So this is what I see now, not counting servers where I see things like SMB, DNS, NCS, LDAP, ect. There used to be a lot more information. Hell, in a lot of cases I could see what website people were on. Facebook, Youtube, and lots of others.
Here is my config (scrubbed of course) in case that helps
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name Guest_WiFi {
default-action accept
description "VLAN 666"
rule 1 {
action drop
description "Isolate Guest VLAN"
destination {
address 10.0.1.0/24
}
log disable
protocol all
}
rule 2 {
action drop
description "Isolate Guest VLAN"
destination {
address 10.0.2.0/24
}
log disable
protocol all
}
rule 3 {
action drop
description "Isolate Guest VLAN"
destination {
address 192.168.1.0/24
}
log disable
protocol all
}
rule 4 {
action drop
description "Isolate Guest VLAN"
destination {
address 66.66.66.0/24
}
log disable
protocol all
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action accept
description "Allow **********"
log disable
protocol udp
source {
port **********
}
}
rule 30 {
action drop
application {
category Bypass-Proxies-and-Tunnels
}
description "Block Bypass Tunnels"
log disable
protocol all
state {
established enable
invalid enable
new enable
related enable
}
}
rule 40 {
action drop
application {
category P2P
}
description "Block P2P"
log disable
p2p {
all
}
protocol all
}
rule 50 {
action accept
description "Allow L2TP"
destination {
port 500,1701,4500
}
ipsec {
match-ipsec
}
log disable
protocol udp
}
rule 60 {
action accept
description "Allow L2TP"
ipsec {
match-ipsec
}
log disable
protocol esp
}
rule 70 {
action accept
description "Allow SIP"
destination {
port 5000-5500
}
log disable
protocol udp
}
rule 80 {
action drop
description "Block SSH"
destination {
port 22
}
log disable
protocol udp
}
rule 90 {
action drop
description "Block RDP"
destination {
port 3389
}
log disable
protocol udp
}
rule 100 {
action drop
application {
category TopSites-Adult
}
description "Block Topsites_Porn"
log disable
protocol all
}
rule 110 {
action drop
description "Block SQL Management"
destination {
port 1433
}
log disable
protocol udp
}
rule 120 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 1 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 2 {
action accept
description "Allow “**********"
destination {
port **********
}
log disable
protocol udp
}
rule 3 {
action accept
description "Allow PPTP"
destination {
port 1723
}
log disable
protocol tcp
}
rule 4 {
action accept
description "Allow PPTP"
log disable
protocol gre
}
rule 5 {
action accept
description "Allow L2TP"
destination {
port 500,1701,4500
}
ipsec {
match-ipsec
}
log disable
protocol udp
}
rule 6 {
action accept
description "Allow ESP"
ipsec {
match-ipsec
}
log disable
protocol esp
}
rule 7 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 8 {
action accept
description "Allow UDP Syslog"
destination {
port 514
}
log disable
protocol udp
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address **********
description "WAN In (Level 3)"
duplex full
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed 100
}
ethernet eth1 {
address 10.0.1.1/24
description "LAN VW_Local"
duplex auto
speed auto
vif 25 {
address 10.0.2.1/24
description "VoIP VLAN"
mtu 1500
}
vif 50 {
address 10.0.4.1/24
description "Production VLAN"
}
vif 666 {
address 10.0.3.1/24
description "Guest WiFi"
firewall {
local {
name Guest_WiFi
}
}
mtu 1500
}
}
ethernet eth2 {
address 192.168.1.1/24
description "LAN VW_Sec"
duplex auto
speed auto
}
ethernet eth3 {
duplex auto
speed auto
}
ethernet eth4 {
address 10.1.0.1/16
description PrimaryLAN
duplex auto
speed auto
vif 25 {
address 10.2.0.1/16
description VoiceVLAN
mtu 1500
}
vif 666 {
address 10.3.0.1/16
description GuestVLAN
mtu 1500
}
}
ethernet eth5 {
address 192.168.0.1/24
description Service
duplex auto
speed auto
}
ethernet eth6 {
duplex auto
speed auto
}
ethernet eth7 {
disable
duplex auto
speed auto
}
loopback lo {
}
}
port-forward {
auto-firewall enable
hairpin-nat disable
rule 1 {
description "**********"
forward-to {
address **********
}
original-port 1194
protocol udp
}
rule 2 {
description "**********"
forward-to {
address **********
}
original-port 50070
protocol tcp
}
wan-interface eth0
}
protocols {
static {
route *************** {
next-hop 10.0.1.17 {
description "OpenVPN Server"
distance 10
}
}
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN1 {
authoritative disable
subnet 10.0.1.0/24 {
default-router 10.0.1.1
dns-server 10.0.1.2
dns-server 10.0.1.3
lease 86400
start 10.0.1.68 {
stop 10.0.1.200
}
}
}
shared-network-name LAN2 {
authoritative disable
subnet 192.168.1.0/24 {
default-router 192.168.1.1
dns-server 192.168.1.1
lease 86400
start 192.168.1.101 {
stop 192.168.1.240
}
}
}
shared-network-name PrimaryLan {
authoritative disable
subnet 10.1.0.0/16 {
default-router 10.1.0.1
dns-server 10.1.1.2
dns-server 10.1.1.3
lease 86400
start 10.1.26.1 {
stop 10.1.254.254
}
}
}
shared-network-name VLAN25 {
authoritative disable
subnet 10.0.2.0/24 {
default-router 10.0.2.1
dns-server 10.0.1.2
lease 86400
start 10.0.2.110 {
stop 10.0.2.199
}
}
}
shared-network-name VLAN666 {
authoritative disable
subnet 10.0.3.0/24 {
default-router 10.0.3.1
dns-server 8.8.8.8
dns-server 8.8.4.4
lease 86400
start 10.0.3.50 {
stop 10.0.3.200
}
}
}
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on eth1
listen-on eth2
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5010 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
conntrack {
expect-table-size 2048
hash-size 32768
modules {
sip {
disable
}
}
table-size 262144
}
gateway-address *************
host-name **********
login {
user ************ {
authentication {
encrypted-password *********************************************************.
plaintext-password ""
}
level admin
}
}
name-server 4.2.2.1
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility auth {
level notice
}
facility protocols {
level notice
}
facility security {
level notice
}
}
host 10.0.1.25 {
facility all {
level notice
}
}
}
time-zone UTC
traffic-analysis {
dpi enable
export enable
}
}
vpn {
ipsec {
auto-firewall-nat-exclude enable
ipsec-interfaces {
interface eth0
}
nat-networks {
allowed-network 0.0.0.0/0 {
}
}
nat-traversal enable
}
l2tp {
remote-access {
authentication {
mode radius
radius-server 10.0.1.29 {
key Secret
}
}
client-ip-pool {
start 10.0.1.230
stop 10.0.1.239
}
ipsec-settings {
authentication {
mode pre-shared-secret
pre-shared-secret *******************************
}
ike-lifetime 3600
}
local-ip 10.0.1.1
outside-address **********
}
}
pptp {
remote-access {
authentication {
local-users {
username *************** {
password ***************
}
username *************** {
password ***************
}
username *************** {
password ***************
}
}
mode local
}
client-ip-pool {
start 10.0.1.240
stop 10.0.1.249
}
dns-servers {
server-1 10.0.1.2
server-2 8.8.8.8
}
mtu 1492
outside-address ************** }
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1139 */