Here's a stripped down version of my config: admin@stig-home:~$ show configuration firewall { group { network-group BOGONS { network 10.0.0.0/8 network 100.64.0.0/10 network 127.0.0.0/8 network 169.254.0.0/16 network 172.16.0.0/12 network 192.0.0.0/24 network 192.0.2.0/24 network 192.168.0.0/16 network 198.18.0.0/15 network 198.51.100.0/24 network 203.0.113.0/24 network 224.0.0.0/4 network 240.0.0.0/4 } } ipv6-name WANv6_IN { default-action drop description "WAN inbound traffic forwarded to LAN" enable-default-log rule 10 { action accept description "Allow established/related sessions" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } ipv6-name WANv6_LOCAL { default-action drop description "WAN inbound traffic to the router" enable-default-log rule 10 { action accept description "Allow established/related sessions" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow IPv6 icmp" protocol ipv6-icmp } rule 40 { action accept description "allow dhcpv6" destination { port 546 } protocol udp source { port 547 } } } name LAN_IN { default-action accept rule 1 { action drop description "drop invalid state" state { invalid enable } } } name WAN_IN { default-action drop enable-default-log rule 10 { action accept description "allow estabished" state { established enable related enable } } rule 20 { action drop description "drop invalid" state { invalid enable } } } name WAN_LOCAL { default-action drop description "To router from WAN" enable-default-log rule 10 { action accept description "allow established" state { established enable related enable } } rule 20 { action drop description "drop invalid" state { invalid enable } } rule 30 { action accept description "allow icmp" protocol icmp } rule 80 { action drop description "drop bogon source" source { group { network-group BOGONS } } } } interfaces { ethernet eth0 { address dhcp description WAN dhcp-options { name-server no-update } dhcpv6-pd { pd 0 { interface eth1 { host-address ::1 prefix-id :1 service slaac } interface eth2 { host-address ::1 prefix-id :2 service slaac } interface eth3 { host-address ::1 prefix-id :3 service slaac } prefix-length /60 } rapid-commit enable } firewall { in { ipv6-name WANv6_IN name WAN_IN } local { ipv6-name WANv6_LOCAL name WAN_LOCAL } } } ethernet eth1 { address 172.16.1.1/24 description LAN firewall { in { name LAN_IN } } } ethernet eth2 { address 172.16.2.1/24 description "PoE for UAP-Pro" firewall { in { name LAN_IN } } poe { output 48v } } ethernet eth3 { address 172.16.3.1/24 description "PoE for UAP-AC" firewall { in { name LAN_IN } } poe { output 48v } } ethernet eth4 { disable } switch switch0 { mtu 1500 } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN-net { authoritative enable subnet 172.16.1.0/24 { default-router 172.16.1.1 dns-server 172.16.1.1 lease 86400 start 172.16.1.10 { stop 172.16.1.50 } } } shared-network-name LAN2 { authoritative enable subnet 172.16.3.0/24 { default-router 172.16.3.1 dns-server 172.16.3.1 dns-server 8.8.8.8 lease 86400 start 172.16.3.10 { stop 172.16.3.100 } } } shared-network-name UniFi { authoritative enable subnet 172.16.2.0/24 { default-router 172.16.2.1 dns-server 172.16.2.1 lease 86400 start 172.16.2.2 { stop 172.16.2.254 } } } } dns { forwarding { cache-size 150 listen-on eth1 listen-on eth2 listen-on eth3 } } gui { https-port 443 } nat { rule 5000 { description "masq to WAN" outbound-interface eth0 type masquerade } } ssh { } ubnt-discover { interface eth0 { disable } } } system { config-management { commit-revisions 50 } host-name stig-home login { user admin { authentication { encrypted-password xxxxxxxxxxxxxxxxxxxxxxxxxxx } level admin } user oper { authentication { encrypted-password xxxxxxxxxxxxxxxxxxxxxxxxxxx } level operator } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.vyatta.pool.ntp.org { } server 1.vyatta.pool.ntp.org { } server 2.vyatta.pool.ntp.org { } server 3.vyatta.pool.ntp.org { } } offload { ipsec enable ipv4 { forwarding enable } ipv6 { forwarding enable } } package { repository wheezy { components "main contrib non-free" description wheezy distribution wheezy url http://http.us.debian.org/debian } repository wheezy-security { components main distribution wheezy/updates url http://security.debian.org } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone US/Pacific } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@4:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.6.0.4716006.141031.1731 */