mirror of https://github.com/hak5/openwrt-owl.git
30 lines
1.1 KiB
Bash
Executable File
30 lines
1.1 KiB
Bash
Executable File
#!/bin/sh
|
|
. /etc/functions.sh
|
|
. /etc/network.overrides
|
|
[ "$FAILSAFE" != "true" -a -e /etc/config/network ] && . /etc/config/network
|
|
|
|
WAN=$(nvram get wan_ifname)
|
|
LAN=$(nvram get lan_ifname)
|
|
|
|
iptables -F input_rule
|
|
iptables -F output_rule
|
|
iptables -F forwarding_rule
|
|
iptables -t nat -F prerouting_rule
|
|
iptables -t nat -F postrouting_rule
|
|
|
|
### BIG FAT DISCLAIMER
|
|
### The "-i $WAN" literally means packets that came in over the $WAN interface;
|
|
### this WILL NOT MATCH packets sent from the LAN to the WAN address.
|
|
|
|
### Allow SSH on the WAN interface
|
|
# iptables -t nat -A prerouting_rule -i $WAN -p tcp --dport 22 -j ACCEPT
|
|
# iptables -A input_rule -i $WAN -p tcp --dport 22 -j ACCEPT
|
|
|
|
### Port forwarding
|
|
# iptables -t nat -A prerouting_rule -i $WAN -p tcp --dport 22 -j DNAT --to 192.168.1.2
|
|
# iptables -A forwarding_rule -i $WAN -p tcp --dport 22 -d 192.168.1.2 -j ACCEPT
|
|
|
|
### DMZ (should be placed after port forwarding / accept rules)
|
|
# iptables -t nat -A prerouting_rule -i $WAN -j DNAT --to 192.168.1.2
|
|
# iptables -A forwarding_rule -i $WAN -d 192.168.1.2 -j ACCEPT
|