Included File - https://github.com/dibdot/DoH-IP-blocklists/blob/master/doh-ipv4.txt


Sometimes (1/15) the block works
Included File - https://github.com/dibdot/DoH-IP-blocklists/blob/master/doh-ipv4.txt
Sometimes (1/15) the block works
opkg update
opkg install banip luci-app-banip
uci set banip.global.ban_enabled="1"
uci add_list banip.global.ban_feed="doh"
uci commit banip
service banip restart
service rpcd restart
OOM perhaps?
hardly BanIPs fault.
That would probably be the PBR package.
I am creating a allow list for VPN's IPs from online URL
Then it's not the PBR package ,)
But why?
There's no restriction for outgoing traffic.
for a strong firewall that only allow VPN IPs on VPN ports
Still insufficient info.
Incoming then, I'd assume.
VPN doesnt need incoming traffic
Still NFI what's you're trying to achieve.
But good luck with incoming VPN traffic, when the fw isn't open.
Why I need incoming ? Currently all incoming is blocked on my router and VPN works
What is this supposed to mean?
That's the only scenario, I can think of, where you'd need the VPN provider's IPs.
Unless you're blocking all outgoing traffic, but Proton VPN.
@RSHARM - Please use complete sentences to fully describe your issue to the community. We'll be better able to assist if you employ clear, detailed information, describe your screenshots textually, etc. We're unable to guess why you wish to add Proton's VPN endpoint list to your firewall. You have to explain.
As previously noted, please be mindful of deleting posts that alter the context of the conversation.
EDIT:
Implementing such a rule will likely break your Internet connection for other reasons (i.e. not considering DNS, NTP or IPv6, etc.). It's difficult to determine what you desire, since you fail to share your reasoning or use case.