Private WAN router firewall

Private WAN routers come with a firewall that restricts traffic destined to them except under certain circumstances described below.

Bonding INPUT traffic

  1. Accept traffic on the management interface, sourced from the management server VPN IP and destined for the node management VPN IP

  2. TCP configuration traffic on destination port 8003

  • Accept traffic on the management interface, sourced from the management server VPN IP and destined for the node management VPN IP (only IPv4)

  • Reject everything else on TCP destination port 8003

  1. Private WAN mesh traffic

  • Accept TCP traffic on destination port 8007

  • Accept TCP traffic on mesh veth interface and destination port 1179

  • Accept TCP traffic on agg/pwr GRE interfaces and destination ports 1179 or 179

  • Accept ESP traffic

  • Accept GRE traffic

Other INPUT traffic

  1. Accept any packets matching rules defined on the management server

  2. Accept all traffic on eth0 that is sourced from 10.207.35.248/29 for local troubleshooting access

  3. Accept all traffic on eth0 that is sourced from 192.168.1.0/24 for legacy local troubleshooting access

  4. Accept all ICMP and ICMPv6 traffic

  5. Accept all traffic from established/related connections

  6. Reject everything else

Note

Nftables is exclusively used on nodes version 6.6 and higher, see Firewall management for more information

Note

More firewall customization options are available and documented here: