# Generated by iptables-save v1.3.8 on Mon Aug 18 18:16:16 2014
*nat
REROUTING ACCEPT [740576:57354976]
OSTROUTING ACCEPT [1507455:180160469]
UTPUT ACCEPT [1166:192905]
:WANPREROUTING - [0:0]
-A PREROUTING -d 79.173.10.90 -j WANPREROUTING
-A PREROUTING -d 192.168.1.0/255.255.255.0 -i vlan2 -j DROP
-A PREROUTING -d 192.168.2.0/255.255.255.0 -i vlan2 -j DROP
-A POSTROUTING -o vlan2 -j MASQUERADE
-A POSTROUTING -s 192.168.1.0/255.255.255.0 -d 192.168.1.0/255.255.255.0 -o br0 -j SNAT --to-source 192.168.1.1
-A POSTROUTING -s 192.168.2.0/255.255.255.0 -d 192.168.2.0/255.255.255.0 -o br1 -j SNAT --to-source 192.168.2.1
-A WANPREROUTING -p icmp -j DNAT --to-destination 192.168.1.1
-A WANPREROUTING -j TRIGGER --trigger-proto --trigger-match 0-0 --trigger-relate 0-0
-A WANPREROUTING -j DNAT --to-destination 192.168.1.11
COMMIT
# Completed on Mon Aug 18 18:16:16 2014
# Generated by iptables-save v1.3.8 on Mon Aug 18 18:16:16 2014
*mangle
REROUTING ACCEPT [35824888:22558149737]
:INPUT ACCEPT [86762:23642717]
:FORWARD ACCEPT [35670503:22523801100]
UTPUT ACCEPT [19032:6419417]
OSTROUTING ACCEPT [35681784:22529463576]
-A PREROUTING -i vlan2 -j DSCP --set-dscp 0x00
-A PREROUTING -s 192.168.2.0/255.255.255.0 -j MARK --set-mark 0x1f5
-A POSTROUTING -d 192.168.2.0/255.255.255.0 -j MARK --set-mark 0x191
COMMIT
# Completed on Mon Aug 18 18:16:16 2014
# Generated by iptables-save v1.3.8 on Mon Aug 18 18:16:16 2014
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
UTPUT ACCEPT [1842:234136]
:logdrop - [0:0]
:logreject - [0:0]
:monitor - [0:0]
:shlimit - [0:0]
:triggers - [0:0]
:wanin - [0:0]
:wanout - [0:0]
-A INPUT -m state --state INVALID -j DROP
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j shlimit
-A INPUT -i lo -j ACCEPT
-A INPUT -i br0 -j ACCEPT
-A INPUT -i br1 -j ACCEPT
-A INPUT -p icmp -m limit --limit 1/sec -j ACCEPT
-A INPUT -p udp -m udp --dport 33434:33534 -m limit --limit 5/sec -j ACCEPT
-A INPUT -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -j logdrop
-A INPUT -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT
-A FORWARD -m account --aaddr 192.168.1.0/255.255.255.0 --aname lan
-A FORWARD -m account --aaddr 192.168.2.0/255.255.255.0 --aname lan1
-A FORWARD -i br0 -o br0 -j ACCEPT
-A FORWARD -i br1 -o br1 -j ACCEPT
-A FORWARD -m state --state INVALID -j DROP
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o vlan2 -j monitor
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i br0 -o br1 -j DROP
-A FORWARD -i br1 -o br0 -j DROP
-A FORWARD -i vlan2 -j wanin
-A FORWARD -o vlan2 -j wanout
-A FORWARD -i br0 -j ACCEPT
-A FORWARD -i br1 -j ACCEPT
-A FORWARD -d 192.168.1.11 -o br0 -j ACCEPT
-A logdrop -m state --state NEW -m limit --limit 1/sec -j LOG
-A logdrop -j DROP
-A logreject -m limit --limit 1/sec -j LOG
-A logreject -p tcp -j REJECT --reject-with tcp-reset
-A monitor -p tcp -m webmon --max_domains 2000 --max_searches 2000 -j RETURN
-A monitor -p tcp -m webmon --max_domains 300 --max_searches 300
-A monitor -p tcp -m webmon --max_domains 300 --max_searches 300
-A monitor -p tcp -m webmon --max_domains 300 --max_searches 300
-A monitor -p tcp -m webmon --max_domains 300 --max_searches 300
-A monitor -p tcp -m webmon --max_domains 300 --max_searches 300
-A shlimit -m recent --set --name shlimit --rsource
-A shlimit -m recent --update --seconds 60 --hitcount 4 --name shlimit --rsource -j logdrop
-A triggers -p tcp -m tcp --dport 10101 -j TRIGGER --trigger-proto tcp --trigger-match 10101-10101 --trigger-relate 10101-10101
-A wanin -j TRIGGER --trigger-proto --trigger-match 0-0 --trigger-relate 0-0
-A wanout -j triggers
COMMIT
# Completed on Mon Aug 18 18:16:16 2014