I have successfully flashed the QWRT image [OpenWrt 21.02-SNAPSHOT, r47273-b4df38cf18, R23.8.10 (QSDK 12.1)] as provided by xHikari post on Apr 10, please review my sysupgrade process as below:-
root@OpenWrt:/# sysupgrade -n /tmp/qrt-arcadyan-aw1000.bin
Thu Jan 1 00:23:44 UTC 1970 upgrade: Image metadata not present
Thu Jan 1 00:23:44 UTC 1970 upgrade: Use sysupgrade -F to override this check when downgrading or flashing to vendor firmware
Image check failed.
root@OpenWrt:/# sysupgrade -F /tmp/qrt-arcadyan-aw1000.bin
Thu Jan 1 00:24:18 UTC 1970 upgrade: Image metadata not present
Image check failed but --force given - will update anyway!
Cannot save config while running from ramdisk.
Thu Jan 1 00:24:19 UTC 1970 upgrade: Commencing upgrade. Closing all shell sessions.
Watchdog handover: fd=3
- watchdog -
Watchdog did not previously reset the system
Thu Jan 1 00:24:19 UTC 1970 upgrade: Sending TERM to remaining processes ...
Thu Jan 1 00:24:19 UTC 1970 upgrade: Sending signal TERM to netifd (1974)
Thu Jan 1 00:24:23 UTC 1970 upgrade: Sending KILL to remaining processes ...
Thu Jan 1 00:24:23 UTC 1970 upgrade: Sending signal KILL to netifd (1974)
[ 1472.109718] stage2 (3122): drop_caches: 3
Thu Jan 1 00:24:32 UTC 1970 upgrade: Switching to ramdisk...
Thu Jan 1 00:24:33 UTC 1970 upgrade: Performing system upgrade...
ubiformat: mtd18 (nand), size 104857600 bytes (100.0 MiB), 400 eraseblocks of 262144 bytes (256.0 KiB), min. I/O size 4096 bytes
libscan: scanning eraseblock 399 -- 100 % complete
ubiformat: 400 eraseblocks have valid erase counter, mean value is 74
ubiformat: flashing eraseblock 399 -- 100 % complete
[ 1487.941798] ubi0: attaching mtd18
[ 1488.344951] ubi0: scanning is finished
[ 1488.351382] ubi0: attached mtd18 (name "rootfs", size 100 MiB)
[ 1488.351422] ubi0: PEB size: 262144 bytes (256 KiB), LEB size: 253952 bytes
[ 1488.356128] ubi0: min./max. I/O unit sizes: 4096/4096, sub-page size 4096
[ 1488.362978] ubi0: VID header offset: 4096 (aligned 4096), data offset: 8192
[ 1488.369831] ubi0: good PEBs: 400, bad PEBs: 0, corrupted PEBs: 0
[ 1488.376610] ubi0: user volume: 3, internal volumes: 1, max. volumes count: 128
[ 1488.382857] ubi0: max/mean erase counter: 231/75, WL threshold: 4096, image sequence number: 2061238594
[ 1488.389888] ubi0: available PEBs: 0, total reserved PEBs: 400, PEBs reserved for bad PEB handling: 80
[ 1488.399190] ubi0: background thread "ubi_bgt0d" started, PID 3913
[ 1488.409071] block ubiblock0_1: created from ubi0:1(rootfs)
UBI device number 0, total 400 LEBs (101580800 bytes, 96.8 MiB), available 0 LEBs (0 bytes), LEB size 253952 bytes (248.0 KiB)
sysupgrade successful
umount: can't unmount /dev: Resource busy
umount: can't unmount /tmp: Resource busy
[ 1488.943010] reboot: Restarting system
...
...
...
root@QWRT:/# free
total used free shared buff/cache available
Mem: 889856 190816 647484 1036 51556 648168
Swap: 0 0 0
root@QWRT:/# df
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/root 39680 39680 0 100% /rom
tmpfs 444928 1036 443892 0% /tmp
/dev/ubi0_2 27748 696 25588 3% /overlay
overlayfs:/overlay 27748 696 25588 3% /
tmpfs 512 0 512 0% /dev
root@QWRT:~# ubus call system board; \
> head -n -0 /etc/opkg/*.conf
{
"kernel": "5.4.164",
"hostname": "QWRT",
"system": "ARMv8 Processor rev 4",
"model": "Arcadyan AW1000",
"board_name": "arcadyan,aw1000",
"release": {
"distribution": "OpenWrt",
"version": "21.02-SNAPSHOT",
"target": "ipq807x/generic",
"revision": "R23.8.10 (QSDK 12.1)",
"description": "QWRT "
}
}
==> /etc/opkg/customfeeds.conf <==
# add your custom package feeds here
#
# src/gz example_feed_name http://www.example.com/path/to/files
==> /etc/opkg/distfeeds.conf <==
src/gz openwrt_base https://downloads.immortalwrt.org/releases/21.02.1/packages/aarch64_cortex-a53/base
src/gz openwrt_luci https://downloads.immortalwrt.org/releases/packages-18.06-k5.4/aarch64_cortex-a53/luci
src/gz openwrt_packages https://downloads.immortalwrt.org/releases/21.02.1/packages/aarch64_cortex-a53/packages
src/gz openwrt_routing https://downloads.immortalwrt.org/releases/21.02.1/packages/aarch64_cortex-a53/routing
src/gz openwrt_telephony https://downloads.immortalwrt.org/releases/21.02.1/packages/aarch64_cortex-a53/telephony
The device's mobile 4G/5G interface wan appears to be working as I can ping any ip address and any domain name on the internet through via System TTYD Terminal prompt.
QWRT login: root
Password:
BusyBox v1.33.2 (2023-08-05 16:42:02 UTC) built-in shell (ash)
MM NM MMMMMMM M M
$MMMMM MMMMM MMMMMMMMMMM MMM MMM
MMMMMMMM MM MMMMM. MMMMM:MMMMMM: MMMM MMMMM
MMMM= MMMMMM MMM MMMM MMMMM MMMM MMMMMM MMMM MMMMM'
MMMM= MMMMM MMMM MM MMMMM MMMM MMMM MMMMNMMMMM
MMMM= MMMM MMMMM MMMMM MMMM MMMM MMMMMMMM
MMMM= MMMM MMMMMM MMMMM MMMM MMMM MMMMMMMMM
MMMM= MMMM MMMMM, NMMMMMMMM MMMM MMMM MMMMMMMMMMM
MMMM= MMMM MMMMMM MMMMMMMM MMMM MMMM MMMM MMMMMM
MMMM= MMMM MM MMMM MMMM MMMM MMMM MMMM MMMM
MMMM$ ,MMMMM MMMMM MMMM MMM MMMM MMMMM MMMM MMMM
MMMMMMM: MMMMMMM M MMMMMMMMMMMM MMMMMMM MMMMMMM
MMMMMM MMMMN M MMMMMMMMM MMMM MMMM
MMMM M MMMMMMM M M
M
---------------------------------------------------------------
For those about to rock... OpenWrt 21.02-SNAPSHOT, r47273-b4df38cf18
---------------------------------------------------------------
root@QWRT:~# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: seq=0 ttl=116 time=260.560 ms
64 bytes from 8.8.8.8: seq=1 ttl=116 time=42.125 ms
64 bytes from 8.8.8.8: seq=2 ttl=116 time=161.885 ms
^C
--- 8.8.8.8 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 42.125/154.856/260.560 ms
root@QWRT:~# ping -4 cisco.com
PING cisco.com (72.163.4.185): 56 data bytes
64 bytes from 72.163.4.185: seq=0 ttl=229 time=276.897 ms
64 bytes from 72.163.4.185: seq=1 ttl=229 time=236.860 ms
64 bytes from 72.163.4.185: seq=2 ttl=229 time=356.435 ms
^C
--- cisco.com ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 236.860/290.064/356.435 ms
root@QWRT:~# traceroute 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 46 byte packets
1 10.111.13.188 (10.111.13.188) 151.329 ms 10.111.13.189 (10.111.13.189) 16.616 ms 14.414 ms
2 172.24.126.1 (172.24.126.1) 14.875 ms 14.381 ms 14.857 ms
3 10.194.122.209 (10.194.122.209) 15.897 ms 19.326 ms 23.782 ms
4 * * *
5 hu0-5-0-0.22rrpr01.optus.net.au (59.154.142.250) 47.193 ms hu0-3-0-0.22rrpr01.optus.net.au (124.19.61.167) 21.832 ms 25.545 ms
6 74.125.147.174 (74.125.147.174) 19.862 ms 28.842 ms 24.815 ms
7 192.178.97.155 (192.178.97.155) 24.409 ms 192.178.98.33 (192.178.98.33) 17.799 ms 192.178.97.225 (192.178.97.225) 20.384 ms
8 216.239.56.69 (216.239.56.69) 18.384 ms 142.250.224.225 (142.250.224.225) 19.756 ms 142.250.234.213 (142.250.234.213) 16.818 ms
9 dns.google (8.8.8.8) 23.612 ms 15.867 ms 18.749 ms
I can also obtain IP address via both wired Ethernet and wifi on my Windows PC from the device's DHCP server, however when pinging an internet address the packet can't be routed back to my PC, see below:-
C:\>ping 8.8.8.8
Pinging 8.8.8.8 with 32 bytes of data:
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
C:\>tracert -4 8.8.8.8
Tracing route to dns.google [8.8.8.8]
over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms QWRT.lan [192.168.1.1]
2 QWRT.lan [192.168.1.1] reports: Destination protocol unreachable.
Trace complete.
C:\>ipconfig/all
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . : lan
Description . . . . . . . . . . . : Alienware AW1022 2.5GbE Adapter
Physical Address. . . . . . . . . : 0C-37-96-94-CC-46
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 192.168.1.145(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Thursday, 4 July 2024 11:48:53 AM
Lease Expires . . . . . . . . . . : Thursday, 4 July 2024 11:59:26 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
C:\>ping -4 cisco.com
Pinging cisco.com [72.163.4.185] with 32 bytes of data:
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
C:\>ping 72.163.4.185
Pinging 72.163.4.185 with 32 bytes of data:
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
Reply from 192.168.1.1: Destination port unreachable.
It may well be the firewall is blocking the traffic but I have a quick look at the both the /etc/config/network and /etc/config/firewall files, but I couldn't see anything apparent. As this is my very first time flashing the device and also looking at a Linux system, can someone share some thought and provide some insight?
root@QWRT:~# cat /etc/config/network
config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fdff:1401:8ad2::/48'
config interface 'lan'
option type 'bridge'
option ifname 'eth0 eth1 eth2 eth3 eth4'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option ip6assign '60'
option multicast_querier '0'
option igmp_snooping '0'
option force_link '1'
config interface 'wan'
option ifname 'wwan0'
option proto 'dhcp'
option metric '1'
config interface 'wan6'
option ifname 'wwan0'
option proto 'dhcpv6'
config interface 'vpn0'
option ifname 'tun0'
option proto 'none'
config interface 'ipsec_server'
option ifname 'ipsec0'
option device 'ipsec0'
option proto 'static'
option ipaddr '192.168.100.1'
option netmask '255.255.255.0'
config interface 'wan2'
option proto 'dhcp'
option metric '20'
option ifname 'wan2'
config interface 'wan1'
option proto 'dhcp'
option _orig_bridge 'false'
option metric '10'
option peerdns '0'
option dns '8.8.8.8 8.8.4.4 1.1.1.1 1.0.0.1'
root@QWRT:~# cat /etc/config/firewall
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option flow_offloading '0'
option flow_offloading_hw '0'
option fullcone '2'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
option network 'wan wan6 wan1 wan2'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config rule
option name 'Support-UDP-Traceroute'
option src 'wan'
option dest_port '33434:33689'
option proto 'udp'
option family 'ipv4'
option target 'REJECT'
option enabled 'false'
config include
option path '/etc/firewall.user'
config include 'zerotier'
option type 'script'
option path '/etc/zerotier.start'
option reload '1'
config include 'miniupnpd'
option type 'script'
option path '/usr/share/miniupnpd/firewall.include'
option family 'any'
option reload '1'
config include 'qcanssecm'
option type 'script'
option path '/etc/firewall.d/qca-nss-ecm'
option family 'any'
option reload '1'
config include 'luci_app_ipsec_server'
option type 'script'
option path '/var/etc/ipsecvpn.include'
option reload '1'
config include 'openclash'
option type 'script'
option path '/var/etc/openclash.include'
option reload '1'
config rule 'openvpn'
option name 'openvpn'
option target 'ACCEPT'
option src 'wan'
option proto 'tcp udp'
option dest_port '1194'
config zone 'vpn'
option name 'vpn'
option input 'ACCEPT'
option forward 'ACCEPT'
option output 'ACCEPT'
option masq '1'
option network 'vpn0'
config forwarding 'vpntowan'
option src 'vpn'
option dest 'wan'
config forwarding 'vpntolan'
option src 'vpn'
option dest 'lan'
config forwarding 'lantovpn'
option src 'lan'
option dest 'vpn'
config zone 'ipsecserver'
option name 'ipsecserver'
option input 'ACCEPT'
option forward 'ACCEPT'
option output 'ACCEPT'
option network 'ipsec_server'
root@QWRT:~# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere /* !fw3 */
input_rule all -- anywhere anywhere /* !fw3: Custom input rule chain */
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED /* !fw3 */
syn_flood tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN /* !fw3 */
zone_lan_input all -- anywhere anywhere /* !fw3 */
zone_wan_input all -- anywhere anywhere /* !fw3 */
zone_vpn_input all -- anywhere anywhere /* !fw3 */
zone_ipsecserver_input all -- anywhere anywhere /* !fw3 */
Chain FORWARD (policy DROP)
target prot opt source destination
forwarding_rule all -- anywhere anywhere /* !fw3: Custom forwarding rule chain */
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED /* !fw3 */
zone_lan_forward all -- anywhere anywhere /* !fw3 */
zone_wan_forward all -- anywhere anywhere /* !fw3 */
zone_vpn_forward all -- anywhere anywhere /* !fw3 */
zone_ipsecserver_forward all -- anywhere anywhere /* !fw3 */
reject all -- anywhere anywhere /* !fw3 */
ACCEPT all -- anywhere anywhere PHYSDEV match --physdev-is-bridged
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere /* !fw3 */
output_rule all -- anywhere anywhere /* !fw3: Custom output rule chain */
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED /* !fw3 */
zone_lan_output all -- anywhere anywhere /* !fw3 */
zone_wan_output all -- anywhere anywhere /* !fw3 */
zone_vpn_output all -- anywhere anywhere /* !fw3 */
zone_ipsecserver_output all -- anywhere anywhere /* !fw3 */
Chain MINIUPNPD (0 references)
target prot opt source destination
Chain RATE-LIMIT (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere limit: avg 1000/sec burst 1000
DROP all -- anywhere anywhere
Chain forwarding_ipsecserver_rule (1 references)
target prot opt source destination
Chain forwarding_lan_rule (1 references)
target prot opt source destination
Chain forwarding_rule (1 references)
target prot opt source destination
Chain forwarding_vpn_rule (1 references)
target prot opt source destination
Chain forwarding_wan_rule (1 references)
target prot opt source destination
Chain input_ipsecserver_rule (1 references)
target prot opt source destination
Chain input_lan_rule (1 references)
target prot opt source destination
Chain input_rule (1 references)
target prot opt source destination
Chain input_vpn_rule (1 references)
target prot opt source destination
Chain input_wan_rule (1 references)
target prot opt source destination
Chain output_ipsecserver_rule (1 references)
target prot opt source destination
Chain output_lan_rule (1 references)
target prot opt source destination
Chain output_rule (1 references)
target prot opt source destination
Chain output_vpn_rule (1 references)
target prot opt source destination
Chain output_wan_rule (1 references)
target prot opt source destination
Chain reject (3 references)
target prot opt source destination
REJECT tcp -- anywhere anywhere /* !fw3 */ reject-with tcp-reset
REJECT all -- anywhere anywhere /* !fw3 */ reject-with icmp-port-unreachable
Chain syn_flood (1 references)
target prot opt source destination
RETURN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50 /* !fw3 */
DROP all -- anywhere anywhere /* !fw3 */
Chain zone_ipsecserver_dest_ACCEPT (2 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_ipsecserver_forward (1 references)
target prot opt source destination
forwarding_ipsecserver_rule all -- anywhere anywhere /* !fw3: Custom ipsecserver forwarding rule chain */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port forwards */
zone_ipsecserver_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_ipsecserver_input (1 references)
target prot opt source destination
input_ipsecserver_rule all -- anywhere anywhere /* !fw3: Custom ipsecserver input rule chain */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port redirections */
zone_ipsecserver_src_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_ipsecserver_output (1 references)
target prot opt source destination
output_ipsecserver_rule all -- anywhere anywhere /* !fw3: Custom ipsecserver output rule chain */
zone_ipsecserver_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_ipsecserver_src_ACCEPT (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate NEW,UNTRACKED /* !fw3 */
Chain zone_lan_dest_ACCEPT (5 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_lan_forward (1 references)
target prot opt source destination
forwarding_lan_rule all -- anywhere anywhere /* !fw3: Custom lan forwarding rule chain */
zone_wan_dest_ACCEPT all -- anywhere anywhere /* !fw3: Zone lan to wan forwarding policy */
zone_vpn_dest_ACCEPT all -- anywhere anywhere /* !fw3: Zone lan to vpn forwarding policy */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port forwards */
zone_lan_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_lan_input (1 references)
target prot opt source destination
input_lan_rule all -- anywhere anywhere /* !fw3: Custom lan input rule chain */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port redirections */
zone_lan_src_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_lan_output (1 references)
target prot opt source destination
output_lan_rule all -- anywhere anywhere /* !fw3: Custom lan output rule chain */
zone_lan_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_lan_src_ACCEPT (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate NEW,UNTRACKED /* !fw3 */
Chain zone_vpn_dest_ACCEPT (3 references)
target prot opt source destination
DROP all -- anywhere anywhere ctstate INVALID /* !fw3: Prevent NAT leakage */
ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_vpn_forward (1 references)
target prot opt source destination
forwarding_vpn_rule all -- anywhere anywhere /* !fw3: Custom vpn forwarding rule chain */
zone_wan_dest_ACCEPT all -- anywhere anywhere /* !fw3: Zone vpn to wan forwarding policy */
zone_lan_dest_ACCEPT all -- anywhere anywhere /* !fw3: Zone vpn to lan forwarding policy */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port forwards */
zone_vpn_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_vpn_input (1 references)
target prot opt source destination
input_vpn_rule all -- anywhere anywhere /* !fw3: Custom vpn input rule chain */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port redirections */
zone_vpn_src_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_vpn_output (1 references)
target prot opt source destination
output_vpn_rule all -- anywhere anywhere /* !fw3: Custom vpn output rule chain */
zone_vpn_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_vpn_src_ACCEPT (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate NEW,UNTRACKED /* !fw3 */
Chain zone_wan_dest_ACCEPT (3 references)
target prot opt source destination
DROP all -- anywhere anywhere ctstate INVALID /* !fw3: Prevent NAT leakage */
ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_wan_dest_REJECT (1 references)
target prot opt source destination
reject all -- anywhere anywhere /* !fw3 */
Chain zone_wan_forward (1 references)
target prot opt source destination
forwarding_wan_rule all -- anywhere anywhere /* !fw3: Custom wan forwarding rule chain */
zone_lan_dest_ACCEPT esp -- anywhere anywhere /* !fw3: Allow-IPSec-ESP */
zone_lan_dest_ACCEPT udp -- anywhere anywhere udp dpt:isakmp /* !fw3: Allow-ISAKMP */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port forwards */
RATE-LIMIT all -- anywhere anywhere ctstate NEW
zone_wan_dest_REJECT all -- anywhere anywhere /* !fw3 */
Chain zone_wan_input (1 references)
target prot opt source destination
input_wan_rule all -- anywhere anywhere /* !fw3: Custom wan input rule chain */
ACCEPT udp -- anywhere anywhere udp dpt:bootpc /* !fw3: Allow-DHCP-Renew */
ACCEPT icmp -- anywhere anywhere icmp echo-request /* !fw3: Allow-Ping */
ACCEPT igmp -- anywhere anywhere /* !fw3: Allow-IGMP */
ACCEPT tcp -- anywhere anywhere tcp dpt:openvpn /* !fw3: openvpn */
ACCEPT udp -- anywhere anywhere udp dpt:openvpn /* !fw3: openvpn */
ACCEPT all -- anywhere anywhere ctstate DNAT /* !fw3: Accept port redirections */
zone_wan_src_REJECT all -- anywhere anywhere /* !fw3 */
Chain zone_wan_output (1 references)
target prot opt source destination
output_wan_rule all -- anywhere anywhere /* !fw3: Custom wan output rule chain */
zone_wan_dest_ACCEPT all -- anywhere anywhere /* !fw3 */
Chain zone_wan_src_REJECT (1 references)
target prot opt source destination
reject all -- anywhere anywhere /* !fw3 */