Edit: I do have the WAN row in the firewall set to drop already. Edit2: I read UPnP relies on UDP Port 1900 to make 1st contact, so I made a Traffic Rule to drop UDP Port 1900 and that fixes the detectable port, but I still would like to know how to find and configure and (prolly) disable UPnP.
08.08.2016 · Using REJECT is also a give-away that a packet filtering firewall is in place. DROP When a DROP rule is matched the firewall discards the packet and sends no response back to the source host that sent the packet. The host originating the connection will continue to wait for a response until a timeout occurs.
As a general rule, use REJECT when you want the other end to know the port is unreachable' use DROP for connections to hosts you don't want people to see.
16.12.2021 · Do not add DROP INVALID rules, if masquerading is used. The DROP rules are supposed to prevent NAT leakage (see commit in firewall3). mtu_fix: boolean : no : 0: Enable MSS clamping for outgoing zone traffic. input: string : no : DROP: Default policy (ACCEPT, REJECT, DROP) for incoming zone traffic. forward: string : no : DROP
16.01.2018 · but by default openwrt is configured to reject connections from outside to inside (except ping/icmp stuff which is inoffensive), so applying a profile or template or specific role for devices that connect wan to internet would be enough (?).