firewall { all-ping enable broadcast-ping disable group { address-group PBX { address 46.31.87.108 description "PBX Servers" } network-group Pulborough { network 192.168.13.0/24 } network-group Southwater { network 192.168.14.0/24 network 192.168.101.0/24 } port-group IMAP { description "IMAP port" port 143 } port-group OpenVPN { description "OpenVPN server port" port 1194 } port-group SSH { port 22 } port-group VOIP { description "VOIP ports" port 5060 port 35300 } port-group https { description "HTTPS ports" port 443 } port-group smtp { description "SMTP port" port 2525 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to Internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description "Allow ICMP" log disable protocol icmp } rule 30 { action accept description "ssh to laptop" destination { group { port-group SSH } } log disable protocol tcp } rule 40 { action accept description "Allow VOIP" destination { group { port-group VOIP } } source { group { address-group PBX } } } rule 50 { action accept description "IMAP to aserver" destination { address 192.168.14.1 group { port-group IMAP } } log disable protocol tcp source { group { port-group IMAP } } } rule 60 { action accept description "OpenVPN connection" destination { address 192.168.14.2 group { port-group OpenVPN } } log disable protocol tcp_udp source { group { port-group OpenVPN } } } rule 100 { action drop description "Drop invalid state" state { invalid disable } } } name WAN_LOCAL { default-action drop description "WAN to Router traffic" rule 10 { action accept description "Allow established/related" log disable state { established enable related enable } } rule 20 { action drop description "Drop Invalid state" state { invalid enable } } rule 30 { action accept description "Allow ICMP" log disable protocol icmp } rule 40 { action accept description "Allow SSH" destination { port 22 } limit { burst 1 rate 10/minute } log disable protocol tcp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description "House Internet" duplex auto speed auto vif 200 { address 10.0.1.1/24 description "House network" } } ethernet eth1 { description LAN duplex auto speed auto vif 1 { address 192.168.14.254/24 description "Default LAN" } vif 101 { address 192.168.101.254/24 description "101 Network" } } ethernet eth2 { duplex auto speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { duplex auto speed auto } ethernet eth5 { duplex auto speed auto } ethernet eth6 { duplex auto speed auto } ethernet eth7 { address 88.127.232.10/30 description "Internet - 88.127.214.0/28 range" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } loopback lo { } pseudo-ethernet peth0 { address 88.127.214.1/28 address 88.127.214.2/28 firewall { in { name WAN_IN } local { name WAN_LOCAL } } link eth7 } } protocols { ospf { area 0.0.0.0 { network 10.0.0.0/30 network 192.168.14.0/24 network 192.168.101.0/24 } parameters { abr-type cisco router-id 192.168.14.254 } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative enable subnet 192.168.14.0/24 { default-router 192.168.14.254 dns-server 192.168.14.254 lease 86400 ntp-server 192.168.14.254 start 192.168.14.21 { stop 192.168.14.200 } time-server 192.168.14.254 } } shared-network-name VLAN101 { authoritative disable subnet 192.168.101.0/24 { default-router 192.168.101.254 dns-server 192.168.101.254 lease 600 ntp-server 192.168.101.254 start 192.168.101.21 { stop 192.168.101.200 } time-server 192.168.101.254 } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth1 listen-on eth1.1 listen-on eth1.101 name-server 8.8.8.8 name-server 8.8.4.4 } } gui { http-port 80 https-port 443 older-ciphers enable } mdns { reflector } nat { rule 10 { description "PBX SIP" destination { address 88.127.214.3 port 5060 } inbound-interface eth0 inside-address { address 192.168.101.1 port 5060 } protocol tcp_udp type destination } rule 11 { description "PBX RTP" destination { address 88.127.214.3 port 35300 } inbound-interface eth0 inside-address { address 192.168.101.1 port 35300 } protocol tcp_udp type destination } rule 5010 { description "Masquerade for WAN" outbound-interface eth7 type masquerade } } ssh { port 22 protocol-version v2 } upnp { listen-on eth1.1 { outbound-interface eth7 } listen-on eth1.101 { outbound-interface eth7 } } } system { conntrack { modules { sip { disable } } } gateway-address 87.127.232.9 host-name Southwater-192-168-14-254 login { banner { pre-login "\n*********************************\nThis is the SOUTHWATER router\n\nUnauthorised access is prohibited\n*********************************\n\n" } user admin { authentication { encrypted-password **************** plaintext-password **************** } level admin } } name-server 192.168.1.254 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec enable } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/London traffic-analysis { dpi enable export enable } } [edit]
My setup as it stands.