Oto dane, o które prosiłeś Cezary:
netstat -apn
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:5000 0.0.0.0:* LISTEN 17021/miniupnpd
tcp 0 0 0.0.0.0:8200 0.0.0.0:* LISTEN 3055/minidlna
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 2019/smbd
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 1612/portmap
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 1891/uhttpd
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 2680/dnsmasq
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1840/dropbear
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 1891/uhttpd
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 2019/smbd
tcp 0 248 192.168.1.1:22 192.168.1.110:65411 ESTABLISHED 17754/dropbear
tcp 0 0 192.168.1.1:8200 192.168.1.106:60837 TIME_WAIT -
tcp 0 0 192.168.1.1:8200 192.168.1.106:60822 TIME_WAIT -
tcp 0 0 192.168.1.1:8200 192.168.1.106:60824 TIME_WAIT -
tcp 0 0 192.168.1.1:8200 192.168.1.106:60835 TIME_WAIT -
netstat: /proc/net/tcp6: No such file or directory
udp 0 0 192.168.1.1:44590 0.0.0.0:* 17021/miniupnpd
udp 0 0 192.168.1.1:52020 0.0.0.0:* 3055/minidlna
udp 0 0 0.0.0.0:53 0.0.0.0:* 2680/dnsmasq
udp 0 0 0.0.0.0:67 0.0.0.0:* 2680/dnsmasq
udp 0 0 0.0.0.0:1900 0.0.0.0:* 17021/miniupnpd
udp 0 0 239.255.255.250:1900 0.0.0.0:* 3055/minidlna
udp 0 0 0.0.0.0:111 0.0.0.0:* 1612/portmap
udp 0 0 0.0.0.0:123 0.0.0.0:* 1799/ntpd
udp 0 0 192.168.1.255:137 0.0.0.0:* 2020/nmbd
udp 0 0 192.168.1.1:137 0.0.0.0:* 2020/nmbd
udp 0 0 0.0.0.0:137 0.0.0.0:* 2020/nmbd
udp 0 0 192.168.1.255:138 0.0.0.0:* 2020/nmbd
udp 0 0 192.168.1.1:138 0.0.0.0:* 2020/nmbd
udp 0 0 0.0.0.0:138 0.0.0.0:* 2020/nmbd
udp 0 0 192.168.1.1:5351 0.0.0.0:* 17021/miniupnpd
netstat: /proc/net/udp6: No such file or directory
netstat: /proc/net/raw6: No such file or directory
Active UNIX domain sockets (servers and established)
Proto RefCnt Flags Type State I-Node PID/Program name Path
unix 2 [ ] DGRAM 3629 2350/hostapd /var/run/hostapd/wlan1
unix 2 [ ACC ] STREAM LISTENING 307 526/ubusd /var/run/ubus.sock
unix 2 [ ACC ] STREAM LISTENING 3418 2020/nmbd /var/nmbd/unexpected
unix 10 [ ] DGRAM 2654 1572/logd /dev/log
unix 2 [ ] DGRAM 3688 2413/hostapd /var/run/hostapd/wlan0
unix 2 [ ] DGRAM 4032 2492/ddns_gargoyle
unix 3 [ ] STREAM CONNECTED 2656 1572/logd
unix 2 [ ] DGRAM 3081 1840/dropbear
unix 3 [ ] STREAM CONNECTED 312 1/procd
unix 2 [ ] DGRAM 4421 2413/hostapd
unix 2 [ ] DGRAM 3247 1652/netifd
unix 3 [ ] STREAM CONNECTED 313 526/ubusd /var/run/ubus.sock
unix 3 [ ] STREAM CONNECTED 3632 526/ubusd /var/run/ubus.sock
unix 2 [ ] DGRAM 2816 1612/portmap
unix 3 [ ] STREAM CONNECTED 2857 526/ubusd /var/run/ubus.sock
unix 3 [ ] STREAM CONNECTED 3690 2413/hostapd
unix 3 [ ] STREAM CONNECTED 2856 1652/netifd
unix 2 [ ] DGRAM 81546 17390/crond
unix 3 [ ] STREAM CONNECTED 2657 526/ubusd /var/run/ubus.sock
unix 2 [ ] DGRAM 81132 17021/miniupnpd
unix 3 [ ] STREAM CONNECTED 3631 2350/hostapd
unix 2 [ ] DGRAM 3274 1652/netifd
unix 2 [ ] DGRAM 4357 2680/dnsmasq
unix 3 [ ] STREAM CONNECTED 3691 526/ubusd /var/run/ubus.sock
iptables -v -L
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
760 630K bw_ingress all -- eth0.2 any anywhere anywhere
3557 1100K delegate_input all -- any any anywhere anywhere
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4696 603K web_monitor all -- any eth0.2 anywhere anywhere
5245 4627K bw_ingress all -- eth0.2 any anywhere anywhere
5281 4639K ingress_restrictions all -- eth0.2 any anywhere anywhere
4720 607K egress_restrictions all -- any eth0.2 anywhere anywhere
9981 5244K delegate_forward all -- any any anywhere anywhere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2981 530K delegate_output all -- any any anywhere anywhere
Chain MINIUPNPD (1 references)
pkts bytes target prot opt in out source destination
3 211 ACCEPT udp -- any any anywhere NAS326 udp dpt:39738
1 52 ACCEPT tcp -- any any anywhere NAS326 tcp dpt:39738
0 0 ACCEPT udp -- any any anywhere Mygen.lan udp dpt:35689
0 0 ACCEPT tcp -- any any anywhere Mygen.lan tcp dpt:35689
Chain bw_ingress (2 references)
pkts bytes target prot opt in out source destination
6005 5257K CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
5245 4627K CONNMARK all -- any any anywhere 192.168.1.0/24 CONNMARK xset 0xf000000/0xff000000
645 590K CONNMARK all -- any any anywhere host-89-229-102-135.stargard.mm.pl CONNMARK xset 0xf000000/0xff000000
115 40018 RETURN all -- any any anywhere anywhere connmark match 0x0/0xf000000
5890 5217K CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
0 0 all -- any any anywhere anywhere bandwidth --id total1-download-2-449 --type combined --current_bandwidth 0 --reset_interval 2 --reset_time 2 --intervals_to_save 449
0 0 all -- any any anywhere anywhere bandwidth --id bdist1-download-minute-15 --type individual_dst --reset_interval minute --intervals_to_save 15
0 0 all -- any any anywhere anywhere bandwidth --id total2-download-minute-359 --type combined --current_bandwidth 0 --reset_interval minute --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist2-download-900-24 --type individual_dst --reset_interval 900 --reset_time 900 --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total3-download-180-479 --type combined --current_bandwidth 0 --reset_interval 180 --reset_time 180 --intervals_to_save 479
0 0 all -- any any anywhere anywhere bandwidth --id bdist3-download-hour-24 --type individual_dst --reset_interval hour --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total4-download-7200-359 --type combined --current_bandwidth 0 --reset_interval 7200 --reset_time 7200 --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist4-download-day-31 --type individual_dst --reset_interval day --intervals_to_save 31
0 0 all -- any any anywhere anywhere bandwidth --id total5-download-day-365 --type combined --current_bandwidth 0 --reset_interval day --intervals_to_save 365
0 0 all -- any any anywhere anywhere bandwidth --id bdist5-download-month-12 --type individual_dst --reset_interval month --intervals_to_save 12
Chain delegate_forward (1 references)
pkts bytes target prot opt in out source destination
9981 5244K lease_mismatch_check all -- any any anywhere anywhere
9981 5244K forwarding_rule all -- any any anywhere anywhere /* user chain for forwarding */
9682 5228K ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
289 16116 zone_lan_forward all -- br-lan any anywhere anywhere
10 623 zone_wan_forward all -- eth0.2 any anywhere anywhere
0 0 reject all -- any any anywhere anywhere
Chain delegate_input (1 references)
pkts bytes target prot opt in out source destination
24 2040 ACCEPT all -- lo any anywhere anywhere
3533 1098K input_rule all -- any any anywhere anywhere /* user chain for input */
1987 752K ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
207 11092 syn_flood tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
1340 301K zone_lan_input all -- br-lan any anywhere anywhere
206 45247 zone_wan_input all -- eth0.2 any anywhere anywhere
Chain delegate_output (1 references)
pkts bytes target prot opt in out source destination
24 2040 ACCEPT all -- any lo anywhere anywhere
2957 528K output_rule all -- any any anywhere anywhere /* user chain for output */
2390 322K ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
413 196K zone_lan_output all -- any br-lan anywhere anywhere
154 10330 zone_wan_output all -- any eth0.2 anywhere anywhere
Chain egress_restrictions (1 references)
pkts bytes target prot opt in out source destination
4720 607K egress_whitelist all -- any any anywhere anywhere
0 0 CONNMARK all -- any any anywhere anywhere MAC 60:D9:A0:C7:D2:3E CONNMARK or 0x8000000
20 1626 CONNMARK all -- any any anywhere anywhere MAC 60:D9:A0:C7:D1:24 CONNMARK or 0x8000000
4720 607K CONNMARK all -- any any anywhere anywhere timerange --hours 0-61200,74700-86340 --weekdays 0,1,1,1,1,1,0 CONNMARK or 0x40000000
20 1626 REJECT all -- any any anywhere anywhere connmark match 0x48000000/0xff000000 reject-with icmp-port-unreachable
4700 605K CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
0 0 CONNMARK all -- any any anywhere anywhere MAC 60:D9:A0:C7:D2:3E CONNMARK or 0x8000000
0 0 CONNMARK all -- any any anywhere anywhere MAC 60:D9:A0:C7:D1:24 CONNMARK or 0x8000000
0 0 CONNMARK all -- any any anywhere anywhere timerange --hours 74700-86340 --weekdays 1,0,0,0,0,0,0 CONNMARK or 0x40000000
0 0 REJECT all -- any any anywhere anywhere connmark match 0x48000000/0xff000000 reject-with icmp-port-unreachable
4700 605K CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
Chain egress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain ingress_restrictions (1 references)
pkts bytes target prot opt in out source destination
5281 4639K ingress_whitelist all -- any any anywhere anywhere
Chain ingress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan_rule (1 references)
pkts bytes target prot opt in out source destination
1 40 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
3 160 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
1 60 tcp -- any any anywhere anywhere tcp dpt:ssh recent: SET name: SSH_CHECK side: source mask: 255.255.255.255
0 0 DROP all -- any any anywhere anywhere recent: UPDATE seconds: 300 hit_count: 11 name: SSH_CHECK side: source mask: 255.255.255.255
1 60 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ssh
Chain lease_mismatch_check (1 references)
pkts bytes target prot opt in out source destination
0 0 REJECT all -- any any !Mygen.lan anywhere MAC 00:1F:1F:DD:4E:86 reject-with icmp-port-unreachable
0 0 REJECT all -- any any Mygen.lan anywhere MAC ! 00:1F:1F:DD:4E:86 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !TCL anywhere MAC 0C:91:60:8F:99:32 reject-with icmp-port-unreachable
0 0 REJECT all -- any any TCL anywhere MAC ! 0C:91:60:8F:99:32 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !Samsung_46 anywhere MAC 1C:5A:3E:4C:B0:E3 reject-with icmp-port-unreachable
0 0 REJECT all -- any any Samsung_46 anywhere MAC ! 1C:5A:3E:4C:B0:E3 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !TCL anywhere MAC 3C:59:1E:22:A9:D4 reject-with icmp-port-unreachable
0 0 REJECT all -- any any TCL anywhere MAC ! 3C:59:1E:22:A9:D4 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !DESKTOP-BM1602P.lan anywhere MAC 4C:BB:58:89:32:91 reject-with icmp-port-unreachable
0 0 REJECT all -- any any DESKTOP-BM1602P.lan anywhere MAC ! 4C:BB:58:89:32:91 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !NAS326 anywhere MAC 58:8B:F3:E0:6D:AC reject-with icmp-port-unreachable
0 0 REJECT all -- any any NAS326 anywhere MAC ! 58:8B:F3:E0:6D:AC reject-with icmp-port-unreachable
0 0 REJECT all -- any any !android-f0cba85118290106.lan anywhere MAC 60:D9:A0:C7:D1:24 reject-with icmp-port-unreachable
0 0 REJECT all -- any any android-f0cba85118290106.lan anywhere MAC ! 60:D9:A0:C7:D1:24 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !Tablet anywhere MAC 60:D9:A0:C7:D2:3E reject-with icmp-port-unreachable
0 0 REJECT all -- any any Tablet anywhere MAC ! 60:D9:A0:C7:D2:3E reject-with icmp-port-unreachable
0 0 REJECT all -- any any !android-49cce10ca09e30fd.lan anywhere MAC C0:11:73:85:00:45 reject-with icmp-port-unreachable
0 0 REJECT all -- any any android-49cce10ca09e30fd.lan anywhere MAC ! C0:11:73:85:00:45 reject-with icmp-port-unreachable
0 0 REJECT all -- any any !Drukarka_HP.lan anywhere MAC C4:8E:8F:49:E5:2B reject-with icmp-port-unreachable
0 0 REJECT all -- any any Drukarka_HP.lan anywhere MAC ! C4:8E:8F:49:E5:2B reject-with icmp-port-unreachable
0 0 REJECT all -- any any !Samsung anywhere MAC E4:58:E7:29:09:E2 reject-with icmp-port-unreachable
0 0 REJECT all -- any any Samsung anywhere MAC ! E4:58:E7:29:09:E2 reject-with icmp-port-unreachable
Chain output_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_B (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- any any anywhere NAS326 tcp dpts:www:81
0 0 ACCEPT udp -- any any anywhere NAS326 udp dpts:80:81
Chain reject (3 references)
pkts bytes target prot opt in out source destination
38 1739 REJECT tcp -- any any anywhere anywhere reject-with tcp-reset
1 53 REJECT all -- any any anywhere anywhere reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
207 11092 RETURN tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
0 0 DROP all -- any any anywhere anywhere
Chain web_monitor (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- any any anywhere anywhere WEBMON --max_domains 300 --max_searches 300
Chain zone_lan_dest_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
413 196K ACCEPT all -- any br-lan anywhere anywhere
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
289 16116 pf_loopback_B all -- any any anywhere anywhere
0 0 ACCEPT all -- br-lan br-lan anywhere anywhere
289 16116 forwarding_lan_rule all -- any any anywhere anywhere /* user chain for forwarding */
289 16116 zone_wan_dest_ACCEPT all -- any any anywhere anywhere /* forwarding lan -> wan */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_lan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_input (1 references)
pkts bytes target prot opt in out source destination
1340 301K input_lan_rule all -- any any anywhere anywhere /* user chain for input */
1 72 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
1339 301K zone_lan_src_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_output (1 references)
pkts bytes target prot opt in out source destination
413 196K output_lan_rule all -- any any anywhere anywhere /* user chain for output */
413 196K zone_lan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_src_ACCEPT (1 references)
pkts bytes target prot opt in out source destination
1339 301K ACCEPT all -- br-lan any anywhere anywhere
Chain zone_wan_dest_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
443 26446 ACCEPT all -- any eth0.2 anywhere anywhere
Chain zone_wan_dest_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any eth0.2 anywhere anywhere
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
10 623 MINIUPNPD all -- any any anywhere anywhere
6 360 forwarding_wan_rule all -- any any anywhere anywhere /* user chain for forwarding */
0 0 zone_lan_dest_ACCEPT esp -- any any anywhere anywhere /* @rule[7] */
0 0 zone_lan_dest_ACCEPT udp -- any any anywhere anywhere udp dpt:isakmp /* @rule[8] */
6 360 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_wan_dest_REJECT all -- any any anywhere anywhere
Chain zone_wan_input (1 references)
pkts bytes target prot opt in out source destination
206 45247 input_wan_rule all -- any any anywhere anywhere /* user chain for input */
116 40435 ACCEPT udp -- any any anywhere anywhere udp dpt:bootpc /* Allow-DHCP-Renew */
0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request /* Allow-Ping */
0 0 ACCEPT igmp -- any any anywhere anywhere /* Allow-IGMP */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:39738 /* transmission */
46 2760 ACCEPT tcp -- any any anywhere anywhere tcp dpt:9091 /* transmission_wan */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
39 1792 zone_wan_src_REJECT all -- any any anywhere anywhere
Chain zone_wan_output (1 references)
pkts bytes target prot opt in out source destination
154 10330 output_wan_rule all -- any any anywhere anywhere /* user chain for output */
154 10330 zone_wan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_wan_src_REJECT (1 references)
pkts bytes target prot opt in out source destination
39 1792 reject all -- eth0.2 any anywhere anywhere
I jeszcze uci show firewall
uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@defaults[0].enforce_dhcp_assignments='1'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].network='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].network='wan' 'wan6'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fe80::/10'
firewall.@rule[3].src_port='547'
firewall.@rule[3].dest_ip='fe80::/10'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
firewall.@include[0].reload='1'
firewall.@rule[7]=rule
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@include[1]=include
firewall.@include[1].type='script'
firewall.@include[1].path='/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'
firewall.@include[1].family='IPv4'
firewall.@include[1].reload='1'
firewall.miniupnpd=include
firewall.miniupnpd.type='script'
firewall.miniupnpd.path='/usr/share/miniupnpd/firewall.include'
firewall.miniupnpd.family='any'
firewall.miniupnpd.reload='1'
firewall.openvpn_include_file=include
firewall.openvpn_include_file.path='/etc/openvpn.firewall'
firewall.openvpn_include_file.reload='1'
firewall.ra_80_80=remote_accept
firewall.ra_80_80.local_port='80'
firewall.ra_80_80.remote_port='80'
firewall.ra_80_80.proto='tcp'
firewall.ra_80_80.zone='wan'
firewall.@rule[9]=rule
firewall.@rule[9].name='transmission'
firewall.@rule[9].src='wan'
firewall.@rule[9].target='ACCEPT'
firewall.@rule[9].proto='tcp'
firewall.@rule[9].dest_port='39738'
firewall.@rule[10]=rule
firewall.@rule[10].name='transmission_wan'
firewall.@rule[10].src='wan'
firewall.@rule[10].target='ACCEPT'
firewall.@rule[10].proto='tcp'
firewall.@rule[10].dest_port='9091'
firewall.rule_1=restriction_rule
firewall.rule_1.is_ingress='0'
firewall.rule_1.description='Blokada internetu'
firewall.rule_1.local_addr='60:d9:a0:c7:d2:3e,60:d9:a0:c7:d1:24'
firewall.rule_1.active_weekdays='mon,tue,wed,thu,fri'
firewall.rule_1.active_hours='00:00-17:00, 20:45-23:59'
firewall.rule_1.enabled='1'
firewall.rule_2=restriction_rule
firewall.rule_2.is_ingress='0'
firewall.rule_2.description='rule_2'
firewall.rule_2.local_addr='60:D9:A0:C7:D2:3E,60:D9:A0:C7:D1:24'
firewall.rule_2.active_weekdays='sun'
firewall.rule_2.active_hours='20:45-23:59'
firewall.rule_2.enabled='1'
firewall.ra_443_443=remote_accept
firewall.ra_443_443.local_port='443'
firewall.ra_443_443.remote_port='443'
firewall.ra_443_443.proto='tcp'
firewall.ra_443_443.zone='wan'
firewall.ra_22_22=remote_accept
firewall.ra_22_22.local_port='22'
firewall.ra_22_22.remote_port='22'
firewall.ra_22_22.proto='tcp'
firewall.ra_22_22.zone='wan'
firewall.redirect_enabled_number_0=redirect
firewall.redirect_enabled_number_0.name='nas'
firewall.redirect_enabled_number_0.src='wan'
firewall.redirect_enabled_number_0.dest='lan'
firewall.redirect_enabled_number_0.proto='tcp'
firewall.redirect_enabled_number_0.src_dport='80-81'
firewall.redirect_enabled_number_0.dest_port='80-81'
firewall.redirect_enabled_number_0.dest_ip='192.168.1.142'
firewall.redirect_enabled_number_1=redirect
firewall.redirect_enabled_number_1.name='nas'
firewall.redirect_enabled_number_1.src='wan'
firewall.redirect_enabled_number_1.dest='lan'
firewall.redirect_enabled_number_1.proto='udp'
firewall.redirect_enabled_number_1.src_dport='80-81'
firewall.redirect_enabled_number_1.dest_port='80-81'
firewall.redirect_enabled_number_1.dest_ip='192.168.1.142'
Zyxel EX5601-T0 @ OpenWrt 24.10-SNAPSHOT 571dcd
TP-Link TL-WDR3600 v1 @ OpenWrt 23.05-SNAPSHOT r23893-08becaf62f
Netgear R6220 @ OpenWrt 24.10-SNAPSHOT r28432-7609571dcd
Zyxel NAS326