ulmwind wrote:What is name of network for 128 and 178 networks? zone2 and lan? Please, provide content of /etc/config/network, output of
root@MyNetN750:~# iptables -nvL -t nat
Chain PREROUTING (policy ACCEPT 4067 packets, 260K bytes)
pkts bytes target prot opt in out source destination
5 320 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1883 to:128.168.1.40
2346 178K REDIRECT udp -- br-lan * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 redir ports 123
412K 29M delegate_prerouting all -- * * 0.0.0.0/0 0. 0.0.0/0
Chain INPUT (policy ACCEPT 1958 packets, 124K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 540 packets, 50653 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 13109 packets, 734K bytes)
pkts bytes target prot opt in out source destination
344K 19M delegate_postrouting all -- * * 0.0.0.0/0 0 .0.0.0/0
Chain MINIUPNPD (2 references)
pkts bytes target prot opt in out source destination
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:58050 to:128.168.1.40:58050
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:58051 to:128.168.1.40:58051
52457 3046K DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:52413 to:128.168.1.50:52413
10823 582K DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:52413 to:128.168.1.50:52413
Chain delegate_postrouting (1 references)
pkts bytes target prot opt in out source destination
344K 19M postrouting_rule all -- * * 0.0.0.0/0 0.0.0 .0/0 /* user chain for postrouting */
308K 17M zone_lan_postrouting all -- * br-lan 0.0.0.0/0 0 .0.0.0/0
32944 2154K zone_wan_postrouting all -- * eth0.1 0.0.0.0/0 0 .0.0.0/0
1 84 zone_voip_postrouting all -- * eth0.3 0.0.0.0/0 0.0.0.0/0
0 0 zone_vpn_postrouting all -- * tun0 0.0.0.0/0 0 .0.0.0/0
0 0 zone_guest_postrouting all -- * br-guest 0.0.0.0/0 0.0.0.0/0
0 0 zone_tor_postrouting all -- * br-tor 0.0.0.0/0 0 .0.0.0/0
Chain delegate_prerouting (1 references)
pkts bytes target prot opt in out source destination
412K 29M prerouting_rule all -- * * 0.0.0.0/0 0.0.0. 0/0 /* user chain for prerouting */
93893 12M zone_lan_prerouting all -- br-lan * 0.0.0.0/0 0. 0.0.0/0
318K 17M zone_wan_prerouting all -- eth0.1 * 0.0.0.0/0 0. 0.0.0/0
2 656 zone_voip_prerouting all -- eth0.3 * 0.0.0.0/0 0 .0.0.0/0
8 416 zone_vpn_prerouting all -- tun0 * 0.0.0.0/0 0. 0.0.0/0
0 0 zone_guest_prerouting all -- br-guest * 0.0.0.0/0 0.0.0.0/0
0 0 zone_tor_prerouting all -- br-tor * 0.0.0.0/0 0. 0.0.0/0
Chain postrouting_guest_rule (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_tor_rule (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_voip_rule (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_vpn_rule (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_guest_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_tor_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_voip_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_vpn_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain zone_guest_postrouting (1 references)
pkts bytes target prot opt in out source destination
0 0 postrouting_guest_rule all -- * * 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
Chain zone_guest_prerouting (1 references)
pkts bytes target prot opt in out source destination
0 0 MINIUPNPD all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 prerouting_guest_rule all -- * * 0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
Chain zone_tor_postrouting (1 references)
pkts bytes target prot opt in out source destination
0 0 postrouting_tor_rule all -- * * 0.0.0.0/0 0 .0.0.0/0 /* user chain for postrouting */
Chain zone_tor_prerouting (1 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_tor_rule all -- * * 0.0.0.0/0 0. 0.0.0/0 /* user chain for prerouting */
0 0 REDIRECT tcp -- * * 0.0.0.0/0 !168.168.1.0/ 24 tcp dpt:80 /* Transparent Proxy Redirect 168.168.1.0/24 */ redir ports 8118
0 0 REDIRECT tcp -- * * 0.0.0.0/0 !168.168.1.1 /* tor Redirect TCP */ redir ports 9040
0 0 REDIRECT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 /* tor Redirect DNS */ redir ports 9053
Chain zone_voip_postrouting (1 references)
pkts bytes target prot opt in out source destination
1 84 postrouting_voip_rule all -- * * 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
Chain zone_voip_prerouting (1 references)
pkts bytes target prot opt in out source destination
2 656 prerouting_voip_rule all -- * * 0.0.0.0/0 0 .0.0.0/0 /* user chain for prerouting */
Chain zone_vpn_postrouting (1 references)
pkts bytes target prot opt in out source destination
0 0 postrouting_vpn_rule all -- * * 0.0.0.0/0 0 .0.0.0/0 /* user chain for postrouting */
0 0 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_vpn_prerouting (1 references)
pkts bytes target prot opt in out source destination
8 416 prerouting_vpn_rule all -- * * 0.0.0.0/0 0. 0.0.0/0 /* user chain for prerouting */
Chain zone_wan_postrouting (1 references)
pkts bytes target prot opt in out source destination
32944 2154K postrouting_wan_rule all -- * * 0.0.0.0/0 0 .0.0.0/0 /* user chain for postrouting */
32944 2154K MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0
root@MyNetN750:~# iptables -S
-P INPUT ACCEPT
-P FORWARD DROP
-P OUTPUT ACCEPT
-N MINIUPNPD
-N delegate_forward
-N delegate_input
-N delegate_output
-N forwarding_guest_rule
-N forwarding_lan_rule
-N forwarding_rule
-N forwarding_tor_rule
-N forwarding_voip_rule
-N forwarding_vpn_rule
-N forwarding_wan_rule
-N input_guest_rule
-N input_lan_rule
-N input_rule
-N input_tor_rule
-N input_voip_rule
-N input_vpn_rule
-N input_wan_rule
-N output_guest_rule
-N output_lan_rule
-N output_rule
-N output_tor_rule
-N output_voip_rule
-N output_vpn_rule
-N output_wan_rule
-N reject
-N syn_flood
-N zone_guest_dest_ACCEPT
-N zone_guest_dest_REJECT
-N zone_guest_forward
-N zone_guest_input
-N zone_guest_output
-N zone_guest_src_REJECT
-N zone_lan_dest_ACCEPT
-N zone_lan_dest_REJECT
-N zone_lan_forward
-N zone_lan_input
-N zone_lan_output
-N zone_lan_src_ACCEPT
-N zone_tor_dest_ACCEPT
-N zone_tor_dest_REJECT
-N zone_tor_forward
-N zone_tor_input
-N zone_tor_output
-N zone_tor_src_REJECT
-N zone_voip_dest_ACCEPT
-N zone_voip_dest_REJECT
-N zone_voip_forward
-N zone_voip_input
-N zone_voip_output
-N zone_voip_src_ACCEPT
-N zone_vpn_dest_ACCEPT
-N zone_vpn_forward
-N zone_vpn_input
-N zone_vpn_output
-N zone_vpn_src_ACCEPT
-N zone_wan_dest_ACCEPT
-N zone_wan_dest_REJECT
-N zone_wan_forward
-N zone_wan_input
-N zone_wan_output
-N zone_wan_src_REJECT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 53 -j DROP
-A INPUT -j delegate_input
-A FORWARD -j delegate_forward
-A OUTPUT -j delegate_output
-A MINIUPNPD -d 128.168.1.40/32 -p tcp -m tcp --dport 58050 -j ACCEPT
-A MINIUPNPD -d 128.168.1.40/32 -p tcp -m tcp --dport 58051 -j ACCEPT
-A MINIUPNPD -d 128.168.1.50/32 -p udp -m udp --dport 52413 -j ACCEPT
-A MINIUPNPD -d 128.168.1.50/32 -p tcp -m tcp --dport 52413 -j ACCEPT
-A delegate_forward -m comment --comment "user chain for forwarding" -j forwarding_rule
-A delegate_forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A delegate_forward -i br-lan -j zone_lan_forward
-A delegate_forward -i eth0.1 -j zone_wan_forward
-A delegate_forward -i eth0.3 -j zone_voip_forward
-A delegate_forward -i tun0 -j zone_vpn_forward
-A delegate_forward -i br-guest -j zone_guest_forward
-A delegate_forward -i br-tor -j zone_tor_forward
-A delegate_forward -j reject
-A delegate_input -i lo -j ACCEPT
-A delegate_input -m comment --comment "user chain for input" -j input_rule
-A delegate_input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A delegate_input -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j syn_flood
-A delegate_input -i br-lan -j zone_lan_input
-A delegate_input -i eth0.1 -j zone_wan_input
-A delegate_input -i eth0.3 -j zone_voip_input
-A delegate_input -i tun0 -j zone_vpn_input
-A delegate_input -i br-guest -j zone_guest_input
-A delegate_input -i br-tor -j zone_tor_input
-A delegate_output -o lo -j ACCEPT
-A delegate_output -m comment --comment "user chain for output" -j output_rule
-A delegate_output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A delegate_output -o br-lan -j zone_lan_output
-A delegate_output -o eth0.1 -j zone_wan_output
-A delegate_output -o eth0.3 -j zone_voip_output
-A delegate_output -o tun0 -j zone_vpn_output
-A delegate_output -o br-guest -j zone_guest_output
-A delegate_output -o br-tor -j zone_tor_output
-A reject -p tcp -j REJECT --reject-with tcp-reset
-A reject -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -j RETURN
-A syn_flood -j DROP
-A zone_guest_dest_ACCEPT -o br-guest -j ACCEPT
-A zone_guest_dest_REJECT -o br-guest -j reject
-A zone_guest_forward -j MINIUPNPD
-A zone_guest_forward -m comment --comment "user chain for forwarding" -j forwarding_guest_rule
-A zone_guest_forward -m comment --comment "forwarding guest -> wan" -j zone_wan_dest_ACCEPT
-A zone_guest_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT
-A zone_guest_forward -j zone_guest_dest_REJECT
-A zone_guest_input -m comment --comment "user chain for input" -j input_guest_rule
-A zone_guest_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT
-A zone_guest_input -j zone_guest_src_REJECT
-A zone_guest_output -m comment --comment "user chain for output" -j output_guest_rule
-A zone_guest_output -j zone_guest_dest_ACCEPT
-A zone_guest_src_REJECT -i br-guest -j reject
-A zone_lan_dest_ACCEPT -o br-lan -j ACCEPT
-A zone_lan_dest_REJECT -o br-lan -j reject
-A zone_lan_forward -m comment --comment "user chain for forwarding" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "forwarding lan -> vpn" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m comment --comment "forwarding lan -> wan" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT
-A zone_lan_forward -j zone_lan_dest_REJECT
-A zone_lan_input -m comment --comment "user chain for input" -j input_lan_rule
-A zone_lan_input -p igmp -m comment --comment "Multicast IGMP" -j ACCEPT
-A zone_lan_input -d 224.0.0.0/4 -p udp -m comment --comment "Multicast UDP" -j ACCEPT
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT
-A zone_lan_input -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "user chain for output" -j output_lan_rule
-A zone_lan_output -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -j ACCEPT
-A zone_tor_dest_ACCEPT -o br-tor -j ACCEPT
-A zone_tor_dest_REJECT -o br-tor -j reject
-A zone_tor_forward -m comment --comment "user chain for forwarding" -j forwarding_tor_rule
-A zone_tor_forward -m comment --comment "forwarding tor -> wan" -j zone_wan_dest_ACCEPT
-A zone_tor_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT
-A zone_tor_forward -j zone_tor_dest_REJECT
-A zone_tor_input -m comment --comment "user chain for input" -j input_tor_rule
-A zone_tor_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT
-A zone_tor_input -j zone_tor_src_REJECT
-A zone_tor_output -m comment --comment "user chain for output" -j output_tor_rule
-A zone_tor_output -j zone_tor_dest_ACCEPT
-A zone_tor_src_REJECT -i br-tor -j reject
-A zone_voip_dest_ACCEPT -o eth0.3 -j ACCEPT
-A zone_voip_dest_REJECT -o eth0.3 -j reject
-A zone_voip_forward -m comment --comment "user chain for forwarding" -j forwarding_voip_rule
-A zone_voip_forward -m comment --comment "forwarding voip -> wan" -j zone_wan_dest_ACCEPT
-A zone_voip_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT
-A zone_voip_forward -j zone_voip_dest_REJECT
-A zone_voip_input -m comment --comment "user chain for input" -j input_voip_rule
-A zone_voip_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT
-A zone_voip_input -j zone_voip_src_ACCEPT
-A zone_voip_output -m comment --comment "user chain for output" -j output_voip_rule
-A zone_voip_output -j zone_voip_dest_ACCEPT
-A zone_voip_src_ACCEPT -i eth0.3 -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -j ACCEPT
-A zone_vpn_forward -m comment --comment "user chain for forwarding" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "forwarding vpn -> lan" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT
-A zone_vpn_forward -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "user chain for input" -j input_vpn_rule
-A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT
-A zone_vpn_input -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "user chain for output" -j output_vpn_rule
-A zone_vpn_output -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0.1 -j ACCEPT
-A zone_wan_dest_REJECT -o eth0.1 -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "user chain for forwarding" -j forwarding_wan_rule
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT
-A zone_wan_forward -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "user chain for input" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment Allow-DHCP-Renew -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment Allow-Ping -j reject
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT
-A zone_wan_input -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "user chain for output" -j output_wan_rule
-A zone_wan_output -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth0.1 -j reject
root@MyNetN750:~# cat /etc/config/network
config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fdca:d38e:c856::/48'
config interface 'lan'
option type 'bridge'
option proto 'static'
option force_link '1'
option netmask '255.255.255.0'
option ip6assign '60'
option ipaddr '128.168.1.1'
option gateway '128.168.1.1'
option ifname 'eth0.2 tun0 wlan0 wlan1'
config interface 'wan'
option proto 'dhcp'
option ifname 'eth0.1'
config interface 'wan6'
option proto 'dhcpv6'
option ifname 'eth0.1'
option reqaddress 'try'
option reqprefix 'auto'
config interface 'wwan'
option proto 'dhcp'
config interface 'voip'
option proto 'static'
option ifname 'eth0.3'
option netmask '255.255.255.0'
option ipaddr '178.168.1.1'
option gateway '178.168.1.1'
config interface 'vpn'
option proto 'none'
option ifname 'tun0'
config interface 'guest'
option proto 'static'
option type 'bridge'
option netmask '255.255.255.0'
option ipaddr '158.168.1.1'
option gateway '158.168.1.1'
option ifname 'eth0.5 wlan0-2'
config interface 'tor'
option proto 'static'
option type 'bridge'
option netmask '255.255.255.0'
option ipaddr '168.168.1.1'
option gateway '168.168.1.1'
option ifname 'eth0.4 wlan0-1 wlan1-1'
config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'
config switch_vlan
option device 'switch0'
option vlan '1'
option ports '0t 5'
option vid '1'
config switch_vlan
option device 'switch0'
option vlan '2'
option ports '0t 1 2 3'
option vid '2'
config switch_vlan
option device 'switch0'
option vlan '3'
option ports '0t 4'
option vid '3'
config switch_vlan
option device 'switch0'
option vlan '4'
option ports '0t'
option vid '4'
config switch_vlan
option device 'switch0'
option vlan '5'
option ports '0t'
option vid '5'
(Last edited by dony71 on 24 Oct 2017, 20:59)