![]() I'm familiar with Access Control Lists (ACL) on a T1, but I'm not familiar with. Main: failed to read config file: novice. But don't forget, V2Ray's routing feature doesn't not only prohibit the connection, but also relays your traffic. GitHub - zw963/asuswrt-merlin-transparent-proxy: transparent proxy base on ss, v2ray, ipset, iptables, chinadns on asuswrt merlin. 2, supporting for VMess, Shadowsocks, SOCKS5 and other. ssh router openwrt proxy iptables shadowsocks dnsmasq opkg v2ray gfw ipset chinadns asuswrt-merlin ss transparent-proxy merlin ss-local ss-redir Updated Shell e2guardian / e2guardian Star 367. ![]() 78 -j RETURN # Apply Forwarding Rules TCP. These are just a few simple commands you can use with iptables, which is capable of much more. The result displayed should be uid 0 and gid 23333. ![]() iptables -A INPUT -m conntrack -ctstate ESTABLISHED,RELATED -j ACCEPT iptables -A. iptables -t nat -A V2RAY -p tcp -j RETURN -m mark -mark 0xff # Ignore LANs and any other addresses you'd like to bypass the proxy # See Wikipedia and RFC5735 for full list of reserved networks.
0 Comments
Leave a Reply. |