226

(4 odpowiedzi, napisanych Oprogramowanie / Software)

Post generalnie nawiązuje do tego tematu http://eko.one.pl/forum/viewtopic.php?id=8727
Zmieniła się adresacja sieci ale koncepcja ta sama.
Moja obecna konfiguracja :

network

config interface 'loopback'
    option ifname 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config interface 'lan'
    option ifname 'eth0.1'
    option type 'bridge'
    option proto 'static'
    option ipaddr '10.1.1.1'
    option netmask '255.255.255.0'

config interface 'lan2'
    option ifname 'eth0.3'
    option type 'bridge'
    option proto 'static'
    option ipaddr '10.1.2.1'
    option netmask '255.255.255.0'

config interface 'guest'
    option proto 'static'
    option ipaddr '10.1.3.1'
    option netmask '255.255.255.0'

config interface 'wan'
    option ifname 'eth0.2'
    option proto 'dhcp'
    option peerdns '0'
    option dns '208.67.222.222 208.67.220.220'
    option macaddr '1c:6f:65:a4:07:1e'

config switch
    option name 'eth0'
    option reset '1'
    option enable_vlan '1'

config switch_vlan
    option device 'eth0'
    option vlan '1'
    option ports '0t 3 4 5'

config switch_vlan
    option device 'eth0'
    option vlan '2'
    option ports '0t 1'

config switch_vlan
    option device 'eth0'
    option vlan '3'
    option ports '0t 2'

dhcp

config dnsmasq
    option domainneeded '1'
    option boguspriv '1'
    option localise_queries '1'
    option rebind_protection '1'
    option rebind_localhost '1'
    option local '/lan/'
    option domain 'mojadomena.pl'
    option expandhosts '1'
    option authoritative '1'
    option readethers '1'
    option leasefile '/tmp/dhcp.leases'
    option noresolv '1'
    option logqueries '0'
    list server '127.0.0.1#2053'
    list server '/pool.ntp.org/208.67.222.222'

config dhcp 'lan'
    option interface 'lan'
    option start '150'
    option limit '51'
    option leasetime '12h'

config dhcp 'lan2'
        option interface 'lan2'
        option start '150'
        option limit '51'
        option leasetime '12h'

config dhcp 'guest'
    option interface 'guest'
    option start '10'
    option limit '11'
    option leasetime '1h'

config dhcp 'wan'
    option interface 'wan'
    option ignore '1'

# LAN
...

config host
        option name 'NAS'
        option mac '00:11:32:0f:a1:26'
        option ip '10.1.1.60'
...

# LAN2

...
config host
        option name 'NAS2'
        option mac '00:11:32:13:d9:d5'
        option ip '10.1.2.60'

config host
        option name 'Linbox'
        option mac '00:09:34:3b:25:ef'
        option ip '10.1.2.101'
...

firewall

config defaults
    option syn_flood '1'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'lan'
    list network 'lan'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'lan2'
    option network 'lan2'
    option input 'REJECT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'guest'
    option network 'guest'
    option input 'REJECT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'wan'
    list network 'wan'
    list network 'wan6'
    option input 'REJECT'
    option output 'ACCEPT'
    option forward 'REJECT'
    option masq '1'
    option mtu_fix '1'

config forwarding
    option src 'lan'
    option dest 'wan'

config forwarding
    option src 'lan2'
    option dest 'wan'

config forwarding
    option src 'guest'
    option dest 'wan'

config rule
    option name 'Allow-DHCP-Renew'
    option src 'wan'
    option proto 'udp'
    option dest_port '68'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Allow-Ping'
    option src 'wan'
    option proto 'icmp'
    option icmp_type 'echo-request'
    option family 'ipv4'
    option target 'ACCEPT'

config rule
    option name 'Allow-DHCPv6'
    option src 'wan'
    option proto 'udp'
    option src_ip 'fe80::/10'
    option src_port '547'
    option dest_ip 'fe80::/10'
    option dest_port '546'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-ICMPv6-Input'
    option src 'wan'
    option proto 'icmp'
    list icmp_type 'echo-request'
    list icmp_type 'echo-reply'
    list icmp_type 'destination-unreachable'
    list icmp_type 'packet-too-big'
    list icmp_type 'time-exceeded'
    list icmp_type 'bad-header'
    list icmp_type 'unknown-header-type'
    list icmp_type 'router-solicitation'
    list icmp_type 'neighbour-solicitation'
    list icmp_type 'router-advertisement'
    list icmp_type 'neighbour-advertisement'
    option limit '1000/sec'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-ICMPv6-Forward'
    option src 'wan'
    option dest '*'
    option proto 'icmp'
    list icmp_type 'echo-request'
    list icmp_type 'echo-reply'
    list icmp_type 'destination-unreachable'
    list icmp_type 'packet-too-big'
    list icmp_type 'time-exceeded'
    list icmp_type 'bad-header'
    list icmp_type 'unknown-header-type'
    option limit '1000/sec'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'LAN2 DNS'
    option src 'lan2'
    option dest_port '53'
    option proto 'tcpudp'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'LAN2 DHCP'
    option src 'lan2'
    option src_port '67-68'
    option dest_port '67-68'
    option proto 'udp'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Guest DNS'
    option src 'guest'
    option dest_port '53'
    option proto 'tcpudp'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Guest DHCP'
    option src 'guest'
    option src_port '67-68'
    option dest_port '67-68'
    option proto 'udp'
    option target 'ACCEPT'
    option family 'ipv4'

config include
    option path '/etc/firewall.user'

config rule
        option name 'NAS2->NAS'
        option src 'lan2'
        option src_ip '10.1.2.60'
        option proto 'tcpudp'
        option dest 'lan'
        option dest_ip '10.1.1.60'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'NAS->LAN2'
        option src 'lan'
        option src_ip '10.1.1.60'
        option proto 'tcpudp'
        option dest 'lan2'
        option target 'ACCEPT'
        option family 'ipv4'

config redirect
        option target 'DNAT'
        option src 'wan'
        option dest 'lan'
        option proto 'tcp'
        option src_dport '80'
        option dest_port '80'
        option dest_ip '10.1.1.60'
        option name 'Syno HTTP'

config redirect
        option target 'DNAT'
        option src 'wan'
        option dest 'lan'
        option proto 'tcp'
        option src_dport '443'
        option dest_ip '10.1.1.60'
        option dest_port '443'
        option name 'Syno HTTPs'

config redirect
        option target 'DNAT'
        option src 'wan'
        option dest 'lan'
        option proto 'tcp'
        option src_dport '25'
        option dest_ip '10.1.1.60'
        option dest_port '25'
        option name 'Syno SMTP'

Sieci są odseparowane, pozwoliłem na ruch pomiędzy NAS-ami w LAN i LAN2
W LAN stoi NAS z przekierowanymi portami 25,80,443

Teraz zauważyłem problem i nie wiem jak sobie poradzić.

W LAN2 mam np. tuner SAT, który ściąga paczki z repo opkg znajdującego się na NAS-ie

ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=46 time=39.5 ms
64 bytes from 8.8.8.8: icmp_seq=1 ttl=46 time=39.9 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=46 time=39.3 ms

/tmp > ping mojadomena.pl
PING mojadomena.pl (xx.xx.xx.244): 56 data bytes

--- mojadomena.pl ping statistics ---
14 packets transmitted, 0 packets received, 100% packet loss


/tmp > wget  http://mojadomena.pl/e2/mipsel/Packages.gz
Connecting to mojadomena.pl[xx.xx.xx.244]:80
wget: Unable to connect to remote host (xx.xx.xx.244): Connection refused

227

(76 odpowiedzi, napisanych Oprogramowanie / Software)

Zrób co kazał @Cezary

touch /etc/mc/sfs.ini
mkdir -p /usr/lib/mc/extfs.d

Ja mam krzaki w mc jak w putty przy łączeniu w "Translation" mam ustawione UTF-8
Zmieniam na ISO-8859-2 i nie ma problemu.

228

(23 odpowiedzi, napisanych Oprogramowanie / Software)

pijak6666 napisał/a:

Własnie jest podłączony internet do portu  WAN ..... z modemu netii

Podłączyłeś a skonfigurowałeś połączenie ppoe dla WAN ?

http://eko.one.pl/?p=openwrt-trybypracy
http://wiki.openwrt.org/doc/uci/network

229

(7 odpowiedzi, napisanych Oprogramowanie / Software)

To więcej to aktualizacja pakietów doinstalowanych na extroot przez opkg upgrade ?
Dziękuję @Cezary

230

(7 odpowiedzi, napisanych Oprogramowanie / Software)

Jestem właśnie w tej samej sytuacji.
Od ostatniego wydania AA niewiele się zmieniło także wydaje mi się, że mogę zrobić sysupgrade bez "-n"
Rozumiem, że po tym wystarczy usunąć z pena

/etc/extroot.md5sum

Po restarcie router wystartuje z flasha i teraz wystarczy :

/etc/init.d/fstab overlay_enable
reboot

231

(23 odpowiedzi, napisanych Oprogramowanie / Software)

Nie przepraszaj tylko pisz dokładniej następnym razem wink

W cronie nie ma co kolidować, on po prostu wykonuje coś w zadanym czasie.
W twoim przypadku będzie archiwizował logi co 2 godziny, o to ci chodziło ?

Zrób porządek z tym co napisałem, bo skrypt start/stop ci nie działa !

stop() {
        pkill urlsnarf
}

zmień na

stop() {
        killall -9 urlsnarf
}

lub doinstaluj jak masz miejsce

opkg update && opkg install procps --force-overwrite

232

(23 odpowiedzi, napisanych Oprogramowanie / Software)

Wiesz co, piszesz że nie wiadomo o co ci chodzi.
W twoim wcześniejszym skrypcie nie ma śladu "arch" ?
Forumowa szklana kula jest w serwisie, więc pisz dokładniej.

Po drugie w moim skrypcie nie ma ":" więc jakim cudem miałeś błąd ?
Po trzecie podstawy angielskiego :

/etc/rc.common: line 85: pkill: not found

Inaczej zabijaj urlsnarf albo doinstaluj

opkg update && opkg install procps --force-overwrite

233

(23 odpowiedzi, napisanych Oprogramowanie / Software)

#!/bin/sh
NOW=`date +%Y.%m.%d_%H.%M.%S`
WDIR='/tmp/usb_mount/dev_sda1/logwww'
FILE='log_www.txt'

/etc/init.d/log_www stop
gzip -c $WDIR/$FILE > $WDIR/$FILE_$NOW.gz
rm $WDIR/$FILE
/etc/init.d/log_www start

exit 0

Zobacz czy działa

Do tego musisz jeszcze wymusić działanie LuCI na porcie 8080

Edytuj /etc/config/uhttpd - dodaj lub zamień linijkę

list listen_http        0.0.0.0:8080

i w konsoli
/etc/init.d/uhttpd restart

Zastanów się czy na pewno chcesz otworzyć ten port.
Bezpieczniej zarządzać przez SSH lub jak już bardzo chcesz przez LuCI, to https.

opkg install luci-ssl

235

(3 odpowiedzi, napisanych Oprogramowanie / Software)

Z LuCI może być problem.
http://luci.subsignal.org/trac/ticket/489

236

(48 odpowiedzi, napisanych Oprogramowanie / Software)

Dokładnie o to mi chodzi.

Zmieniłem sprawdzanie IP z zewnętrznych serwisów na :

        option ip_source 'network'
        option ip_network 'wan'

Skrypt łączy się z changeip.com i wysyła co podałem w logu powyżej.

237

(48 odpowiedzi, napisanych Oprogramowanie / Software)

Ja to rozumiem jako interwał między sprawdzeniem czy zmieniło się IP w OpenWrt.
Widocznie źle zrozumiałem mechanizm działania tego skryptu.

238

(48 odpowiedzi, napisanych Oprogramowanie / Software)

Z ciekawości zerknąłem sobie w logi na changeip.com

Konfigurację mam następującą :

config service 'CHANGEIP'
        option interface 'wan'
        option check_interval '10'
        option check_unit 'minutes'
        option force_interval '72'
        option force_unit 'hours'
        option retry_interval '60'
        option retry_unit 'seconds'
        option service_name 'changeip.com'
        option domain 'xxx'
        option username 'xxx'
        option password 'xxx'
        option ip_source 'network'
        option ip_network 'wan'
        option use_https '1'
        option cacert '/etc/ssl/certs/cacert.pem'
        option enabled '1'

Czy to normalne,że skrypt łączy się z dostawcą usługi co 10 minut ?
Powinien chyba tylko w momencie zmiany IP ?

06/10/2014 7:26:38 UTC     D:0  R:0  S:1     200     /nic/update?u=xxx&p=***&cmd=update&hostname=xxx&ip=xx.xx.xx.244     xx.xx.xx.244     1     curl/7.29.0
06/10/2014 7:16:36 UTC     D:0  R:0  S:1     200     /nic/update?u=xxx&p=***&cmd=update&hostname=xxx&ip=xx.xx.xx.244     xx.xx.xx.244     1     curl/7.29.0
06/10/2014 7:06:34 UTC     D:0  R:0  S:1     200     /nic/update?u=xxx&p=***&cmd=update&hostname=xxx&ip=xx.xx.xx.244     xx.xx.xx.244     1     curl/7.29.0
06/10/2014 6:56:32 UTC     D:0  R:0  S:1     200     /nic/update?u=xxx&p=***&cmd=update&hostname=xxx&ip=xx.xx.xx.244     xx.xx.xx.244     1     curl/7.29.0
06/10/2014 6:46:29 UTC     D:0  R:0  S:1     200     /nic/update?u=xxx&p=***&cmd=update&hostname=xxx&ip=xx.xx.xx.244     xx.xx.xx.244     1     curl/7.29.0
06/10/2014 6:36:27 UTC     D:0  R:0  S:1     200     /nic/update?u=xxx&p=***&cmd=update&hostname=xxx&ip=xx.xx.xx.244     xx.xx.xx.244     1     curl/7.29.0

239

(14 odpowiedzi, napisanych Oprogramowanie / Software)

Zobacz czy działa

http://s000.tinyupload.com/index.php?fi … 6986153213

Poczytaj o odwoływaniu certyfikatów.

https://openvpn.net/index.php/open-sour … tml#revoke

241

(6 odpowiedzi, napisanych Oprogramowanie / Software)

A co nie działa ?

242

(10 odpowiedzi, napisanych Oprogramowanie / Software)

Na 150m to nie będzie przerost formy nad treścią ?
Ja też mam linka na około 150m i przy locoM5 skręcenie mocy na minimum to i tak za dużo.

Jako most polecam, działa u mnie już prawie rok bez żadnych problemów.
Uptime kilka miesięcy  praktycznie do padu zasilania.

Przez LuCI nie dasz rady.

Zobacz /etc/sysctl.conf

...
net.netfilter.nf_conntrack_max=16384
...

Dziękuję @Cezary za zainteresowanie tematem i pomoc.

lan z adresacją 10.0.0.1 będzie u mnie
lan2 z adresacją 10.0.1.1 u matki.

Generalnie lan2 ma mieć internet i tylko kilka urządzeń będzie miało dostęp do lan1.
Natomiast z lan chcę mieć dostęp do lan2 w razie jakby trzeba było się połączyć np. z NAS-em i coś skonfigurować.

@Cezary sądzisz, że bezpieczniej będzie zrobić to regułką analogiczną jak udało mi się przepuścić ruch z lan2 do lan ?

config rule
        option name 'LAN->LAN2'
        option target 'ACCEPT'
        option src 'lan'
        option src_ip '10.0.0.XX'
        option dest 'lan2'
        option proto 'all'
        option family 'ipv4'

Dobra działa, źle się zabrałem do testowania.
Przemęczenie robi swoje, do problemu trzeba podejść na świeżo smile
Postawiłem na laptopie w LAN serwer SSH i udało mi się z nim połączyć z LAN2 regułką, którą stosowałem wcześniej.

config rule
        option name 'NAS2->LAN'
        option target 'ACCEPT'
        option src 'lan2'
        option src_ip '10.0.1.60'
        option dest 'lan'
        option proto 'all'
        option family 'ipv4'

Teraz mam jeszcze pytanie, jeżeli chcę mieć dostęp z LAN do LAN2 wystarczy, że zmienię ? :

config zone
    option name 'lan'
    list network 'lan'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'REJECT' -> 'ACCEPT' ?

Testowałem i działa ale jak ma to się do bezpieczeństwa?
Domyślnie forward jest 'reject'.

Zmiana proto nie przyniosła efektu.
Sprawdzałem już wcześniej.

Nie jestem pewien czy o to ci chodziło @Cezary
Ja nic z tego nie potrafię wywnioskować sad

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
 1792  134K delegate_input  all  --  any    any     anywhere             anywhere            

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
 1359  599K delegate_forward  all  --  any    any     anywhere             anywhere            

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
 1615  450K delegate_output  all  --  any    any     anywhere             anywhere            

Chain delegate_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination         
 1359  599K forwarding_rule  all  --  any    any     anywhere             anywhere            /* user chain for forwarding */ 
 1302  596K ACCEPT     all  --  any    any     anywhere             anywhere            ctstate RELATED,ESTABLISHED 
    0     0 zone_lan_forward  all  --  br-lan any     anywhere             anywhere            
   57  3212 zone_lan2_forward  all  --  br-lan2 any     anywhere             anywhere            
    0     0 zone_guest_forward  all  --  wlan0-1 any     anywhere             anywhere            
    0     0 zone_wan_forward  all  --  eth0.2 any     anywhere             anywhere            
    0     0 reject     all  --  any    any     anywhere             anywhere            

Chain delegate_input (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  150 12274 ACCEPT     all  --  lo     any     anywhere             anywhere            
 1642  121K input_rule  all  --  any    any     anywhere             anywhere            /* user chain for input */ 
 1200 80001 ACCEPT     all  --  any    any     anywhere             anywhere            ctstate RELATED,ESTABLISHED 
    6   360 syn_flood  tcp  --  any    any     anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN 
    0     0 zone_lan_input  all  --  br-lan any     anywhere             anywhere            
  334 28614 zone_lan2_input  all  --  br-lan2 any     anywhere             anywhere            
    0     0 zone_guest_input  all  --  wlan0-1 any     anywhere             anywhere            
  108 12713 zone_wan_input  all  --  eth0.2 any     anywhere             anywhere            

Chain delegate_output (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  150 12274 ACCEPT     all  --  any    lo      anywhere             anywhere            
 1465  438K output_rule  all  --  any    any     anywhere             anywhere            /* user chain for output */ 
 1405  429K ACCEPT     all  --  any    any     anywhere             anywhere            ctstate RELATED,ESTABLISHED 
    0     0 zone_lan_output  all  --  any    br-lan  anywhere             anywhere            
    0     0 zone_lan2_output  all  --  any    br-lan2  anywhere             anywhere            
    0     0 zone_guest_output  all  --  any    wlan0-1  anywhere             anywhere            
   60  8796 zone_wan_output  all  --  any    eth0.2  anywhere             anywhere            

Chain forwarding_guest_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain forwarding_lan2_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain forwarding_lan_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain forwarding_wan_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain input_guest_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain input_lan2_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain input_lan_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain input_wan_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain output_guest_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain output_lan2_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain output_lan_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain output_wan_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain reject (5 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 REJECT     tcp  --  any    any     anywhere             anywhere            reject-with tcp-reset 
  412 39383 REJECT     all  --  any    any     anywhere             anywhere            reject-with icmp-port-unreachable 

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    6   360 RETURN     tcp  --  any    any     anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50 
    0     0 DROP       all  --  any    any     anywhere             anywhere            

Chain zone_guest_dest_ACCEPT (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     all  --  any    wlan0-1  anywhere             anywhere            

Chain zone_guest_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 forwarding_guest_rule  all  --  any    any     anywhere             anywhere            /* user chain for forwarding */ 
    0     0 zone_wan_dest_ACCEPT  all  --  any    any     anywhere             anywhere            /* forwarding guest -> wan */ 
    0     0 zone_guest_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_guest_input (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 input_guest_rule  all  --  any    any     anywhere             anywhere            /* user chain for input */ 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:domain /* Guest_DNS */ 
    0     0 ACCEPT     udp  --  any    any     anywhere             anywhere            udp dpt:domain /* Guest_DNS */ 
    0     0 ACCEPT     udp  --  any    any     anywhere             anywhere            udp spts:bootps:bootpc dpts:bootps:bootpc /* Guest_DHCP */ 
    0     0 zone_guest_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_guest_output (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 output_guest_rule  all  --  any    any     anywhere             anywhere            /* user chain for output */ 
    0     0 zone_guest_dest_ACCEPT  all  --  any    any     anywhere             anywhere            

Chain zone_guest_src_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 reject     all  --  wlan0-1 any     anywhere             anywhere            

Chain zone_lan2_dest_ACCEPT (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     all  --  any    br-lan2  anywhere             anywhere            

Chain zone_lan2_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination         
   57  3212 forwarding_lan2_rule  all  --  any    any     anywhere             anywhere            /* user chain for forwarding */ 
   57  3212 zone_lan_dest_ACCEPT  all  --  any    any     NAS_NETBOOK.lan      anywhere            /* @rule[11] */ 
   57  3212 zone_wan_dest_ACCEPT  all  --  any    any     anywhere             anywhere            /* forwarding lan2 -> wan */ 
    0     0 zone_lan2_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_lan2_input (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  334 28614 input_lan2_rule  all  --  any    any     anywhere             anywhere            /* user chain for input */ 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:domain /* LAN2_DNS */ 
   24  1584 ACCEPT     udp  --  any    any     anywhere             anywhere            udp dpt:domain /* LAN2_DNS */ 
    0     0 ACCEPT     udp  --  any    any     anywhere             anywhere            udp spts:bootps:bootpc dpts:bootps:bootpc /* LAN2_DHCP */ 
  310 27030 zone_lan2_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_lan2_output (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 output_lan2_rule  all  --  any    any     anywhere             anywhere            /* user chain for output */ 
    0     0 zone_lan2_dest_ACCEPT  all  --  any    any     anywhere             anywhere            

Chain zone_lan2_src_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination         
  310 27030 reject     all  --  br-lan2 any     anywhere             anywhere            

Chain zone_lan_dest_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     all  --  any    br-lan  anywhere             anywhere            

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 forwarding_lan_rule  all  --  any    any     anywhere             anywhere            /* user chain for forwarding */ 
    0     0 zone_wan_dest_ACCEPT  all  --  any    any     anywhere             anywhere            /* forwarding lan -> wan */ 
    0     0 zone_lan_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_lan_input (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 input_lan_rule  all  --  any    any     anywhere             anywhere            /* user chain for input */ 
    0     0 zone_lan_src_ACCEPT  all  --  any    any     anywhere             anywhere            

Chain zone_lan_output (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 output_lan_rule  all  --  any    any     anywhere             anywhere            /* user chain for output */ 
    0     0 zone_lan_dest_ACCEPT  all  --  any    any     anywhere             anywhere            

Chain zone_lan_src_ACCEPT (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     all  --  br-lan any     anywhere             anywhere            

Chain zone_lan_src_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 reject     all  --  br-lan any     anywhere             anywhere            

Chain zone_wan_dest_ACCEPT (4 references)
 pkts bytes target     prot opt in     out     source               destination         
  117 12008 ACCEPT     all  --  any    eth0.2  anywhere             anywhere            

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 forwarding_wan_rule  all  --  any    any     anywhere             anywhere            /* user chain for forwarding */ 
    0     0 zone_wan_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_wan_input (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  108 12713 input_wan_rule  all  --  any    any     anywhere             anywhere            /* user chain for input */ 
    0     0 ACCEPT     udp  --  any    any     anywhere             anywhere            udp dpt:bootpc /* Allow-DHCP-Renew */ 
    0     0 ACCEPT     icmp --  any    any     anywhere             anywhere            icmp echo-request /* Allow-Ping */ 
    6   360 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:www /* LuCI */ 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:ssh /* SSH */ 
  102 12353 zone_wan_src_REJECT  all  --  any    any     anywhere             anywhere            

Chain zone_wan_output (1 references)
 pkts bytes target     prot opt in     out     source               destination         
   60  8796 output_wan_rule  all  --  any    any     anywhere             anywhere            /* user chain for output */ 
   60  8796 zone_wan_dest_ACCEPT  all  --  any    any     anywhere             anywhere            

Chain zone_wan_src_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination         
  102 12353 reject     all  --  eth0.2 any     anywhere             anywhere            

Zdecydowałem się na OpenWRT od @Cezary , doinstalowałem LuCI i inne pakiety które potrzebowałem.
Wziąłem się za konfigurację, wcześniej nie miałem do czynienia z VLAN.
Tak jak pisałem rozdzieliłem sieci, zrobiłem u siebie sieć gościnną WiFi.

NETWORK

config interface 'loopback'
    option ifname 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config interface 'lan'
    option ifname 'eth0.1'
    option type 'bridge'
    option proto 'static'
    option ipaddr '10.0.0.1'
    option netmask '255.255.255.0'

config interface 'lan2'
    option ifname 'eth0.3'
    option type 'bridge'
    option proto 'static'
    option ipaddr '10.0.1.1'
    option netmask '255.255.255.0'

config interface 'guest'
    option proto 'static'
    option ipaddr '10.0.2.1'
    option netmask '255.255.255.0'

config interface 'wan'
    option ifname 'eth0.2'
    option proto 'dhcp'
    option peerdns '0'
    option dns '208.67.222.222 208.67.220.220'

config switch
    option name 'eth0'
    option reset '1'
    option enable_vlan '1'

config switch_vlan
    option device 'eth0'
    option vlan '1'
    option ports '0t 3 4 5'

config switch_vlan
    option device 'eth0'
    option vlan '2'
    option ports '0t 1'

config switch_vlan
    option device 'eth0'
    option vlan '3'
    option ports '0t 2'

DHCP

config dnsmasq
    option domainneeded '1'
    option boguspriv '1'
    option localise_queries '1'
    option rebind_protection '1'
    option rebind_localhost '1'
    option local '/lan/'
    option domain 'lan'
    option expandhosts '1'
    option authoritative '1'
    option readethers '1'
    option leasefile '/tmp/dhcp.leases'
    option noresolv '1'
    list server '127.0.0.1#2053'
    list server '/pool.ntp.org/208.67.222.222'

config dhcp 'lan'
    option interface 'lan'
    option start '10'
    option limit '200'
    option leasetime '12h'

config dhcp 'lan2'
    option interface 'lan2'
    option limit '200'
    option leasetime '12h'
    option start '10'

config dhcp 'guest'
    option interface 'guest'
    option start '10'
    option limit '10'
    option leasetime '1h'

config dhcp 'wan'
    option interface 'wan'
    option ignore '1'

config host
    option name 'NAS_NETBOOK'
    option mac '80:c1:6e:3c:86:f6'
    option ip '10.0.1.60'

WIRELESS

...
config wifi-iface
        option device 'radio0'
        option network 'guest'
        option mode 'ap'
        option ssid 'xxx_guest'
        option encryption 'psk2+ccmp'
        option key 'xxx'
...

FIREWALL

config defaults
    option syn_flood '1'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'lan'
    list network 'lan'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'lan2'
    option network 'lan2'
    option input 'REJECT'
    option output 'ACCEPT'
    option forward 'REJECT'

config zone
    option name 'guest'
    option network 'guest'
    option input 'REJECT'
    option forward 'REJECT'
    option output 'ACCEPT'

config zone
    option name 'wan'
    list network 'wan'
    list network 'wan6'
    option input 'REJECT'
    option output 'ACCEPT'
    option forward 'REJECT'
    option masq '1'
    option mtu_fix '1'

config forwarding
    option src 'lan'
    option dest 'wan'

config forwarding
    option src 'lan2'
    option dest 'wan'

config forwarding
    option src 'guest'
    option dest 'wan'

config rule
    option name 'Allow-DHCP-Renew'
    option src 'wan'
    option proto 'udp'
    option dest_port '68'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Allow-Ping'
    option src 'wan'
    option proto 'icmp'
    option icmp_type 'echo-request'
    option family 'ipv4'
    option target 'ACCEPT'

config rule
    option name 'Allow-DHCPv6'
    option src 'wan'
    option proto 'udp'
    option src_ip 'fe80::/10'
    option src_port '547'
    option dest_ip 'fe80::/10'
    option dest_port '546'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-ICMPv6-Input'
    option src 'wan'
    option proto 'icmp'
    list icmp_type 'echo-request'
    list icmp_type 'echo-reply'
    list icmp_type 'destination-unreachable'
    list icmp_type 'packet-too-big'
    list icmp_type 'time-exceeded'
    list icmp_type 'bad-header'
    list icmp_type 'unknown-header-type'
    list icmp_type 'router-solicitation'
    list icmp_type 'neighbour-solicitation'
    list icmp_type 'router-advertisement'
    list icmp_type 'neighbour-advertisement'
    option limit '1000/sec'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-ICMPv6-Forward'
    option src 'wan'
    option dest '*'
    option proto 'icmp'
    list icmp_type 'echo-request'
    list icmp_type 'echo-reply'
    list icmp_type 'destination-unreachable'
    list icmp_type 'packet-too-big'
    list icmp_type 'time-exceeded'
    list icmp_type 'bad-header'
    list icmp_type 'unknown-header-type'
    option limit '1000/sec'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'LAN2_DNS'
    option src 'lan2'
    option dest_port '53'
    option proto 'tcpudp'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'LAN2_DHCP'
    option src 'lan2'
    option src_port '67-68'
    option dest_port '67-68'
    option proto 'udp'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Guest_DNS'
    option src 'guest'
    option dest_port '53'
    option proto 'tcpudp'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Guest_DHCP'
    option src 'guest'
    option src_port '67-68'
    option dest_port '67-68'
    option proto 'udp'
    option target 'ACCEPT'
    option family 'ipv4'

config include
    option path '/etc/firewall.user'

config rule
    option target 'ACCEPT'
    option src 'lan2'
    option src_ip '10.0.1.60'
    option dest 'lan'
    option proto 'all'
    option family 'ipv4'

Narazie testuję całość "na sucho"
Generalnie osiągnąłem co chciałem.
Moja sieć 10.0.0.1 z WiFi i gościnną 10.0.2.1 odizolowaną od lan - tylko internet.
Druga sieć 10.0.1.1 na pierwszym porcie switcha odizolowana, tylko internet.
Problem w tym, że chcę dać dostęp kilku urządzeniom z lan2 do lan1.
Próbowałem ale niestety bez skutku.

config rule
    option target 'ACCEPT'
    option src 'lan2'
    option src_ip '10.0.1.60'
    option dest 'lan'
    option proto 'all'
    option family 'ipv4'

Czy konfiguracja jest poprawna ?
Co robię źle ?

HD ci tnie bo sieciówka w NBOX-ie jest do d... ekhm pupy wink
Większą prędkość osiągniesz na karcie WiFi po USB.

Wejdź w ustawienia pluginu WebIf

http://i61.tinypic.com/28mmvxs.jpg

Włącz uwierzytelnianie, ustaw w tunerze jakieś skomplikowane hasło.
Przekieruj na routerze port 8001 do streamingu i 443 do połączenia z WebIf.
Najlepiej 443 przekieruj na jakiś inny znany tylko tobie, żeby ograniczyć próby włamań.

Zmienne IP to przecież nie problem, załóż domenę w jakimś darmowym serwisie np. changeip.com
Ustaw w LuCI i będzie działać, ogranicza cię tylko twój UPLOAD na łączu.