firewall.config 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. config defaults
  2. option syn_flood 1
  3. option input REJECT
  4. option output ACCEPT
  5. option forward REJECT
  6. # Uncomment this line to disable ipv6 rules
  7. # option disable_ipv6 1
  8. config zone
  9. option name lan
  10. list network 'lan'
  11. option input ACCEPT
  12. option output ACCEPT
  13. option forward ACCEPT
  14. config zone
  15. option name wan
  16. list network 'wan'
  17. list network 'wan6'
  18. option input REJECT
  19. option output ACCEPT
  20. option forward REJECT
  21. option masq 1
  22. option mtu_fix 1
  23. config forwarding
  24. option src lan
  25. option dest wan
  26. # We need to accept udp packets on port 68,
  27. # see https://dev.openwrt.org/ticket/4108
  28. config rule
  29. option name Allow-DHCP-Renew
  30. option src wan
  31. option proto udp
  32. option dest_port 68
  33. option target ACCEPT
  34. option family ipv4
  35. # Allow IPv4 ping
  36. config rule
  37. option name Allow-Ping
  38. option src wan
  39. option proto icmp
  40. option icmp_type echo-request
  41. option family ipv4
  42. option target ACCEPT
  43. config rule
  44. option name Allow-IGMP
  45. option src wan
  46. option proto igmp
  47. option family ipv4
  48. option target ACCEPT
  49. # Allow DHCPv6 replies
  50. # see https://github.com/openwrt/openwrt/issues/5066
  51. config rule
  52. option name Allow-DHCPv6
  53. option src wan
  54. option proto udp
  55. option dest_ip fe80::/10
  56. option dest_port 546
  57. option family ipv6
  58. option target ACCEPT
  59. config rule
  60. option name Allow-MLD
  61. option src wan
  62. option proto icmp
  63. option src_ip fe80::/10
  64. list icmp_type '130/0'
  65. list icmp_type '131/0'
  66. list icmp_type '132/0'
  67. list icmp_type '143/0'
  68. option family ipv6
  69. option target ACCEPT
  70. # Allow essential incoming IPv6 ICMP traffic
  71. config rule
  72. option name Allow-ICMPv6-Input
  73. option src wan
  74. option proto icmp
  75. list icmp_type echo-request
  76. list icmp_type echo-reply
  77. list icmp_type destination-unreachable
  78. list icmp_type packet-too-big
  79. list icmp_type time-exceeded
  80. list icmp_type bad-header
  81. list icmp_type unknown-header-type
  82. list icmp_type router-solicitation
  83. list icmp_type neighbour-solicitation
  84. list icmp_type router-advertisement
  85. list icmp_type neighbour-advertisement
  86. option limit 1000/sec
  87. option family ipv6
  88. option target ACCEPT
  89. # Allow essential forwarded IPv6 ICMP traffic
  90. config rule
  91. option name Allow-ICMPv6-Forward
  92. option src wan
  93. option dest *
  94. option proto icmp
  95. list icmp_type echo-request
  96. list icmp_type echo-reply
  97. list icmp_type destination-unreachable
  98. list icmp_type packet-too-big
  99. list icmp_type time-exceeded
  100. list icmp_type bad-header
  101. list icmp_type unknown-header-type
  102. option limit 1000/sec
  103. option family ipv6
  104. option target ACCEPT
  105. config rule
  106. option name Allow-IPSec-ESP
  107. option src wan
  108. option dest lan
  109. option proto esp
  110. option target ACCEPT
  111. config rule
  112. option name Allow-ISAKMP
  113. option src wan
  114. option dest lan
  115. option dest_port 500
  116. option proto udp
  117. option target ACCEPT
  118. # allow interoperability with traceroute classic
  119. # note that traceroute uses a fixed port range, and depends on getting
  120. # back ICMP Unreachables. if we're operating in DROP mode, it won't
  121. # work so we explicitly REJECT packets on these ports.
  122. config rule
  123. option name Support-UDP-Traceroute
  124. option src wan
  125. option dest_port 33434:33689
  126. option proto udp
  127. option family ipv4
  128. option target REJECT
  129. option enabled 0
  130. # include a file with users custom iptables rules
  131. config include
  132. option path /etc/firewall.user
  133. ### EXAMPLE CONFIG SECTIONS
  134. # do not allow a specific ip to access wan
  135. #config rule
  136. # option src lan
  137. # option src_ip 192.168.45.2
  138. # option dest wan
  139. # option proto tcp
  140. # option target REJECT
  141. # block a specific mac on wan
  142. #config rule
  143. # option dest wan
  144. # option src_mac 00:11:22:33:44:66
  145. # option target REJECT
  146. # block incoming ICMP traffic on a zone
  147. #config rule
  148. # option src lan
  149. # option proto ICMP
  150. # option target DROP
  151. # port redirect port coming in on wan to lan
  152. #config redirect
  153. # option src wan
  154. # option src_dport 80
  155. # option dest lan
  156. # option dest_ip 192.168.16.235
  157. # option dest_port 80
  158. # option proto tcp
  159. # port redirect of remapped ssh port (22001) on wan
  160. #config redirect
  161. # option src wan
  162. # option src_dport 22001
  163. # option dest lan
  164. # option dest_port 22
  165. # option proto tcp
  166. ### FULL CONFIG SECTIONS
  167. #config rule
  168. # option src lan
  169. # option src_ip 192.168.45.2
  170. # option src_mac 00:11:22:33:44:55
  171. # option src_port 80
  172. # option dest wan
  173. # option dest_ip 194.25.2.129
  174. # option dest_port 120
  175. # option proto tcp
  176. # option target REJECT
  177. #config redirect
  178. # option src lan
  179. # option src_ip 192.168.45.2
  180. # option src_mac 00:11:22:33:44:55
  181. # option src_port 1024
  182. # option src_dport 80
  183. # option dest_ip 194.25.2.129
  184. # option dest_port 120
  185. # option proto tcp