Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

upnp2 and firewall

$
0
0

UPNP2 doesn't seem to be working after I put my firewall in place. It is driving me mad as it seems to stop my computer that connects to an exchange server from authorising.

 

Is there anything that I can do?

Output of show upnp2 rules:

show upnp2 rules
Firewall pin holes
 pkts bytes target     prot opt in     out     source               destination         

NAT port forwards
 pkts bytes target     prot opt in     out     source               destination         

firewall

show firewall
 all-ping enable
 broadcast-ping disable
 ipv6-name Allow-All-IPv6 {
     default-action drop
     enable-default-log
     rule 1 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         log enable
         state {
             invalid enable
         }
     }
     rule 100 {
         action accept
         protocol ipv6-icmp
     }
     rule 2000 {
         action accept
         description "Allow all traffic"
         protocol all
     }
 }
 ipv6-name Allow-EST-Drop-INV-IPv6 {
     default-action drop
     enable-default-log
     rule 1 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         log enable
         state {
             invalid enable
         }
     }
     rule 100 {
         action accept
         protocol ipv6-icmp
     }
 }
 ipv6-name LAN-Local-IPv6 {
     default-action drop
     enable-default-log
     rule 1 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         log enable
         state {
             invalid enable
         }
     }
     rule 100 {
         action accept
         protocol ipv6-icmp
     }
     rule 200 {
         action accept
         description "Allow HTTP/HTTPS"
         destination {
             port 80,443
         }
         protocol tcp
     }
     rule 600 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 700 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
     rule 800 {
         action accept
         description "Allow SSH"
         destination {
             port 22
         }
         protocol tcp
     }
 }
 ipv6-receive-redirects disable
 ipv6-src-route disable
 ip-src-route disable
 log-martians enable
 name Allow-All {
     default-action drop
     enable-default-log
     rule 1 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         log enable
         state {
             invalid enable
         }
     }
     rule 2000 {
         action accept
         description "Allow all traffic"
         protocol all
     }
 }
 name Allow-EST-Drop-INV {
     default-action drop
     enable-default-log
     rule 1 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         log enable
         state {
             invalid enable
         }
     }
 }
 name LAN-Local {
     default-action drop
     enable-default-log
     rule 1 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 2 {
         action drop
         log enable
         state {
             invalid enable
         }
     }
     rule 100 {
         action accept
         protocol icmp
     }
     rule 200 {
         action accept
         description "Allow HTTP/HTTPS"
         destination {
             port 80,443
         }
         protocol tcp
     }
     rule 600 {
         action accept
         description "Allow DNS"
         destination {
             port 53
         }
         protocol tcp_udp
     }
     rule 700 {
         action accept
         description "Allow DHCP"
         destination {
             port 67,68
         }
         protocol udp
     }
     rule 800 {
         action accept
         description "Allow SSH"
         destination {
             port 22
         }
         protocol tcp
     }
 }
 options {
     mss-clamp {
         mss 1412
     }
 }
 receive-redirects disable
 send-redirects enable
 source-validation disable
 syn-cookies enable

Zone policy

show zone-policy
 zone LAN {
     default-action drop
     from Local {
         firewall {
             ipv6-name Allow-All-IPv6
             name Allow-All
         }
     }
     from WAN {
         firewall {
             ipv6-name Allow-EST-Drop-INV-IPv6
             name Allow-EST-Drop-INV
         }
     }
     interface eth1
     interface eth2
 }
 zone Local {
     default-action drop
     from LAN {
         firewall {
             ipv6-name LAN-Local-IPv6
             name LAN-Local
         }
     }
     from WAN {
         firewall {
             ipv6-name Allow-EST-Drop-INV-IPv6
             name Allow-EST-Drop-INV
         }
     }
     local-zone
 }
 zone WAN {
     default-action drop
     from LAN {
         firewall {
             ipv6-name Allow-All-IPv6
             name Allow-All
         }
     }
     from Local {
         firewall {
             ipv6-name Allow-All-IPv6
             name Allow-All
         }
     }
     interface pppoe0
     interface eth0
 }

upnp2

show service upnp2
 listen-on eth1
 listen-on eth2
 nat-pmp disable
 secure-mode disable
 wan eth0

 

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>