New paste Repaste Download
# Generated by iptables-save v1.4.12.2 on Fri Jan  2 12:04:37 2026
*raw
:PREROUTING ACCEPT [27800444:18906651553]
:OUTPUT ACCEPT [5976879:1458262846]
COMMIT
# Completed on Fri Jan  2 12:04:37 2026
# Generated by iptables-save v1.4.12.2 on Fri Jan  2 12:04:37 2026
*nat
:PREROUTING ACCEPT [411:70980]
:INPUT ACCEPT [233:24871]
:OUTPUT ACCEPT [338:28667]
:POSTROUTING ACCEPT [338:28667]
:DNSFILTER - [0:0]
:GAME_VSERVER - [0:0]
:LOCALSRV - [0:0]
:MAPE - [0:0]
:PCREDIRECT - [0:0]
:VPN_FUSION - [0:0]
:VPN_INPUT - [0:0]
:VSERVER - [0:0]
:VUPNP - [0:0]
[12442:618032] -A PREROUTING -i wgc5 -j VPN_INPUT
[1:72] -A POSTROUTING -o wgc5 -j MASQUERADE
[4660:1406461] -A POSTROUTING ! -s 100.92.143.13/32 -o eth4 -j MASQUERADE
[11487:559327] -A VPN_INPUT -j DNAT --to-destination 192.168.1.30
[0:0] -A VPN_INPUT -j RETURN
COMMIT
# Completed on Fri Jan  2 12:04:37 2026
# Generated by iptables-save v1.4.12.2 on Fri Jan  2 12:04:37 2026
*mangle
:PREROUTING ACCEPT [41132:6725188]
:INPUT ACCEPT [21860:3687749]
:FORWARD ACCEPT [10021:2624683]
:OUTPUT ACCEPT [14619:3191875]
:POSTROUTING ACCEPT [24642:5820078]
COMMIT
# Completed on Fri Jan  2 12:04:37 2026
# Generated by iptables-save v1.4.12.2 on Fri Jan  2 12:04:37 2026
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [112183:25081981]
:ACCESS_RESTRICTION - [0:0]
:DNSFILTER_DOT - [0:0]
:FUPNP - [0:0]
:IControls - [0:0]
:INPUT_ICMP - [0:0]
:INPUT_PING - [0:0]
:IPSEC_DROP_SUBNET_ICMP - [0:0]
:IPSEC_STRONGSWAN - [0:0]
:OUTPUT_DNS - [0:0]
:OUTPUT_IP - [0:0]
:OVPNCF - [0:0]
:OVPNCI - [0:0]
:OVPNSF - [0:0]
:OVPNSI - [0:0]
:PControls - [0:0]
:PTCSRVLAN - [0:0]
:PTCSRVWAN - [0:0]
:SECURITY - [0:0]
:VPNCF - [0:0]
:VPNCI - [0:0]
:WGCF - [0:0]
:WGCI - [0:0]
:WGNPControls - [0:0]
:WGSF - [0:0]
:WGSI - [0:0]
:default_block - [0:0]
:logaccept - [0:0]
:logdrop - [0:0]
:logdrop_dns - [0:0]
:logdrop_ip - [0:0]
[1142:81164] -A INPUT -p icmp -m icmp --icmp-type 8 -j INPUT_PING
[26597:6186350] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
[675:27072] -A INPUT -m state --state INVALID -j DROP
[147456:33281390] -A INPUT ! -i br0 -j PTCSRVWAN
[29421:3673615] -A INPUT -i br0 -j PTCSRVLAN
[0:0] -A INPUT ! -i lo -p tcp -m tcp --dport 5152 -j DROP
[29421:3673615] -A INPUT -i br0 -m state --state NEW -j ACCEPT
[146428:33217387] -A INPUT -i lo -m state --state NEW -j ACCEPT
[0:0] -A INPUT -p udp -m udp --sport 67 --dport 68 -j ACCEPT
[681:46160] -A INPUT -p icmp -j INPUT_ICMP
[1028:64003] -A INPUT -j WGSI
[1028:64003] -A INPUT -j WGCI
[3:132] -A INPUT -j OVPNSI
[3:132] -A INPUT -j OVPNCI
[3:132] -A INPUT -j DROP
[0:0] -A FORWARD -i wgc5 -j ACCEPT
[0:0] -A FORWARD -d 192.168.1.30/32 -j ACCEPT
[7648820:7114892700] -A FORWARD -j IPSEC_DROP_SUBNET_ICMP
[7648820:7114892700] -A FORWARD -j IPSEC_STRONGSWAN
[7641949:7112214133] -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
[6871:2678567] -A FORWARD -j WGSF
[6871:2678567] -A FORWARD -j OVPNSF
[0:0] -A FORWARD ! -i br0 -o eth4 -j DROP
[0:0] -A FORWARD -i br0 -o br0 -j ACCEPT
[452:21583] -A FORWARD -m state --state INVALID -j DROP
[0:0] -A FORWARD -i eth4 -j SECURITY
[0:0] -A FORWARD -m conntrack --ctstate DNAT -j ACCEPT
[0:0] -A FORWARD -i br+ -p tcp -m tcp --dport 853 -j DNSFILTER_DOT
[6419:2656984] -A FORWARD -j WGCF
[6419:2656984] -A FORWARD -j OVPNCF
[6419:2656984] -A FORWARD -j VPNCF
[6419:2656984] -A FORWARD -i br0 -j ACCEPT
[0:0] -A FORWARD -j DROP
[189061:44585510] -A OUTPUT -j OUTPUT_IP
[681:46160] -A INPUT_ICMP -p icmp -m icmp --icmp-type 8 -j RETURN
[0:0] -A INPUT_ICMP -p icmp -m icmp --icmp-type 13 -j RETURN
[0:0] -A INPUT_ICMP -p icmp -j ACCEPT
[0:0] -A INPUT_PING -i eth4 -p icmp -j DROP
[0:0] -A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 1/sec -j RETURN
[0:0] -A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
[0:0] -A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 1/sec -j RETURN
[0:0] -A SECURITY -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -j DROP
[0:0] -A SECURITY -p icmp -m icmp --icmp-type 8 -m limit --limit 1/sec -j RETURN
[0:0] -A SECURITY -p icmp -m icmp --icmp-type 8 -j DROP
[0:0] -A SECURITY -j RETURN
[0:0] -A WGCF -o wgc5 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
[0:0] -A WGCF -o wgc5 -j ACCEPT
[0:0] -A WGCF -i wgc5 -j ACCEPT
[1025:63871] -A WGCI -i wgc5 -j ACCEPT
[0:0] -A logaccept -m state --state NEW -j LOG --log-prefix "ACCEPT " --log-tcp-sequence --log-tcp-options --log-ip-options
[0:0] -A logaccept -j ACCEPT
[0:0] -A logdrop -m state --state NEW -j LOG --log-prefix "DROP " --log-tcp-sequence --log-tcp-options --log-ip-options
[0:0] -A logdrop -j DROP
[0:0] -A logdrop_dns -j LOG --log-prefix "DROP_DNS " --log-tcp-sequence --log-tcp-options --log-ip-options
[0:0] -A logdrop_dns -j DROP
[0:0] -A logdrop_ip -j LOG --log-prefix "DROP_IP " --log-tcp-sequence --log-tcp-options --log-ip-options
[0:0] -A logdrop_ip -j DROP
COMMIT
# Completed on Fri Jan  2 12:04:37 2026
Filename: None. Size: 5kb. View raw, , hex, or download this file.

This paste expires on 2026-01-09 18:44:28.872010+00:00. Pasted through web.