[SOLVED] Init7 iptv / Configuration

My ISP (init7) in switzerland just announced they provide free iptv to their customers. I would love to use that, but i am pretty lost. I never had to deal with multicasting.

The provider provides these playlists: https://www.init7.net/de/support/faq/TV-andere-Geraete/
When i try to open them in VLC on linux or windows on my machine in the LAN nothing happens.
So i guess my clearfog pro router (with Lede 17.01.04) blocks the requests.

I installed igmpproxy and configured it that way:

root@LEDE:~# cat /etc/config/igmpproxy 
config igmpproxy
	option quickleave 1
	option verbose 2
#	option verbose [0-2]

config phyint wan
	option network wan
	option direction upstream
#	list altnet 192.168.1.0/24
	list altnet 0.0.0.0/0

config phyint lan
	option network lan
	option direction downstream

when i use logread -f i see some output from igmpproxy but - to be honest - i do not fully understand what it is saying:

Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: About to call timeout 2 (#0)
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: SENT Membership query   from 192.168.1.1     to 224.0.0.1
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: Sent membership query from 192.168.1.1 to 224.0.0.1. Delay: 10
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: Created timeout 3 (#0) - delay 10 secs
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: (Id:3, Time:10) 
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: Created timeout 4 (#1) - delay 21 secs
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: (Id:3, Time:10) 
Thu May 24 15:23:21 2018 user.debug igmpproxy[4960]: (Id:4, Time:21) 
Thu May 24 15:23:21 2018 user.notice igmpproxy[4960]: RECV Membership query   from 192.168.1.1     to 224.0.0.1
Thu May 24 15:23:23 2018 user.notice igmpproxy[4960]: RECV V2 member report   from 192.168.1.1     to 224.0.0.2
Thu May 24 15:23:23 2018 user.notice igmpproxy[4960]: The IGMP message was from myself. Ignoring.

What is 224.0.0.1?

Here is the debug log output from igmpproxy after starting:

Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Searching for config file at '/var/etc/igmpproxy.conf'
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: Quick leave mode enabled.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: Got a phyint token.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Config for interface eth1.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got upstream token.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got ratelimit token '0'.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got threshold token '1'.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got altnet token 0.0.0.0/0.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Altnet: Parsed altnet to default.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: IF name : eth1
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Next ptr : 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Ratelimit : 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Threshold : 1
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: State : 1
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Allowednet ptr : b6f54110
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: Got a phyint token.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Config for interface br-lan.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got downstream token.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got ratelimit token '0'.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Config: IF: Got threshold token '1'.
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: IF name : br-lan
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Next ptr : 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Ratelimit : 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Threshold : 1
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: State : 2
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Allowednet ptr : 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: buildIfVc: Interface lo Addr: 127.0.0.1, Flags: 0x0049, Network: 127/8
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: buildIfVc: Interface eth1 Addr: 85.195.252.21, Flags: 0x1043, Network: 85.195.252/24
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: buildIfVc: Interface br-lan Addr: 192.168.1.1, Flags: 0x1043, Network: 192.168.1/24
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: buildIfVc: Interface br-wlan Addr: 192.168.7.1, Flags: 0x1043, Network: 192.168.7/24
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Found config for eth1
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Found config for br-lan
Thu May 24 15:22:50 2018 user.notice igmpproxy[4960]: adding VIF, Ix 0 Fl 0x0 IP 0x1cfcc355 eth1, Threshold: 1, Ratelimit: 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]:         Network for [eth1] : 85.195.252/24
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]:         Network for [eth1] : default
Thu May 24 15:22:50 2018 user.notice igmpproxy[4960]: adding VIF, Ix 1 Fl 0x0 IP 0x0101a8c0 br-lan, Threshold: 1, Ratelimit: 0
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]:         Network for [br-lan] : 192.168.1/24
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Got 262144 byte buffer size in 0 iterations
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Joining all-routers group 224.0.0.2 on vif 192.168.1.1
Thu May 24 15:22:50 2018 user.notice igmpproxy[4960]: joinMcGroup: 224.0.0.2 on br-lan
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: SENT Membership query   from 192.168.1.1     to 224.0.0.1
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Sent membership query from 192.168.1.1 to 224.0.0.1. Delay: 10
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Created timeout 1 (#0) - delay 10 secs
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: (Id:1, Time:10) 
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: Created timeout 2 (#1) - delay 21 secs
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: (Id:1, Time:10) 
Thu May 24 15:22:50 2018 user.debug igmpproxy[4960]: (Id:2, Time:21) 
Thu May 24 15:22:50 2018 user.notice igmpproxy[4960]: RECV Membership query   from 192.168.1.1     to 224.0.0.1
Thu May 24 15:22:50 2018 user.notice igmpproxy[4960]: RECV V2 member report   from 192.168.1.1     to 224.0.0.2
Thu May 24 15:22:50 2018 user.notice igmpproxy[4960]: The IGMP message was from myself. Ignoring.
Thu May 24 15:22:51 2018 user.notice igmpproxy[4960]: RECV V2 member report   from 192.168.1.1     to 239.255.255.250
Thu May 24 15:22:51 2018 user.notice igmpproxy[4960]: The IGMP message was from myself. Ignoring.
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: Route activate request from 192.168.1.1 to 239.255.255.250
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: No table entry for 239.255.255.250 [From: 192.168.1.1]. Inserting route.
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: No existing route for 239.255.255.250. Create new.
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: No routes in table. Insert at beginning.
Thu May 24 15:22:51 2018 user.info igmpproxy[4960]: Inserted route table entry for 239.255.255.250 on VIF #-1
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: No downstream listeners for group 239.255.255.250. No join sent.
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: 
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: Current routing table (Insert Route):
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: -----------------------------------------------------
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: #0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: -----------------------------------------------------
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: 
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: Current routing table (Activate Route):
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: -----------------------------------------------------
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: #0: Src: 192.168.1.1, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Thu May 24 15:22:51 2018 user.debug igmpproxy[4960]: -----------------------------------------------------

This IP is used to signal All Hosts on a Multicast network.

See:

Also, I think the new config file is different (it now defines the firewall zone and network):

config igmpproxy
        option quickleave 1
#       option verbose [0-2]

config phyint
	option network wan
	option zone wan
	option direction upstream
#	list altnet 192.168.1.0/24
	list altnet 0.0.0.0/0

config phyint
	option network lan
	option zone lan
	option direction downstream

still the same behaviour. I am wondering if it should not be "network br-lan" ?

The output is now:

Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Searching for config file at '/var/etc/igmpproxy.conf'
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: Quick leave mode enabled.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: Got a phyint token.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Config for interface eth1.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got upstream token.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got ratelimit token '0'.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got threshold token '1'.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got altnet token 0.0.0.0/0.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Altnet: Parsed altnet to default.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: IF name : eth1
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Next ptr : 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Ratelimit : 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Threshold : 1
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: State : 1
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Allowednet ptr : b6f13110
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: Got a phyint token.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Config for interface br-lan.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got downstream token.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got ratelimit token '0'.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Config: IF: Got threshold token '1'.
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: IF name : br-lan
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Next ptr : 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Ratelimit : 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Threshold : 1
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: State : 2
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Allowednet ptr : 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: buildIfVc: Interface lo Addr: 127.0.0.1, Flags: 0x0049, Network: 127/8
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: buildIfVc: Interface eth1 Addr: 85.195.252.21, Flags: 0x1043, Network: 85.195.252/24
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: buildIfVc: Interface br-lan Addr: 192.168.1.1, Flags: 0x1043, Network: 192.168.1/24
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: buildIfVc: Interface br-wlan Addr: 192.168.7.1, Flags: 0x1043, Network: 192.168.7/24
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Found config for eth1
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Found config for br-lan
Thu May 24 16:47:04 2018 user.notice igmpproxy[5175]: adding VIF, Ix 0 Fl 0x0 IP 0x1cfcc355 eth1, Threshold: 1, Ratelimit: 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]:         Network for [eth1] : 85.195.252/24
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]:         Network for [eth1] : default
Thu May 24 16:47:04 2018 user.notice igmpproxy[5175]: adding VIF, Ix 1 Fl 0x0 IP 0x0101a8c0 br-lan, Threshold: 1, Ratelimit: 0
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]:         Network for [br-lan] : 192.168.1/24
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Got 262144 byte buffer size in 0 iterations
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Joining all-routers group 224.0.0.2 on vif 192.168.1.1
Thu May 24 16:47:04 2018 user.notice igmpproxy[5175]: joinMcGroup: 224.0.0.2 on br-lan
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: SENT Membership query   from 192.168.1.1     to 224.0.0.1
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Sent membership query from 192.168.1.1 to 224.0.0.1. Delay: 10
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Created timeout 1 (#0) - delay 10 secs
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: (Id:1, Time:10) 
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: Created timeout 2 (#1) - delay 21 secs
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: (Id:1, Time:10) 
Thu May 24 16:47:04 2018 user.debug igmpproxy[5175]: (Id:2, Time:21) 
Thu May 24 16:47:04 2018 user.notice igmpproxy[5175]: RECV Membership query   from 192.168.1.1     to 224.0.0.1
Thu May 24 16:47:04 2018 user.notice igmpproxy[5175]: RECV V2 member report   from 192.168.1.1     to 224.0.0.2
Thu May 24 16:47:04 2018 user.notice igmpproxy[5175]: The IGMP message was from myself. Ignoring.
Thu May 24 16:47:12 2018 user.notice igmpproxy[5175]: RECV V2 member report   from 192.168.1.1     to 239.255.255.250
Thu May 24 16:47:12 2018 user.notice igmpproxy[5175]: The IGMP message was from myself. Ignoring.
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: Route activate request from 192.168.1.1 to 239.255.255.250
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: No table entry for 239.255.255.250 [From: 192.168.1.1]. Inserting route.
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: No existing route for 239.255.255.250. Create new.
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: No routes in table. Insert at beginning.
Thu May 24 16:47:12 2018 user.info igmpproxy[5175]: Inserted route table entry for 239.255.255.250 on VIF #-1
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: No downstream listeners for group 239.255.255.250. No join sent.
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: 
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: Current routing table (Insert Route):
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: -----------------------------------------------------
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: #0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: -----------------------------------------------------
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: 
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: Current routing table (Activate Route):
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: -----------------------------------------------------
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: #0: Src: 192.168.1.1, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Thu May 24 16:47:12 2018 user.debug igmpproxy[5175]: -----------------------------------------------------
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: About to call timeout 1 (#0)
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: Aging routes in table.
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: 
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: Current routing table (Age active routes):
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: -----------------------------------------------------
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: #0: Src: 192.168.1.1, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Thu May 24 16:47:15 2018 user.debug igmpproxy[5175]: -----------------------------------------------------

Maybe something is wrong with my iptables setup?

root@LEDE:~# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */
input_rule  all  --  anywhere             anywhere             /* !fw3: user chain for input */
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED /* !fw3 */
DROP       all  --  anywhere             anywhere             ctstate INVALID /* !fw3 */
zone_lan_input  all  --  anywhere             anywhere             /* !fw3 */
zone_lan_input  all  --  anywhere             anywhere             /* !fw3 */
zone_wan_input  all  --  anywhere             anywhere             /* !fw3 */

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
forwarding_rule  all  --  anywhere             anywhere             /* !fw3: user chain for forwarding */
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED /* !fw3 */
DROP       all  --  anywhere             anywhere             ctstate INVALID /* !fw3 */
zone_lan_forward  all  --  anywhere             anywhere             /* !fw3 */
zone_lan_forward  all  --  anywhere             anywhere             /* !fw3 */
zone_wan_forward  all  --  anywhere             anywhere             /* !fw3 */

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */
output_rule  all  --  anywhere             anywhere             /* !fw3: user chain for output */
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED /* !fw3 */
DROP       all  --  anywhere             anywhere             ctstate INVALID /* !fw3 */
zone_lan_output  all  --  anywhere             anywhere             /* !fw3 */
zone_lan_output  all  --  anywhere             anywhere             /* !fw3 */
zone_wan_output  all  --  anywhere             anywhere             /* !fw3 */

Chain MINIUPNPD (1 references)
target     prot opt source               destination         

Chain forwarding_lan_rule (1 references)
target     prot opt source               destination         

Chain forwarding_rule (1 references)
target     prot opt source               destination         

Chain forwarding_wan_rule (1 references)
target     prot opt source               destination         

Chain input_lan_rule (1 references)
target     prot opt source               destination         

Chain input_rule (1 references)
target     prot opt source               destination         

Chain input_wan_rule (1 references)
target     prot opt source               destination         

Chain output_lan_rule (1 references)
target     prot opt source               destination         

Chain output_rule (1 references)
target     prot opt source               destination         

Chain output_wan_rule (1 references)
target     prot opt source               destination         

Chain reject (2 references)
target     prot opt source               destination         
REJECT     tcp  --  anywhere             anywhere             /* !fw3 */ reject-with tcp-reset
REJECT     all  --  anywhere             anywhere             /* !fw3 */ reject-with icmp-port-unreachable

Chain zone_lan_dest_ACCEPT (6 references)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */

Chain zone_lan_forward (2 references)
target     prot opt source               destination         
forwarding_lan_rule  all  --  anywhere             anywhere             /* !fw3: user chain for forwarding */
zone_wan_dest_ACCEPT  all  --  anywhere             anywhere             /* !fw3: forwarding lan -> wan */
ACCEPT     all  --  anywhere             anywhere             ctstate DNAT /* !fw3: Accept port forwards */
zone_lan_dest_ACCEPT  all  --  anywhere             anywhere             /* !fw3 */

Chain zone_lan_input (2 references)
target     prot opt source               destination         
input_lan_rule  all  --  anywhere             anywhere             /* !fw3: user chain for input */
ACCEPT     igmp --  anywhere             anywhere             /* !fw3: ubus:igmpproxy[instance1] rule 2 */
ACCEPT     all  --  anywhere             anywhere             ctstate DNAT /* !fw3: Accept port redirections */
zone_lan_src_ACCEPT  all  --  anywhere             anywhere             /* !fw3 */

Chain zone_lan_output (2 references)
target     prot opt source               destination         
output_lan_rule  all  --  anywhere             anywhere             /* !fw3: user chain for output */
zone_lan_dest_ACCEPT  all  --  anywhere             anywhere             /* !fw3 */

Chain zone_lan_src_ACCEPT (1 references)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */

Chain zone_wan_dest_ACCEPT (2 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere             ctstate INVALID /* !fw3: Prevent NAT leakage */
ACCEPT     all  --  anywhere             anywhere             /* !fw3 */

Chain zone_wan_dest_REJECT (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere             limit: avg 10/sec burst 5 /* !fw3 */ LOG level warning prefix "REJECT(dest wan)"
reject     all  --  anywhere             anywhere             /* !fw3 */

Chain zone_wan_forward (1 references)
target     prot opt source               destination         
MINIUPNPD  all  --  anywhere             anywhere            
forwarding_wan_rule  all  --  anywhere             anywhere             /* !fw3: user chain for forwarding */
zone_lan_dest_ACCEPT  udp  --  anywhere             base-address.mcast.net/4  /* !fw3: ubus:igmpproxy[instance1] rule 1 */
zone_lan_dest_ACCEPT  udp  --  anywhere             base-address.mcast.net/4  /* !fw3: iptv udp */
zone_lan_dest_ACCEPT  esp  --  anywhere             anywhere             /* !fw3: @rule[11] */
zone_lan_dest_ACCEPT  udp  --  anywhere             anywhere             udp dpt:isakmp /* !fw3: @rule[12] */
ACCEPT     all  --  anywhere             anywhere             ctstate DNAT /* !fw3: Accept port forwards */
zone_wan_dest_REJECT  all  --  anywhere             anywhere             /* !fw3 */

Chain zone_wan_input (1 references)
target     prot opt source               destination         
input_wan_rule  all  --  anywhere             anywhere             /* !fw3: user chain for input */
ACCEPT     igmp --  anywhere             anywhere             /* !fw3: ubus:igmpproxy[instance1] rule 0 */
ACCEPT     udp  --  anywhere             anywhere             udp dpt:bootpc /* !fw3: Allow-DHCP-Renew */
ACCEPT     icmp --  anywhere             anywhere             icmp echo-request /* !fw3: Allow-Ping */
ACCEPT     igmp --  anywhere             anywhere             /* !fw3: Allow-IGMP */
ACCEPT     udp  --  anywhere             anywhere             /* !fw3: allow udp for iptv */
ACCEPT     all  --  anywhere             anywhere             ctstate DNAT /* !fw3: Accept port redirections */
zone_wan_src_REJECT  all  --  anywhere             anywhere             /* !fw3 */

Chain zone_wan_output (1 references)
target     prot opt source               destination         
output_wan_rule  all  --  anywhere             anywhere             /* !fw3: user chain for output */
zone_wan_dest_ACCEPT  all  --  anywhere             anywhere             /* !fw3 */

Chain zone_wan_src_REJECT (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere             limit: avg 10/sec burst 5 /* !fw3 */ LOG level warning prefix "REJECT(src wan)"
reject     all  --  anywhere             anywhere             /* !fw3 */

Its pretty open (for testing), so i think it is not because of iptables

  • What problem are you having on VLC?
  • Have you tried quickleave 0?

perfect, it was quickleave :slight_smile: changed that to 0 now its working

1 Like

If your question is solved, please consider marking this topic as [Solved].