What's new

Does my iptables looks normal?

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

NoBenefit

New Around Here
I have RT-AX86U using 388.2_2, lately it's been acting weird, and I don't have much experiences with iptables, I do not have WAN access enabled, nor any kind of remote access enabled, I’m using it with Tmobile gateway thru wan port.
Today the swap gone, and scribe said usb drive is bad, and some how my window computer see two 5Ghz wifi but not Mac or iPhone, one with correct name and one with weird characters, guest wifi is not enabled.


-P INPUT ACCEPT


-P FORWARD ACCEPT


-P OUTPUT ACCEPT


-N ACCESS_RESTRICTION


-N DNSFILTER_DOT


-N FUPNP


-N IControls


-N INPUT_ICMP


-N INPUT_PING


-N IPSEC_DROP_SUBNET_ICMP


-N IPSEC_STRONGSWAN


-N OUTPUT_DNS


-N OUTPUT_IP


-N OVPNCF


-N OVPNCI


-N OVPNSF


-N OVPNSI


-N PControls


-N PTCSRVLAN


-N PTCSRVWAN


-N SECURITY


-N VPNCF


-N VPNCI


-N WGCF


-N WGCI


-N WGNPControls


-N WGSF


-N WGSI


-N default_block


-N logaccept


-N logdrop


-N logdrop_dns


-N logdrop_ip


-A INPUT -p icmp -m icmp --icmp-type 8 -j INPUT_PING


-A INPUT -m state --state RELATED,ESTABLISHED -j logaccept


-A INPUT -m state --state INVALID -j logdrop


-A INPUT ! -i br0 -j PTCSRVWAN


-A INPUT -i br0 -j PTCSRVLAN


-A INPUT ! -i lo -p tcp -m tcp --dport 5152 -j logdrop


-A INPUT -i br0 -m state --state NEW -j ACCEPT


-A INPUT -i lo -m state --state NEW -j ACCEPT


-A INPUT -p udp -m udp --sport 67 --dport 68 -j logaccept


-A INPUT -p icmp -j INPUT_ICMP


-A INPUT -j WGSI


-A INPUT -j WGCI


-A INPUT -j OVPNSI


-A INPUT -j OVPNCI


-A INPUT -j logdrop


-A FORWARD -j IPSEC_DROP_SUBNET_ICMP


-A FORWARD -j IPSEC_STRONGSWAN


-A FORWARD -m state --state RELATED,ESTABLISHED -j logaccept


-A FORWARD -j WGSF


-A FORWARD -j OVPNSF


-A FORWARD ! -i br0 -o eth0 -j logdrop


-A FORWARD -i br0 -o br0 -j logaccept


-A FORWARD -m state --state INVALID -j logdrop


-A FORWARD -m conntrack --ctstate DNAT -j logaccept


-A FORWARD -j WGCF


-A FORWARD -j OVPNCF


-A FORWARD -j VPNCF


-A FORWARD -i br0 -j ACCEPT


-A FORWARD -j logdrop


-A OUTPUT -p udp -m udp --dport 53 -m u32 --u32 "0x0>>0x16&0x3c@0x8>>0xf&0x1=0x0" -j OUTPUT_DNS


-A OUTPUT -p tcp -m tcp --dport 53 -m u32 --u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x8>>0xf&0x1=0x0" -j OUTPUT_DNS


-A OUTPUT -j OUTPUT_IP


-A INPUT_ICMP -p icmp -m icmp --icmp-type 8 -j RETURN


-A INPUT_ICMP -p icmp -m icmp --icmp-type 13 -j RETURN


-A INPUT_ICMP -p icmp -j logaccept


-A INPUT_PING -i eth0 -p icmp -j logdrop


-A OUTPUT_DNS -m string --hex-string "|10706f697579747975696f706b6a666e6603636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0d72666a656a6e666a6e65666a6503636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|1131306166646d617361787373736171726b03636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0f376d667364666173646d6b676d726b03636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0d386d617361787373736171726b03636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0f3966646d617361787373736171726b03636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|1265666274686d6f6975796b6d6b6a6b6a677403636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|086861636b7563647403636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|076c696e77756469056633333232036e657400|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0f6c6b6a68676664736174727975696f03636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0b6d6e627663787a7a7a313203636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|077131313133333303746f7000|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|057371353230056633333232036e657400|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|077563746b6f6e6503636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0e7a786376626d6e6e666a6a66777103636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0a65756d6d6167766e627003636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0b726f75746572736173757303636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|037777770b726f757465722d6173757303636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0377777709617375736c6f67696e03636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|0d72657065617461722d6173757303636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_DNS -m string --hex-string "|037777310b726f757465722d6173757303636f6d00|" --algo bm --to 65535 --icase -j logdrop_dns


-A OUTPUT_IP -d 193.201.224.0/24 -j logdrop_ip


-A OUTPUT_IP -d 51.15.120.245/32 -j logdrop_ip


-A OUTPUT_IP -d 45.33.73.134/32 -j logdrop_ip


-A OUTPUT_IP -d 190.115.18.28/32 -j logdrop_ip


-A OUTPUT_IP -d 51.159.52.250/32 -j logdrop_ip


-A OUTPUT_IP -d 190.115.18.86/32 -j logdrop_ip


-A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 1/sec -j RETURN


-A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j logdrop


-A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 1/sec -j RETURN


-A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -j logdrop


-A SECURITY -p icmp -m icmp --icmp-type 8 -m limit --limit 1/sec -j RETURN


-A SECURITY -p icmp -m icmp --icmp-type 8 -j logdrop


-A SECURITY -j RETURN


-A logaccept -m state --state NEW -j LOG --log-prefix "ACCEPT " --log-tcp-sequence --log-tcp-options --log-ip-options


-A logaccept -j ACCEPT


-A logdrop -m state --state NEW -j LOG --log-prefix "DROP " --log-tcp-sequence --log-tcp-options --log-ip-options


-A logdrop -j DROP


-A logdrop_dns -j LOG --log-prefix "DROP_DNS " --log-tcp-sequence --log-tcp-options --log-ip-options


-A logdrop_dns -j DROP


-A logdrop_ip -j LOG --log-prefix "DROP_IP " --log-tcp-sequence --log-tcp-options --log-ip-options


-A logdrop_ip -j DROP
 

Attachments

  • Screenshot 2023-08-02 at 12.18.08 AM.png
    Screenshot 2023-08-02 at 12.18.08 AM.png
    427 KB · Views: 77
  • Screenshot 2023-08-02 at 12.18.34 AM.png
    Screenshot 2023-08-02 at 12.18.34 AM.png
    185.2 KB · Views: 77

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top