hi.. this is what it was giving
root@OpenWrt:~# /etc/init.d/log restart
root@OpenWrt:~# /etc/init.d/openvpn restart
root@OpenWrt:~# sleep 10
root@OpenWrt:~# logread -e openvpn
Sun Oct 11 10:51:27 2020 daemon.err openvpn(PLUSCHANNEL)[6509]: event_wait : Interrupted system call (code=4)
Sun Oct 11 10:51:27 2020 daemon.notice openvpn(PLUSCHANNEL)[6509]: /sbin/route del -net 185.40.20.153 netmask 255.255.255.255
Sun Oct 11 10:51:27 2020 daemon.notice openvpn(PLUSCHANNEL)[6509]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
Sun Oct 11 10:51:27 2020 daemon.warn openvpn(PLUSCHANNEL)[6509]: ERROR: Linux route delete command failed: external program exited with error status: 1
Sun Oct 11 10:51:27 2020 daemon.notice openvpn(PLUSCHANNEL)[6509]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
Sun Oct 11 10:51:27 2020 daemon.warn openvpn(PLUSCHANNEL)[6509]: ERROR: Linux route delete command failed: external program exited with error status: 1
Sun Oct 11 10:51:27 2020 daemon.notice openvpn(PLUSCHANNEL)[6509]: Closing TUN/TAP interface
Sun Oct 11 10:51:27 2020 daemon.notice openvpn(PLUSCHANNEL)[6509]: SIGTERM[hard,] received, process exiting
Sun Oct 11 10:51:28 2020 daemon.warn openvpn(PLUSCHANNEL)[6611]: Unrecognized option or missing or extra parameter(s) in /etc/openvpn/PLUSCHANNEL.ovpn:21: block-outside-dns (2.4.7)
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.40.20.153:8080
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Sun Oct 11 10:51:28 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Attempting to establish TCP connection with [AF_INET]185.40.20.153:8080 [nonblock]
Sun Oct 11 10:51:29 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TCP connection established with [AF_INET]185.40.20.153:8080
Sun Oct 11 10:51:29 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Send to HTTP proxy: 'CONNECT /SSHPLUS?:1195 HTTP/1.0'
Sun Oct 11 10:51:29 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Send to HTTP proxy: 'Host: netflix.com'
Sun Oct 11 10:51:29 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: HTTP proxy returned: 'HTTP/1.1 200 Connection established'
Sun Oct 11 10:51:31 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TCP_CLIENT link local: (not bound)
Sun Oct 11 10:51:31 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TCP_CLIENT link remote: [AF_INET]185.40.20.153:8080
Sun Oct 11 10:51:31 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TLS: Initial packet from [AF_INET]185.40.20.153:8080, sid=cf633335 3f78c37f
Sun Oct 11 10:51:31 2020 daemon.warn openvpn(PLUSCHANNEL)[6611]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: VERIFY KU OK
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Validating certificate extended key usage
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: VERIFY EKU OK
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: VERIFY OK: depth=0, CN=server
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Sun Oct 11 10:51:32 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: [server] Peer Connection Initiated with [AF_INET]185.40.20.153:8080
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,peer-id 0,cipher AES-256-GCM'
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: timers and/or timeouts modified
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: --ifconfig/up options modified
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: route options modified
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: route-related options modified
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: peer-id set
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: adjusting link_mtu to 1627
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: OPTIONS IMPORT: data channel crypto options modified
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TUN/TAP device tun0 opened
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: TUN/TAP TX queue length set to 100
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: /sbin/route add -net 185.40.20.153 netmask 255.255.255.255 gw 192.168.1.1
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
Sun Oct 11 10:51:33 2020 daemon.warn openvpn(PLUSCHANNEL)[6611]: ERROR: Linux route add command failed: external program exited with error status: 1
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
Sun Oct 11 10:51:33 2020 daemon.warn openvpn(PLUSCHANNEL)[6611]: ERROR: Linux route add command failed: external program exited with error status: 1
Sun Oct 11 10:51:33 2020 daemon.notice openvpn(PLUSCHANNEL)[6611]: Initialization Sequence Completed
root@OpenWrt:~# pgrep -f -a openvpn
6611 /usr/sbin/openvpn --syslog openvpn(PLUSCHANNEL) --status /var/run/openvpn.PLUSCHANNEL.status --cd /etc/openvpn --config /etc/openvpn/PLUSCHANNEL.ovpn
root@OpenWrt:~# ip address show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether 20:0d:b0:74:4a:30 brd ff:ff:ff:ff:ff:ff
inet6 fe80::220d:b0ff:fe74:4a30/64 scope link
valid_lft forever preferred_lft forever
5: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 20:0d:b0:74:4a:30 brd ff:ff:ff:ff:ff:ff
inet 192.168.2.1/24 brd 192.168.2.255 scope global br-lan
valid_lft forever preferred_lft forever
inet6 fd7f:7ca7:9bce::1/60 scope global noprefixroute
valid_lft forever preferred_lft forever
inet6 fe80::220d:b0ff:fe74:4a30/64 scope link
valid_lft forever preferred_lft forever
6: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
link/ether 20:0d:b0:74:4a:30 brd ff:ff:ff:ff:ff:ff
7: eth0.1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 20:0d:b0:74:4a:30 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.2/24 brd 192.168.1.255 scope global eth0.1
valid_lft forever preferred_lft forever
inet6 fe80::220d:b0ff:fe74:4a30/64 scope link
valid_lft forever preferred_lft forever
8: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
link/ether 12:34:56:78:90:12 brd ff:ff:ff:ff:ff:ff
inet6 fe80::1034:56ff:fe78:9012/64 scope link
valid_lft forever preferred_lft forever
9: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP group default qlen 1000
link/ether 20:0d:b0:74:4a:31 brd ff:ff:ff:ff:ff:ff
inet6 fe80::220d:b0ff:fe74:4a31/64 scope link
valid_lft forever preferred_lft forever
13: tun0: <POINTOPOINT,MULTICAST,NOARP> mtu 1500 qdisc noop state DOWN group default qlen 100
link/none
root@OpenWrt:~# ip route show table all
default via 192.168.1.1 dev eth0.1 proto static src 192.168.1.2
185.40.20.153 via 192.168.1.1 dev eth0.1
192.168.1.0/24 dev eth0.1 proto kernel scope link src 192.168.1.2
192.168.2.0/24 dev br-lan proto kernel scope link src 192.168.2.1
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
broadcast 192.168.1.0 dev eth0.1 table local proto kernel scope link src 192.168.1.2
local 192.168.1.2 dev eth0.1 table local proto kernel scope host src 192.168.1.2
broadcast 192.168.1.255 dev eth0.1 table local proto kernel scope link src 192.168.1.2
broadcast 192.168.2.0 dev br-lan table local proto kernel scope link src 192.168.2.1
local 192.168.2.1 dev br-lan table local proto kernel scope host src 192.168.2.1
broadcast 192.168.2.255 dev br-lan table local proto kernel scope link src 192.168.2.1
fd7f:7ca7:9bce::/64 dev br-lan proto static metric 1024 pref medium
unreachable fd7f:7ca7:9bce::/48 dev lo proto static metric 2147483647 error 4294967148 pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium
fe80::/64 dev eth0.1 proto kernel metric 256 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
fe80::/64 dev wlan0 proto kernel metric 256 pref medium
fe80::/64 dev wlan1 proto kernel metric 256 pref medium
local ::1 dev lo table local proto kernel metric 0 pref medium
anycast fd7f:7ca7:9bce:: dev br-lan table local proto kernel metric 0 pref medium
local fd7f:7ca7:9bce::1 dev br-lan table local proto kernel metric 0 pref medium
anycast fe80:: dev eth0.1 table local proto kernel metric 0 pref medium
anycast fe80:: dev eth0 table local proto kernel metric 0 pref medium
anycast fe80:: dev br-lan table local proto kernel metric 0 pref medium
anycast fe80:: dev wlan0 table local proto kernel metric 0 pref medium
anycast fe80:: dev wlan1 table local proto kernel metric 0 pref medium
local fe80::1034:56ff:fe78:9012 dev wlan0 table local proto kernel metric 0 pref medium
local fe80::220d:b0ff:fe74:4a30 dev eth0.1 table local proto kernel metric 0 pref medium
local fe80::220d:b0ff:fe74:4a30 dev eth0 table local proto kernel metric 0 pref medium
local fe80::220d:b0ff:fe74:4a30 dev br-lan table local proto kernel metric 0 pref medium
local fe80::220d:b0ff:fe74:4a31 dev wlan1 table local proto kernel metric 0 pref medium
ff00::/8 dev eth0 table local metric 256 pref medium
ff00::/8 dev br-lan table local metric 256 pref medium
ff00::/8 dev eth0.1 table local metric 256 pref medium
ff00::/8 dev wlan0 table local metric 256 pref medium
ff00::/8 dev wlan1 table local metric 256 pref medium
root@OpenWrt:~# ip rule show
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
root@OpenWrt:~# iptables-save
# Generated by iptables-save v1.8.3 on Sun Oct 11 10:54:01 2020
*nat
:PREROUTING ACCEPT [840:238439]
:INPUT ACCEPT [240:16388]
:OUTPUT ACCEPT [517:41205]
:POSTROUTING ACCEPT [856:219581]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpnfirewall_postrouting - [0:0]
:zone_vpnfirewall_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i eth0.1 -m comment --comment "!fw3" -j zone_wan_prerouting
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o eth0.1 -m comment --comment "!fw3" -j zone_wan_postrouting
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Sun Oct 11 10:54:01 2020
# Generated by iptables-save v1.8.3 on Sun Oct 11 10:54:01 2020
*mangle
:PREROUTING ACCEPT [30229:18399097]
:INPUT ACCEPT [1728:273326]
:FORWARD ACCEPT [28240:18082096]
:OUTPUT ACCEPT [2188:294304]
:POSTROUTING ACCEPT [30430:18377056]
-A FORWARD -o eth0.1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0.1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Sun Oct 11 10:54:01 2020
# Generated by iptables-save v1.8.3 on Sun Oct 11 10:54:01 2020
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpnfirewall_dest_ACCEPT - [0:0]
:zone_vpnfirewall_dest_REJECT - [0:0]
:zone_vpnfirewall_forward - [0:0]
:zone_vpnfirewall_input - [0:0]
:zone_vpnfirewall_output - [0:0]
:zone_vpnfirewall_src_REJECT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_ACCEPT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth0.1 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth0.1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth0.1 -m comment --comment "!fw3" -j zone_wan_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpnfirewall forwarding policy" -j zone_vpnfirewall_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpnfirewall_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_vpnfirewall_forward -m comment --comment "!fw3" -j zone_vpnfirewall_dest_REJECT
-A zone_vpnfirewall_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_vpnfirewall_input -m comment --comment "!fw3" -j zone_vpnfirewall_src_REJECT
-A zone_vpnfirewall_output -m comment --comment "!fw3" -j zone_vpnfirewall_dest_ACCEPT
-A zone_wan_dest_ACCEPT -o eth0.1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_ACCEPT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_ACCEPT -i eth0.1 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Sun Oct 11 10:54:01 2020
root@OpenWrt:~# head -n -0 /etc/resolv.* /tmp/resolv.*
==> /etc/resolv.conf <==
search lan
nameserver 127.0.0.1
==> /tmp/resolv.conf <==
search lan
nameserver 127.0.0.1
==> /tmp/resolv.conf.auto <==
# Interface wan
nameserver 222.165.171.1
nameserver 222.165.171.2
root@OpenWrt:~#