Temat: Co jest nie tak w firewallu
Witajcie, zauwżyłęm że jak puściłęm DMZ na PC to nie moge dostać sie do usług uruchomionych na routerze, np transmission, czy darkstat, natomiast po puszczeniu DMZ na router czyli 192.168.1.1 zaczyna działać, mimo przekierowania portów (przynajmniej mi sie tak wydaje)
Wcześniej cały czas mialem DMZ na ip routera wiec tego nie zauwazylem.'
plik firewall
config 'defaults'
option 'syn_flood' '1'
option 'input' 'ACCEPT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
option 'force_router_dns' '1'
config 'zone'
option 'name' 'lan'
option 'network' 'lan'
option 'input' 'ACCEPT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
config 'zone'
option 'name' 'wan'
option 'network' 'wan'
option 'input' 'REJECT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
option 'masq' '1'
option 'mtu_fix' '1'
config 'forwarding'
option 'src' 'lan'
option 'dest' 'wan'
config 'rule'
option 'name' 'Allow-DHCP-Renew'
option 'src' 'wan'
option 'proto' 'udp'
option 'dest_port' '68'
option 'target' 'ACCEPT'
option 'family' 'ipv4'
config 'rule'
option 'name' 'Allow-Ping'
option 'src' 'wan'
option 'proto' 'icmp'
option 'icmp_type' 'echo-request'
option 'family' 'ipv4'
option 'target' 'ACCEPT'
config 'rule'
option 'name' 'Allow-DHCPv6'
option 'src' 'wan'
option 'proto' 'udp'
option 'src_ip' 'fe80::/10'
option 'src_port' '547'
option 'dest_ip' 'fe80::/10'
option 'dest_port' '546'
option 'family' 'ipv6'
option 'target' 'ACCEPT'
config 'rule'
option 'name' 'Allow-ICMPv6-Input'
option 'src' 'wan'
option 'proto' 'icmp'
list 'icmp_type' 'echo-request'
list 'icmp_type' 'destination-unreachable'
list 'icmp_type' 'packet-too-big'
list 'icmp_type' 'time-exceeded'
list 'icmp_type' 'bad-header'
list 'icmp_type' 'unknown-header-type'
list 'icmp_type' 'router-solicitation'
list 'icmp_type' 'neighbour-solicitation'
list 'icmp_type' 'router-advertisement'
list 'icmp_type' 'neighbour-advertisement'
option 'limit' '1000/sec'
option 'family' 'ipv6'
option 'target' 'ACCEPT'
config 'rule'
option 'name' 'Allow-ICMPv6-Forward'
option 'src' 'wan'
option 'dest' '*'
option 'proto' 'icmp'
list 'icmp_type' 'echo-request'
list 'icmp_type' 'destination-unreachable'
list 'icmp_type' 'packet-too-big'
list 'icmp_type' 'time-exceeded'
list 'icmp_type' 'bad-header'
list 'icmp_type' 'unknown-header-type'
option 'limit' '1000/sec'
option 'family' 'ipv6'
option 'target' 'ACCEPT'
config 'include'
option 'path' '/etc/firewall.user'
config 'include'
option 'path' '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'
config 'rule' 'ftp_wan'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '21'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '51413'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'udp'
option 'dest_port' '51413'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '81'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '9091'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'udp'
option 'dest_port' '9091'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '8200'
config 'zone'
option 'name' 'guest'
option 'network' 'guest'
option 'input' 'REJECT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
config 'forwarding'
option 'src' 'guest'
option 'dest' 'wan'
config 'rule'
option 'src' 'guest'
option 'proto' 'udp'
option 'src_port' '67-68'
option 'dest_port' '67-68'
option 'target' 'ACCEPT'
option 'family' 'ipv4'
config 'rule'
option 'src' 'guest'
option 'dest_port' '53'
option 'target' 'ACCEPT'
option 'family' 'ipv4'
option 'proto' 'tcpudp'
config 'zone' 'vpn_zone'
option 'name' 'vpn'
option 'network' 'vpn'
option 'input' 'ACCEPT'
option 'output' 'ACCEPT'
option 'forward' 'ACCEPT'
option 'mtu_fix' '1'
option 'masq' '1'
config 'forwarding' 'vpn_lan_forwarding'
option 'src' 'lan'
option 'dest' 'vpn'
config 'remote_accept' 'ra_openvpn'
option 'zone' 'wan'
option 'local_port' '1194'
option 'remote_port' '1194'
option 'proto' 'udp'
config 'forwarding' 'vpn_wan_forwarding'
option 'src' 'vpn'
option 'dest' 'wan'
config 'include' 'openvpn_include_file'
option 'path' '/etc/openvpn.firewall'
config 'remote_accept' 'ra_443_444'
option 'local_port' '443'
option 'remote_port' '444'
option 'proto' 'tcp'
option 'zone' 'wan'
config 'remote_accept' 'ra_80_88'
option 'local_port' '80'
option 'remote_port' '88'
option 'proto' 'tcp'
option 'zone' 'wan'
config 'remote_accept' 'ra_22_1022'
option 'local_port' '22'
option 'remote_port' '1022'
option 'proto' 'tcp'
option 'zone' 'wan'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '667'
config 'rule'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'udp'
option 'dest_port' '667'
config 'redirect' 'redirect_enabled_number_0'
option 'name' 'ap'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '1088'
option 'dest_ip' '192.168.1.100'
option 'dest_port' '80'
config 'redirect' 'redirect_enabled_number_1'
option 'name' 'ap'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '1088'
option 'dest_ip' '192.168.1.100'
option 'dest_port' '80'
config 'dmz' 'dmz'
option 'from' 'wan'
option 'to_ip' '192.168.1.1'+ edit: Dodam ze jak nie dam DMZ do routera to nie można do niego pingować z zewnątrz. Coś kiedys zepsułęm pewnie
RB951-2HnD / Celeron J1900 / 4G DDR3 / MiniITX - Satpol 100M