FOR TIPS, gUIDES & TUTORIALS

subscribe to our Youtube

GO TO YOUTUBE

14455 questions

17168 answers

28195 comments

0 members

We are migrating to our new platform at https://community.teltonika.lt. Moving forward, you can continue discussions on this new platform. This current platform will be temporarily maintained for reference purposes.
+1 vote
177 views 3 comments
by anonymous
Hello

How can I get rid of the "Redirect_DNS" Rule in Firewall > Port Forwards

Each time I reboot the device the rule is recreated and/or reenabled.

Does this depend from another setting?

regards

Till

1 Answer

0 votes
by anonymous

Hello,

It is difficult to tell, what spawns the rule, without knowing your device, firmware and configuration details, but I would suggest to login to the router via SSH, enter command

  • uci show firewall

find the rule's number, then enter command below to edit custom scripts file:

  • vi /etc/rc.local

And disable the rule upon boot by adding the following lines in the file:

  • uci set firewall.<rule_num>.enabled='0'
  • uci commit
Replace <rule_num> with a number.
Otherwise, please attach a troubleshoot file by editing your question. To generate the file access router's WebUI, go to System -> Administration -> Troubleshoot section and download troubleshoot file from there.

Best regards,
by anonymous

Thanks for Your swift answer, troubleshoot file is attached now wink

by anonymous

Hello,

I was able to recreate your scenario. 

The rule is generated in relation to Web Filter package. That is the way it should work.

The rule is necessary to apply blacklisting to all the pages you have configured. 

Best regards,

by anonymous

Hi,

thank You for the answer.

I disabled site blocking and it made the trick.wink

This means site blocking is dns based and not based on http header inspection?!

BTW, integrated the blocklist in my external dns and now everything works as expected.

cheers

Till