I'm confused by this part. If that were the case, then your Asus router's shouldn't have a 192.168.0.x as its WAN IP, but the actual ISP WAN IP. Did you configure any particular routing rules on either devices? All netmasks are left to 255.255.255.0
Sorry, I'll try to be more clear :
my initial configuration was :
[ISP's router] -> 192.168.0.x -> [ASUS] -> 192.168.1.x -> LAN
I did this for testing purposes, to be able to configure the Asus without exposing it to the Internet.
Then a few posts later, to be able to scan the Asus from grc.com, I switched the ISP's router as a simple modem, which was to be my setup, once I had validated the Asus :
[ISP's modem] -> 78.217.x.x -> [ASUS] ->192.168.x.x -> LAN
Hence, at the beginning of this thread, scanning while connected to the ISP's router allowed me to scan the WAN side of the Asus. Subsequently I made the changes mentioned to make the discussion simpler.
Make sure your phone isn't also connected to Wifi (I've seen a user previously mention having firewalling issues while testing with his phone, until he realized his phone was actually connected to his Wifi network and not 3G).
I'm pretty sure the phone is on 3G : To make sure of if, when I try to connect to the Admin page of the router from the LAN while already connected to it from my phone, I get :
"Login user IP: 37.161.xx.xx
You cannot Login unless logout another user first."
sites such as ipchicken.com show that this is effectively the external IP address of my phone, quite different from the 78.217.x.x of my DSL line, or the 192.168.x.x of my LAN.
Besides, a scan from grc.com, which is definitely out of my LAN, does confirm the opening and closing of port 80.
Also make sure it didn't automatically connect to the OpenVPN server, as that would allow your phone to totally bypass the firewall. That might explain why the issue only appears when the OpenVPN server is started.
I'm quite sure of that too : I only enabled OpenVPN server 1 on the router without further settings, I have not even installed yet the OpenVPN client on my phone.
Can you post the current firewall rules on your Asus router while you are seeing port 80 being reachable? Go to the Tools -> Run Cmd page, and run the following command:
iptables -L -v
This would confirm whether your firewall is properly working, or if it failed to properly get applied (that can happen when there is an invalid rule, for instance).
here it is, with openVPN server 1 activated, Firewall enabled, and port 80 checked available on WAN :
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- tap21 any anywhere anywhere
2378 219K ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
5 231 DROP all -- any any anywhere anywhere state INVALID
24 8879 ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED
0 0 ACCEPT all -- lo any anywhere anywhere state NEW
196 19020 ACCEPT all -- br0 any anywhere anywhere state NEW
0 0 ACCEPT udp -- any any anywhere anywhere udp spt:bootps dpt:bootpc
25 5720 DROP all -- any any anywhere anywhere
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP ipv6-auth-- br0 eth0 anywhere anywhere
0 0 ACCEPT all -- tap21 any anywhere anywhere
0 0 DROP ipv6-crypt-- br0 eth0 anywhere anywhere
0 0 DROP gre -- br0 eth0 anywhere anywhere
0 0 DROP udp -- br0 eth0 anywhere anywhere udp dpt:4500
0 0 DROP udp -- br0 eth0 anywhere anywhere udp dpt:500
0 0 DROP udp -- br0 eth0 anywhere anywhere udp dpt:1701
0 0 DROP tcp -- br0 eth0 anywhere anywhere tcp dpt:1723
52 2200 ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED
0 0 DROP all -- !br0 eth0 anywhere anywhere
0 0 DROP all -- any any anywhere anywhere state INVALID
0 0 ACCEPT all -- br0 br0 anywhere anywhere
0 0 DROP icmp -- eth0 any anywhere anywhere
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT
49 2496 ACCEPT all -- br0 any anywhere anywhere
Chain OUTPUT (policy ACCEPT 3179 packets, 3641K bytes)
pkts bytes target prot opt in out source destination
Chain FUPNP (0 references)
pkts bytes target prot opt in out source destination
Chain PControls (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any any anywhere anywhere
Chain logaccept (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- any any anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT '
0 0 ACCEPT all -- any any anywhere anywhere
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- any any anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
0 0 DROP all -- any any anywhere anywhere
Last edited: