Hola a todos.
Despues de mucho leer y buscar por el foro y gracias a vuestra ayuda he conseguido configurar un poco el router.
He compilado el firmware y he instalado el script 18 de Noltari. Funciona perfecto.
Con respecto a la VPN que es donde tengo problemas. He instalado OpenVPN siguiendo el tutorial de
ppfdez en el post 445 a 447.
Pero tengo varios problemas con la red. Me puedo conectar desde el wifi poniendo la red interna 192.168.1.1 y también puedo conectarme desde 3g con el movil cambiando la ip de acceso al servidor noip.com. Me autentifica y me da IP, puedo entrar a los equipos que tengo conectados en mi red en los dos supuestos. Pero no tengo acceso a internet y tampoco al VOIP. Ni en casa ni fuera. He buscado bastante pero no doy con la tecla.
Lo que busco es poder conectarme a mi Red desde fuera de casa, poder entrar al NAS (con OPENMEDIAVAULT), recibir llamadas de VOIP, y tambien conectarme al udpxy para ver movistar TV. (quiza sea demasiado

)
Os dejo los ficheros de configuracion que tengo.
>>>etc/config/openvpn
config openvpn 'VPN'
option enabled '1'
option port '1194'
option proto 'udp'
option dev 'tun'
option 'ca' '/etc/easy-rsa/keys/ca.crt'
option 'cert' '/etc/easy-rsa/keys/VPN.crt'
option 'key' '/etc/easy-rsa/keys/VPN.key'
option 'dh' '/etc/easy-rsa/keys/dh2048.pem'
option server '10.8.0.0 255.255.255.0'
option ifconfig_pool_persist '/tmp/ipp.txt'
list push 'route 192.168.1.0 255.255.255.0'
list push 'dhcp-option DNS 192.168.1.1'
option client_to_client '1'
option keepalive '10 120'
option comp_lzo 'yes'
option max_clients '4'
option persist_key '1'
option persist_tun '1'
option status '/tmp/openvpn-status.log'
option log '/tmp/openvpn.log'
option verb '3'
option mute '20'
option script_security '3'
option auth_user_pass_verify '/etc/openvpn/pass.sh via-env'
>>>etc/config/firewall
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fe80::/10'
option src_port '547'
option dest_ip 'fe80::/10'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config include
option path '/etc/firewall.user'
config include 'miniupnpd'
option type 'script'
option path '/usr/share/miniupnpd/firewall.include'
option family 'any'
option reload '1'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option network 'lan'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
option network 'wan wan6'
config forwarding
option src 'lan'
option dest 'wan'
config zone
option name 'iptv'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option network 'iptv'
option masq '1'
config forwarding
option src 'lan'
option dest 'iptv'
config forwarding
option src 'iptv'
option dest 'lan'
config zone
option name 'voip'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option network 'voip'
option masq '1'
config forwarding
option src 'lan'
option dest 'voip'
config rule 'udpxy'
option target 'ACCEPT'
option src 'wan'
option proto 'tcp udp'
option dest_port '4022'
option name 'udpxy'
config forwarding
option src 'VPN'
option dest 'wan'
config rule
option target 'ACCEPT'
option src 'lan'
option dest 'vpn'
option name 'LANtoVPN'
option proto 'all'
config rule
option target 'ACCEPT'
option name 'VPNtoLAN'
option src 'vpn'
option dest 'lan'
option proto 'all'
config rule
option target 'ACCEPT'
option src 'wan'
option proto 'udp'
option dest_port '1194'
option name 'OpenVPN'
config zone
option name 'vpn'
option input 'ACCEPT'
option forward 'REJECT'
option output 'ACCEPT'
option network 'VPN'
>>>etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
# Internal uci firewall chains are flushed and recreated on reload, so
# put custom rules into the root chains e.g. INPUT or FORWARD or into the
# special user chains, e.g. input_wan_rule or postrouting_lan_rule.
iptables -t nat -A prerouting_wan -p udp --dport 1194 -j ACCEPT
iptables -A input_wan -p udp --dport 1194 -j ACCEPT
iptables -I INPUT -i tun+ -j ACCEPT
iptables -I FORWARD -i tun+ -j ACCEPT
iptables -I OUTPUT -o tun+ -j ACCEPT
iptables -I FORWARD -o tun+ -j ACCEPT