firewall.config 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. config defaults
  2. option syn_flood 1
  3. option input ACCEPT
  4. option output ACCEPT
  5. option forward REJECT
  6. # Uncomment this line to disable ipv6 rules
  7. # option disable_ipv6 1
  8. config zone
  9. option name lan
  10. option network 'lan'
  11. option input ACCEPT
  12. option output ACCEPT
  13. option forward REJECT
  14. config zone
  15. option name wan
  16. option network 'wan'
  17. option input REJECT
  18. option output ACCEPT
  19. option forward REJECT
  20. option masq 1
  21. option mtu_fix 1
  22. config forwarding
  23. option src lan
  24. option dest wan
  25. # We need to accept udp packets on port 68,
  26. # see https://dev.openwrt.org/ticket/4108
  27. config rule
  28. option src wan
  29. option proto udp
  30. option dest_port 68
  31. option target ACCEPT
  32. option family ipv4
  33. # Allow IPv4 ping
  34. config rule
  35. option src wan
  36. option proto icmp
  37. option icmp_type echo-request
  38. option family ipv4
  39. option target ACCEPT
  40. # Allow essential incoming IPv6 ICMP traffic
  41. config rule
  42. option src wan
  43. option dest *
  44. option proto icmp
  45. list icmp_type echo-request
  46. list icmp_type destination-unreachable
  47. list icmp_type packet-too-big
  48. list icmp_type time-exceeded
  49. list icmp_type bad-header
  50. list icmp_type unknown-header-type
  51. option limit 1000/sec
  52. option family ipv6
  53. option target ACCEPT
  54. # include a file with users custom iptables rules
  55. config include
  56. option path /etc/firewall.user
  57. ### EXAMPLE CONFIG SECTIONS
  58. # do not allow a specific ip to access wan
  59. #config rule
  60. # option src lan
  61. # option src_ip 192.168.45.2
  62. # option dest wan
  63. # option proto tcp
  64. # option target REJECT
  65. # block a specific mac on wan
  66. #config rule
  67. # option dest wan
  68. # option src_mac 00:11:22:33:44:66
  69. # option target REJECT
  70. # block incoming ICMP traffic on a zone
  71. #config rule
  72. # option src lan
  73. # option proto ICMP
  74. # option target DROP
  75. # port redirect port coming in on wan to lan
  76. #config redirect
  77. # option src wan
  78. # option src_dport 80
  79. # option dest lan
  80. # option dest_ip 192.168.16.235
  81. # option dest_port 80
  82. # option proto tcp
  83. # port redirect of remapped ssh port (22001) on wan
  84. #config redirect
  85. # option src wan
  86. # option src_dport 22001
  87. # option dest lan
  88. # option dest_port 22
  89. # option proto tcp
  90. # allow IPsec/ESP and ISAKMP passthrough
  91. #config rule
  92. # option src wan
  93. # option dest lan
  94. # option protocol esp
  95. # option target ACCEPT
  96. #config rule
  97. # option src wan
  98. # option dest lan
  99. # option src_port 500
  100. # option dest_port 500
  101. # option proto udp
  102. # option target ACCEPT
  103. ### FULL CONFIG SECTIONS
  104. #config rule
  105. # option src lan
  106. # option src_ip 192.168.45.2
  107. # option src_mac 00:11:22:33:44:55
  108. # option src_port 80
  109. # option dest wan
  110. # option dest_ip 194.25.2.129
  111. # option dest_port 120
  112. # option proto tcp
  113. # option target REJECT
  114. #config redirect
  115. # option src lan
  116. # option src_ip 192.168.45.2
  117. # option src_mac 00:11:22:33:44:55
  118. # option src_port 1024
  119. # option src_dport 80
  120. # option dest_ip 194.25.2.129
  121. # option dest_port 120
  122. # option proto tcp