Sep 25, 2018
Jun 05, 2019 OpenWrt Project: Netfilter In OpenWrt Currently, the most maintainable mechanism in OpenWrt is to add rules to a new chain in the WAN zone in /etc/firewall.user iptables -N spam_block iptables -A forwarding_rule -j spam_block iptables -t filter -A spam_block -s 103.110.144.0/22 -p tcp -m tcp --dport 25 -j DROP iptables -t filter -A spam_block -s 114.67.64.0/18 -p tcp -m tcp --dport [firewall3] some rules from firewall.user are - OpenWrt
Anything goes: Enable remote SSH access on OpenWRT 10.03.1 …
Jun 05, 2019 OpenWrt Project: Netfilter In OpenWrt Currently, the most maintainable mechanism in OpenWrt is to add rules to a new chain in the WAN zone in /etc/firewall.user iptables -N spam_block iptables -A forwarding_rule -j spam_block iptables -t filter -A spam_block -s 103.110.144.0/22 -p tcp -m tcp --dport 25 -j DROP iptables -t filter -A spam_block -s 114.67.64.0/18 -p tcp -m tcp --dport
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Share Alike 4.0 International CC Attribution-Share Alike 4.0 International
On OpenWRT custom firewall rules can be defined in /etc/firewall.user. Before creating rules we need some method to create and (easily) maintain IP/MAC pairs. I decided t use /etc/ethers and /etc/hosts that already contains MACs, hostnames nad IPs (used by dnsmasq). On my router I have /etc/ethers in format: Anything goes: Enable remote SSH access on OpenWRT 10.03.1 …