6 # Uncomment this line to disable ipv6 rules
7 # option disable_ipv6 1
29 # We need to accept udp packets on port 68,
30 # see https://dev.openwrt.org/ticket/4108
42 option icmp_type echo-request
46 # Allow essential incoming IPv6 ICMP traffic
50 list icmp_type echo-request
51 list icmp_type destination-unreachable
52 list icmp_type packet-too-big
53 list icmp_type time-exceeded
54 list icmp_type bad-header
55 list icmp_type unknown-header-type
56 list icmp_type router-solicitation
57 list icmp_type neighbour-solicitation
62 # Allow essential forwarded IPv6 ICMP traffic
67 list icmp_type echo-request
68 list icmp_type destination-unreachable
69 list icmp_type packet-too-big
70 list icmp_type time-exceeded
71 list icmp_type bad-header
72 list icmp_type unknown-header-type
77 # include a file with users custom iptables rules
79 option path /etc/firewall.user
82 ### EXAMPLE CONFIG SECTIONS
83 # do not allow a specific ip to access wan
86 # option src_ip 192.168.45.2
89 # option target REJECT
91 # block a specific mac on wan
94 # option src_mac 00:11:22:33:44:66
95 # option target REJECT
97 # block incoming ICMP traffic on a zone
103 # port redirect port coming in on wan to lan
106 # option src_dport 80
108 # option dest_ip 192.168.16.235
109 # option dest_port 80
112 # port redirect of remapped ssh port (22001) on wan
115 # option src_dport 22001
117 # option dest_port 22
120 # allow IPsec/ESP and ISAKMP passthrough
124 # option protocol esp
125 # option target ACCEPT
130 # option src_port 500
131 # option dest_port 500
133 # option target ACCEPT
135 ### FULL CONFIG SECTIONS
138 # option src_ip 192.168.45.2
139 # option src_mac 00:11:22:33:44:55
142 # option dest_ip 194.25.2.129
143 # option dest_port 120
145 # option target REJECT
149 # option src_ip 192.168.45.2
150 # option src_mac 00:11:22:33:44:55
151 # option src_port 1024
152 # option src_dport 80
153 # option dest_ip 194.25.2.129
154 # option dest_port 120