With regard to your previous query about a potential UPnP security breach..... unless your apps
absolutely must use UPnP, my advice is to
DISABLE UPnP on the router, and
explicitly configure their port forwarding requirements
manually ..but then again I'm not a gamer and I be no Buccaneer!- Arrr!
If configuring iptables manually, then for each camera, you will need to manually add an inbound blocking (DROP/logdrop) rule something like this
Code:
iptables -I FORWARD -d xxx.xxx.xxx.xxx -i $(nvram get wan0_ifname) -m state --state NEW -j DROP
However. if using my script, it blocks
ALL outbound camera traffic via
ANY interface (
except the VPN servers) so I hope that even if UPnP did surreptitiously configure an
inbound port forward connection to the cameras, there would be no reply
outbound -
at least NOT from the cameras anyway!
But security should never be left to chance, so you could modify my
IPCamsBlock.sh script
@LINE 184:
Code:
Firewall $ACTION FORWARD $FWRULENO -s $CAMERA -i br0 ! -o tun2+ -j $JUMP
change to
Code:
Firewall $ACTION FORWARD $FWRULENO -s $CAMERA -i br0 ! -o tun2+ -j $JUMP
# v01.02 The following rule is belt'n'braces to explicity ensure UPnP (if still ENABLED on router) can't start a new inbound connection
if [ "$(nvram get wan_upnp_enable)" == "1" ];then
Firewall $ACTION FORWARD $FWRULENO -d $CAMERA -i $(nvram get wan0_ifname) -m state --state NEW -j $JUMP
fi