Upnp opening Ports But Port Forwarding Is not Opening Ports

Can you tell me how can I do that

Somehow i got to save IPtables. Here it is

# Generated by iptables-save v1.6.2 on Fri Sep  6 13:47:04 2019
*nat
:PREROUTING ACCEPT [206:25472]
:INPUT ACCEPT [22:1702]
:OUTPUT ACCEPT [411:29002]
:POSTROUTING ACCEPT [273:30892]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i eth0.2 -m comment --comment "!fw3" -j zone_wan_prerouting
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o eth0.2 -m comment --comment "!fw3" -j zone_wan_postrouting
-A MINIUPNPD -p udp -m udp --dport 6881 -j DNAT --to-destination 192.168.0.100:6881
-A MINIUPNPD -p tcp -m tcp --dport 44328 -j DNAT --to-destination 192.168.0.100:44328
-A MINIUPNPD -p udp -m udp --dport 44328 -j DNAT --to-destination 192.168.0.100:44328
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 443 -m comment --comment "!fw3: TCP Anthem & Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 8080 -m comment --comment "!fw3: TCP Anthem (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 3659 -m comment --comment "!fw3: UDP Anthem (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 21000:26000 -m comment --comment "!fw3: UDP Anthem (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 9960:9969 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 1024:1124 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 3216 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 18000 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 18120 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 18120 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 18060 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 27900 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 28910 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 29900 -m comment --comment "!fw3: TCP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 1024:1124 -m comment --comment "!fw3: UDP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 1024:1124 -m comment --comment "!fw3: UDP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 37000:40000 -m comment --comment "!fw3: UDP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 18000 -m comment --comment "!fw3: UDP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 29900 -m comment --comment "!fw3: UDP Apex (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 1119 -m comment --comment "!fw3: TCP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 3724 -m comment --comment "!fw3: TCP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 6113 -m comment --comment "!fw3: TCP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p tcp -m tcp --dport 3478:3479 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 3478:3479 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 12000:64000 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 5060 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 5062 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_postrouting -s 192.168.0.0/24 -d 192.168.0.100/32 -p udp -m udp --dport 6250 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j SNAT --to-source 192.168.0.1
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 443 -m comment --comment "!fw3: TCP Anthem & Apex (reflection)" -j DNAT --to-destination 192.168.0.100:443
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 8080 -m comment --comment "!fw3: TCP Anthem (reflection)" -j DNAT --to-destination 192.168.0.100:8080
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 3659 -m comment --comment "!fw3: UDP Anthem (reflection)" -j DNAT --to-destination 192.168.0.100:3659
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 21000:26000 -m comment --comment "!fw3: UDP Anthem (reflection)" -j DNAT --to-destination 192.168.0.100:21000-26000
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 9960:9969 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:9960-9969
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 1024:1124 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:1024-1124
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 3216 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:3216
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 18000 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:18000
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 18120 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:18120
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 18120 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:18120
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 18060 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:18060
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 27900 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:27900
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 28910 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:28910
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 29900 -m comment --comment "!fw3: TCP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:29900
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 1024:1124 -m comment --comment "!fw3: UDP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:1024-1124
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 1024:1124 -m comment --comment "!fw3: UDP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:1024-1124
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 37000:40000 -m comment --comment "!fw3: UDP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:37000-40000
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 18000 -m comment --comment "!fw3: UDP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:18000
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 29900 -m comment --comment "!fw3: UDP Apex (reflection)" -j DNAT --to-destination 192.168.0.100:29900
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 1119 -m comment --comment "!fw3: TCP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:1119
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 3724 -m comment --comment "!fw3: TCP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:3724
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 6113 -m comment --comment "!fw3: TCP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:6113
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p tcp -m tcp --dport 3478:3479 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:3478-3479
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 3478:3479 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:3478-3479
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 12000:64000 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:12000-64000
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 5060 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:5060
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 5062 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:5062
-A zone_lan_prerouting -s 192.168.0.0/24 -d 118.179.85.83/32 -p udp -m udp --dport 6250 -m comment --comment "!fw3: UDP Overwatch (reflection)" -j DNAT --to-destination 192.168.0.100:6250
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -p tcp -m tcp --dport 443 -m comment --comment "!fw3: TCP Anthem & Apex" -j DNAT --to-destination 192.168.0.100:443
-A zone_wan_prerouting -p tcp -m tcp --dport 8080 -m comment --comment "!fw3: TCP Anthem" -j DNAT --to-destination 192.168.0.100:8080
-A zone_wan_prerouting -p udp -m udp --dport 3659 -m comment --comment "!fw3: UDP Anthem" -j DNAT --to-destination 192.168.0.100:3659
-A zone_wan_prerouting -p udp -m udp --dport 21000:26000 -m comment --comment "!fw3: UDP Anthem" -j DNAT --to-destination 192.168.0.100:21000-26000
-A zone_wan_prerouting -p tcp -m tcp --dport 9960:9969 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:9960-9969
-A zone_wan_prerouting -p tcp -m tcp --dport 1024:1124 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:1024-1124
-A zone_wan_prerouting -p tcp -m tcp --dport 3216 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:3216
-A zone_wan_prerouting -p tcp -m tcp --dport 18000 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:18000
-A zone_wan_prerouting -p tcp -m tcp --dport 18120 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:18120
-A zone_wan_prerouting -p udp -m udp --dport 18120 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:18120
-A zone_wan_prerouting -p tcp -m tcp --dport 18060 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:18060
-A zone_wan_prerouting -p tcp -m tcp --dport 27900 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:27900
-A zone_wan_prerouting -p tcp -m tcp --dport 28910 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:28910
-A zone_wan_prerouting -p tcp -m tcp --dport 29900 -m comment --comment "!fw3: TCP Apex" -j DNAT --to-destination 192.168.0.100:29900
-A zone_wan_prerouting -p tcp -m tcp --dport 1024:1124 -m comment --comment "!fw3: UDP Apex" -j DNAT --to-destination 192.168.0.100:1024-1124
-A zone_wan_prerouting -p udp -m udp --dport 1024:1124 -m comment --comment "!fw3: UDP Apex" -j DNAT --to-destination 192.168.0.100:1024-1124
-A zone_wan_prerouting -p udp -m udp --dport 37000:40000 -m comment --comment "!fw3: UDP Apex" -j DNAT --to-destination 192.168.0.100:37000-40000
-A zone_wan_prerouting -p udp -m udp --dport 18000 -m comment --comment "!fw3: UDP Apex" -j DNAT --to-destination 192.168.0.100:18000
-A zone_wan_prerouting -p udp -m udp --dport 29900 -m comment --comment "!fw3: UDP Apex" -j DNAT --to-destination 192.168.0.100:29900
-A zone_wan_prerouting -p tcp -m tcp --dport 1119 -m comment --comment "!fw3: TCP Overwatch" -j DNAT --to-destination 192.168.0.100:1119
-A zone_wan_prerouting -p tcp -m tcp --dport 3724 -m comment --comment "!fw3: TCP Overwatch" -j DNAT --to-destination 192.168.0.100:3724
-A zone_wan_prerouting -p tcp -m tcp --dport 6113 -m comment --comment "!fw3: TCP Overwatch" -j DNAT --to-destination 192.168.0.100:6113
-A zone_wan_prerouting -p tcp -m tcp --dport 3478:3479 -m comment --comment "!fw3: UDP Overwatch" -j DNAT --to-destination 192.168.0.100:3478-3479
-A zone_wan_prerouting -p udp -m udp --dport 3478:3479 -m comment --comment "!fw3: UDP Overwatch" -j DNAT --to-destination 192.168.0.100:3478-3479
-A zone_wan_prerouting -p udp -m udp --dport 12000:64000 -m comment --comment "!fw3: UDP Overwatch" -j DNAT --to-destination 192.168.0.100:12000-64000
-A zone_wan_prerouting -p udp -m udp --dport 5060 -m comment --comment "!fw3: UDP Overwatch" -j DNAT --to-destination 192.168.0.100:5060
-A zone_wan_prerouting -p udp -m udp --dport 5062 -m comment --comment "!fw3: UDP Overwatch" -j DNAT --to-destination 192.168.0.100:5062
-A zone_wan_prerouting -p udp -m udp --dport 6250 -m comment --comment "!fw3: UDP Overwatch" -j DNAT --to-destination 192.168.0.100:6250
-A zone_wan_prerouting -j MINIUPNPD
COMMIT
# Completed on Fri Sep  6 13:47:04 2019
# Generated by iptables-save v1.6.2 on Fri Sep  6 13:47:04 2019
*mangle
:PREROUTING ACCEPT [221590194:184543144831]
:INPUT ACCEPT [100224:11046447]
:FORWARD ACCEPT [221488446:184531983335]
:OUTPUT ACCEPT [147566:36199919]
:POSTROUTING ACCEPT [221634817:184568115347]
-A FORWARD -o eth0.2 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Fri Sep  6 13:47:04 2019
# Generated by iptables-save v1.6.2 on Fri Sep  6 13:47:04 2019
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth0.2 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth0.2 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth0.2 -m comment --comment "!fw3" -j zone_wan_output
-A MINIUPNPD -d 192.168.0.100/32 -p udp -m udp --dport 6881 -j ACCEPT
-A MINIUPNPD -d 192.168.0.100/32 -p tcp -m tcp --dport 44328 -j ACCEPT
-A MINIUPNPD -d 192.168.0.100/32 -p udp -m udp --dport 44328 -j ACCEPT
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0.2 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0.2 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth0.2 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth0.2 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Sep  6 13:47:04 2019

You have these rules created by Upnp

-A MINIUPNPD -p udp -m udp --dport 6881 -j DNAT --to-destination 192.168.0.100:6881
-A MINIUPNPD -p tcp -m tcp --dport 44328 -j DNAT --to-destination 192.168.0.100:44328
-A MINIUPNPD -p udp -m udp --dport 44328 -j DNAT --to-destination 192.168.0.100:44328

and lot of manually created port forwards, like:

-A zone_wan_prerouting -p tcp -m tcp --dport 443 -m comment --comment "!fw3: TCP Anthem & Apex" -j DNAT --to-destination 192.168.0.100:443

What exactly is not working here?

So is there anything i can do here ?

I'll ask you for the third and last time here:

What does not work for you?

1 Like

I want to open ports for applications that don't use Upnp. And i'm using few Port checking sites to confirm ports.
Now The Problem I'm Having.
Just Say i forwarded 25000 port from my firewall but when i check from any port checking site it says its closed.
But if i config any applications that use UPNP to use 25000 through Upnp then port checking site it says its open. So how can i open ports from Firewall
Also I just flashed firmware without keeping settings then reconfigured. But My problem still there.

Most likely there is no problem there. I have seen this behaviour myself in my routers. Ports are indeed open, but are reported falsely as closed in the monitoring tools.
Apart from testing it yourself from another internet connection, you can also verify with the following command:

iptables -L -t nat -nv | grep -i DNAT

The first number is the packet hits and the second the bytes. As long as they are not ZERO, it means that you had ports forwarded.

2 Likes

I cannot just login to your device and better remove your IP and port.

A couple of posts ago you ran the iptables-save command from SSH. You can do the same for this command too. Read here if still in doubt.
Otherwise I think you can also see the hits on the Luci webpage of the firewalls.

Ping will not get an answer from SSH.

2 Likes

Now ive done what you told me this is what ive got

  • You have hits, the port is opened

I see Thanks

Can you tell me how can i check my port status from another network.
i mean i can still see from Ports Checking sites its closed unless i use upnp. and i tried 8 sites

Sure. Use the program/software to check the connection. Do not use a checker.

can you please give me a specific name of the software

:confused:

No I cannot:

  • you're opening the port
  • you haven't told us the software
  • I hope you're not trying to open a port while you don't have a server listening - that may be why it's reporting as closed

I am opening my port because im having net issue in some games and i am troubleshooting the problems with EA advisors.
As you can see i forwarded all ports they gave me but after they checked then they told me my port was not opened.

I don't see that. If your game isn't actively running, then they would be closed. That's normal. Your "game server" is off.

I can only suggest testing by running the game in question.

OK.
I have checked my ports after installing Portforward Network Utilities.
And as you guys said my ports are open.
So My Problem Is resolved Now.
Thanks You Guys. You guys Helped Me alot.

1 Like

If your problem is solved, feel free to mark the relevant post as the solution; and edit the title to add "[SOLVED]" to the beginning (click the pencil behind the topic).

grafik

See How to mark a topic as [Solved] for a tutorial.

1 Like

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.