Thank you very much.
# wg show
interface: zion
public key: xxxxx
private key: (hidden)
listening port: 42125
peer: xxxxx
endpoint: [2001:19f0:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx]:51820
allowed ips: 0.0.0.0/0, ::/0
latest handshake: 1 minute, 24 seconds ago
transfer: 71.72 MiB received, 2.49 MiB sent
persistent keepalive: every 25 seconds
# wg showconf zion
[Interface]
ListenPort = 42125
PrivateKey = xxxxx
[Peer]
PublicKey = xxxxx
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = [2001:19f0:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx]:51820
PersistentKeepalive = 25
# ip address show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:fc brd ff:ff:ff:ff:ff:ff
inet 218.103.199.110/24 brd 218.103.199.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 2404:c800:9138:1a4:62be:b4ff:fe0a:2ffc/64 scope global dynamic noprefixroute
valid_lft 85964sec preferred_lft 3164sec
inet6 fe80::62be:b4ff:fe0a:2ffc/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
link/ether 60:be:b4:0a:2f:fd brd ff:ff:ff:ff:ff:ff
4: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-lan state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:fe brd ff:ff:ff:ff:ff:ff
5: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-lan state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:ff brd ff:ff:ff:ff:ff:ff
6: eth4: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-lan state UP group default qlen 1000
link/ether 60:be:b4:0a:30:00 brd ff:ff:ff:ff:ff:ff
7: eth5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-lan state UP group default qlen 1000
link/ether 60:be:b4:0a:30:01 brd ff:ff:ff:ff:ff:ff
8: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:fe brd ff:ff:ff:ff:ff:ff
inet6 fe80::62be:b4ff:fe0a:2ffe/64 scope link
valid_lft forever preferred_lft forever
9: br-lan.7@br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:fe brd ff:ff:ff:ff:ff:ff
inet 192.168.50.1/24 brd 192.168.50.255 scope global br-lan.7
valid_lft forever preferred_lft forever
inet6 2404:c805:3800:6b00::1/64 scope global dynamic noprefixroute
valid_lft 1143sec preferred_lft 1143sec
inet6 fe80::62be:b4ff:fe0a:2ffe/64 scope link
valid_lft forever preferred_lft forever
10: br-lan.8@br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:fe brd ff:ff:ff:ff:ff:ff
inet 192.168.58.1/24 brd 192.168.58.255 scope global br-lan.8
valid_lft forever preferred_lft forever
inet6 fe80::62be:b4ff:fe0a:2ffe/64 scope link
valid_lft forever preferred_lft forever
11: br-lan.9@br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 60:be:b4:0a:2f:fe brd ff:ff:ff:ff:ff:ff
inet 192.168.59.1/24 brd 192.168.59.255 scope global br-lan.9
valid_lft forever preferred_lft forever
inet6 fe80::62be:b4ff:fe0a:2ffe/64 scope link
valid_lft forever preferred_lft forever
13: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default
link/ether 02:42:ff:ff:4f:76 brd ff:ff:ff:ff:ff:ff
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
valid_lft forever preferred_lft forever
inet6 fe80::42:ffff:feff:4f76/64 scope link
valid_lft forever preferred_lft forever
22: WireGuard: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.0.0.1/24 brd 10.0.0.255 scope global WireGuard
valid_lft forever preferred_lft forever
26: zion: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.10.10.2/32 brd 255.255.255.255 scope global zion
valid_lft forever preferred_lft forever
inet6 fd78:977c:d34a::2/128 scope global
valid_lft forever preferred_lft forever
# ip route show table all
default via 218.103.199.252 dev eth0 proto static src 218.103.199.110
10.0.0.0/24 dev WireGuard proto kernel scope link src 10.0.0.1
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown
192.168.50.0/24 dev br-lan.7 proto kernel scope link src 192.168.50.1
192.168.58.0/24 dev br-lan.8 proto kernel scope link src 192.168.58.1
192.168.59.0/24 dev br-lan.9 proto kernel scope link src 192.168.59.1
218.103.199.0/24 dev eth0 proto kernel scope link src 218.103.199.110
broadcast 10.0.0.0 dev WireGuard table local proto kernel scope link src 10.0.0.1
local 10.0.0.1 dev WireGuard table local proto kernel scope host src 10.0.0.1
broadcast 10.0.0.255 dev WireGuard table local proto kernel scope link src 10.0.0.1
local 10.10.10.2 dev zion table local proto kernel scope host src 10.10.10.2
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
broadcast 172.17.0.0 dev docker0 table local proto kernel scope link src 172.17.0.1 linkdown
local 172.17.0.1 dev docker0 table local proto kernel scope host src 172.17.0.1
broadcast 172.17.255.255 dev docker0 table local proto kernel scope link src 172.17.0.1 linkdown
broadcast 192.168.50.0 dev br-lan.7 table local proto kernel scope link src 192.168.50.1
local 192.168.50.1 dev br-lan.7 table local proto kernel scope host src 192.168.50.1
broadcast 192.168.50.255 dev br-lan.7 table local proto kernel scope link src 192.168.50.1
broadcast 192.168.58.0 dev br-lan.8 table local proto kernel scope link src 192.168.58.1
local 192.168.58.1 dev br-lan.8 table local proto kernel scope host src 192.168.58.1
broadcast 192.168.58.255 dev br-lan.8 table local proto kernel scope link src 192.168.58.1
broadcast 192.168.59.0 dev br-lan.9 table local proto kernel scope link src 192.168.59.1
local 192.168.59.1 dev br-lan.9 table local proto kernel scope host src 192.168.59.1
broadcast 192.168.59.255 dev br-lan.9 table local proto kernel scope link src 192.168.59.1
broadcast 218.103.199.0 dev eth0 table local proto kernel scope link src 218.103.199.110
local 218.103.199.110 dev eth0 table local proto kernel scope host src 218.103.199.110
broadcast 218.103.199.255 dev eth0 table local proto kernel scope link src 218.103.199.110
default from 2404:c800:9138:1a4::/64 via fe80::ff:fe02:202 dev eth0 table 272 proto static metric 512 pref medium
default from 2404:c805:3800:6b00::/56 via fe80::ff:fe02:202 dev eth0 table 272 proto static metric 512 pref medium
2001:19f0:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx via fe80::ff:fe02:202 dev eth0 table 272 proto static metric 512 pref medium
2404:c800:9138:1a4::/64 dev eth0 table 272 proto static metric 256 pref medium
fe80::/64 dev eth0 table 272 proto kernel metric 256 pref medium
unreachable default dev lo table 273 metric 1024 pref medium
fd78:977c:d34a::2 dev zion table 274 proto kernel metric 256 pref medium
unreachable default dev lo table 274 metric 1024 pref medium
default from 2404:c800:9138:1a4::/64 via fe80::ff:fe02:202 dev eth0 proto static metric 512 pref medium
default from 2404:c805:3800:6b00::/56 via fe80::ff:fe02:202 dev eth0 proto static metric 512 pref medium
2001:19f0:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx via fe80::ff:fe02:202 dev eth0 proto static metric 512 pref medium
2404:c800:9138:1a4::/64 dev eth0 proto static metric 256 pref medium
unreachable 2404:c800:9138:1a4::/64 dev lo proto static metric 2147483647 pref medium
2404:c805:3800:6b00::/64 dev br-lan.7 proto kernel metric 256 expires 796sec pref medium
2404:c805:3800:6b00::/64 dev br-lan.7 proto static metric 1024 pref medium
unreachable 2404:c805:3800:6b00::/56 dev lo proto static metric 2147483647 pref medium
fd78:977c:d34a::2 dev zion proto kernel metric 256 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
fe80::/64 dev br-lan.7 proto kernel metric 256 pref medium
fe80::/64 dev br-lan.8 proto kernel metric 256 pref medium
fe80::/64 dev br-lan.9 proto kernel metric 256 pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium
fe80::/64 dev docker0 proto kernel metric 256 linkdown pref medium
local ::1 dev lo table local proto kernel metric 0 pref medium
anycast 2404:c800:9138:1a4:: dev eth0 table local proto kernel metric 0 pref medium
local 2404:c800:9138:1a4:62be:b4ff:fe0a:2ffc dev eth0 table local proto kernel metric 0 pref medium
anycast 2404:c805:3800:6b00:: dev br-lan.7 table local proto kernel metric 0 pref medium
local 2404:c805:3800:6b00::1 dev br-lan.7 table local proto kernel metric 0 pref medium
local fd78:977c:d34a::2 dev zion table local proto kernel metric 0 pref medium
anycast fe80:: dev br-lan.7 table local proto kernel metric 0 pref medium
anycast fe80:: dev br-lan table local proto kernel metric 0 pref medium
anycast fe80:: dev br-lan.8 table local proto kernel metric 0 pref medium
anycast fe80:: dev br-lan.9 table local proto kernel metric 0 pref medium
anycast fe80:: dev eth0 table local proto kernel metric 0 pref medium
anycast fe80:: dev docker0 table local proto kernel metric 0 pref medium
local fe80::42:ffff:feff:4f76 dev docker0 table local proto kernel metric 0 pref medium
local fe80::62be:b4ff:fe0a:2ffc dev eth0 table local proto kernel metric 0 pref medium
local fe80::62be:b4ff:fe0a:2ffe dev br-lan.7 table local proto kernel metric 0 pref medium
local fe80::62be:b4ff:fe0a:2ffe dev br-lan table local proto kernel metric 0 pref medium
local fe80::62be:b4ff:fe0a:2ffe dev br-lan.8 table local proto kernel metric 0 pref medium
local fe80::62be:b4ff:fe0a:2ffe dev br-lan.9 table local proto kernel metric 0 pref medium
multicast ff00::/8 dev br-lan table local proto kernel metric 256 pref medium
multicast ff00::/8 dev br-lan.7 table local proto kernel metric 256 pref medium
multicast ff00::/8 dev br-lan.8 table local proto kernel metric 256 pref medium
multicast ff00::/8 dev br-lan.9 table local proto kernel metric 256 pref medium
multicast ff00::/8 dev eth0 table local proto kernel metric 256 pref medium
multicast ff00::/8 dev docker0 table local proto kernel metric 256 linkdown pref medium
multicast ff00::/8 dev WireGuard table local proto kernel metric 256 pref medium
multicast ff00::/8 dev zion table local proto kernel metric 256 pref medium
# ip rule show
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
# ip -6 rule show
0: from all lookup local
30000: from all fwmark 0x10000/0xff0000 lookup 272
30001: from all fwmark 0x20000/0xff0000 lookup 273
30002: from all fwmark 0x30000/0xff0000 lookup 274
32766: from all lookup main
4200000000: from 2404:c805:3800:6b00::1/64 iif br-lan.7 unreachable
# nft list ruleset
table inet fw4 {
chain input {
type filter hook input priority filter; policy accept;
iifname "lo" accept comment "!fw4: Accept traffic from loopback"
ct state established,related accept comment "!fw4: Allow inbound established and related flows"
tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets"
iifname "br-lan.7" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
iifname "WireGuard" jump input_WG comment "!fw4: Handle WG IPv4/IPv6 input traffic"
iifname "br-lan.8" jump input_IoTZone comment "!fw4: Handle IoTZone IPv4/IPv6 input traffic"
iifname "br-lan.9" jump input_GuestZone comment "!fw4: Handle GuestZone IPv4/IPv6 input traffic"
iifname "zion" jump input_WGZone comment "!fw4: Handle WGZone IPv4/IPv6 input traffic"
iifname { "eth0", "eth1" } jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
iifname "docker0" jump input_docker comment "!fw4: Handle docker IPv4/IPv6 input traffic"
}
chain forward {
type filter hook forward priority filter; policy drop;
ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
iifname "br-lan.7" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
iifname "WireGuard" jump forward_WG comment "!fw4: Handle WG IPv4/IPv6 forward traffic"
iifname "br-lan.8" jump forward_IoTZone comment "!fw4: Handle IoTZone IPv4/IPv6 forward traffic"
iifname "br-lan.9" jump forward_GuestZone comment "!fw4: Handle GuestZone IPv4/IPv6 forward traffic"
iifname "zion" jump forward_WGZone comment "!fw4: Handle WGZone IPv4/IPv6 forward traffic"
iifname { "eth0", "eth1" } jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
iifname "docker0" jump forward_docker comment "!fw4: Handle docker IPv4/IPv6 forward traffic"
jump handle_reject
}
chain output {
type filter hook output priority filter; policy accept;
oifname "lo" accept comment "!fw4: Accept traffic towards loopback"
ct state established,related accept comment "!fw4: Allow outbound established and related flows"
oifname "br-lan.7" jump output_lan comment "!fw4: Handle lan IPv4/IPv6 output traffic"
oifname "WireGuard" jump output_WG comment "!fw4: Handle WG IPv4/IPv6 output traffic"
oifname "br-lan.8" jump output_IoTZone comment "!fw4: Handle IoTZone IPv4/IPv6 output traffic"
oifname "br-lan.9" jump output_GuestZone comment "!fw4: Handle GuestZone IPv4/IPv6 output traffic"
oifname "zion" jump output_WGZone comment "!fw4: Handle WGZone IPv4/IPv6 output traffic"
oifname { "eth0", "eth1" } jump output_wan comment "!fw4: Handle wan IPv4/IPv6 output traffic"
oifname "docker0" jump output_docker comment "!fw4: Handle docker IPv4/IPv6 output traffic"
}
chain prerouting {
type filter hook prerouting priority filter; policy accept;
iifname "br-lan.7" jump helper_lan comment "!fw4: Handle lan IPv4/IPv6 helper assignment"
iifname "WireGuard" jump helper_WG comment "!fw4: Handle WG IPv4/IPv6 helper assignment"
iifname "br-lan.8" jump helper_IoTZone comment "!fw4: Handle IoTZone IPv4/IPv6 helper assignment"
iifname "br-lan.9" jump helper_GuestZone comment "!fw4: Handle GuestZone IPv4/IPv6 helper assignment"
iifname "docker0" jump helper_docker comment "!fw4: Handle docker IPv4/IPv6 helper assignment"
}
chain handle_reject {
meta l4proto tcp reject with tcp reset comment "!fw4: Reject TCP traffic"
reject comment "!fw4: Reject any other traffic"
}
chain syn_flood {
limit rate 25/second burst 50 packets return comment "!fw4: Accept SYN packets below rate-limit"
drop comment "!fw4: Drop excess packets"
}
chain input_lan {
jump accept_from_lan
}
chain output_lan {
jump accept_to_lan
}
chain forward_lan {
jump accept_to_wan comment "!fw4: Accept lan to wan forwarding"
jump accept_to_WG comment "!fw4: Accept lan to WG forwarding"
jump accept_to_IoTZone comment "!fw4: Accept lan to IoTZone forwarding"
jump accept_to_WGZone comment "!fw4: Accept lan to WGZone forwarding"
jump accept_to_lan
}
chain helper_lan {
}
chain accept_from_lan {
iifname "br-lan.7" counter packets 3150 bytes 231251 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
}
chain accept_to_lan {
oifname "br-lan.7" counter packets 434 bytes 36576 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
}
chain input_wan {
meta nfproto ipv4 udp dport 68 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCP-Renew"
icmp type echo-request counter packets 1 bytes 40 accept comment "!fw4: Allow-Ping"
meta nfproto ipv4 meta l4proto igmp counter packets 0 bytes 0 accept comment "!fw4: Allow-IGMP"
meta nfproto ipv6 udp dport 546 counter packets 1 bytes 161 accept comment "!fw4: Allow-DHCPv6"
ip6 saddr fe80::/10 icmpv6 type . icmpv6 code { mld-listener-query . no-route, mld-listener-report . no-route, mld-listener-done . no-route, mld2-listener-report . no-route } counter packets 0 bytes 0 accept comment "!fw4: Allow-MLD"
icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply, nd-router-solicit, nd-router-advert } limit rate 1000/second counter packets 2 bytes 272 accept comment "!fw4: Allow-ICMPv6-Input"
icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route, parameter-problem . admin-prohibited } limit rate 1000/second counter packets 45 bytes 3240 accept comment "!fw4: Allow-ICMPv6-Input"
udp dport 51820 counter packets 0 bytes 0 accept comment "!fw4: WireGuard"
jump reject_from_wan
}
chain output_wan {
jump accept_to_wan
}
chain forward_wan {
icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, parameter-problem . admin-prohibited } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
meta l4proto esp counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-IPSec-ESP"
udp dport 500 counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-ISAKMP"
jump reject_to_wan
}
chain accept_to_wan {
oifname { "eth0", "eth1" } counter packets 2101 bytes 233947 accept comment "!fw4: accept wan IPv4/IPv6 traffic"
}
chain reject_from_wan {
iifname { "eth0", "eth1" } counter packets 645 bytes 25841 jump handle_reject comment "!fw4: reject wan IPv4/IPv6 traffic"
}
chain reject_to_wan {
oifname { "eth0", "eth1" } counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject wan IPv4/IPv6 traffic"
}
chain input_WG {
jump accept_from_WG
}
chain output_WG {
jump accept_to_WG
}
chain forward_WG {
jump accept_to_lan comment "!fw4: Accept WG to lan forwarding"
jump accept_to_wan comment "!fw4: Accept WG to wan forwarding"
jump accept_to_IoTZone comment "!fw4: Accept WG to IoTZone forwarding"
jump accept_to_WG
}
chain helper_WG {
}
chain accept_from_WG {
iifname "WireGuard" counter packets 0 bytes 0 accept comment "!fw4: accept WG IPv4/IPv6 traffic"
}
chain accept_to_WG {
oifname "WireGuard" counter packets 0 bytes 0 accept comment "!fw4: accept WG IPv4/IPv6 traffic"
}
chain input_WGZone {
jump drop_from_WGZone
}
chain output_WGZone {
jump accept_to_WGZone
}
chain forward_WGZone {
jump accept_to_wan comment "!fw4: Accept WGZone to wan forwarding"
jump drop_to_WGZone
}
chain accept_to_WGZone {
oifname "zion" counter packets 922 bytes 66180 accept comment "!fw4: accept WGZone IPv4/IPv6 traffic"
}
chain drop_from_WGZone {
iifname "zion" counter packets 721 bytes 103924 drop comment "!fw4: drop WGZone IPv4/IPv6 traffic"
}
chain drop_to_WGZone {
oifname "zion" counter packets 0 bytes 0 drop comment "!fw4: drop WGZone IPv4/IPv6 traffic"
}
chain input_docker {
jump accept_from_docker
}
chain output_docker {
jump accept_to_docker
}
chain forward_docker {
jump accept_to_docker
}
chain helper_docker {
}
chain accept_from_docker {
iifname "docker0" counter packets 0 bytes 0 accept comment "!fw4: accept docker IPv4/IPv6 traffic"
}
chain accept_to_docker {
oifname "docker0" counter packets 0 bytes 0 accept comment "!fw4: accept docker IPv4/IPv6 traffic"
}
chain input_GuestZone {
tcp dport { 53, 54, 67, 68 } counter packets 0 bytes 0 accept comment "!fw4: Guest DHCP and DNS"
udp dport { 53, 54, 67, 68 } counter packets 0 bytes 0 accept comment "!fw4: Guest DHCP and DNS"
jump accept_from_GuestZone
}
chain output_GuestZone {
jump accept_to_GuestZone
}
chain forward_GuestZone {
jump accept_to_wan comment "!fw4: Accept GuestZone to wan forwarding"
jump accept_to_GuestZone
}
chain helper_GuestZone {
}
chain accept_from_GuestZone {
iifname "br-lan.9" counter packets 0 bytes 0 accept comment "!fw4: accept GuestZone IPv4/IPv6 traffic"
}
chain accept_to_GuestZone {
oifname "br-lan.9" counter packets 0 bytes 0 accept comment "!fw4: accept GuestZone IPv4/IPv6 traffic"
}
chain input_IoTZone {
tcp dport { 53, 54, 67, 68 } counter packets 0 bytes 0 accept comment "!fw4: IoT DHCP and DNS"
udp dport { 53, 54, 67, 68 } counter packets 0 bytes 0 accept comment "!fw4: IoT DHCP and DNS"
jump accept_from_IoTZone
}
chain output_IoTZone {
jump accept_to_IoTZone
}
chain forward_IoTZone {
jump reject_to_IoTZone
}
chain helper_IoTZone {
}
chain accept_from_IoTZone {
iifname "br-lan.8" counter packets 0 bytes 0 accept comment "!fw4: accept IoTZone IPv4/IPv6 traffic"
}
chain accept_to_IoTZone {
oifname "br-lan.8" counter packets 0 bytes 0 accept comment "!fw4: accept IoTZone IPv4/IPv6 traffic"
}
chain reject_to_IoTZone {
oifname "br-lan.8" counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject IoTZone IPv4/IPv6 traffic"
}
chain dstnat {
type nat hook prerouting priority dstnat; policy accept;
}
chain srcnat {
type nat hook postrouting priority srcnat; policy accept;
oifname "zion" jump srcnat_WGZone comment "!fw4: Handle WGZone IPv4/IPv6 srcnat traffic"
oifname { "eth0", "eth1" } jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
}
chain dstnat_lan {
}
chain srcnat_lan {
}
chain dstnat_wan {
}
chain srcnat_wan {
meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 wan traffic"
meta nfproto ipv6 masquerade comment "!fw4: Masquerade IPv6 wan traffic"
}
chain srcnat_WGZone {
meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 WGZone traffic"
meta nfproto ipv6 masquerade comment "!fw4: Masquerade IPv6 WGZone traffic"
}
chain raw_prerouting {
type filter hook prerouting priority raw; policy accept;
}
chain raw_output {
type filter hook output priority raw; policy accept;
}
chain mangle_prerouting {
type filter hook prerouting priority mangle; policy accept;
jump pbr_prerouting comment "Jump into pbr prerouting chain"
}
chain mangle_postrouting {
type filter hook postrouting priority mangle; policy accept;
jump pbr_postrouting comment "Jump into pbr postrouting chain"
}
chain mangle_input {
type filter hook input priority mangle; policy accept;
jump pbr_input comment "Jump into pbr input chain"
}
chain mangle_output {
type route hook output priority mangle; policy accept;
jump pbr_output comment "Jump into pbr output chain"
}
chain mangle_forward {
type filter hook forward priority mangle; policy accept;
iifname "zion" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone WGZone IPv4/IPv6 ingress MTU fixing"
oifname "zion" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone WGZone IPv4/IPv6 egress MTU fixing"
iifname { "eth0", "eth1" } tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 ingress MTU fixing"
oifname { "eth0", "eth1" } tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 egress MTU fixing"
jump pbr_forward comment "Jump into pbr forward chain"
}
chain pbr_forward {
}
chain pbr_input {
}
chain pbr_output {
}
chain pbr_prerouting {
}
chain pbr_postrouting {
}
}
table ip nat {
chain DOCKER {
iifname "docker0" counter packets 0 bytes 0 return
}
chain POSTROUTING {
type nat hook postrouting priority srcnat; policy accept;
oifname != "docker0" ip saddr 172.17.0.0/16 counter packets 0 bytes 0 # xt_MASQUERADE
}
chain PREROUTING {
type nat hook prerouting priority dstnat; policy accept;
# xt_addrtype counter packets 157914 bytes 11248104 jump DOCKER
}
chain OUTPUT {
type nat hook output priority -100; policy accept;
ip daddr != 127.0.0.0/8 # xt_addrtype counter packets 28047 bytes 2039326 jump DOCKER
}
}
table ip filter {
chain DOCKER {
}
chain DOCKER-ISOLATION-STAGE-1 {
iifname "docker0" oifname != "docker0" counter packets 0 bytes 0 jump DOCKER-ISOLATION-STAGE-2
counter packets 5689199 bytes 9582061123 return
}
chain DOCKER-ISOLATION-STAGE-2 {
oifname "docker0" counter packets 0 bytes 0 drop
counter packets 0 bytes 0 return
}
chain FORWARD {
type filter hook forward priority filter; policy accept;
counter packets 5689192 bytes 9582060464 jump DOCKER-USER
counter packets 5689194 bytes 9582060646 jump DOCKER-ISOLATION-STAGE-1
oifname "docker0" # xt_conntrack counter packets 0 bytes 0 accept
oifname "docker0" counter packets 0 bytes 0 jump DOCKER
iifname "docker0" oifname != "docker0" counter packets 0 bytes 0 accept
iifname "docker0" oifname "docker0" counter packets 0 bytes 0 accept
}
chain DOCKER-USER {
counter packets 5689192 bytes 9582060464 return
}
}