As mentioned in this thread:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify SOURCE_ROUTE { rule 10 { action modify modify { table 1 } source { address 192.168.2.250/32 } } } name WAN_IN { default-action drop description "WAN to internal" rule 20 { action accept description "Allow established/related" state { established enable related enable } } rule 30 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow Ping" destination { group { address-group ADDRv4_pppoe0 } } log disable protocol icmp } rule 20 { action accept description "Allow Nat-T for Remote VPN Server" destination { port 4500 } log enable protocol udp } rule 30 { action accept description "Allow L2TP for Remote VPN Server" destination { port 1701 } log enable protocol udp } rule 40 { action accept description "Allow IKE for Remote VPN Serve" destination { port 500 } log enable protocol udp } rule 50 { action accept description "Allow ESP for Remote VPN Server" log enable protocol esp } rule 60 { action accept description "Allow established/related" state { established enable related enable } } rule 70 { action drop description "Drop invalid state" state { invalid enable } } } options { mss-clamp { interface-type pppoe mss 1452 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { duplex auto speed auto vif 35 { description "Internet (PPPoE)" pppoe 0 { default-route auto firewall { in { modify SOURCE_ROUTE name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password ******* user-id ******* } } } ethernet eth1 { address 192.168.100.1/24 description DMZ duplex auto speed auto } ethernet eth2 { address 192.168.2.1/24 description LAN duplex auto speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { address 192.168.3.1/24 description WIFI duplex auto speed auto } loopback lo { } openvpn vtun0 { config-file /config/auth/nordvpn/us321.ovpn description "NordVPN USA321" mode client } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth2 rule 1 { description "" forward-to { address 192.168.2.100 } original-port 32400 protocol tcp_udp } rule 2 { description "" forward-to { address 192.168.2.100 } original-port 1194 protocol udp } wan-interface pppoe0 } protocols { static { table 1 { interface-route 0.0.0.0/0 { next-hop-interface vtun0 { } } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative enable subnet 192.168.100.0/24 { default-router 192.168.100.1 dns-server 192.168.100.1 lease 86400 start 192.168.100.38 { stop 192.168.100.243 } } } shared-network-name LAN2 { authoritative enable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 192.168.2.1 lease 86400 start 192.168.2.38 { stop 192.168.2.243 } static-mapping FireTv { ip-address 192.168.2.250 mac-address 0C:47:C9:C5:1A:BD } static-mapping SipuraSPA { ip-address 192.168.2.39 mac-address 00:0e:08:24:9e:54 } } } shared-network-name Wifi { authoritative disable subnet 192.168.3.0/24 { default-router 192.168.3.1 dns-server 192.168.2.1 lease 86400 start 192.168.3.10 { stop 192.168.3.100 } unifi-controller 192.168.2.52 } } use-dnsmasq disable } dns { dynamic { interface pppoe0 { service dyndns { host-name all.dnsomatic.com login mik**************@gmail.com password ************* server updates.dnsomatic.com } web dyndns } } forwarding { cache-size 1500 listen-on eth1 listen-on eth2 listen-on eth3 listen-on eth4 options listen-address=192.168.2.1 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface pppoe0 type masquerade } rule 5011 { description "VPN NAT" log disable outbound-interface vtun0 protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name ubnt login { user admin { authentication { encrypted-password $6$i8Hdwc5mYRkwhjz$S9MG2mfisbnHeHUgznlvUrRaO7bCFgWvbHagnSZuw759034PlfsXuxEukTeddkl4elOmF6V5XJWUqoyoL3o2Z. } level admin } } name-server 208.67.222.222 name-server 208.67.220.220 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec disable } package { repository wheezy { components "main contrib non-free" distribution wheezy password "" url http://http.us.debian.org/debian username "" } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/Toronto traffic-analysis { dpi enable export enable } } traffic-control { smart-queue Smart_Q { upload { ecn enable flows 1024 fq-quantum 1514 limit 10240 rate 50mbit } wan-interface pppoe0 } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.1alpha2.4931052.161116.0900 */