26

Odp: iptv / multicast - internetia

To co mogę odpowiedzieć na teraz bez dostępu do mojego labu;)

rpc napisał/a:
szwabek napisał/a:

2. Właśnie zaimplementowałem Twój config.
Nastawe /ect/config/dhcp mam od początku mojej zabawy.
Próbowałem już wcześniej takiej konfiguracji - bez sukcesu. Nie działa TV, nie działająusługi sieciowe.

a czy działa internet na komputerze ? Jaki komputer otrzymuje adres (o ile go otrzymuje)?

Internet działa. Komputer dostaje adres z LAN. NetiaPlayer pingowalny - 192.168.1.4 - jak widać w tcpdump kilka postów powyżej

rpc napisał/a:
szwabek napisał/a:

3. Tak jak pisałem. Jeżeli zmodyfikuję config na poniższy:

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1'
    option ports '1 2 3 4 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '2'
    option ports '0 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1000'
    option ports '0t 1t 5t'

To nie działa TV, ale działają usługi internetowe.

Pytanie jak wyżej jakie adresy otrzymuje komputer podpięty do tego portu ?

Logika mówi, że adres z LAN i tak pewnie jest. Teraz nie sprawdzę.

rpc napisał/a:

Mam jeszcze jeden pomysł
Spróbuj tak.
Moja konfiguracja ta co jest internet a nie działa TV czyli

config interface 'loopback'
    option ifname 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config interface 'lan'
    option ifname 'eth0.1'
    option type 'bridge'
    option proto 'static'
    option ipaddr '192.168.1.1'
    option netmask '255.255.255.0'

config interface 'wan'
    option ifname 'eth0.2'
    option proto 'dhcp'

config interface 'IPTV'
    option ifname 'eth0.1000'
    option proto 'dhcp'
    option 'defaultroute' '0'
    option 'peerdns' '0'
    option metric '20'

config switch
    option name 'rtl8366rb'
    option reset '1'
    option enable_vlan '1'
    option enable_vlan4k '1'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1'
    option ports '2 3 4 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '2'
    option ports '0 1 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1000'
    option ports '0t 1t 5t'

następnie wpisz z ręki na początek

ip route add 244.0.0.0/4 dev eth0.1000

iptables -I INPUT -p igmp -j ACCEPT
iptables -I FORWARD -i eth0.1000 -p udp -j ACCEPT
iptables -I INPUT -i eth0.1000 -d 239.2.0.0/16 -j ACCEPT

iptables -t filter -I INPUT -d 239.0.0.0/240.0.0.0 -i eth0.1000 -j ACCEPT
iptables -t filter -I INPUT -s 239.0.0.0/240.0.0.0 -i eth0.1000 -j ACCEPT
iptables -t filter -I FORWARD -d 239.0.0.0/240.0.0.0 -j ACCEPT
iptables -t filter -I FORWARD -s 239.0.0.0/240.0.0.0 -j ACCEPT
iptables -t mangle -I PREROUTING -d 239.0.0.0/240.0.0.0 -p udp -j TTL --ttl-inc 1
iptables -t nat -I POSTROUTING -o eth0.1000 -j MASQUERADE

i zobacz co się dzieje

I odwrotnie weź swoją konfigurację i sprawdź te wpisy.

Mój obecny config:
/etc/config/firewall

config rule
    option name        Allow-DHCP-Renew
    option src        wan
    option proto        udp
    option dest_port    68
    option target        ACCEPT
    option family        ipv4

# Allow IPv4 ping
config rule
    option name        Allow-Ping
    option src        wan
    option proto        icmp
    option icmp_type    echo-request
    option family        ipv4
    option target        ACCEPT

# Allow DHCPv6 replies
# see https://dev.openwrt.org/ticket/10381
config rule
    option name        Allow-DHCPv6
    option src        wan
    option proto        udp
    option src_ip        fe80::/10
    option src_port        547
    option dest_ip        fe80::/10
    option dest_port    546
    option family        ipv6
    option target        ACCEPT

# Allow essential incoming IPv6 ICMP traffic
config rule
    option name        Allow-ICMPv6-Input
    option src        wan
    option proto    icmp
    list icmp_type        echo-request
    list icmp_type        echo-reply
    list icmp_type        destination-unreachable
    list icmp_type        packet-too-big
    list icmp_type        time-exceeded
    list icmp_type        bad-header
    list icmp_type        unknown-header-type
    list icmp_type        router-solicitation
    list icmp_type        neighbour-solicitation
    list icmp_type        router-advertisement
    list icmp_type        neighbour-advertisement
    option limit        1000/sec
    option family        ipv6
    option target        ACCEPT

# Allow essential forwarded IPv6 ICMP traffic
config rule
    option name        Allow-ICMPv6-Forward
    option src        wan
    option dest        *
    option proto        icmp
    list icmp_type        echo-request
    list icmp_type        echo-reply
    list icmp_type        destination-unreachable
    list icmp_type        packet-too-big
    list icmp_type        time-exceeded
    list icmp_type        bad-header
    list icmp_type        unknown-header-type
    option limit        1000/sec
    option family        ipv6
    option target        ACCEPT

#definicja dla IPTV z nat
config zone
        option name 'IPTV'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'IPTV'

config forwarding
        option src 'lan'
        option dest 'IPTV'

# ----- pingi do wan_iptv
config 'rule'
        option 'name' 'Allow-DHCP-Renew-wan_iptv'
        option 'src' 'IPTV'
        option 'proto' 'udp'
        option 'dest_port' '68'
        option 'target' 'ACCEPT'
        option 'family' 'ipv4'

config 'rule'
        option 'name' 'Allow-Ping-wan_iptv'
        option 'src' 'IPTV'
        option 'proto' 'icmp'
        option 'icmp_type' 'echo-request'
        option 'family' 'ipv4'
        option 'target' 'ACCEPT'

# ----- udpxy
config 'rule'
       option 'src' 'IPTV'
       option 'proto' 'igmp'
       option 'target' 'ACCEPT'

config 'rule'
       option 'src' 'IPTV'
       option 'proto' 'udp'
       option 'dest_ip' '224.0.0.0/4'
       option 'target' 'ACCEPT'

config rule
        option src      wan
        option proto    igmp
        option target   ACCEPT

config rule
        option src      wan
        option proto    udp
        option dest_ip  224.0.0.0/4
        option target   ACCEPT

27

Odp: iptv / multicast - internetia

alossek napisał/a:

@szwabek:
zrób tak
1. instalujesz igmpproxy  (koniecznie AA, ze względu na  'IGMP snooping', http://eko.one.pl/forum/viewtopic.php?id=3400)
2. konfigurujesz tak jak miałeś pierwotną konfigurację
3. konfigurujesz igmpproxy (http://wiki.openwrt.org/doc/howto/udp_multicast)
4. NETIA playera wpinasz do portów LAN (2 3 4) potem ten 1 też sobie dołącz

i będzie działać. MUSI.

Dzięki wielkie za odp.
Hmm jak pisałem wcześniej i co widać w moich configach (szczególnie firewall), używałem Twojej konfiguracji z postu:
http://eko.one.pl/forum/viewtopic.php?id=3400%29
udpxy zainstalowane i skonfigurowane - nie potwierdzę teraz, ale w domu ok 18.00 sprawdzę

Nic nie robiłem pod kątem IGMP snooping
Swoją drogą tego tematu zupełnie nie czuję i nie wiem jak to powinno wygladać. Mój cel jest prosty. Ja chce wyłącznie TV na porcie 1. Nie chce żeby mi cokolwiek związanego z TV latało po innych portach czy wlan.

Zatem ok 18.00 kolejne podejście :] Czuję, że dziś się uda zakońćzyć tę nierówną walkę i wtedy to ja Was na piwo lub "piwo" zapraszam! :]

Skoro sie przyznałem, że znalazłem huba w pracy to switcha zarządzalnego pewnie też znajdę. Pytanie czy jest jeszcze na to potrzeba?

Pozdrawiam.

28

Odp: iptv / multicast - internetia

Z ciekawości jakby się udało to się przyda. Skonfiguruj jeden port w tryb monitoringu pakietów jak oczywiście ma taką opcję. I na tym porcie nasłuchuj dokładnie co gada i w jaki sposób netia player z netia spot. Ale zrób to tak aby
netia spot jest włączony wszystko podłączyłeś odpaliłeś wireshek a na końcu włączasz netiaplayer
Chodzi o przechwycenie wszystkiego.

Co do otrzymania adresu ip wcale nie jest to takie oczywiste, że dostanie adres lanu. Może być tak że otrzymasz poprzez vlan1000 adres ip a nie z routera (dwa serwery dhcp) i to też może być ważne.


Co do twojego firewalla
Na razie odpuścił bym sobie tą konfigurację aby nie mieszać zbytnio (zaremuj ją) i ustawił bym tak jak podałem
Będzie dla nas to wykładnik i nic nie będzie nam mieszać

29 (edytowany przez alossek 2013-06-14 11:08:26)

Odp: iptv / multicast - internetia

szwabek napisał/a:

używałem Twojej konfiguracji z postu:
http://eko.one.pl/forum/viewtopic.php?id=3400%29
udpxy zainstalowane i skonfigurowane - nie potwierdzę teraz, ale w domu ok 18.00 sprawdzę

Nic nie robiłem pod kątem IGMP snooping
Swoją drogą tego tematu zupełnie nie czuję i nie wiem jak to powinno wygladać. Mój cel jest prosty. Ja chce wyłącznie TV na porcie 1. Nie chce żeby mi cokolwiek związanego z TV latało po innych portach czy wlan.

Ja obstawiam że z igmpproxy zadziała, z tym że trzy uwagi:
1. udpxy  to nie to samo co igmpproxy (czytaj tu http://wiki.openwrt.org/doc/howto/udp_multicast)
2. "IGMP snooping" to ważne dla igmpproxy, chodzi tu o to aby Ci pakiety nie zalały sieci LAN,
musisz to mieć bez tego nie da się korzystać z sieci (dlatego konieczne jest Attitude Adjustment)
3. jak użyjesz igmpproxy to domyślnie będziesz mieć TV w całym lanie (tak jak w netia spot)  na każdym porcie,
oczywiście możesz wydzielić inna podsieć (jakiś tam lan2) w której igmpproxy będzie proxy'sować i przypiąć ja do jednego portu (ale to już inna zabawa i ja Ci tu nie pomogę - pytaj raczej rpc, coś mi to świta że było o tym przy okazji sieci gościnnej wifi) wpierw zrób aby było w całym lanie potem się martw aby było na jednym porcie.

w przykładowej poniższej konfiguracji widać że proxy jest do lan a Ty możesz zrobić sobie w przyszłości do lan2

config igmpproxy
        option quickleave 1

config phyint
        option network wan_iptv
        option direction upstream
        list altnet 192.168.65.0/24
        list altnet 172.18.0.0/16

config phyint
        option network lan
        option direction downstream
TP-Link TL-WDR4300 v1, Reboot (17.01-SNAPSHOT, r3876-efb6ca1)

30

Odp: iptv / multicast - internetia

rpc napisał/a:

Inszo powiem szczerze ja na ich miejscu postawiłbym netiaplayer normalnie na vlan a pozostałe rzeczy na proxy.

Zgadzam się pewnie było by lepiej ...

rpc napisał/a:

Po drugie jaki cel miałoby przenoszenie vlan1000 na porty lan w netiaspot. Do czegoś musi to służyć. Trzeba się jeszcze nad tym pokłonić

Jakiś tam mały sens to ma:
1. opcja mulitroom - tyle ile portów w netiaspot
2. klient podłącza netiaplayer lub kompa gdzie chce i działa (to słaby argument, ale zawsze jakiś)

TP-Link TL-WDR4300 v1, Reboot (17.01-SNAPSHOT, r3876-efb6ca1)

31 (edytowany przez rpc 2013-06-14 12:22:30)

Odp: iptv / multicast - internetia

pewnie jak pisze allosek
jednak ja bym spróbował najpierw z przekierowaniem ew.
jeszcze może routing ustawił

ip route add 224.0.0.0/4 dev eth0.1000

no i może jeszcze bym spróbował

ip route add 239.0.0.0/4 dev eth0.1000

ale nie wszystkie na raz no może na końcu

32

Odp: iptv / multicast - internetia

rpc napisał/a:

pewnie jak pisze allosek
jednak ja bym spróbował najpierw z przekierowaniem ew.
jeszcze może routing ustawił

ip route add 224.0.0.0/4 dev eth0.1000

no i może jeszcze bym spróbował

ip route add 239.0.0.0/4 dev eth0.1000

ale nie wszystkie na raz no może na końcu

Dodałem wszystkie komendy iptables jakie mi podałeś. Łacznie z inkrementacją TTL, do czego musiałem naszukac sie pakietu Cezarego;)
Dodałem również powyższy routing - pierwszy. Drugi nie wskoczył. Nie liczyłem, ale czy nie nachodzą na siebie?

Bez zmian. Sprawdzałem na kazdym configu.
1. nietagowany vlan 1000 - działa tylko TV
2. nietagovalny vlan2, tagowany vlan1000 - nie działa NIC
3. nietagowany vlan1, tagowany vlan1000 - działają tylko usługi sieciowe

33

Odp: iptv / multicast - internetia

alossek napisał/a:
szwabek napisał/a:

używałem Twojej konfiguracji z postu:
http://eko.one.pl/forum/viewtopic.php?id=3400%29
udpxy zainstalowane i skonfigurowane - nie potwierdzę teraz, ale w domu ok 18.00 sprawdzę

Nic nie robiłem pod kątem IGMP snooping
Swoją drogą tego tematu zupełnie nie czuję i nie wiem jak to powinno wygladać. Mój cel jest prosty. Ja chce wyłącznie TV na porcie 1. Nie chce żeby mi cokolwiek związanego z TV latało po innych portach czy wlan.

Ja obstawiam że z igmpproxy zadziała, z tym że trzy uwagi:
1. udpxy  to nie to samo co igmpproxy (czytaj tu http://wiki.openwrt.org/doc/howto/udp_multicast)
2. "IGMP snooping" to ważne dla igmpproxy, chodzi tu o to aby Ci pakiety nie zalały sieci LAN,
musisz to mieć bez tego nie da się korzystać z sieci (dlatego konieczne jest Attitude Adjustment)
3. jak użyjesz igmpproxy to domyślnie będziesz mieć TV w całym lanie (tak jak w netia spot)  na każdym porcie,
oczywiście możesz wydzielić inna podsieć (jakiś tam lan2) w której igmpproxy będzie proxy'sować i przypiąć ja do jednego portu (ale to już inna zabawa i ja Ci tu nie pomogę - pytaj raczej rpc, coś mi to świta że było o tym przy okazji sieci gościnnej wifi) wpierw zrób aby było w całym lanie potem się martw aby było na jednym porcie.

w przykładowej poniższej konfiguracji widać że proxy jest do lan a Ty możesz zrobić sobie w przyszłości do lan2

config igmpproxy
        option quickleave 1

config phyint
        option network wan_iptv
        option direction upstream
        list altnet 192.168.65.0/24
        list altnet 172.18.0.0/16

config phyint
        option network lan
        option direction downstream

Odinstalowałem udpxy. Z poziomu luci, mam nadzieje, że to wystarczy.
Sprawdziłem, ze mam zainstlowany igmpproxy oraz OpenWrt Attitude Adjustment 12.09-rc1

Plik konfiguracyjny stworzyłem:

root@OpenWrt:~# cat /etc/igmpproxy.conf
quickleave
# eth1 is the WAN interface
# 10.254.0.0/16 is the ip range your ISP sends multicast from
phyint eth1 upstream  ratelimit 0  threshold 1
        altnet 10.4.42.0/24
        altnet 87.99.47.216/24
# br-lan is LAN bridge
phyint br-lan downstream  ratelimit 0  threshold 1
phyint eth2 disabled

1. Nie  wiem czy jest poprawny
2. Nie wiem czy usług igmpproxy jest włączona. Jak to moge sprawdzić?

Obecny plik /etc/config/firewall:

root@OpenWrt:~# cat /etc/config/firewall

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        option network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'wan'
        option network 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'
        option enabled '0'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fe80::/10'
        option src_port '547'
        option dest_ip 'fe80::/10'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'
        option enabled '0'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'
        option enabled '0'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'
        option enabled '0'

config zone
        option name 'IPTV'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'IPTV'

config forwarding
        option src 'lan'
        option dest 'IPTV'

config rule
        option name 'Allow-DHCP-Renew-wan_iptv'
        option src 'IPTV'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping-wan_iptv'
        option src 'IPTV'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option src 'IPTV'
        option proto 'igmp'
        option target 'ACCEPT'

config rule
        option src 'IPTV'
        option proto 'udp'
        option dest_ip '224.0.0.0/4'
        option target 'ACCEPT'

config rule
        option src 'wan'
        option proto 'igmp'
        option target 'ACCEPT'

config rule
        option src 'wan'
        option proto 'udp'
        option dest 'lan'
        option dest_ip '224.0.0.0/4'
        option target 'ACCEPT'

config include
        option path '/etc/firewall.user'

Stan połączenie się nie zmienił.

Sniffowanie będę w stanie zrobić dopiero w nocy.
Czuję, że Twoja propozycja jest bardzo bliska, ze witamy się z gąską... kurcze może coś z firewallem mam źle. A możetak jak szuka rpc brakuje jeszcze jakiegoś routingu?

Pozdrawiam

34

Odp: iptv / multicast - internetia

@szwabek:
mój błąd źle patrzyłem źle przypisałem wyjście lan nie wiem jak patrzyłem
zrób jak poniżej
i daj znać


ustaw jak poniżej

config interface 'loopback'
    option ifname 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config interface 'lan'
    option ifname 'eth0.1'
    option type 'bridge'
    option proto 'static'
    option ipaddr '192.168.1.1'
    option netmask '255.255.255.0'

config interface 'wan'
    option ifname 'eth0.2'
    option proto 'dhcp'
    option macaddr '00:12:2a:81:9a:40'

config interface 'IPTV'
    option ifname 'eth0.1000'
    option proto 'dhcp'
    option 'defaultroute' '0'
    option 'peerdns' '0'
    option metric '20'

config switch
    option name 'rtl8366rb'
    option reset '1'
    option enable_vlan '1'
    option enable_vlan4k '1'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1'
    option ports '1 2 3 4 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '2'
    option ports '0 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1000'
    option ports '0t 1t 5t'

tak czuję że jest szansa że zadziała jeśli nie to może to być wina firewalla ew. routingu
więc najpierw dopisz jeszcze to

ip route add 244.0.0.0/4 dev eth0.1000

iptables -I INPUT -p igmp -j ACCEPT
iptables -I FORWARD -i eth0.1000 -p udp -j ACCEPT
iptables -I INPUT -i eth0.1000 -d 239.2.0.0/16 -j ACCEPT

iptables -t filter -I INPUT -d 239.0.0.0/240.0.0.0 -i eth0.1000 -j ACCEPT
iptables -t filter -I INPUT -s 239.0.0.0/240.0.0.0 -i eth0.1000 -j ACCEPT
iptables -t filter -I FORWARD -d 239.0.0.0/240.0.0.0 -j ACCEPT
iptables -t filter -I FORWARD -s 239.0.0.0/240.0.0.0 -j ACCEPT
iptables -t mangle -I PREROUTING -d 239.0.0.0/240.0.0.0 -p udp -j TTL --ttl-inc 1
iptables -t nat -I POSTROUTING -o eth0.1000 -j MASQUERADE

a jak będzie bida to jeszcze

ip route add 224.0.0.0/4 dev eth0.1000

35

Odp: iptv / multicast - internetia

rpc napisał/a:

@szwabek:
mój błąd źle patrzyłem źle przypisałem wyjście lan nie wiem jak patrzyłem
zrób jak poniżej
i daj znać


ustaw jak poniżej

config interface 'loopback'
    option ifname 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config interface 'lan'
    option ifname 'eth0.1'
    option type 'bridge'
    option proto 'static'
    option ipaddr '192.168.1.1'
    option netmask '255.255.255.0'

config interface 'wan'
    option ifname 'eth0.2'
    option proto 'dhcp'
    option macaddr '00:12:2a:81:9a:40'

config interface 'IPTV'
    option ifname 'eth0.1000'
    option proto 'dhcp'
    option 'defaultroute' '0'
    option 'peerdns' '0'
    option metric '20'

config switch
    option name 'rtl8366rb'
    option reset '1'
    option enable_vlan '1'
    option enable_vlan4k '1'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1'
    option ports '1 2 3 4 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '2'
    option ports '0 5t'

config switch_vlan
    option device 'rtl8366rb'
    option vlan '1000'
    option ports '0t 1t 5t'

tak czuję że jest szansa że zadziała jeśli nie to może to być wina firewalla ew. routingu
więc najpierw dopisz jeszcze to

ip route add 244.0.0.0/4 dev eth0.1000

iptables -I INPUT -p igmp -j ACCEPT
iptables -I FORWARD -i eth0.1000 -p udp -j ACCEPT
iptables -I INPUT -i eth0.1000 -d 239.2.0.0/16 -j ACCEPT

iptables -t filter -I INPUT -d 239.0.0.0/240.0.0.0 -i eth0.1000 -j ACCEPT
iptables -t filter -I INPUT -s 239.0.0.0/240.0.0.0 -i eth0.1000 -j ACCEPT
iptables -t filter -I FORWARD -d 239.0.0.0/240.0.0.0 -j ACCEPT
iptables -t filter -I FORWARD -s 239.0.0.0/240.0.0.0 -j ACCEPT
iptables -t mangle -I PREROUTING -d 239.0.0.0/240.0.0.0 -p udp -j TTL --ttl-inc 1
iptables -t nat -I POSTROUTING -o eth0.1000 -j MASQUERADE

a jak będzie bida to jeszcze

ip route add 224.0.0.0/4 dev eth0.1000

Nadal stara bida. Tylko usługi internetowe.

root@OpenWrt:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           ctstate RELATED,EST                                                                                        ABLISHED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
syn_flood  tcp  --  0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02                                                                                        
input_rule  all  --  0.0.0.0/0            0.0.0.0/0
input      all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           ctstate RELATED,EST                                                                                        ABLISHED
forwarding_rule  all  --  0.0.0.0/0            0.0.0.0/0
forward    all  --  0.0.0.0/0            0.0.0.0/0
reject     all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           ctstate RELATED,EST                                                                                        ABLISHED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
output_rule  all  --  0.0.0.0/0            0.0.0.0/0
output     all  --  0.0.0.0/0            0.0.0.0/0

Chain forward (1 references)
target     prot opt source               destination
zone_lan_forward  all  --  0.0.0.0/0            0.0.0.0/0
zone_wan_forward  all  --  0.0.0.0/0            0.0.0.0/0
zone_IPTV_forward  all  --  0.0.0.0/0            0.0.0.0/0

Chain forwarding_IPTV (1 references)
target     prot opt source               destination

Chain forwarding_lan (1 references)
target     prot opt source               destination

Chain forwarding_rule (1 references)
target     prot opt source               destination

Chain forwarding_wan (1 references)
target     prot opt source               destination

Chain input (1 references)
target     prot opt source               destination
zone_lan   all  --  0.0.0.0/0            0.0.0.0/0
zone_wan   all  --  0.0.0.0/0            0.0.0.0/0
zone_IPTV  all  --  0.0.0.0/0            0.0.0.0/0

Chain input_IPTV (1 references)
target     prot opt source               destination

Chain input_lan (1 references)
target     prot opt source               destination

Chain input_rule (1 references)
target     prot opt source               destination

Chain input_wan (1 references)
target     prot opt source               destination

Chain output (1 references)
target     prot opt source               destination
zone_lan_ACCEPT  all  --  0.0.0.0/0            0.0.0.0/0
zone_wan_ACCEPT  all  --  0.0.0.0/0            0.0.0.0/0
zone_IPTV_ACCEPT  all  --  0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
target     prot opt source               destination

Chain reject (7 references)
target     prot opt source               destination
REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           reject-with tcp-res                                                                                        et
REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-po                                                                                        rt-unreachable

Chain syn_flood (1 references)
target     prot opt source               destination
RETURN     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02                                                                                         limit: avg 25/sec burst 50
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV (1 references)
target     prot opt source               destination
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:68
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
ACCEPT     2    --  0.0.0.0/0            0.0.0.0/0
ACCEPT     udp  --  0.0.0.0/0            224.0.0.0/4
input_IPTV  all  --  0.0.0.0/0            0.0.0.0/0
zone_IPTV_REJECT  all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_ACCEPT (2 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_DROP (0 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_REJECT (2 references)
target     prot opt source               destination
reject     all  --  0.0.0.0/0            0.0.0.0/0
reject     all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_forward (1 references)
target     prot opt source               destination
forwarding_IPTV  all  --  0.0.0.0/0            0.0.0.0/0
zone_IPTV_REJECT  all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
target     prot opt source               destination
input_lan  all  --  0.0.0.0/0            0.0.0.0/0
zone_lan_ACCEPT  all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (3 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_lan_DROP (0 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_lan_REJECT (1 references)
target     prot opt source               destination
reject     all  --  0.0.0.0/0            0.0.0.0/0
reject     all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_lan_forward (1 references)
target     prot opt source               destination
zone_IPTV_ACCEPT  all  --  0.0.0.0/0            0.0.0.0/0
zone_wan_ACCEPT  all  --  0.0.0.0/0            0.0.0.0/0
forwarding_lan  all  --  0.0.0.0/0            0.0.0.0/0
zone_lan_REJECT  all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_wan (1 references)
target     prot opt source               destination
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:68
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:68
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:68
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:68
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:68
ACCEPT     2    --  0.0.0.0/0            0.0.0.0/0
input_wan  all  --  0.0.0.0/0            0.0.0.0/0
zone_wan_REJECT  all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (2 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_wan_DROP (0 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_wan_REJECT (2 references)
target     prot opt source               destination
reject     all  --  0.0.0.0/0            0.0.0.0/0
reject     all  --  0.0.0.0/0            0.0.0.0/0

Chain zone_wan_forward (1 references)
target     prot opt source               destination
zone_lan_ACCEPT  udp  --  0.0.0.0/0            224.0.0.0/4
forwarding_wan  all  --  0.0.0.0/0            0.0.0.0/0
zone_wan_REJECT  all  --  0.0.0.0/0            0.0.0.0/0

36

Odp: iptv / multicast - internetia

pokaż mi z powyższego konfigu

route -n
ifconfig

jak już pokazujesz iptables to z takimi opcjami

iptables -L -n -v

czy podłączony komputer na port 1 ma internet ?
jaki dostał adres ip ? powinien z lan a najlepiej pokaż komendę

ipconfig
route print

Czyli rozumiem, że działają usługi internetowe czyli i że będzie internet a brak TV ?

No to zostaje do tej konfiguracji jak sugerował allosek dorobić igmproxy i powinno być git(to powinna być podobna konfiguracja jak w netiaspot bo tam podłączasz do dowolnego portu a nie do konkretnego)

zbierz logi z routera tcpdump o co routera pyta netiaplayer

Ps. Mam jeszcze jeden pomysł ale to dopiero jak odpowiesz na powyższe pytania.
może uda się uniknąć igmproxy

37

Odp: iptv / multicast - internetia

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         87.99.47.1      0.0.0.0         UG    0      0        0 eth0.2
10.4.32.0       0.0.0.0         255.255.240.0   U     20     0        0 eth0.1000
87.99.47.0      0.0.0.0         255.255.255.0   U     0      0        0 eth0.2
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
root@OpenWrt:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:AC:61:86
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:17711 errors:0 dropped:153 overruns:0 frame:0
          TX packets:23033 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:3011174 (2.8 MiB)  TX bytes:19920442 (18.9 MiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:AC:61:86
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:797477 errors:0 dropped:14 overruns:60111 frame:0
          TX packets:18843 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:74115694 (70.6 MiB)  TX bytes:4586521 (4.3 MiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:AC:61:86
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:20796 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2693 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:4792513 (4.5 MiB)  TX bytes:1319348 (1.2 MiB)

eth0.1000 Link encap:Ethernet  HWaddr 94:0C:6D:AC:61:86
          inet addr:10.4.42.44  Bcast:10.4.47.255  Mask:255.255.240.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:390624 errors:0 dropped:980 overruns:0 frame:0
          TX packets:10 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:17165572 (16.3 MiB)  TX bytes:3501 (3.4 KiB)

eth0.2    Link encap:Ethernet  HWaddr 00:12:2A:81:9A:40
          inet addr:87.99.47.216  Bcast:87.99.47.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:385605 errors:0 dropped:7266 overruns:0 frame:0
          TX packets:16135 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:37769692 (36.0 MiB)  TX bytes:3185465 (3.0 MiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:16 errors:0 dropped:0 overruns:0 frame:0
          TX packets:16 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:3422 (3.3 KiB)  TX bytes:3422 (3.3 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:AC:61:86
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:14289 errors:0 dropped:0 overruns:0 frame:0
          TX packets:25136 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:32
          RX bytes:2940505 (2.8 MiB)  TX bytes:19697984 (18.7 MiB)
root@OpenWrt:~# iptables -L -n -v
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
 1312  188K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           ctstate RELATED,ESTABLISHED
    8   480 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
   20  1044 syn_flood  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02
 3255  213K input_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 3254  213K input      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
34673   22M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           ctstate RELATED,ESTABLISHED
 1868  104K forwarding_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1868  104K forward    all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
 1458  253K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           ctstate RELATED,ESTABLISHED
    8   480 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
 1101 92768 output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1101 92768 output     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1868  104K zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_forward  all  --  eth0.2 *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_IPTV_forward  all  --  eth0.1000 *       0.0.0.0/0            0.0.0.0/0

Chain forwarding_IPTV (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1323  113K zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
  748 59851 zone_wan   all  --  eth0.2 *       0.0.0.0/0            0.0.0.0/0
 1180 39166 zone_IPTV  all  --  eth0.1000 *       0.0.0.0/0            0.0.0.0/0

Chain input_IPTV (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1101 92768 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1095 90742 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_IPTV_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain reject (7 references)
 pkts bytes target     prot opt in     out     source               destination
   52  2336 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
  229 43893 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination
   20  1044 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV (1 references)
 pkts bytes target     prot opt in     out     source               destination
    5  1566 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
 1175 37600 ACCEPT     2    --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            224.0.0.0/4
    0     0 input_IPTV  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_IPTV_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      eth0.1000  0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  eth0.1000 *       0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      eth0.1000  0.0.0.0/0            0.0.0.0/0
    0     0 DROP       all  --  eth0.1000 *       0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 reject     all  --  *      eth0.1000  0.0.0.0/0            0.0.0.0/0
    0     0 reject     all  --  eth0.1000 *       0.0.0.0/0            0.0.0.0/0

Chain zone_IPTV_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 forwarding_IPTV  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_IPTV_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1323  113K input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1323  113K zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination
    6  2026 ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0
 1323  113K ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    3   478 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0
    0     0 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1868  104K zone_IPTV_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1868  104K zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    3   478 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    3   478 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
  470 14100 ACCEPT     2    --  *      *       0.0.0.0/0            0.0.0.0/0
  278 45751 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  278 45751 zone_wan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination
 2960  194K ACCEPT     all  --  *      eth0.2  0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  eth0.2 *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      eth0.2  0.0.0.0/0            0.0.0.0/0
    0     0 DROP       all  --  eth0.2 *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 reject     all  --  *      eth0.2  0.0.0.0/0            0.0.0.0/0
  278 45751 reject     all  --  eth0.2 *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 zone_lan_ACCEPT  udp  --  *      *       0.0.0.0/0            224.0.0.0/4
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@OpenWrt:~# cat /tmp/dhcp.leases
1371326347 6c:71:d9:1d:18:5f 192.168.1.187 xxx 01:6c:71:d9:1d:18:5f
1371305045 00:04:30:5b:c3:2a 192.168.1.4 NetaPlayer 01:00:04:30:5b:c3:2a

I teraz po wpięciu kompa w to gniazdko:

P:\>ipconfig

Windows IP Configuration


Wireless LAN adapter Local Area Connection* 12:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Wireless LAN adapter Wi-Fi:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : lan

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . : lan
   Link-local IPv6 Address . . . . . : fe80::7198:eed3:2acc:1fca%12
   IPv4 Address. . . . . . . . . . . : 192.168.1.232
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.1

...
P:\>route print
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.232     10
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link     192.168.1.232    266
    192.168.1.232  255.255.255.255         On-link     192.168.1.232    266
    192.168.1.255  255.255.255.255         On-link     192.168.1.232    266
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link     192.168.1.232    266
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link     192.168.1.232    266
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 21    306 ::/0                     On-link
  1    306 ::1/128                  On-link
 21    306 2001::/32                On-link
 21    306 2001:0:4137:9e76:14f1:3053:3f57:fe17/128
                                    On-link
 12    266 fe80::/64                On-link
 21    306 fe80::/64                On-link
 21    306 fe80::14f1:3053:3f57:fe17/128
                                    On-link
 12    266 fe80::7198:eed3:2acc:1fca/128
                                    On-link
  1    306 ff00::/8                 On-link
 21    306 ff00::/8                 On-link
 12    266 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

I jest jak piszesz - działa internet/usługi internetowe. Nie działa TV.
Pozostałem logi zamieszczę później.

38

Odp: iptv / multicast - internetia

Cześć,

Poniżej wyniki mojego wieczornego tcpdumpowania.

Konfiguracja docelowa, tzn OpenWrt, wpięty NetiaPlayer na porcie 1 (nietagowany vlan1, tagowany vlan1000).
tcpdump puszczany na openwrt

Pierwszy, przy wyłączonym NetiaSpot (192.168.1.187 to mój komp):

root@OpenWrt:~# tcpdump -enni eth0 dst not 192.168.1.187 and not broadcast and not arp and src not 192.168.1.187
tcpdump: WARNING: eth0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
23:09:17.638369 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:20.638357 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:23.638469 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:24.305811 b8:af:67:5d:a9:87 > 01:00:5e:00:00:01, ethertype 802.1Q (0x8100), length 64: vlan 1000, p 0, ethertype IPv4, 172.24.10.14 > 224.0.0.1: igmp query v2
23:09:25.494449 c0:c1:c0:51:51:5b > 01:00:5e:00:00:01, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.244 > 224.0.0.1: igmp query v2
23:09:25.528686 54:e6:fc:96:12:0b > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.111 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:25.528802 00:24:2c:0c:a6:a1 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.186 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:25.528964 54:e6:fc:f6:63:69 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.69 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:25.529115 54:e6:fc:f6:63:69 > 01:00:5e:00:01:3c, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.69 > 224.0.1.60: igmp v2 report 224.0.1.60
23:09:25.540818 f0:7d:68:43:34:f3 > 01:00:5e:40:53:50, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.87 > 239.192.83.80: igmp v2 report 239.192.83.80
23:09:25.598941 00:13:8f:39:6d:c7 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.236 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:25.599088 00:13:8f:39:6d:c7 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.236 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:25.599220 54:e6:fc:96:42:ed > 01:00:5e:00:00:fb, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.169 > 224.0.0.251: igmp v2 report 224.0.0.251
23:09:25.599381 54:e6:fc:f6:37:65 > 01:00:5e:00:00:fb, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.148 > 224.0.0.251: igmp v2 report 224.0.0.251
23:09:25.599528 54:e6:fc:f6:37:65 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.148 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:25.599680 54:e6:fc:f6:37:65 > 01:00:5e:7f:43:fa, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.148 > 239.255.67.250: igmp v2 report 239.255.67.250
23:09:25.750606 c8:60:00:4f:c9:73 > 01:00:5e:7f:ff:fa, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.173 > 239.255.255.250: igmp v2 report 239.255.255.250
23:09:25.853380 c0:c1:c0:51:51:5b > 01:00:5e:00:00:02, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.244 > 224.0.0.2: igmp v2 report 224.0.0.2
23:09:25.911248 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
23:09:26.052541 6c:71:d9:1d:18:5f > 33:33:00:01:00:02, ethertype 802.1Q (0x8100), length 172: vlan 1, p 0, ethertype IPv6, fe80::c9dc:4a44:5cf9:c7f1.546 > ff02::1:2.547: dhcp6 solicit
23:09:26.552480 00:18:e7:e0:71:97 > 01:00:5e:00:00:01, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.226 > 224.0.0.1: igmp v2 report 224.0.0.1
23:09:26.552627 00:18:e7:e0:71:97 > 01:00:5e:7f:ff:f6, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.226 > 239.255.255.246: igmp v2 report 239.255.255.246
23:09:26.552764 00:18:e7:e0:71:97 > 01:00:5e:00:01:7f, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.226 > 224.0.1.127: igmp v2 report 224.0.1.127
23:09:26.552903 00:18:e7:e0:71:97 > 01:00:5e:7f:ff:fd, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.226 > 239.255.255.253: igmp v2 report 239.255.255.253
23:09:26.620282 00:30:4f:59:d6:61 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.188 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:26.620417 00:30:4f:59:d6:61 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.188 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:27.081159 00:30:4f:59:d6:61 > 01:00:5e:40:98:8f, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.188 > 239.192.152.143: igmp v2 report 239.192.152.143
23:09:27.474009 00:1b:11:f6:0f:75 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.2 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:27.638822 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:27.660629 00:1c:f0:7e:fd:93 > 01:00:5e:7f:ff:fa, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.157 > 239.255.255.250: igmp v2 report 239.255.255.250
23:09:27.738876 00:1d:7e:d7:6c:04 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.137 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:27.787396 00:18:f3:6d:76:16 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.106.52547 > 224.0.0.252.5355: UDP, length 22
23:09:27.895635 00:18:f3:6d:76:16 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.106.52547 > 224.0.0.252.5355: UDP, length 22
23:09:28.037873 00:1c:f0:7e:fd:93 > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.157 > 224.0.0.252: igmp v2 report 224.0.0.252
23:09:28.170887 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 113: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [P.], seq 1395206817:1395206872, ack 3715313242, win 1944, length 55
23:09:28.224302 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [.], ack 55, win 16293, length 0
23:09:29.032233 00:1b:11:f6:0f:75 > 01:00:5e:7f:ff:fa, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.2 > 239.255.255.250: igmp v2 report 239.255.255.250
23:09:29.304764 00:1e:e5:95:4c:fd > 01:00:5e:00:00:fd, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.93 > 224.0.0.253: igmp v2 report 224.0.0.253
23:09:29.974061 00:1b:11:f6:0f:75 > 01:00:5e:00:00:fb, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.2 > 224.0.0.251: igmp v2 report 224.0.0.251
23:09:30.582409 00:30:4f:59:d6:61 > 01:00:5e:7f:ff:fa, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.188 > 239.255.255.250: igmp v2 report 239.255.255.250
23:09:30.639815 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:30.916137 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 60: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52682 > 157.56.52.34.40015: Flags [P.], seq 1500584527:1500584529, ack 1339023609, win 256, length 2
23:09:31.096217 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 157.56.52.34.40015 > 87.99.47.216.52682: Flags [.], ack 2, win 79, length 0
23:09:31.097985 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 500: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52682 > 157.56.52.34.40015: Flags [P.], seq 2:444, ack 1, win 256, length 442
23:09:31.278196 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 157.56.52.34.40015 > 87.99.47.216.52682: Flags [.], ack 444, win 81, length 0
23:09:31.278536 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 157.56.52.34.40015 > 87.99.47.216.52682: Flags [P.], seq 1:5, ack 444, win 81, length 4
23:09:31.330400 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52682 > 157.56.52.34.40015: Flags [.], ack 5, win 256, length 0
23:09:32.749758 00:1d:7e:d7:6c:04 > 01:00:5e:00:00:fb, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.137 > 224.0.0.251: igmp v2 report 224.0.0.251
23:09:32.749905 00:1d:7e:d7:6c:04 > 01:00:5e:00:00:fd, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.137 > 224.0.0.253: igmp v2 report 224.0.0.253
23:09:33.144093 00:12:2a:60:2f:f0 > 01:00:5e:00:00:16, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.205 > 224.0.0.22: igmp v2 report 224.0.0.22
23:09:33.537340 00:1c:f0:7e:fd:93 > 01:00:5e:00:00:fd, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.46.157 > 224.0.0.253: igmp v2 report 224.0.0.253
23:09:33.639917 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:33.792504 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 111: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52677 > 173.194.69.125.5222: Flags [P.], seq 1969813245:1969813298, ack 3036565673, win 251, length 53
23:09:33.835385 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.69.125.5222 > 87.99.47.216.52677: Flags [.], ack 53, win 1002, length 0
23:09:34.213679 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 237: vlan 2, p 1, ethertype IPv4, 108.160.163.47.80 > 87.99.47.216.52701: Flags [P.], seq 575647222:575647401, ack 3656624678, win 83, length 179
23:09:34.217377 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 336: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52701 > 108.160.163.47.80: Flags [P.], seq 1:279, ack 179, win 255, length 278
23:09:34.399592 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 108.160.163.47.80 > 87.99.47.216.52701: Flags [.], ack 279, win 83, length 0
23:09:35.910420 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
23:09:36.987317 00:0f:e2:07:f2:e0 > 01:80:c2:00:00:0a, ethertype 802.1Q (0x8100), length 164: vlan 2, p 1, ethertype 0x88a7,
        0x0000:  0003 0000 01b4 b770 0001 000e 0000 0000  .......p........
        0x0010:  5866 ba12 4cf3 0007 0011 4833 4320 5333  Xf..L.....H3C.S3
        0x0020:  3130 302d 3532 5000 0e00 1153 3331 3030  100-52P....S3100
        0x0030:  2d31 3730 3250 3033 0011 0013 5265 6c65  -1702P03....Rele
        0x0040:  6173 6520 3137 3032 5030 3300 1000 0733  ase.1702P03....3
        0x0050:  3035 000c 0014 1000 0000 0000 0000 0000  05..............
        0x0060:  0000 0000 0000 0003 0014 7377 312d 6862  ..........sw1-hb
        0x0070:  732d 3630 612e 7772 6f63 0002 0012 4574  s-60a.wroc....Et
        0x0080:  6865 726e 6574 312f 302f 3130 000b 0006  hernet1/0/10....
        0x0090:  0003                                     ..
23:09:37.640322 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:09:38.227711 b8:af:67:b4:76:f7 > 01:80:c2:00:00:0e, ethertype 802.1Q (0x8100), length 376: vlan 2, p 1, ethertype LLDP, LLDP, name sw1-gjw-46_48.wroc, length 358
^C

Drugi, również przy wyłączonym NetiaSpot:

root@OpenWrt:~# tcpdump -enni eth0 dst not 192.168.1.187 and not broadcast and not arp and src not 192.168.1.187
tcpdump: WARNING: eth0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
23:10:23.652333 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:24.055374 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 113: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [P.], seq 1395206927:1395206982, ack 3715313242, win 1944, length 55
23:10:24.106878 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [.], ack 55, win 16266, length 0
23:10:25.908667 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
23:10:26.132173 d0:7e:28:24:35:f7 > 01:00:5e:00:00:01, ethertype 802.1Q (0x8100), length 64: vlan 1000, p 0, ethertype IPv4, 10.100.16.43 > 224.0.0.1: igmp query v2
23:10:27.652738 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:29.924435 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 237: vlan 2, p 1, ethertype IPv4, 108.160.163.47.80 > 87.99.47.216.52701: Flags [P.], seq 575647401:575647580, ack 3656624956, win 83, length 179
23:10:29.928489 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 336: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52701 > 108.160.163.47.80: Flags [P.], seq 1:279, ack 179, win 254, length 278
23:10:30.110306 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 108.160.163.47.80 > 87.99.47.216.52701: Flags [.], ack 279, win 83, length 0
23:10:30.652709 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:30.949225 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 63: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52685 > 91.190.218.61.12350: Flags [P.], seq 366410283:366410288, ack 832984057, win 254, length 5
23:10:30.988557 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 91.190.218.61.12350 > 87.99.47.216.52685: Flags [P.], seq 1:6, ack 5, win 9, length 5
23:10:31.018713 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52685 > 91.190.218.61.12350: Flags [.], ack 6, win 254, length 0
23:10:33.641757 00:1e:58:0e:a8:93 > 00:78:30:40:98:8f, ethertype 802.1Q (0x8100), length 165: vlan 2, p 1, ethertype IPv4, 87.99.47.20.6771 > 239.192.152.143.6771: UDP, length 119
23:10:33.655838 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:33.713156 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 157.56.126.149.443 > 87.99.47.216.52695: Flags [.], seq 2600426368:2600426369, ack 27326789, win 63939, length 1
23:10:33.714491 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 70: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52695 > 157.56.126.149.443: Flags [.], ack 1, win 64240, options [nop,nop,sack 1 {0:1}], length 0
23:10:33.790571 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 111: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52677 > 173.194.69.125.5222: Flags [P.], seq 1969813351:1969813404, ack 3036565673, win 251, length 53
23:10:33.833385 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.69.125.5222 > 87.99.47.216.52677: Flags [.], ack 53, win 1002, length 0
23:10:34.420838 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 157.56.52.34.40015 > 87.99.47.216.52682: Flags [P.], seq 1339023613:1339023616, ack 1500584971, win 81, length 3
23:10:34.472197 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52682 > 157.56.52.34.40015: Flags [.], ack 3, win 256, length 0
23:10:34.652255 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 157.56.52.34.40015 > 87.99.47.216.52682: Flags [P.], seq 3:13, ack 1, win 81, length 10
23:10:34.653788 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 62: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52682 > 157.56.52.34.40015: Flags [P.], seq 1:5, ack 13, win 256, length 4
23:10:34.877878 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 157.56.52.34.40015 > 87.99.47.216.52682: Flags [.], ack 5, win 81, length 0
23:10:35.907825 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
23:10:37.656800 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:38.080791 00:0f:e2:07:f2:e0 > 01:80:c2:00:00:0a, ethertype 802.1Q (0x8100), length 164: vlan 2, p 1, ethertype 0x88a7,
        0x0000:  0003 0000 01b4 b770 0001 000e 0000 0000  .......p........
        0x0010:  5866 ba12 4cf3 0007 0011 4833 4320 5333  Xf..L.....H3C.S3
        0x0020:  3130 302d 3532 5000 0e00 1153 3331 3030  100-52P....S3100
        0x0030:  2d31 3730 3250 3033 0011 0013 5265 6c65  -1702P03....Rele
        0x0040:  6173 6520 3137 3032 5030 3300 1000 0733  ase.1702P03....3
        0x0050:  3035 000c 0014 1000 0000 0000 0000 0000  05..............
        0x0060:  0000 0000 0000 0003 0014 7377 312d 6862  ..........sw1-hb
        0x0070:  732d 3630 612e 7772 6f63 0002 0012 4574  s-60a.wroc....Et
        0x0080:  6865 726e 6574 312f 302f 3130 000b 0006  hernet1/0/10....
        0x0090:  0003                                     ..
23:10:38.829640 b8:af:67:b4:76:f7 > 01:80:c2:00:00:0e, ethertype 802.1Q (0x8100), length 376: vlan 2, p 1, ethertype LLDP, LLDP, name sw1-gjw-46_48.wroc, length 358
23:10:40.657202 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:43.657333 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:44.782868 00:1f:d0:06:b6:59 > 33:33:00:01:00:02, ethertype 802.1Q (0x8100), length 156: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.546 > ff02::1:2.547: dhcp6 solicit
23:10:45.668142 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 192: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53383 > 157.55.235.150.40042: UDP, length 146
23:10:45.668340 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 80: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53383 > 111.221.74.31.40023: UDP, length 34
23:10:45.668504 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 78: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53383 > 111.221.77.153.40031: UDP, length 32
23:10:45.712666 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 67: vlan 2, p 1, ethertype IPv4, 157.55.235.150.40042 > 87.99.47.216.53383: UDP, length 21
23:10:45.782276 00:1f:d0:06:b6:59 > 33:33:00:01:00:02, ethertype 802.1Q (0x8100), length 156: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.546 > ff02::1:2.547: dhcp6 solicit
23:10:45.907847 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
23:10:45.942191 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 487: vlan 2, p 1, ethertype IPv4, 111.221.77.153.40031 > 87.99.47.216.53383: UDP, length 441
23:10:45.949254 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 175: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53383 > 213.199.179.166.40040: UDP, length 129
23:10:45.962121 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 597: vlan 2, p 1, ethertype IPv4, 111.221.74.31.40023 > 87.99.47.216.53383: UDP, length 551
23:10:45.964865 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 187: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53383 > 157.56.52.16.40018: UDP, length 141
23:10:45.974804 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 95: vlan 2, p 1, ethertype IPv4, 213.199.179.166.40040 > 87.99.47.216.53383: UDP, length 49
23:10:46.144250 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 67: vlan 2, p 1, ethertype IPv4, 157.56.52.16.40018 > 87.99.47.216.53383: UDP, length 21
23:10:47.657885 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:47.782364 00:1f:d0:06:b6:59 > 33:33:00:01:00:02, ethertype 802.1Q (0x8100), length 156: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.546 > ff02::1:2.547: dhcp6 solicit
23:10:48.341882 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 113: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [P.], seq 55:110, ack 1, win 1944, length 55
23:10:48.394396 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [.], ack 110, win 16252, length 0
23:10:50.659667 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:51.784632 00:1f:d0:06:b6:59 > 33:33:00:01:00:02, ethertype 802.1Q (0x8100), length 156: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.546 > ff02::1:2.547: dhcp6 solicit
23:10:53.198704 c0:c1:c0:36:fd:24 > 01:00:5e:00:00:02, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 87.99.47.101 > 224.0.0.2: igmp v2 report 224.0.0.2
23:10:53.659790 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:55.906978 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
23:10:56.211606 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 1488: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [.], seq 1:1431, ack 110, win 16252, length 1430
23:10:56.212308 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 1488: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [.], seq 1431:2861, ack 110, win 16252, length 1430
23:10:56.212444 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 439: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [P.], seq 2861:3242, ack 110, win 16252, length 381
23:10:56.212540 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 91: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [P.], seq 3242:3275, ack 110, win 16252, length 33
23:10:56.238349 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [.], ack 1431, win 1944, length 0
23:10:56.238802 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [.], ack 3242, win 1944, length 0
23:10:56.238932 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [.], ack 3275, win 1944, length 0
23:10:56.441837 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 175: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [P.], seq 110:227, ack 3275, win 1944, length 117
23:10:56.442025 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 913: vlan 2, p 1, ethertype IPv4, 173.194.113.53.443 > 87.99.47.216.53417: Flags [P.], seq 227:1082, ack 3275, win 1944, length 855
23:10:56.443597 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53417 > 173.194.113.53.443: Flags [.], ack 1082, win 16445, length 0
23:10:57.664179 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:10:58.299666 00:1e:e5:95:4c:fd > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.93.61644 > 224.0.0.252.5355: UDP, length 22
23:10:58.407465 00:1e:e5:95:4c:fd > 01:00:5e:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.93.61644 > 224.0.0.252.5355: UDP, length 22
23:10:59.286135 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 80: vlan 2, p 0, ethertype IPv4, 87.99.47.216.58964 > 87.99.33.159.53: 8487+ A? tools.google.com. (34)
23:10:59.286613 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 414: vlan 2, p 1, ethertype IPv4, 87.99.33.159.53 > 87.99.47.216.58964: 8487 12/4/4 CNAME tools.l.google.com., A 173.194.112.198, A 173.194.112.199, A 173.194.112.200, A 173.194.112.201, A 173.194.112.206, A 173.194.112.192, A 173.194.112.193, A 173.194.112.194, A 173.194.112.195, A 173.194.112.196, A 173.194.112.197 (368)
23:10:59.288319 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 80: vlan 2, p 0, ethertype IPv4, 87.99.47.216.58964 > 87.99.33.19.53: 8487+ A? tools.google.com. (34)
23:10:59.289246 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 414: vlan 2, p 1, ethertype IPv4, 87.99.33.19.53 > 87.99.47.216.58964: 8487 12/4/4 CNAME tools.l.google.com., A 173.194.112.201, A 173.194.112.206, A 173.194.112.192, A 173.194.112.193, A 173.194.112.194, A 173.194.112.195, A 173.194.112.196, A 173.194.112.197, A 173.194.112.198, A 173.194.112.199, A 173.194.112.200 (368)
23:10:59.298679 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 70: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53884 > 173.194.112.198.80: Flags [S], seq 2932906050, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:10:59.322839 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 70: vlan 2, p 1, ethertype IPv4, 173.194.112.198.80 > 87.99.47.216.53884: Flags [S.], seq 2974975003, ack 2932906051, win 62920, options [mss 1430,nop,nop,sackOK,nop,wscale 6], length 0
23:10:59.324323 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53884 > 173.194.112.198.80: Flags [.], ack 1, win 256, length 0
23:10:59.324462 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 704: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53884 > 173.194.112.198.80: Flags [P.], seq 1:647, ack 1, win 256, length 646
23:10:59.324568 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 704: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53884 > 173.194.112.198.80: Flags [P.], seq 647:1293, ack 1, win 256, length 646
23:10:59.348679 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.112.198.80 > 87.99.47.216.53884: Flags [.], ack 647, win 1002, length 0
23:10:59.348848 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.112.198.80 > 87.99.47.216.53884: Flags [.], ack 1293, win 1002, length 0
23:10:59.505344 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 938: vlan 2, p 1, ethertype IPv4, 173.194.112.198.80 > 87.99.47.216.53884: Flags [P.], seq 1:881, ack 1293, win 1002, length 880
23:10:59.558061 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53884 > 173.194.112.198.80: Flags [.], ack 881, win 253, length 0
23:10:59.575478 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53884 > 173.194.112.198.80: Flags [R.], seq 1293, ack 881, win 0, length 0
23:10:59.788013 00:1f:d0:06:b6:59 > 33:33:00:01:00:02, ethertype 802.1Q (0x8100), length 156: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.546 > ff02::1:2.547: dhcp6 solicit
23:11:00.664120 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:11:00.725057 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 70: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53886 > 213.189.48.247.80: Flags [S], seq 3088716597, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
23:11:00.737264 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 66: vlan 2, p 1, ethertype IPv4, 213.189.48.247.80 > 87.99.47.216.53886: Flags [S.], seq 4108036713, ack 3088716598, win 65535, options [mss 1460,sackOK,eol], length 0
23:11:00.738813 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53886 > 213.189.48.247.80: Flags [.], ack 1, win 64240, length 0
23:11:00.738954 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 1086: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53886 > 213.189.48.247.80: Flags [P.], seq 1:1029, ack 1, win 64240, length 1028
23:11:00.751551 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 749: vlan 2, p 1, ethertype IPv4, 213.189.48.247.80 > 87.99.47.216.53886: Flags [P.], seq 1:692, ack 1029, win 65535, length 691
23:11:00.815403 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 58: vlan 2, p 0, ethertype IPv4, 87.99.47.216.53886 > 213.189.48.247.80: Flags [.], ack 692, win 63549, length 0
23:11:02.998306 00:1e:58:0e:a8:93 > 00:78:30:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.20.50068 > 224.0.0.252.5355: UDP, length 22
23:11:03.098205 00:1e:58:0e:a8:93 > 00:78:30:00:00:fc, ethertype 802.1Q (0x8100), length 68: vlan 2, p 1, ethertype IPv4, 87.99.47.20.50068 > 224.0.0.252.5355: UDP, length 22
23:11:03.666242 00:1f:d0:06:b6:59 > 33:33:00:00:00:0c, ethertype 802.1Q (0x8100), length 212: vlan 2, p 1, ethertype IPv6, fe80::b91e:a1ca:1adb:685a.64833 > ff02::c.1900: UDP, length 146
23:11:03.790094 00:12:2a:81:9a:40 > 20:fd:f1:c9:2b:a0, ethertype 802.1Q (0x8100), length 111: vlan 2, p 0, ethertype IPv4, 87.99.47.216.52677 > 173.194.69.125.5222: Flags [P.], seq 53:106, ack 1, win 251, length 53
23:11:03.832876 20:fd:f1:c9:2b:a0 > 00:12:2a:81:9a:40, ethertype 802.1Q (0x8100), length 64: vlan 2, p 1, ethertype IPv4, 173.194.69.125.5222 > 87.99.47.216.52677: Flags [.], ack 106, win 1002, length 0
23:11:05.906119 00:04:75:ff:85:f4 > 01:00:5e:00:00:05, ethertype 802.1Q (0x8100), length 82: vlan 2, p 1, ethertype IPv4, 172.24.51.129 > 224.0.0.5: OSPFv2, Hello, length 44
^C

Ostatni, pokazujący bootowanie netiaspota - załącznik all.pcap - http://www.sendspace.com/file/z6xcbd

root@OpenWrt:~# tcpdump dst not 192.168.1.187 and src not 192.168.1.187 -enni eth0 -w all.pcap
tcpdump: WARNING: eth0: no IPv4 address assigned
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
^C2551 packets captured
4100 packets received by filter
1548 packets dropped by kernel

Czy jesteście w stanie coś z tego wyciągnąć.
Byłbym bardzo bardzo wdzieczny, jeżeli udałoby się dobrnąć do sukcesu...

39

Odp: iptv / multicast - internetia

ok.
A jak masz dokładnie podłączone fizycznie ? Topologia mnie interesuje.
Do czego masz podłączonego wr1043nd ?

Mam prośbę czy mógłbyś się zalogować do netia spot i wkleić zrzut ekranu zakładki "Przełącznik"
Strona 111/112 instrukcji http://www.netia.pl/files/_netia_spot/i … yjnego.pdf

oraz zakładkę "Routing"
strona 122/123 w/w instrukcji

Widać, że netia spot ma opcję igmp proxy
więc raczej szykuj tę konfigurację co mówił allossek
http://wiki.openwrt.org/doc/howto/udp_multicast

40 (edytowany przez rpc 2013-06-16 08:10:28)

Odp: iptv / multicast - internetia

Ale żeś przekosił log smile
ale dziwne że netia nie blokuje od strony wan tych wszystkich dzikich zapytań

Skanowałeś eth0 i wyskanowałeś cały busz internetu

mnie interesuje skan eth0.1 oraz eth0.1000 tylko smile
i niech nic oprócz twojego kompa i netiaplayer nie będzie podłączone więcej.

ale jeszcze patrze co tam jest.

41 (edytowany przez rpc 2013-06-16 08:57:23)

Odp: iptv / multicast - internetia

sprawdź jeszcze czy na netiaspot jest odpalona usługa upnp

ponieważ netiaplayer ciągle odpytuje openwrt o to chcąc przekierować sobie jakieś porty

można sprawdzić co on tam chce
http://192.168.1.4:5678/description.xml

Wygląda na to że netiaplayer pyta się o uprawnienia do oglądania telewizji (poszczególnych kanałów polsat/tv4 itd.) i je otrzymuje z hosta 87.99.47.216 (w postaci sum md5 i czasu)

42

Odp: iptv / multicast - internetia

szwabek napisał/a:

2. Nie wiem czy usług igmpproxy jest włączona. Jak to moge sprawdzić?

Włączysz, za pomocą

 
/etc/init.d/igmpproxy start
szwabek napisał/a:

Plik konfiguracyjny stworzyłem:

root@OpenWrt:~# cat /etc/igmpproxy.conf
quickleave
# eth1 is the WAN interface
# 10.254.0.0/16 is the ip range your ISP sends multicast from
phyint eth1 upstream  ratelimit 0  threshold 1
        altnet 10.4.42.0/24
        altnet 87.99.47.216/24
# br-lan is LAN bridge
phyint br-lan downstream  ratelimit 0  threshold 1
phyint eth2 disabled

1. Nie  wiem czy jest poprawny

Nie, w AA musisz tak:
w pliku

/etc/config/igmpproxy
config igmpproxy
        option quickleave 1

config phyint
        option network wan_iptv
        option direction upstream
        list altnet 172.18.0.0/16

config phyint
        option network lan
        option direction downstream

Ustawiasz odpowiednio altnet
i teraz cyt.


If you're not sure what to specify for altnet, comment it out and look for the igmpproxy output in the log (or on stdout if you start it in debug mode), it'll say something like Warn: The source address 10.254.16.66 for group 233.32.240.222, is not in any valid net for upstream VIF. and so you'll learn the multicast source address for your ISP.

Co w skrócie oznacza jeśli nie znasz altnet zajrzyj do logu (logread) i stamtąd wykapuj altnet
potem ustaw znowu i restart (/etc/init.d/igmpproxy resart)

Jak nie zadział to zaraz po tym poleceniu wrzuć  wynik "logread"

Odpuść póki co te iptables itp.
Przejdź ścieżkę z igmpproxy to musi zadziałać, co najwyżej będzie to wymagać trochę walki.

TP-Link TL-WDR4300 v1, Reboot (17.01-SNAPSHOT, r3876-efb6ca1)

43

Odp: iptv / multicast - internetia

zgadzam się z allosek

jednakże nawet jak odpalisz to daj te zrzuty z netiaspot dla innych się przyda w przyszłości

44

Odp: iptv / multicast - internetia

Panowie,

Bardzo ale to bardzo dziękuje Wam za te odp.
@rpc: przeczytałeś nawet instrukcję netia spota, czego ja nie zrobiłem <kaja_sie>
@alossek: nie znalazłem nigdzie info jak skonfigurować to imgpproxy, więc pewnie ratujesz mi tyłek

W niedz jednak miałem straszny młyn, a po południu wyjechałem w delegację. Będę w śr w nocy w domu i jak tylko będzie to możliwe, to sprawdzę wszystko i oczywiście opiszę.

Pozdrawiam.

45

Odp: iptv / multicast - internetia

Cześć,

Wróciłem i testuję. Nadal nie udało mi się uruchomić....

Zacznę od configu Netia Spota. Wcześniej obsługiwałem ten interfejs z poziomu użytkownika "user" a nie "admin". Stąd nie widziałem tych wpisów... eh

WAN:
http://i44.tinypic.com/2zew6yr.png

IPTV:
http://i42.tinypic.com/2ypdcll.png
http://i40.tinypic.com/30wnsx4.png

Routing:
http://i40.tinypic.com/rgxymv.png

UPNP:
http://i39.tinypic.com/2l96z40.png

Zrobiłem tak jak pisał alossek
Nie wiem jednak jak altnet powinien być skonfigurowany, poniżej logread:

root@OpenWrt:~# logread
Jun 20 00:26:01 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:26:11 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:26:12 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:13 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.1 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:13 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:21 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:26:25 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:31 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:26:41 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:26:41 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:44 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.1 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:51 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:26:51 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:26:52 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:27:01 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:04 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:27:11 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:14 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:27:21 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:25 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:27:31 OpenWrt user.warn igmpproxy[2589]: The source address 83.238.252.169 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:31 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:36 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:27:41 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:51 OpenWrt user.warn igmpproxy[2589]: The source address 195.191.9.41 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:27:55 OpenWrt user.warn igmpproxy[2589]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:28:00 OpenWrt user.warn igmpproxy[2589]: select() failure; Errno(4): Interrupted system call
Jun 20 00:28:06 OpenWrt user.warn igmpproxy[2969]: The origin for route 239.255.255.250 changed from 192.168.1.4 to 192.168.1.187
Jun 20 00:28:32 OpenWrt user.warn igmpproxy[2969]: The origin for route 239.255.255.250 changed from 192.168.1.187 to 192.168.1.1
Jun 20 00:28:55 OpenWrt user.warn igmpproxy[2969]: select() failure; Errno(4): Interrupted system call
Jun 20 00:28:55 OpenWrt user.warn igmpproxy[2969]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:29:04 OpenWrt user.warn igmpproxy[3131]: The origin for route 239.255.255.250 changed from 192.168.1.1 to 192.168.1.4
Jun 20 00:29:04 OpenWrt user.warn igmpproxy[3131]: The origin for route 239.255.255.250 changed from 192.168.1.4 to 192.168.1.187
Jun 20 00:29:15 OpenWrt daemon.info hostapd: wlan0: STA 6c:71:d9:1d:18:5f WPA: group key handshake completed (RSN)
Jun 20 00:29:18 OpenWrt user.warn igmpproxy[3131]: select() failure; Errno(4): Interrupted system call
Jun 20 00:29:22 OpenWrt user.warn igmpproxy[3198]: The origin for route 239.255.255.250 changed from 192.168.1.187 to 192.168.1.4
Jun 20 00:30:00 OpenWrt user.warn igmpproxy[3198]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:30:03 OpenWrt daemon.notice netifd: wan (702): Sending renew...
Jun 20 00:30:03 OpenWrt daemon.notice netifd: wan (702): Lease of 87.99.47.216 obtained, lease time 2400
Jun 20 00:30:07 OpenWrt daemon.info dnsmasq[1866]: reading /tmp/resolv.conf.auto
Jun 20 00:30:07 OpenWrt daemon.info dnsmasq[1866]: using nameserver 87.99.33.19#53
Jun 20 00:30:07 OpenWrt daemon.info dnsmasq[1866]: using nameserver 87.99.33.159#53
Jun 20 00:30:07 OpenWrt daemon.info dnsmasq[1866]: using local addresses only for domain lan
Jun 20 00:30:11 OpenWrt user.warn igmpproxy[3198]: The source address 83.238.252.169 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:30:11 OpenWrt user.warn igmpproxy[3198]: The source address 172.24.18.128 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:30:11 OpenWrt user.warn igmpproxy[3198]: The source address 172.24.10.14 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:30:30 OpenWrt user.warn igmpproxy[3198]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:30:30 OpenWrt user.warn igmpproxy[3198]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:30:30 OpenWrt user.warn igmpproxy[3198]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:30:41 OpenWrt user.warn igmpproxy[3198]: The source address 172.24.18.128 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:30:44 OpenWrt user.warn igmpproxy[3198]: select() failure; Errno(4): Interrupted system call
Jun 20 00:30:45 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:30:48 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:03 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:16 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:21 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:35 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:45 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:47 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.1 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:48 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:31:57 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:32:07 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:32:18 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:32:37 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:32:51 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:32:51 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.18.128 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:33:01 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:33:13 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:33:27 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:33:38 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:33:48 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:33:54 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:33:58 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:34:18 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:34:29 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:34:49 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:35:00 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:35:12 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:35:22 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:35:35 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:35:51 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:35:57 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:06 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:07 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:36:07 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:36:07 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:36:07 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:36:16 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:29 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:32 OpenWrt user.warn igmpproxy[3440]: The source address 83.238.252.169 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:32 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.10.14 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:32 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.18.128 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:42 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:52 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:37:11 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:37:21 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:37:31 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.10.14 for group 239.200.5.6, is not in any valid net for upstream VIF.
Jun 20 00:37:32 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:37:47 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:03 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:08 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.187 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:12 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:38:13 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:28 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:40 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:55 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:57 OpenWrt user.warn igmpproxy[3440]: The source address 83.238.252.169 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:57 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.18.128 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:57 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.10.14 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:38:57 OpenWrt user.warn igmpproxy[3440]: The source address 10.100.16.43 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:39:06 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:39:15 OpenWrt daemon.info hostapd: wlan0: STA 6c:71:d9:1d:18:5f WPA: group key handshake completed (RSN)
Jun 20 00:39:16 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:39:34 OpenWrt user.warn igmpproxy[3440]: The source address 192.168.1.4 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:39:40 OpenWrt user.warn igmpproxy[3440]: select() failure; Errno(4): Interrupted system call
Jun 20 00:39:40 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory
Jun 20 00:39:40 OpenWrt user.warn igmpproxy[3440]: MRT_DEL_MFC; Errno(2): No such file or directory

Zainstalowałem i uruchomiłem upnp. Według luci działa.

46 (edytowany przez rpc 2013-06-20 07:47:07)

Odp: iptv / multicast - internetia

wpisz
altnet 239.0.0.0/8
altnet 10.0.0.0/8
altnet 195.0.0.0/8


W zasadzie to procedura jest taka
robi się czystą konfigurację /etc/igmpproxy.xonf

quickleave
phyint eth0.1000 upstream  ratelimit 0  threshold 1
phyint br-lan downstream  ratelimit 0  threshold 1
phyint lo disabled

a wedle openwrt w pliku /etc/config/igmpproxy

config igmpproxy
        option quickleave 1

config phyint
        option network wan_iptv
        option direction upstream

config phyint
        option network lan
        option direction downstream

i wtedy zobacz co powiedzą logi
igmpproxy -d -v /etc/igmpproxy.conf
w openwrt logread patrzysz

i szukaj czegoś w rodzaju (mogą być inne adresy !!!)

RECV Membership query   from 10.253.88.1     to 224.0.0.1
RECV Membership query   from 10.254.88.1     to 224.0.0.1
RECV V2 member report   from 88.222.27.35    to 239.255.255.250

a po wszystkim robisz konfig np.

config igmpproxy
        option quickleave 1

config phyint
        option network wan_iptv
        option direction upstream
        list altnet 239.0.0.0/8
        list altnet 10.0.0.0/8
        list altnet 195.0.0.0/8 

config phyint
        option network lan
        option direction downstream

do tego oczywiście firewall

47 (edytowany przez alossek 2013-06-20 07:54:29)

Odp: iptv / multicast - internetia

Do tego co pisze rpc spróbuj może dodatkowo
altnet 172.24.0.0/16

ewentualnie możesz
altnet 10.100.0.0/16 (zamiast  10.0.0.0/8)
altnet 195.191.0.0/16 (zamiast 195.0.0.0/8)
(nie ma to raczej większego znaczenia - propozycja rpc obejmie po prostu szerszy zakres adresów)

ten raczej sobie odpuść
altnet 239.0.0.0/8
(bo to właściwie adres grupy niż źródło)

TP-Link TL-WDR4300 v1, Reboot (17.01-SNAPSHOT, r3876-efb6ca1)

48 (edytowany przez rpc 2013-06-20 07:59:34)

Odp: iptv / multicast - internetia

tyle że jak skanował to raczej nic z 172.24.0.0/16 nie widziałem ale spróbować nie zawadzi a i tak zawęzi poszukiwania
alleosek tak adres grupy masz rację ale 239.200.5.6 jednak występuje

49

Odp: iptv / multicast - internetia

rpc napisał/a:

tyle że jak skanował to raczej nic z 172.24.0.0/16 nie widziałem ale spróbować nie zawadzi a i tak zawęzi poszukiwania

Ja tam widzę, cyt.

Jun 20 00:36:32 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.10.14 for group 239.255.255.250, is not in any valid net for upstream VIF.
Jun 20 00:36:32 OpenWrt user.warn igmpproxy[3440]: The source address 172.24.18.128 for group 239.255.255.250, is not in any valid net for upstream VIF.
TP-Link TL-WDR4300 v1, Reboot (17.01-SNAPSHOT, r3876-efb6ca1)

50

Odp: iptv / multicast - internetia

tak masz rację teraz widzę w logu od vlan1000

length 64: vlan 1000, p 0, ethertype IPv4, 172.24.10.14 > 224.0.0.1: igmp query v2

sądziłem że to się pojawiło z przykładowego konfigu jaki podałeś