PassLAN InterfaceIPv4Any protocolVPN alias sourceAny destinationAny portVPN Gateway
BlockLAN interfaceIPv4Any protocolVPN alias sourceAny destinationAny portDefault gateway
VPN interfaceIPv4Any protocolVPN alias sourceAny destinationTranslation/target interface address
VPN interfaceIPv4TCP/UDPAny destinationDestination port alias (Port opened at Mullvad)Redirect to single host IPRedirect to targe port HTTPNAT reflection onAdd associated filter rule
Capture output10:32:21.481369 AF IPv4 (2), length 52: (tos 0x0, ttl 118, id 50601, offset 0, flags [none], proto UDP (17), length 48) 41.220.30.38.17052 > 10.11.0.7.31353: [udp sum ok] UDP, length 2010:32:21.481451 AF IPv4 (2), length 52: (tos 0x0, ttl 117, id 50601, offset 0, flags [none], proto UDP (17), length 48) 41.220.30.38.17052 > 192.168.1.211.31353: [udp sum ok] UDP, length 2010:32:22.128435 AF IPv4 (2), length 64: (tos 0x0, ttl 58, id 20939, offset 0, flags [DF], proto TCP (6), length 60) 34.73.85.159.57694 > 10.11.0.7.31353: Flags [S], cksum 0x7efc (correct), seq 145608005, win 28400, options [mss 1357,sackOK,TS val 170368142 ecr 0,nop,wscale 7], length 010:32:22.128506 AF IPv4 (2), length 64: (tos 0x0, ttl 57, id 20939, offset 0, flags [DF], proto TCP (6), length 60) 34.73.85.159.57694 > 192.168.1.211.31353: Flags [S], cksum 0xc692 (correct), seq 145608005, win 28400, options [mss 1357,sackOK,TS val 170368142 ecr 0,nop,wscale 7], length 010:32:22.240453 AF IPv4 (2), length 64: (tos 0x0, ttl 56, id 55812, offset 0, flags [DF], proto TCP (6), length 60) 69.136.134.174.31886 > 10.11.0.7.31353: Flags [S], cksum 0xb8bb (correct), seq 2722786196, win 65535, options [mss 1357,sackOK,TS val 49000848 ecr 0,nop,wscale 8], length 010:32:22.240523 AF IPv4 (2), length 64: (tos 0x0, ttl 55, id 55812, offset 0, flags [DF], proto TCP (6), length 60) 69.136.134.174.31886 > 192.168.1.211.31353: Flags [S], cksum 0x0052 (correct), seq 2722786196, win 65535, options [mss 1357,sackOK,TS val 49000848 ecr 0,nop,wscale 8], length 0
$ nmap -p 31353 185.65.134.166Starting Nmap 7.40 ( https://nmap.org ) at 2019-06-28 08:32 UTCNmap scan report for 185.65.134.166Host is up (0.093s latency).PORT STATE SERVICE31353/tcp filtered unknownNmap done: 1 IP address (1 host up) scanned in 1.06 seconds