Terminal vt102 detected, using multiline input mode
[admin@RouTer] > interface
[admin@RouTer] interface> pr
Flags: X - disabled, D - dynamic, R - running
NAME TYPE RX-RATE TX-RATE MTU
0 R ether1 ether 0 0 1500
1 R ether2 ether 0 0 1500
2 R pptp-in1 pptp-in 0 0 1400
3 pptp-in2 pptp-in 0 0
[admin@RouTer] interface> /
[admin@RouTer] > ip firewall filter
[admin@RouTer] ip firewall filter> pr
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; NETBIOS block
chain=forward protocol=tcp dst-port=135 action=drop
1 ;;; To deny acces to the router via Telnet (protocol TCP, port 23), type >
following command:
chain=input protocol=tcp dst-port=23 action=drop
2 X ;;; To only allow not more than 5 simultaneous connections from each of t>
clients, do the following:
chain=forward protocol=tcp tcp-flags=syn connection-limit=6,32
action=drop
3 ;;; Drop Invalid connections
chain=input connection-state=invalid action=drop
4 ;;; Allow Established connections
chain=input connection-state=established action=accept
5 ;;; Allow UDP
chain=input protocol=udp action=accept
6 ;;; Allow ICMP
chain=input protocol=icmp action=accept
7 ;;; Allow access to router from known network
chain=input src-address=192.168.1.0/24 action=accept
8 ;;; Drop anything else
chain=input action=drop
9 ;;; drop invalid connections
chain=forward protocol=tcp connection-state=invalid action=drop
10 ;;; allow already established connections
chain=forward connection-state=established action=accept
11 ;;; allow related connections
chain=forward connection-state=related action=accept
12 chain=forward src-address=0.0.0.0/8 action=drop
13 chain=forward dst-address=0.0.0.0/8 action=drop
14 chain=forward src-address=127.0.0.0/8 action=drop
15 chain=forward dst-address=127.0.0.0/8 action=drop
16 chain=forward src-address=224.0.0.0/3 action=drop
17 chain=forward dst-address=224.0.0.0/3 action=drop
18 chain=forward protocol=tcp action=jump jump-target=tcp
19 chain=forward protocol=udp action=jump jump-target=udp
20 chain=forward protocol=icmp action=jump jump-target=icmp
21 ;;; deny TFTP
chain=tcp protocol=tcp dst-port=69 action=drop
22 ;;; deny RPC portmapper
chain=tcp protocol=tcp dst-port=111 action=drop
23 ;;; deny RPC portmapper
chain=tcp protocol=tcp dst-port=135 action=drop
24 ;;; deny NBT
chain=tcp protocol=tcp dst-port=137-139 action=drop
25 ;;; deny cifs
chain=tcp protocol=tcp dst-port=445 action=drop
26 ;;; deny NFS
chain=tcp protocol=tcp dst-port=2049 action=drop
27 ;;; deny NetBus
chain=tcp protocol=tcp dst-port=12345-12346 action=drop
28 ;;; deny NetBus
chain=tcp protocol=tcp dst-port=20034 action=drop
29 ;;; deny BackOriffice
chain=tcp protocol=tcp dst-port=3133 action=drop
30 ;;; deny DHCP
chain=tcp protocol=tcp dst-port=67-68 action=drop
31 ;;; deny TFTP
chain=udp protocol=udp dst-port=69 action=drop
32 ;;; deny PRC portmapper
chain=udp protocol=udp dst-port=111 action=drop
33 ;;; deny PRC portmapper
chain=udp protocol=udp dst-port=135 action=drop
34 ;;; deny NBT
chain=udp protocol=udp dst-port=137-139 action=drop
35 ;;; deny NFS
chain=udp protocol=udp dst-port=2049 action=drop
36 ;;; deny BackOriffice
chain=udp protocol=udp dst-port=3133 action=drop
37 ;;; drop invalid connections
chain=icmp protocol=icmp icmp-options=0:0 action=accept
38 ;;; allow established connections
chain=icmp protocol=icmp icmp-options=3:0 action=accept
39 ;;; allow already established connections
chain=icmp protocol=icmp icmp-options=3:1 action=accept
40 ;;; allow source quench
chain=icmp protocol=icmp icmp-options=4:0 action=accept
41 ;;; allow echo request
chain=icmp protocol=icmp icmp-options=8:0 action=accept
42 ;;; allow time exceed
chain=icmp protocol=icmp icmp-options=11:0 action=accept
43 ;;; allow parameter bad
chain=icmp protocol=icmp icmp-options=12:0 action=accept
44 ;;; deny all other types
chain=icmp action=drop
45 chain=input in-interface=pptp-in1 action=accept
46 chain=output out-interface=pptp-in1 action=accept
47 chain=input src-address=192.168.1.0/24 action=accept
[admin@RouTer] ip firewall filter>
[admin@RouTer] > ip firewall nat
[admin@RouTer] ip firewall nat> pr
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat out-interface=ether2 action=masquerade
1 chain=dstnat in-interface=ether2 dst-address=62.x.x.x protocol=tcp
dst-port=0-65535 action=dst-nat to-addresses=192.168.1.10
to-ports=0-65535
2 chain=dstnat in-interface=ether2 dst-address=62.x.x.x protocol=udp
dst-port=0-65535 action=dst-nat to-addresses=192.168.1.10
to-ports=0-65535
3 chain=dstnat in-interface=ether2 dst-address=62.x.x.x protocol=gre
dst-port=0-65535 action=dst-nat to-addresses=192.168.1.10
to-ports=0-65535
4 chain=dstnat in-interface=pptp-in1 src-address=192.168.1.0/24
action=dst-nat to-addresses=192.168.1.10 to-ports=0-65535
5 chain=srcnat out-interface=pptp-in1 src-address=192.168.1.0/24
action=src-nat to-addresses=62.x.x.x to-ports=0-65535
[admin@RouTer] ip firewall nat>