htpc 9 Posted ... Hello All! With the help of some earlier post on this and the Gargoyle forums I was able to install AirVPN on my TP-Link 1043nd V2. To my surprise without any hit to my download and upload speeds. Mostly because they are already pretty low (10Mbit up, 1Mbit down) but still better than I expected for a pretty low spec consumer router. As far as I can say everything is working smoothly. I wasn't able to detect any leaks so far and I had no disconnects or router crashes whatsoever - even under heavy load. My questions: Do I need to change anything to the default firewall rules that are setup by Gargoyle to prevent unwanted leaks. I compared my entries to the ones provided by urbanconcrete here: https://airvpn.org/topic/15405-using-airvpn-with-openwrt/ and there are some differences. I don't know if those come form the difference in firmware or are deliberately different. Just in case here are my rules: config defaults option syn_flood '1' option input 'ACCEPT' option output 'ACCEPT' option forward 'REJECT' option force_router_dns '1' config zone option name 'lan' list network 'lan' option input 'ACCEPT' option output 'ACCEPT' option forward 'ACCEPT' config zone option name 'wan' list network 'wan' list network 'wan6' option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' option masq '1' option mtu_fix '1' config forwarding option src 'lan' option dest 'wan' config rule option name 'Allow-DHCP-Renew' option src 'wan' option proto 'udp' option dest_port '68' option target 'ACCEPT' option family 'ipv4' config rule option name 'Allow-Ping' option src 'wan' option proto 'icmp' option icmp_type 'echo-request' option family 'ipv4' option target 'ACCEPT' config rule option name 'Allow-IGMP' option src 'wan' option proto 'igmp' option family 'ipv4' option target 'ACCEPT' config rule option name 'Allow-DHCPv6' option src 'wan' option proto 'udp' option src_ip 'fe80::/10' option src_port '547' option dest_ip 'fe80::/10' option dest_port '546' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-MLD' option src 'wan' option proto 'icmp' option src_ip 'fe80::/10' list icmp_type '130/0' list icmp_type '131/0' list icmp_type '132/0' list icmp_type '143/0' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-ICMPv6-Input' option src 'wan' option proto 'icmp' list icmp_type 'echo-request' list icmp_type 'echo-reply' list icmp_type 'destination-unreachable' list icmp_type 'packet-too-big' list icmp_type 'time-exceeded' list icmp_type 'bad-header' list icmp_type 'unknown-header-type' list icmp_type 'router-solicitation' list icmp_type 'neighbour-solicitation' list icmp_type 'router-advertisement' list icmp_type 'neighbour-advertisement' option limit '1000/sec' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-ICMPv6-Forward' option src 'wan' option dest '*' option proto 'icmp' list icmp_type 'echo-request' list icmp_type 'echo-reply' list icmp_type 'destination-unreachable' list icmp_type 'packet-too-big' list icmp_type 'time-exceeded' list icmp_type 'bad-header' list icmp_type 'unknown-header-type' option limit '1000/sec' option family 'ipv6' option target 'ACCEPT' config include option path '/etc/firewall.user' option reload '1' config rule option src 'wan' option dest 'lan' option proto 'esp' option target 'ACCEPT' config rule option src 'wan' option dest 'lan' option dest_port '500' option proto 'udp' option target 'ACCEPT' config include option type 'script' option path '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall' option family 'IPv4' option reload '1' config include 'miniupnpd' option type 'script' option path '/usr/share/miniupnpd/firewall.include' option family 'any' option reload '1' config include 'openvpn_include_file' option path '/etc/openvpn.firewall' option reload '1' config zone 'vpn_zone' option name 'vpn' option network 'vpn' option input 'ACCEPT' option output 'ACCEPT' option forward 'ACCEPT' option mtu_fix '1' option masq '1' config forwarding 'vpn_lan_forwarding' option src 'lan' option dest 'vpn' config forwarding 'lan_vpn_forwarding' option src 'vpn' option dest 'lan' The second question is regarding the port forwarding - yes I did read the multiple post about it, but couldn't get it to work anyways. As far as I was able to understand I should NOT use the forwarding tool from the client area but use IP tables. I tried that but never was able to get the ports confirmed open by for example torrent clients. However speeds seem to be OK, so maybe portforwarding isn't even needed? A hope a generous soul will have a few answers for me. Quote Share this post Link to post
ulmwind 6 Posted ... You can see my manual concerning AirVPN with OpenWRT https://airvpn.org/topic/20303-airvpn-configuration-on-openwrt-preventing-traffic-leakage-outside-tunnel/ Quote Share this post Link to post