nearlyheadlessarvie
New Around Here
Hi, in my RT-AX86U with latest firmware, 3004.388.8, SkyNet/firewall is blocking all ping requests, including outbound, resulting in Internet-Connectivity failure. Well, to be fair I don't think its because of SkyNet, because I can't ping anyting even when it's uninstalled (iptables virtually unchanged after removing skynet).
Is there any way to allow outbound PING in my firewall-start script?
(other chains removed for brevity)
Is there any way to allow outbound PING in my firewall-start script?
Bash:
iptables -vnL --line-number
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 86 4096 INPUT_PING icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
2 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 500,4500
3 0 0 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0
4 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0
5 6351 1477K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
6 279 24167 logdrop all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
7 2053 496K PTCSRVWAN all -- !br0 * 0.0.0.0/0 0.0.0.0/0
8 5200 440K PTCSRVLAN all -- br0 * 0.0.0.0/0 0.0.0.0/0
9 0 0 logdrop tcp -- !lo * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5152
10 5200 440K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0 state NEW
11 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 policy match dir in pol ipsec state NEW
12 940 234K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 state NEW
13 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
14 0 0 INPUT_ICMP icmp -- * * 0.0.0.0/0 0.0.0.0/0
15 1113 262K WGSI all -- * * 0.0.0.0/0 0.0.0.0/0
16 1113 262K WGCI all -- * * 0.0.0.0/0 0.0.0.0/0
17 1113 262K OVPNSI all -- * * 0.0.0.0/0 0.0.0.0/0
18 1113 262K OVPNCI all -- * * 0.0.0.0/0 0.0.0.0/0
19 1113 262K logdrop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 63036 23M IPSEC_DROP_SUBNET_ICMP all -- * * 0.0.0.0/0 0.0.0.0/0
2 63036 23M IPSEC_STRONGSWAN all -- * * 0.0.0.0/0 0.0.0.0/0
3 20 1440 PControls all -- br0 * 0.0.0.0/0 0.0.0.0/0 MAC 5C:62:8B:F9:7F:8E
4 0 0 PControls all -- br0 * 0.0.0.0/0 0.0.0.0/0 MAC FA:8A:15:45:02:88
5 18 2003 PControls all -- br0 * 0.0.0.0/0 0.0.0.0/0 MAC 2E:3D:E5:A6:6A:4F
6 59865 22M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
7 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 policy match dir in pol ipsec
8 3151 1316K WGSF all -- * * 0.0.0.0/0 0.0.0.0/0
9 3151 1316K OVPNSF all -- * * 0.0.0.0/0 0.0.0.0/0
10 0 0 logdrop all -- !br0 eth0 0.0.0.0/0 0.0.0.0/0
11 0 0 ACCEPT all -- br0 br0 0.0.0.0/0 0.0.0.0/0
12 112 4900 logdrop all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
13 0 0 SECURITY all -- eth0 * 0.0.0.0/0 0.0.0.0/0
14 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT
15 3039 1311K WGCF all -- * * 0.0.0.0/0 0.0.0.0/0
16 3039 1311K OVPNCF all -- * * 0.0.0.0/0 0.0.0.0/0
17 3039 1311K VPNCF all -- * * 0.0.0.0/0 0.0.0.0/0
18 3039 1311K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
19 0 0 logdrop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT_ICMP (1 references)
num pkts bytes target prot opt in out source destination
1 0 0 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
2 0 0 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 13
3 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT_PING (1 references)
num pkts bytes target prot opt in out source destination
1 0 0 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0 policy match dir in pol ipsec
2 2 64 logdrop icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0
Chain IPSEC_DROP_SUBNET_ICMP (1 references)
num pkts bytes target prot opt in out source destination
Chain IPSEC_STRONGSWAN (1 references)
num pkts bytes target prot opt in out source destination
Chain SECURITY (1 references)
num pkts bytes target prot opt in out source destination
1 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x17/0x02 limit: avg 1/sec burst 5
2 0 0 logdrop tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x17/0x02
3 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x17/0x04 limit: avg 1/sec burst 5
4 0 0 logdrop tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x17/0x04
5 0 0 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8 limit: avg 1/sec burst 5
6 0 0 logdrop icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
7 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0