table inet fw4 {
ct helper amanda {
type "amanda" protocol udp
l3proto inet
}
ct helper RAS {
type "RAS" protocol udp
l3proto inet
}
ct helper Q.931 {
type "Q.931" protocol tcp
l3proto inet
}
ct helper irc {
type "irc" protocol tcp
l3proto ip
}
ct helper pptp {
type "pptp" protocol tcp
l3proto ip
}
ct helper sip {
type "sip" protocol udp
l3proto inet
}
ct helper snmp {
type "snmp" protocol udp
l3proto ip
}
ct helper tftp {
type "tftp" protocol udp
l3proto inet
}
set doh {
type ipv4_addr
flags interval
auto-merge
elements = { 1.0.0.1-1.0.0.3, 1.1.1.1-1.1.1.3,
3.0.86.126, 3.1.94.218,
## shortend to not reach body imimit of post
221.228.217.28, 223.5.5.5,
223.6.6.6 }
}
set doh6 {
type ipv6_addr
flags interval
auto-merge
elements = { 2001:300::5-2001:300::6,
2001:470:1c:76d::53,
2001:470:20::2,
2001:470:26:7c:b26e:bfff:fe1d:e19b,
## shortend to not reach body imimit of post
2a11:3::66 }
}
chain input {
type filter hook input priority filter; policy accept;
iifname "lo" accept comment "!fw4: Accept traffic from loopback"
ct state established,related accept comment "!fw4: Allow inbound established and related flows"
tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets"
iifname { "tun1", "vlan.10" } jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
iifname "eth0" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
iifname { "tun0", "vlan.80" } jump input_MGT comment "!fw4: Handle MGT IPv4/IPv6 input traffic"
iifname "vlan.3" jump input_SRV comment "!fw4: Handle SRV IPv4/IPv6 input traffic"
iifname "vlan.6" jump input_IOT comment "!fw4: Handle IOT IPv4/IPv6 input traffic"
}
chain forward {
type filter hook forward priority filter; policy drop;
ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
iifname { "tun1", "vlan.10" } jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
iifname "eth0" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
iifname { "tun0", "vlan.80" } jump forward_MGT comment "!fw4: Handle MGT IPv4/IPv6 forward traffic"
iifname "vlan.3" jump forward_SRV comment "!fw4: Handle SRV IPv4/IPv6 forward traffic"
iifname "vlan.6" jump forward_IOT comment "!fw4: Handle IOT IPv4/IPv6 forward traffic"
jump handle_reject
}
chain output {
type filter hook output priority filter; policy accept;
oifname "lo" accept comment "!fw4: Accept traffic towards loopback"
ct state established,related accept comment "!fw4: Allow outbound established and related flows"
oifname { "tun1", "vlan.10" } jump output_lan comment "!fw4: Handle lan IPv4/IPv6 output traffic"
oifname "eth0" jump output_wan comment "!fw4: Handle wan IPv4/IPv6 output traffic"
oifname { "tun0", "vlan.80" } jump output_MGT comment "!fw4: Handle MGT IPv4/IPv6 output traffic"
oifname "vlan.3" jump output_SRV comment "!fw4: Handle SRV IPv4/IPv6 output traffic"
oifname "vlan.6" jump output_IOT comment "!fw4: Handle IOT IPv4/IPv6 output traffic"
}
chain prerouting {
type filter hook prerouting priority filter; policy accept;
iifname { "tun1", "vlan.10" } jump helper_lan comment "!fw4: Handle lan IPv4/IPv6 helper assignment"
iifname "eth0" jump helper_wan comment "!fw4: Handle wan IPv4/IPv6 helper assignment"
iifname { "tun0", "vlan.80" } jump helper_MGT comment "!fw4: Handle MGT IPv4/IPv6 helper assignment"
iifname "vlan.3" jump helper_SRV comment "!fw4: Handle SRV IPv4/IPv6 helper assignment"
iifname "vlan.6" jump helper_IOT comment "!fw4: Handle IOT IPv4/IPv6 helper assignment"
}
chain handle_reject {
meta l4proto tcp reject with tcp reset comment "!fw4: Reject TCP traffic"
reject comment "!fw4: Reject any other traffic"
}
chain syn_flood {
limit rate 25/second burst 50 packets return comment "!fw4: Accept SYN packets below rate-limit"
drop comment "!fw4: Drop excess packets"
}
chain input_lan {
tcp dport 53 counter packets 3 bytes 204 accept comment "!fw4: lan allow DNS Queries"
udp dport 53 counter packets 598656 bytes 49206520 accept comment "!fw4: lan allow DNS Queries"
udp sport 67-68 udp dport 67-68 counter packets 1398 bytes 471841 accept comment "!fw4: lan allow DHCP request"
meta nfproto ipv6 udp sport 546 udp dport 547 counter packets 87 bytes 14442 accept comment "!fw4: lan allow DHCPv6"
icmpv6 type { nd-router-solicit, nd-router-advert, ind-neighbor-solicit, ind-neighbor-advert, 148, 149 } counter packets 616 bytes 33200 accept comment "!fw4: lan allow SLAAC"
icmpv6 type . icmpv6 code { nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route } counter packets 168137 bytes 12018232 accept comment "!fw4: lan allow SLAAC"
udp dport xx counter packets 3 bytes 246 accept comment "!fw4: lan Allow OpenVPN lan"
udp dport xx counter packets 36 bytes 3072 accept comment "!fw4: lan Allow OpenVPN MGT"
ct status dnat accept comment "!fw4: Accept port redirections"
jump drop_from_lan
}
chain output_lan {
jump accept_to_lan
}
chain forward_lan {
meta l4proto tcp ip6 daddr & ::ffff:ffff:ffff:ffff == ::xx counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: lan block FB IPv6"
meta l4proto udp ip6 daddr & ::ffff:ffff:ffff:ffff == ::xx counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: lan block FB IPv6"
ip6 daddr xx::/64 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: lan Block FB IPv6 GUA net"
ip6 daddr fd01::/64 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: lan block FB IPv6 ULA net"
ip daddr 10.1.1.1 counter packets 841 bytes 315749 jump accept_to_wan comment "!fw4: lan allow FB IPv4 FON"
ip daddr 10.1.1.0/24 counter packets 0 bytes 0 jump drop_to_wan comment "!fw4: lan block FB IPv4 net"
ip daddr 10.1.3.2 tcp dport { 80, 443 } counter packets 8256 bytes 485354 jump accept_to_SRV comment "!fw4: LAN allow local nginx"
tcp dport 443 ip daddr @doh counter packets 356 bytes 20832 jump reject_to_wan comment "!fw4: LAN4 Deny-DoH"
udp dport 443 ip daddr @doh counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: LAN4 Deny-DoH"
tcp dport 443 ip6 daddr @doh6 counter packets 346 bytes 27680 jump reject_to_wan comment "!fw4: LAN6 Deny-DoH"
udp dport 443 ip6 daddr @doh6 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: LAN6 Deny-DoH"
tcp dport 853 counter packets 22 bytes 1408 jump reject_to_wan comment "!fw4: lan Deny-DoT"
udp dport 853 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: lan Deny-DoT"
jump accept_to_wan comment "!fw4: Accept lan to wan forwarding"
ct status dnat accept comment "!fw4: Accept port forwards"
jump reject_to_lan
}
chain helper_lan {
udp dport 10080 ct helper set "amanda" comment "!fw4: Amanda backup and archiving proto"
udp dport 1719 ct helper set "RAS" comment "!fw4: RAS proto tracking"
tcp dport 1720 ct helper set "Q.931" comment "!fw4: Q.931 proto tracking"
meta nfproto ipv4 tcp dport 6667 ct helper set "irc" comment "!fw4: IRC DCC connection tracking"
meta nfproto ipv4 tcp dport 1723 ct helper set "pptp" comment "!fw4: PPTP VPN connection tracking"
udp dport 5060 ct helper set "sip" comment "!fw4: SIP VoIP connection tracking"
meta nfproto ipv4 udp dport 161 ct helper set "snmp" comment "!fw4: SNMP monitoring connection tracking"
udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
}
chain accept_to_lan {
oifname { "tun1", "vlan.10" } counter packets 304293 bytes 25343109 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
}
chain reject_to_lan {
oifname { "tun1", "vlan.10" } counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject lan IPv4/IPv6 traffic"
}
chain drop_from_lan {
iifname { "tun1", "vlan.10" } counter packets 23430 bytes 1794411 drop comment "!fw4: drop lan IPv4/IPv6 traffic"
}
chain input_wan {
meta nfproto ipv4 udp dport 68 counter packets 9 bytes 5184 accept comment "!fw4: Allow-DHCP-Renew"
icmp type echo-request counter packets 0 bytes 0 accept comment "!fw4: Allow-Ping"
meta nfproto ipv4 meta l4proto igmp counter packets 28917 bytes 1041012 accept comment "!fw4: Allow-IGMP"
ip6 saddr fc00::/6 ip6 daddr fc00::/6 udp dport 546 counter packets 2105 bytes 493929 accept comment "!fw4: Allow-DHCPv6"
ip6 saddr fe80::/10 icmpv6 type . icmpv6 code { mld-listener-query . no-route, mld-listener-report . no-route, mld-listener-done . no-route, mld2-listener-report . no-route } counter packets 0 bytes 0 accept comment "!fw4: Allow-MLD"
icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply, nd-router-solicit, nd-router-advert } limit rate 1000/second counter packets 7405 bytes 1501704 accept comment "!fw4: Allow-ICMPv6-Input"
icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route, parameter-problem . admin-prohibited } limit rate 1000/second counter packets 52562 bytes 3377928 accept comment "!fw4: Allow-ICMPv6-Input"
udp dport xx counter packets 1 bytes 102 accept comment "!fw4: Allow-OpenVPN-LAN"
udp dport xx counter packets 82 bytes 7492 accept comment "!fw4: Allow-OpenVPN-MGT"
jump drop_from_wan
}
chain output_wan {
jump accept_to_wan
}
chain forward_wan {
icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, parameter-problem . admin-prohibited } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
meta l4proto esp counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-IPSec-ESP"
udp dport 500 counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-ISAKMP"
ip daddr 10.1.3.2 tcp dport 8082 counter packets 0 bytes 0 jump accept_to_SRV comment "!fw4: SRV Allow acme.sh"
jump reject_to_wan
}
chain helper_wan {
udp dport 10080 ct helper set "amanda" comment "!fw4: Amanda backup and archiving proto"
udp dport 1719 ct helper set "RAS" comment "!fw4: RAS proto tracking"
tcp dport 1720 ct helper set "Q.931" comment "!fw4: Q.931 proto tracking"
meta nfproto ipv4 tcp dport 6667 ct helper set "irc" comment "!fw4: IRC DCC connection tracking"
meta nfproto ipv4 tcp dport 1723 ct helper set "pptp" comment "!fw4: PPTP VPN connection tracking"
udp dport 5060 ct helper set "sip" comment "!fw4: SIP VoIP connection tracking"
meta nfproto ipv4 udp dport 161 ct helper set "snmp" comment "!fw4: SNMP monitoring connection tracking"
udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
}
chain accept_to_wan {
oifname "eth0" counter packets 1354207 bytes 250032459 accept comment "!fw4: accept wan IPv4/IPv6 traffic"
}
chain reject_to_wan {
oifname "eth0" counter packets 5937 bytes 947598 jump handle_reject comment "!fw4: reject wan IPv4/IPv6 traffic"
}
chain drop_from_wan {
iifname "eth0" counter packets 35987 bytes 2567988 drop comment "!fw4: drop wan IPv4/IPv6 traffic"
}
chain drop_to_wan {
oifname "eth0" counter packets 0 bytes 0 drop comment "!fw4: drop wan IPv4/IPv6 traffic"
}
chain input_MGT {
jump accept_from_MGT
}
chain output_MGT {
jump accept_to_MGT
}
chain forward_MGT {
jump accept_to_lan comment "!fw4: Accept MGT to lan forwarding"
jump accept_to_wan comment "!fw4: Accept MGT to wan forwarding"
jump accept_to_SRV comment "!fw4: Accept MGT to SRV forwarding"
jump accept_to_IOT comment "!fw4: Accept MGT to IOT forwarding"
jump accept_to_MGT
}
chain helper_MGT {
udp dport 10080 ct helper set "amanda" comment "!fw4: Amanda backup and archiving proto"
udp dport 1719 ct helper set "RAS" comment "!fw4: RAS proto tracking"
tcp dport 1720 ct helper set "Q.931" comment "!fw4: Q.931 proto tracking"
meta nfproto ipv4 tcp dport 6667 ct helper set "irc" comment "!fw4: IRC DCC connection tracking"
meta nfproto ipv4 tcp dport 1723 ct helper set "pptp" comment "!fw4: PPTP VPN connection tracking"
udp dport 5060 ct helper set "sip" comment "!fw4: SIP VoIP connection tracking"
meta nfproto ipv4 udp dport 161 ct helper set "snmp" comment "!fw4: SNMP monitoring connection tracking"
udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
}
chain accept_from_MGT {
iifname { "tun0", "vlan.80" } counter packets 12538 bytes 971651 accept comment "!fw4: accept MGT IPv4/IPv6 traffic"
}
chain accept_to_MGT {
oifname { "tun0", "vlan.80" } counter packets 27759 bytes 2880039 accept comment "!fw4: accept MGT IPv4/IPv6 traffic"
}
chain input_SRV {
tcp dport 53 counter packets 0 bytes 0 accept comment "!fw4: SRV allow DNS Queries"
udp dport 53 counter packets 34961 bytes 2522182 accept comment "!fw4: SRV allow DNS Queries"
udp sport 67-68 udp dport 67-68 counter packets 581 bytes 190568 accept comment "!fw4: SRV allow DHCP request"
meta nfproto ipv6 udp sport 546 udp dport 547 counter packets 5 bytes 846 accept comment "!fw4: SRV allow DHCPv6"
icmpv6 type { nd-router-solicit, nd-router-advert, ind-neighbor-solicit, ind-neighbor-advert, 148, 149 } counter packets 2038 bytes 114128 accept comment "!fw4: SRV allow SLAAC"
icmpv6 type . icmpv6 code { nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route } counter packets 4578 bytes 312296 accept comment "!fw4: SRV allow SLAAC"
jump drop_from_SRV
}
chain output_SRV {
jump accept_to_SRV
}
chain forward_SRV {
meta l4proto tcp ip6 daddr & ::ffff:ffff:ffff:ffff == ::xx counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: SRV block FB IPv6"
meta l4proto udp ip6 daddr & ::ffff:ffff:ffff:ffff == ::xx counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: SRV block FB IPv6"
ip6 daddr xx::/64 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: SRV Block FB IPv6 GUA net"
ip6 daddr fd01::/64 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: SRV block FB IPv6 ULA net"
ip daddr 10.1.1.0/24 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: SRV block FB IPv4 net"
jump accept_to_wan comment "!fw4: Accept SRV to wan forwarding"
jump reject_to_SRV
}
chain helper_SRV {
udp dport 10080 ct helper set "amanda" comment "!fw4: Amanda backup and archiving proto"
udp dport 1719 ct helper set "RAS" comment "!fw4: RAS proto tracking"
tcp dport 1720 ct helper set "Q.931" comment "!fw4: Q.931 proto tracking"
meta nfproto ipv4 tcp dport 6667 ct helper set "irc" comment "!fw4: IRC DCC connection tracking"
meta nfproto ipv4 tcp dport 1723 ct helper set "pptp" comment "!fw4: PPTP VPN connection tracking"
udp dport 5060 ct helper set "sip" comment "!fw4: SIP VoIP connection tracking"
meta nfproto ipv4 udp dport 161 ct helper set "snmp" comment "!fw4: SNMP monitoring connection tracking"
udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
}
chain accept_to_SRV {
oifname "vlan.3" counter packets 650827 bytes 49742464 accept comment "!fw4: accept SRV IPv4/IPv6 traffic"
}
chain reject_to_SRV {
oifname "vlan.3" counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject SRV IPv4/IPv6 traffic"
}
chain drop_from_SRV {
iifname "vlan.3" counter packets 657 bytes 238138 drop comment "!fw4: drop SRV IPv4/IPv6 traffic"
}
chain input_IOT {
tcp dport 53 counter packets 60 bytes 3600 accept comment "!fw4: IOT allow DNS Queries"
udp dport 53 counter packets 129498 bytes 8784036 accept comment "!fw4: IOT allow DNS Queries"
udp sport 67-68 udp dport 67-68 counter packets 848 bytes 287362 accept comment "!fw4: IOT allow DHCP request"
meta nfproto ipv6 udp sport 546 udp dport 547 counter packets 547 bytes 44854 accept comment "!fw4: IOT allow DHCPv6"
icmpv6 type { nd-router-solicit, nd-router-advert, ind-neighbor-solicit, ind-neighbor-advert, 148, 149 } counter packets 683 bytes 33888 accept comment "!fw4: IOT allow SLAAC"
icmpv6 type . icmpv6 code { nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route } counter packets 22084 bytes 1513640 accept comment "!fw4: IOT allow SLAAC"
udp dport 56075 counter packets 0 bytes 0 accept comment "!fw4: IOT allow OpenVPN MGT"
ct status dnat accept comment "!fw4: Accept port redirections"
jump drop_from_IOT
}
chain output_IOT {
jump accept_to_IOT
}
chain forward_IOT {
ip6 daddr & ::ffff:ffff:ffff:ffff == ::xx counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: IOT block FB IPv6"
ip6 daddr fd01::/64 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: IOT block FB IPv6 ULA net"
ip6 daddr xx::/64 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: IOT Block FB IPv6 GUA net"
ip daddr 10.1.1.0/24 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: IOT block FB IPv4 net"
tcp dport 443 ip daddr @doh counter packets 1269 bytes 81216 jump reject_to_wan comment "!fw4: IOT4 Deny-DoH"
udp dport 443 ip daddr @doh counter packets 145 bytes 199810 jump reject_to_wan comment "!fw4: IOT4 Deny-DoH"
tcp dport 443 ip6 daddr @doh6 counter packets 2816 bytes 235872 jump reject_to_wan comment "!fw4: IOT6 Deny-DoH"
udp dport 443 ip6 daddr @doh6 counter packets 230 bytes 321540 jump reject_to_wan comment "!fw4: IOT6 Deny-DoH"
tcp dport 853 counter packets 753 bytes 59240 jump reject_to_wan comment "!fw4: IOT Deny-DoT"
udp dport 853 counter packets 0 bytes 0 jump reject_to_wan comment "!fw4: IOT Deny-DoT"
jump accept_to_wan comment "!fw4: Accept IOT to wan forwarding"
ct status dnat accept comment "!fw4: Accept port forwards"
jump reject_to_IOT
}
chain helper_IOT {
udp dport 10080 ct helper set "amanda" comment "!fw4: Amanda backup and archiving proto"
udp dport 1719 ct helper set "RAS" comment "!fw4: RAS proto tracking"
tcp dport 1720 ct helper set "Q.931" comment "!fw4: Q.931 proto tracking"
meta nfproto ipv4 tcp dport 6667 ct helper set "irc" comment "!fw4: IRC DCC connection tracking"
meta nfproto ipv4 tcp dport 1723 ct helper set "pptp" comment "!fw4: PPTP VPN connection tracking"
udp dport 5060 ct helper set "sip" comment "!fw4: SIP VoIP connection tracking"
meta nfproto ipv4 udp dport 161 ct helper set "snmp" comment "!fw4: SNMP monitoring connection tracking"
udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
}
chain accept_to_IOT {
oifname "vlan.6" counter packets 71167 bytes 8834174 accept comment "!fw4: accept IOT IPv4/IPv6 traffic"
}
chain reject_to_IOT {
oifname "vlan.6" counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject IOT IPv4/IPv6 traffic"
}
chain drop_from_IOT {
iifname "vlan.6" counter packets 328 bytes 117408 drop comment "!fw4: drop IOT IPv4/IPv6 traffic"
}
chain dstnat {
type nat hook prerouting priority dstnat; policy accept;
iifname { "tun1", "vlan.10" } jump dstnat_lan comment "!fw4: Handle lan IPv4/IPv6 dstnat traffic"
iifname "vlan.6" jump dstnat_IOT comment "!fw4: Handle IOT IPv4/IPv6 dstnat traffic"
}
chain srcnat {
type nat hook postrouting priority srcnat; policy accept;
}
chain dstnat_lan {
tcp dport 53 counter packets 3 bytes 204 redirect to :53 comment "!fw4: lan Intercept-DNS"
udp dport 53 counter packets 593797 bytes 48850024 redirect to :53 comment "!fw4: lan Intercept-DNS"
tcp dport 123 counter packets 0 bytes 0 redirect to :123 comment "!fw4: lan Intercept-NTP"
udp dport 123 counter packets 773 bytes 62628 redirect to :123 comment "!fw4: lan Intercept-NTP"
}
chain dstnat_IOT {
tcp dport 53 counter packets 60 bytes 3600 redirect to :53 comment "!fw4: IOT Intercept-DNS"
udp dport 53 counter packets 127106 bytes 8617554 redirect to :53 comment "!fw4: IOT Intercept-DNS"
tcp dport 123 counter packets 0 bytes 0 redirect to :123 comment "!fw4: IOT Intercept-NTP"
udp dport 123 counter packets 10961 bytes 1026136 redirect to :123 comment "!fw4: IOT Intercept-NTP"
}
chain raw_prerouting {
type filter hook prerouting priority raw; policy accept;
}
chain raw_output {
type filter hook output priority raw; policy accept;
}
chain mangle_prerouting {
type filter hook prerouting priority mangle; policy accept;
}
chain mangle_postrouting {
type filter hook postrouting priority mangle; policy accept;
}
chain mangle_input {
type filter hook input priority mangle; policy accept;
}
chain mangle_output {
type route hook output priority mangle; policy accept;
}
chain mangle_forward {
type filter hook forward priority mangle; policy accept;
iifname "eth0" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 ingress MTU fixing"
oifname "eth0" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 egress MTU fixing"
}
}
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
3: eth0@dsa: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 10.1.1.201/24 brd 10.1.1.255 scope global eth0
valid_lft forever preferred_lft forever
10: vlan.80@vlan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 10.1.80.1/24 brd 10.1.80.255 scope global vlan.80
valid_lft forever preferred_lft forever
11: vlan.3@vlan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 10.1.3.1/24 brd 10.1.3.255 scope global vlan.3
valid_lft forever preferred_lft forever
12: vlan.6@vlan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 10.1.6.1/24 brd 10.1.6.255 scope global vlan.6
valid_lft forever preferred_lft forever
46: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 500
inet 10.1.180.1/24 scope global tun0
valid_lft forever preferred_lft forever
48: vlan.10@vlan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 10.1.2.1/24 brd 10.1.2.255 scope global vlan.10
valid_lft forever preferred_lft forever
65: tun1: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 500
inet 10.1.102.1/24 scope global tun1
valid_lft forever preferred_lft forever
default via 10.1.1.1 dev eth0
10.1.1.0/24 dev eth0 scope link src 10.1.1.201
10.1.2.0/24 dev vlan.10 scope link src 10.1.2.1
10.1.3.0/24 dev vlan.3 scope link src 10.1.3.1
10.1.6.0/24 dev vlan.6 scope link src 10.1.6.1
10.1.80.0/24 dev vlan.80 scope link src 10.1.80.1
10.1.102.0/24 dev tun1 scope link src 10.1.102.1
10.1.180.0/24 dev tun0 scope link src 10.1.180.1
broadcast 10.1.1.0 dev eth0 table local scope link src 10.1.1.201
local 10.1.1.201 dev eth0 table local scope host src 10.1.1.201
broadcast 10.1.1.255 dev eth0 table local scope link src 10.1.1.201
broadcast 10.1.2.0 dev vlan.10 table local scope link src 10.1.2.1
local 10.1.2.1 dev vlan.10 table local scope host src 10.1.2.1
broadcast 10.1.2.255 dev vlan.10 table local scope link src 10.1.2.1
broadcast 10.1.3.0 dev vlan.3 table local scope link src 10.1.3.1
local 10.1.3.1 dev vlan.3 table local scope host src 10.1.3.1
broadcast 10.1.3.255 dev vlan.3 table local scope link src 10.1.3.1
broadcast 10.1.6.0 dev vlan.6 table local scope link src 10.1.6.1
local 10.1.6.1 dev vlan.6 table local scope host src 10.1.6.1
broadcast 10.1.6.255 dev vlan.6 table local scope link src 10.1.6.1
broadcast 10.1.80.0 dev vlan.80 table local scope link src 10.1.80.1
local 10.1.80.1 dev vlan.80 table local scope host src 10.1.80.1
broadcast 10.1.80.255 dev vlan.80 table local scope link src 10.1.80.1
broadcast 10.1.102.0 dev tun1 table local scope link src 10.1.102.1
local 10.1.102.1 dev tun1 table local scope host src 10.1.102.1
broadcast 10.1.102.255 dev tun1 table local scope link src 10.1.102.1
broadcast 10.1.180.0 dev tun0 table local scope link src 10.1.180.1
local 10.1.180.1 dev tun0 table local scope host src 10.1.180.1
broadcast 10.1.180.255 dev tun0 table local scope link src 10.1.180.1
broadcast 127.0.0.0 dev lo table local scope link src 127.0.0.1
local 127.0.0.0/8 dev lo table local scope host src 127.0.0.1
local 127.0.0.1 dev lo table local scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local scope link src 127.0.0.1
0: from all lookup local
32766: from all lookup main
32767: from all lookup default