Completely different architecture.
www.snbforums.com
# iptables -L OVPNCF -v -n
Chain OVPNCF (1 references)
pkts bytes target prot opt in out source destination
471K 44M ACCEPT all -- * tun11 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- tun11 * 0.0.0.0/0 0.0.0.0/0
# Mark Outbound Web Services Packets from WAN to OpenVPN Client 1
#if ! iptables -t mangle -S | grep OUTPUT | grep vlan2 | grep 0x1000; then
if ! iptables -t mangle -S | grep OUTPUT | grep tun11 | grep 0x1000; then
#iptables -t mangle -I OUTPUT -o vlan2 -p tcp -s 192.168.0.2/32 -j MARK --set-mark 0x1000/0x1000
iptables -t mangle -I OUTPUT -o tun11 -p tcp -s 192.168.0.2/32 -j MARK --set-mark 0x1000/0x1000
fi
eth0 or vlan2 depending on whether hardware acceleration was enabled or disabled. The use of vlan1 and vlan2 had nothing really to do with VLANs in the traditional sense. It was required as a way of associating physical network ports with a logical network interface. On the HND routers none of that is required any more because each port is already associated with a network interface, eth0, eth1, eth2, eth3, eth4, etc.Sorry Gary I don't understand what you're doing here, probably because I haven't looked at those old routers for years.
On pre-HND routers the WAN interface was eithereth0orvlan2depending on whether hardware acceleration was enabled or disabled. The use ofvlan1andvlan2had nothing really to do with VLANs in the traditional sense. It was required as a way of associating physical network ports with a logical network interface. On the HND routers none of that is required any more because each port is already associated with a network interface, eth0, eth1, eth2, eth3, eth4, etc.
iptables -t mangle -I OUTPUT -o vlan2 -p tcp -s 192.168.0.2/32 -j MARK --set-mark 0x1000/0x1000
We use essential cookies to make this site work, and optional cookies to enhance your experience.