# iptables -nL
Chain INPUT (policy DROP)
target prot opt source destination
AS0_ACCEPT tcp --
0.0.0.0/0 201.217.4X.17X state NEW tcp dpt:915
AS0_ACCEPT tcp --
0.0.0.0/0 201.217.4X.17X state NEW tcp dpt:914
AS0_ACCEPT udp --
0.0.0.0/0 201.217.4X.17X state NEW udp dpt:917
AS0_ACCEPT udp --
0.0.0.0/0 201.217.4X.17X state NEW udp dpt:916
AS0_WEBACCEPT tcp --
0.0.0.0/0 201.217.4X.17X state NEW tcp dpt:943
ACCEPT tcp -- 201.217.1.230
0.0.0.0/0 tcp dpt:53
ACCEPT udp -- 201.217.1.230
0.0.0.0/0 udp dpt:53
ACCEPT tcp -- 201.217.1.230
0.0.0.0/0 tcp spt:53
ACCEPT udp -- 201.217.1.230
0.0.0.0/0 udp spt:53
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:25
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:25
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:110
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:143
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:443
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:465
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:465
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:993
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:995
ACCEPT tcp --
0.0.0.0/0 201.217.55.1X tcp dpt:10000
ACCEPT tcp --
0.0.0.0/0 201.217.4X.17X tcp dpt:8000
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT tcp --
0.0.0.0/0 201.217.1.230 tcp dpt:53
ACCEPT udp --
0.0.0.0/0 201.217.1.230 udp dpt:53
ACCEPT tcp --
0.0.0.0/0 201.217.1.230 tcp spt:53
ACCEPT udp --
0.0.0.0/0 201.217.1.230 udp spt:53
Chain ALLOWIN (1 references)
target prot opt source destination
Chain ALLOWOUT (1 references)
target prot opt source destination
Chain AS0_ACCEPT (7 references)
target prot opt source destination
Chain AS0_DNS (2 references)
target prot opt source destination
Chain AS0_IN (3 references)
target prot opt source destination
Chain AS0_IN_POST (2 references)
target prot opt source destination
Chain AS0_IN_PRE (2 references)
target prot opt source destination
Chain AS0_OUT (2 references)
target prot opt source destination
Chain AS0_OUT_LOCAL (1 references)
target prot opt source destination
Chain AS0_OUT_S2C (1 references)
target prot opt source destination
Chain AS0_U_ESOJ_IN (0 references)
target prot opt source destination
Chain AS0_U_ESOJ_OUT (0 references)
target prot opt source destination
Chain AS0_WEBACCEPT (2 references)
target prot opt source destination
Chain DENYIN (1 references)
target prot opt source destination
Chain DENYOUT (1 references)
target prot opt source destination
Chain INVALID (2 references)
target prot opt source destination
Chain INVDROP (10 references)
target prot opt source destination
Chain LOCALINPUT (1 references)
target prot opt source destination
Chain LOCALOUTPUT (1 references)
target prot opt source destination
Chain LOGDROPIN (1 references)
target prot opt source destination
LOG tcp --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *TCP_IN Blocked* '
LOG udp --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *UDP_IN Blocked* '
LOG icmp --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *ICMP_IN Blocked* '
Chain LOGDROPOUT (0 references)
target prot opt source destination
LOG tcp --
0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *TCP_OUT Blocked* '
LOG udp --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *UDP_OUT Blocked* '
LOG icmp --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *ICMP_OUT Blocked* '
Chain SYNFLOOD (1 references)
target prot opt source destination
LOG all --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *SYNFLOOD Blocked* '
Chain UDPFLOOD (1 references)
target prot opt source destination
LOG all --
0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *UDPFLOOD* '
Chain PREROUTING (policy ACCEPT 373K packets, 26M bytes)
pkts bytes target prot opt in out source destination
4 240 AS0_NAT_PRE_REL_EST all -- any any anywhere anywhere state RELATED,ESTABLISHED
Chain POSTROUTING (policy ACCEPT 41302 packets, 2834K bytes)
pkts bytes target prot opt in out source destination
4 240 AS0_NAT_POST_REL_EST all -- any any anywhere anywhere state RELATED,ESTABLISHED
29 5329 AS0_NAT_PRE all -- any any anywhere anywhere MARK match 0x2000000/0x2000000
Chain OUTPUT (policy ACCEPT 35565 packets, 2745K bytes)
pkts bytes target prot opt in out source destination
Chain AS0_DPFWD_TCP (1 references)
pkts bytes target prot opt in out source destination
0 0 DNAT tcp -- any any anywhere anywhere to:201.217.4X.17X:914
0 0 ACCEPT all -- any any anywhere anywhere
Chain AS0_DPFWD_UDP (1 references)
pkts bytes target prot opt in out source destination
0 0 DNAT udp -- any any anywhere anywhere to:201.217.4X.17X:916
0 0 ACCEPT all -- any any anywhere anywhere
Chain AS0_NAT (2 references)
pkts bytes target prot opt in out source destination
24 5024 SNAT all -- any eth1 anywhere anywhere to:192.168.0.1
0 0 SNAT all -- any eth0 anywhere anywhere to:192.168.1.10
0 0 SNAT all -- any ppp1 anywhere anywhere to:190.23.18.51
5 305 SNAT all -- any ppp0 anywhere anywhere to:190.23.151.161
0 0 ACCEPT all -- any any anywhere anywhere
Chain AS0_NAT_POST_REL_EST (1 references)
pkts bytes target prot opt in out source destination
4 240 ACCEPT all -- any any anywhere anywhere
Chain AS0_NAT_PRE (1 references)
pkts bytes target prot opt in out source destination
0 0 AS0_NAT_TEST all -- any any anywhere
10.0.0.0/8 5 305 AS0_NAT all -- any any anywhere anywhere
Chain AS0_NAT_PRE_REL_EST (1 references)
pkts bytes target prot opt in out source destination
4 240 ACCEPT all -- any any anywhere anywhere
Chain AS0_NAT_TEST (3 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any as0t+ anywhere anywhere
24 5024 AS0_NAT all -- any any anywhere anywhere
Some IP and Domains has been masked for security questions. Thanks for your understanding..