Ah ok, that makes sense - Netgear running their own binary to update the rules randomly explains what I was seeing, that was the piece I was missing. Can I just run that binary myself to test changes to the firewall scripts right away then?
I’ve read it, and have used both files for years. I just didn’t read that as “this is the only way to add rules” but rather “this is how to make rules permanent”, I assumed I could still test rules with the standard ip6tables commands (so that if the rules broke something, I could just reboot...
Thanks for the updates! Just found the GitHub and started poking around :)
One thing I’m confused about:
The default rules I get when I boot up have ICMPv6 filtering:
# ip6tables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP ipv6-icmp...
We used half our monthly data allocation this week due to… I don’t know what. Is there an easy/recommended way to get more detailed usage data (per ip would be lovely) than what is offered in the Netgear UI?
Saw your other post about not getting a lot of feedback from LBR20 users and just wanted to say this is the only reason we can get a decent internet connection at our cabin in the US. Thank you @Voxel!