In http://wiki.openwrt.org/OpenWrtDocs/Kam … figuration they mention that you can add manual iptables rules, however these are only run once per boot, so if your WAN IP changes, you will be locked out from any redirects you set up.
To me the simplicity of kamikaze is worth it, but if not, it is possible to run manual ifconfig rules, and in fact, if you must reference the WAN_IP, you can set it to redo the firewall when your WAN goes down or up, by putting a script into /etc/hotplug.d/iface/
#!/bin/sh
if [ "$INTERFACE" = "wan" ] && [ "$ACTION" = "ifup" ]; then
... iptables rules go here ...
fi
The iptables rules may conflict with the openwrt ones so you would have to do:
/etc/init.d/firewall stop
/etc/init.d/firewall disable