Packets to be dropped seem to end in filter INPUT to be discarded by the default drop rule, how to redirect them to a LAN ip to act as a catchall?
Could save some trouble every time a service changes ports, it's an outwards facing box anyway so receiving unwanted traffic is no problem, or to run a honeypot.
Something similar to
(seems the invalidity decision is also made by routing as the above rule still has 0 hits)
but how to re-dnat packets doomed by the routing decision?
Device is AC66 mips in case it makes a difference.
Could save some trouble every time a service changes ports, it's an outwards facing box anyway so receiving unwanted traffic is no problem, or to run a honeypot.
Something similar to
Code:
iptables -t nat -A PREROUTING -m state --state INVALID -j DNAT --to-destination 192.168.16.16
but how to re-dnat packets doomed by the routing decision?
Device is AC66 mips in case it makes a difference.
Last edited: