Пожалуйста
Flags: X - disabled, I - invalid, D - dynamic 0 ;;; Protect router, allow icmp chain=input action=accept protocol=icmp
1 ;;; Protect router, allow established connection chain=input action=accept connection-state=established
2 ;;; Protect router, allow related connections chain=input action=accept connection-state=related
3 ;;; Protect router, allow access to router(tcp:80) from office chain=input action=accept protocol=tcp src-address-list=Office dst-port=80
4 ;;; Protect router, allow access to router(tcp:8291) from Office chain=input action=accept protocol=tcp src-address-list=Office dst-port=8291
5 ;;; Allow Bandwidth Server TCP Port 2000 to all shops chain=input action=accept protocol=tcp dst-address=192.166.132.ХХ src-address-list=Shops in-interface=ether1 dst-port=2000
6 ;;; Allow Bandwidth Server UDP Port 2000 to all shops chain=input action=accept protocol=udp dst-address=196.166.132.ХХ src-address-list=Shops in-interface=ether1 dst-port=2000
7 ;;; Allow DNS request from Wi-Fi router chain=input action=accept protocol=udp src-address=10.10.10.2 dst-address=10.10.10.1 dst-port=53
8 ;;; Allow NTP Server chain=input action=accept protocol=udp src-address=10.10.10.2 dst-address=10.10.10.1 dst-port=123
9 ;;; Protect router, drop invalid connections chain=input action=drop connection-state=invalid
10 ;;; Protect router, drop anything else chain=input action=drop
11 ;;; Protect lan, drop invalid connections chain=forward action=drop connection-state=invalid
12 ;;; Protect lan, block bogons chain=forward action=drop src-address=0.0.0.0/8
13 ;;; Protect lan, block bogons chain=forward action=drop dst-address=0.0.0.0/8
14 ;;; Protect lan, block bogons chain=forward action=drop src-address=127.0.0.0/8
15 ;;; Protect lan, block bogons chain=forward action=drop dst-address=127.0.0.0/8
16 ;;; Protect lan, block bogons chain=forward action=drop src-address=224.0.0.0/3
17 ;;; Protect lan, block bogons chain=forward action=drop dst-address=224.0.0.0/3
18 ;;; Accept Remote Management For Wi-Fi router chain=forward action=accept protocol=tcp src-address-list=Office dst-port=5555
19 ;;; Protect lan, allow already established connections chain=forward action=accept connection-state=established
20 ;;; Protect lan, allow related connections chain=forward action=accept connection-state=related
21 ;;; IPsec tunel, allow all traffic ftom 10.100.19.0 to 10.100.26.0 chain=forward action=accept src-address=10.100.19.0/24 dst-address=10.100.26.0/24
22 ;;; IPsec tunel, allow all traffic ftom 10.100.26.0 to 10.100.19.0 chain=forward action=accept src-address=10.100.26.0/24 dst-address=10.100.19.0/24
23 ;;; allow Citrix(TCP 80, 1494, 2512, 2513, 2598, 2897) ftom 10.100.26.0 to Office chain=forward action=accept protocol=tcp src-address=10.100.26.0/24 dst-address=Office dst-port=80,1494,2512,2513,2598,2897
24 ;;; allow Citrix(UDP 1604) ftom 10.100.26.0 to Office chain=forward action=accept protocol=udp src-address=10.100.65.0/24 dst-address=Office dst-port=1604
25 ;;; ether2(IPSec port), deny connections to 10.10.10.0 chain=forward action=drop src-address=10.100.26.0/24 dst-address=10.10.10.0/3
26 ;;; ether2(IPSec port), deny any connections chain=forward action=drop src-address=10.100.26.0/24 dst-address=0.0.0.0/0
27 ;;; Protect lan, deny TFTP chain=forward action=drop protocol=tcp dst-port=69
28 ;;; Protect lan, deny RPC portmapper chain=forward action=drop protocol=tcp dst-port=111
29 ;;; Protect lan, deny RPC portmapper chain=forward action=drop protocol=tcp dst-port=135
30 ;;; Protect lan, deny NBT chain=forward action=drop protocol=tcp dst-port=137-139
31 ;;; Protect lan, deny cifs chain=forward action=drop protocol=tcp dst-port=445
32 ;;; Protect lan, deny NFS chain=forward action=drop protocol=tcp dst-port=2049
33 ;;; Protect lan, deny NetBus chain=forward action=drop protocol=tcp dst-port=12345-12346
34 ;;; Protect lan, deny NetBus chain=forward action=drop protocol=tcp dst-port=20034
35 ;;; Protect lan, deny BackOriffice chain=forward action=drop protocol=tcp dst-port=3133
36 ;;; Protect lan, deny DHCP chain=forward action=drop protocol=tcp dst-port=67-68
37 ;;; Protect lan, deny TFTP chain=forward action=drop protocol=udp dst-port=69
38 ;;; Protect lan, deny PRC portmapper chain=forward action=drop protocol=udp dst-port=111
39 ;;; Protect lan, deny PRC portmappe chain=forward action=drop protocol=udp dst-port=135
40 ;;; Protect lan, deny NBT chain=forward action=drop protocol=udp dst-port=137-139
41 ;;; Protect lan, deny NFS chain=forward action=drop protocol=udp dst-port=2049
42 ;;; Protect lan, deny BackOriffice chain=forward action=drop protocol=udp dst-port=3133
43 ;;; Wi-Fi net, rules chain=forward action=jump jump-target=Wi-Fi src-address=10.10.10.0/30
44 ;;; Wi-Fi net, drop all to 10.100.0.0 chain=Wi-Fi action=drop dst-address=10.100.0.0/16
45 ;;; Wi-Fi net, drop all p2p chain=Wi-Fi action=drop p2p=all-p2p
46 ;;; Wi-Fi net, allow to inet chain=Wi-Fi action=accept dst-address=0.0.0.0/0
47 ;;; All other forward drop chain=forward action=drop
|