No chciałbym aby radius tym zawiadywał. na wszystkich routerach dump to fajnie działa tylko z tym głównym problem

tylko dlaczego robi bridge  br-vlan20 zamiast użyć który istnieje w network? jak go do tego zmusić aby nie tworzył nowego mostu?

Teraz próbowałem połączyć się z mac tym wpisanym ether, ta sama sytuacja nie dostał ip, jezeli łączę się loginem przypisanym w radius do sieci lokalnej to dostaje ip.
Oto fragment logu

Thu Sep 25 07:47:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa RADIUS: VLAN ID 20
Thu Sep 25 07:47:33 2025 daemon.err hostapd: VLAN: vlan_add: ADD_VLAN_CMD failed for br-lan: File exists
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.123948] br-vlan20: port 1(br-lan.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.129878] br-vlan20: port 1(br-lan.20) entered disabled state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.135895] br-lan.20: entered allmulticast mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.140504] br-lan: entered allmulticast mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.145087] br-lan.20: entered promiscuous mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.149612] br-lan: entered promiscuous mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.154238] br-vlan20: port 1(br-lan.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.160150] br-vlan20: port 1(br-lan.20) entered forwarding state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.166612] br-vlan20: port 2(phy0-ap1.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.172732] br-vlan20: port 2(phy0-ap1.20) entered disabled state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.178841] mt798x-wmac 18000000.wifi phy0-ap1.20: entered allmulticast mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.186053] mt798x-wmac 18000000.wifi phy0-ap1.20: entered promiscuous mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.193124] br-vlan20: port 2(phy0-ap1.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.199202] br-vlan20: port 2(phy0-ap1.20) entered forwarding state
Thu Sep 25 07:47:33 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-SUCCESS2 a4:a4:90:58:1e:aa
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa WPA: pairwise key handshake completed (RSN)
Thu Sep 25 07:47:33 2025 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:33 2025 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED a4:a4:90:58:1e:aa auth_alg=open
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa RADIUS: starting accounting session 76C8977B650B6BCA
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Thu Sep 25 07:47:33 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:34 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:36 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:39 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:47 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:51 2025 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:51 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa RADIUS: stopped accounting session 76C8977B650B6BCA
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.443277] br-vlan20: port 2(phy0-ap1.20) entered disabled state
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.503099] mt798x-wmac 18000000.wifi phy0-ap1.20 (unregistering): left allmulticast mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.511268] mt798x-wmac 18000000.wifi phy0-ap1.20 (unregistering): left promiscuous mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.519355] br-vlan20: port 2(phy0-ap1.20) entered disabled state
Thu Sep 25 07:47:51 2025 daemon.err hostapd: VLAN: br_delif: Failure determining interface index for 'phy0-ap1.20'
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.677520] br-lan.20: left allmulticast mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.681889] br-lan: left allmulticast mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.685986] br-lan.20: left promiscuous mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.690239] br-lan: left promiscuous mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.694469] br-vlan20: port 1(br-lan.20) entered disabled state
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa IEEE 802.11: authenticated
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa IEEE 802.11: associated (aid 2)
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-EAP-STARTED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-EAP-SUCCESS2 a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa WPA: pairwise key handshake completed (RSN)
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: EAPOL-4WAY-HS-COMPLETED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: AP-STA-CONNECTED a4:a4:90:58:1e:aa auth_alg=open
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa RADIUS: starting accounting session FAADB1DD9762D6D6
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Thu Sep 25 07:47:55 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.1.84 a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.1.84 a4:a4:90:58:1e:aa Telefon-Mariusz-XCover6-Pro

mac tego telefonu to: a4:a4:90:58:1e:aa

mam wyłączone bo ip dostają klienci po mac łacze sie swoim telefonem ale z losowym mac. Dla testu załączę i zobaczę
edit.
Niestety załaczenie nic nie dało

Witam!
Mam 3 apeki dump (Asus ax4200) z openwrt 24.10 Cezarego i i ten sam asus jako router główny. Logowaniem do sieci wifi u mnie
zawiaduje radiius którego mam na raspberry pi, wszystko jakoś to śmiga, ale problem mam z routerem głównym, tj. jeżeli, chcę się zalogować loginem gościa do sieci wifi to nie otrzymuję ip (np telefon zatrzymuje się na pobieraniu ip). Natomiast jak łączę się do sieci obojętnie do którego apeka dump to dostaję ip sieci gościnnej bez problemu. Może ktoś spojrzeć  na moją konfiguracje, co tu jest nie tak?
tak mam na głównym:
network

config interface 'loopback'
    option device 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config globals 'globals'
    option ula_prefix 'fdf4:2f9f:1a17::/48'
    option packet_steering '0'

config device
    option name 'br-lan'
    option type 'bridge'
    option vlan_filtering '1'
    list ports 'lan1'
    list ports 'lan2'
    list ports 'lan3'
    list ports 'lan4'

config bridge-vlan
    option device 'br-lan'
    option vlan '1'
    list ports 'lan1'
    list ports 'lan2'
    list ports 'lan3'
    list ports 'lan4'
    list ports 'eth0:t'

config bridge-vlan
    option device 'br-lan'
    option vlan '20'
    list ports 'lan1:t'
    list ports 'eth0:t'

config interface 'lan'
    option proto 'static'
    option device 'br-lan.1'
    option ipaddr '192.168.1.1'
    option netmask '255.255.255.0'
    list dns '8.8.8.8'
    list dns '8.8.4.4'

config interface 'guest'
    option proto 'static'
    option device 'br-lan.20'
    option ipaddr '192.168.2.1'
    option netmask '255.255.255.0'
    list dns '8.8.8.8'

config interface 'wan'
    option device 'eth1'
    option proto 'dhcp'

config interface 'wan6'
    option device 'eth1'
    option proto 'dhcpv6'

wireless:

config wifi-device 'radio0'
    option type 'mac80211'
    option path 'platform/soc/18000000.wifi'
    option band '2g'
    option channel '2'
    option htmode 'HE40'
    option country 'PL'
    option cell_density '0'
    option noscan '1'

config wifi-iface 'default_radio0'
    option device 'radio0'
    option network 'lan'
    option mode 'ap'
    option ssid 'Ap'\''dom'
    option encryption 'psk2'
    option macfilter 'deny'
    option key 'haslo'
    option ieee80211r '1'
    option ft_over_ds '0'
    option ft_psk_generate_local '1'
    option hidden '1'
    option mobility_domain '4f61'

config wifi-device 'radio1'
    option type 'mac80211'
    option path 'platform/soc/18000000.wifi+1'
    option band '5g'
    option channel '128'
    option htmode 'HE160'
    option country 'PL'
    option cell_density '0'
    option txpower '26'

config wifi-iface 'default_radio1'
    option device 'radio1'
    option network 'lan'
    option mode 'ap'
    option ssid 'Ap'\''dom-5G'
    option encryption 'psk2'
    option key 'haslo'
    option macfilter 'deny'
    option ieee80211r '1'
    option hidden '1'
    option ft_over_ds '0'
    option ft_psk_generate_local '1'
    option mobility_domain '4f63'

config wifi-iface 'wifinet2'
    option device 'radio0'
    option mode 'ap'
    option ssid 'Ap'\''dom-Mariusz'
    option encryption 'wpa2'
    option auth_server '192.168.1.43'
    option auth_port '1812'
    option auth_secret 'haslo'
    option acct_server '192.168.1.43'
    option acct_port '1813'
    option acct_secret 'haslo'
    option ieee80211r '1'
    option ft_over_ds '1'
    option network 'lan'
    option mobility_domain '4f62'
    option nasid 'glowny'
    option dynamic_vlan '1'
    option vlan_naming '1'
    option vlan_tagged_interface 'br-lan'
    option vlan_bridge 'br-vlan'
    option ieee80211k '1'

config wifi-iface 'wifinet3'
    option device 'radio1'
    option mode 'ap'
    option ssid 'Ap'\''dom-Mariusz-5G'
    option encryption 'wpa2'
    option auth_server '192.168.1.43'
    option auth_port '1812'
    option auth_secret 'haslo'
    option acct_server '192.168.1.43'
    option acct_port '1813'
    option acct_secret 'haslo'
    option ieee80211r '1'
    option ft_over_ds '1'
    option network 'lan'
    option mobility_domain '4f60'
    option nasid 'glowny-5g'
    option dynamic_vlan '1'
    option vlan_naming '1'
    option vlan_tagged_interface 'br-lan'
    option vlan_bridge 'br-vlan'
    option ieee80211k '1'

dhcp:

config dnsmasq
    option domainneeded '1'
    option localise_queries '1'
    option rebind_protection '1'
    option rebind_localhost '1'
    option local '/lan/'
    option domain 'lan'
    option expandhosts '1'
    option cachesize '1000'
    option authoritative '1'
    option readethers '1'
    option leasefile '/tmp/dhcp.leases'
    option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
    option localservice '1'
    option ednspacket_max '1232'
    option sequential_ip '1'

config dhcp 'lan'
    option interface 'lan'
    option start '2'
    option limit '150'
    option leasetime '12h'
    option dhcpv4 'server'
    option dhcpv6 'hybrid'
    option ra 'hybrid'
    option master '1'
    option dynamicdhcp '0'

config dhcp 'guest'
    option interface 'guest'
    option start '100'
    option limit '150'
    option leasetime '12h'
    option dhcpv4 'server'
    option ignore '0'
    option force '1'

config dhcp 'wan'
    option interface 'wan'
    option ignore '1'

config odhcpd 'odhcpd'
    option maindhcp '0'
    option leasefile '/tmp/hosts/odhcpd'
    option leasetrigger '/usr/sbin/odhcpd-update'
    option loglevel '4'

firewall:

 config defaults
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'ACCEPT'
    option synflood_protect '1'
    option flow_offloading '1'
    option flow_offloading_hw '1'

config zone
    option name 'lan'
    list network 'lan'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'ACCEPT'

config zone
    option name 'wan'
    list network 'wan'
    list network 'wan6'
    option input 'REJECT'
    option output 'ACCEPT'
    option forward 'REJECT'
    option masq '1'
    option mtu_fix '1'

config forwarding
    option src 'lan'
    option dest 'wan'

config rule
    option name 'Allow-DHCP-Renew'
    option src 'wan'
    option proto 'udp'
    option dest_port '68'
    option target 'ACCEPT'
    option family 'ipv4'

config rule
    option name 'Allow-Ping'
    option src 'wan'
    option proto 'icmp'
    option icmp_type 'echo-request'
    option family 'ipv4'
    option target 'ACCEPT'

config rule
    option name 'Allow-IGMP'
    option src 'wan'
    option proto 'igmp'
    option family 'ipv4'
    option target 'ACCEPT'

config rule
    option name 'Allow-DHCPv6'
    option src 'wan'
    option proto 'udp'
    option dest_port '546'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-MLD'
    option src 'wan'
    option proto 'icmp'
    option src_ip 'fe80::/10'
    list icmp_type '130/0'
    list icmp_type '131/0'
    list icmp_type '132/0'
    list icmp_type '143/0'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-ICMPv6-Input'
    option src 'wan'
    option proto 'icmp'
    list icmp_type 'echo-request'
    list icmp_type 'echo-reply'
    list icmp_type 'destination-unreachable'
    list icmp_type 'packet-too-big'
    list icmp_type 'time-exceeded'
    list icmp_type 'bad-header'
    list icmp_type 'unknown-header-type'
    list icmp_type 'router-solicitation'
    list icmp_type 'neighbour-solicitation'
    list icmp_type 'router-advertisement'
    list icmp_type 'neighbour-advertisement'
    option limit '1000/sec'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-ICMPv6-Forward'
    option src 'wan'
    option dest '*'
    option proto 'icmp'
    list icmp_type 'echo-request'
    list icmp_type 'echo-reply'
    list icmp_type 'destination-unreachable'
    list icmp_type 'packet-too-big'
    list icmp_type 'time-exceeded'
    list icmp_type 'bad-header'
    list icmp_type 'unknown-header-type'
    option limit '1000/sec'
    option family 'ipv6'
    option target 'ACCEPT'

config rule
    option name 'Allow-IPSec-ESP'
    option src 'wan'
    option dest 'lan'
    option proto 'esp'
    option target 'ACCEPT'

config rule
    option name 'Allow-ISAKMP'
    option src 'wan'
    option dest 'lan'
    option dest_port '500'
    option proto 'udp'
    option target 'ACCEPT'

config rule
    option src 'guest'
    option name 'Allow-DHCP-Guest'
    list proto 'udp'
    option target 'ACCEPT'
    option dest_port '67-68'
    option family 'ipv4'

config rule
    option src 'guest'
    option name 'Allow-DNS-Guest'
    option dest_port '53'
    option target 'ACCEPT'
    option family 'ipv4'

config zone
    option name 'guest'
    option input 'ACCEPT'
    option output 'ACCEPT'
    option forward 'ACCEPT'
    option masq '1'
    list network 'guest'

config forwarding
    option src 'guest'
    option dest 'wan'

a tak mam na pierwszym lepszym apeku dump
network:

config interface 'loopback'
    option device 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config globals 'globals'
    option ula_prefix 'fd95:bee7:583b::/48'
    option packet_steering '0'

config device
    option name 'br-lan'
    option type 'bridge'
    list ports 'eth1'
    list ports 'lan1'
    list ports 'lan2'
    list ports 'lan3'
    list ports 'lan4'

config bridge-vlan
    option device 'br-lan'
    option vlan '1'
    list ports 'eth1'
    list ports 'lan1'
    list ports 'lan2'
    list ports 'lan3'
    list ports 'lan4'

config bridge-vlan
    option device 'br-lan'
    option vlan '20'
    list ports 'lan1:t'

config interface 'lan'
    option device 'br-lan.1'
    option proto 'static'
    option ipaddr '192.168.1.201'
    option netmask '255.255.255.0'
    option gateway '192.168.1.1'
    list dns '192.168.1.1'

wireless:

config wifi-device 'radio0'
    option type 'mac80211'
    option path 'platform/soc/18000000.wifi'
    option band '2g'
    option channel '11'
    option htmode 'HE40'
    option country 'PL'
    option cell_density '0'
    option noscan '1'

config wifi-iface 'default_radio0'
    option device 'radio0'
    option network 'lan'
    option mode 'ap'
    option ssid 'Ap'\''dom'
    option encryption 'psk2'
    option key 'haslo'
    option ieee80211r '1'
    option hidden '1'
    option ft_over_ds '1'
    option ft_psk_generate_local '1'
    option mobility_domain '4f61'

config wifi-device 'radio1'
    option type 'mac80211'
    option path 'platform/soc/18000000.wifi+1'
    option band '5g'
    option channel '108'
    option htmode 'HE160'
    option country 'PL'
    option cell_density '0'

config wifi-iface 'default_radio1'
    option device 'radio1'
    option network 'lan'
    option mode 'ap'
    option ssid 'Ap'\''dom-5G'
    option encryption 'psk2'
    option key 'haslo'
    option ieee80211r '1'
    option hidden '1'
    option ft_over_ds '1'
    option ft_psk_generate_local '1'
    option mobility_domain '4f63'

config wifi-iface 'wifinet2'
    option device 'radio0'
    option mode 'ap'
    option ssid 'Ap'\''dom-Mariusz'
    option encryption 'wpa2'
    option auth_server '192.168.1.43'
    option auth_port '1812'
    option auth_secret 'haslo'
    option acct_port '1813'
    option acct_secret 'haslo'
    option acct_server '192.168.1.43'
    option ieee80211r '1'
    option ft_over_ds '1'
    option network 'lan'
    option mobility_domain '4f62'
    option nasid 'tv'
    option vlan_tagged_interface 'br-lan'
    option vlan_bridge 'br-vlan'
    option vlan_naming '1'
    option ieee80211k '1'
    option dynamic_vlan '1'

config wifi-iface 'wifinet3'
    option device 'radio1'
    option mode 'ap'
    option ssid 'Ap'\''dom-Mariusz-5G'
    option encryption 'wpa2'
    option auth_server '192.168.1.43'
    option auth_port '1812'
    option auth_secret 'haslo'
    option acct_server '192.168.1.43'
    option acct_port '1813'
    option acct_secret 'haslo'
    option ieee80211r '1'
    option ft_over_ds '1'
    option network 'lan'
    option mobility_domain '4f60'
    option nasid 'tv-5g'
    option dynamic_vlan '1'
    option vlan_naming '1'
    option vlan_tagged_interface 'br-lan'
    option vlan_bridge 'br-vlan'
    option ieee80211k '1'

6

(2 odpowiedzi, napisanych Oprogramowanie / Software)

Dzieki @Cezary :-)
Przy następnej aktualizacji wypróbuję.
ps. korzystam z Twoich obrazów

Witam!
Mam pewien problem przy aktualizacji moich routerów, chodzi o to że korzystam z radiusa i trzeba mieć zainstalowane
wpad nie w wersji mini tak jak jest to standardowo.
Po aktualizacji przez Aktualizacja interaktywna wgrywany jest wpad w wersji mini i rzeba najpierw go usunąć a później zainstalować tz. wersję full.
Problem polega na tym że mam 2 apeki które łączą sie po wifi i po aktualizacji nie działa radio.
Można to jakoś ogarnąć, aby aktualizacja nie wgrywała wpad mini?

8

(7 odpowiedzi, napisanych Oprogramowanie / Software)

Ale to jest oprogramowanie na komputer, tak?

9

(7 odpowiedzi, napisanych Oprogramowanie / Software)

Zdaje sobie sprawę ale mam kilkanaście portów pootwieranych i muszę mieć też dostęp z internetu z kilku lokalizacji też mobilnego

10

(7 odpowiedzi, napisanych Oprogramowanie / Software)

Ok
@Cezary dzięki za szybką odpowiedź, blokuję po IP
mam takie wpisy w blokowanych:

 87.236.0.0/16
92.204.0.0/16
146.0.0.0/16
151.106.0.0/16
152.32.0.0/16
167.99.0.0/16 

rozumiem że taki format może być, tak?

11

(7 odpowiedzi, napisanych Oprogramowanie / Software)

Witam!
od jakiegoś czasu ktoś próbuje dostać się do mojej sieci więc zainstalowałem banIP, ale mam mały problem z zablokowaniem pewnego MAC-a
tak wygląda fragment dziennika zapory:

 Sat Feb 15 21:10:06 2025 kern.warn kernel: [3010969.311650] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.26 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=8946 DF PROTO=TCP SPT=60051 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:09 2025 kern.warn kernel: [3010972.357240] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.26 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=8948 DF PROTO=TCP SPT=60051 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:13 2025 kern.warn kernel: [3010976.658140] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41462 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:14 2025 kern.warn kernel: [3010977.678932] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41463 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:15 2025 kern.warn kernel: [3010978.704055] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41464 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:16 2025 kern.warn kernel: [3010979.726904] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41465 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:17 2025 kern.warn kernel: [3010980.751992] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41466 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:18 2025 kern.warn kernel: [3010981.774953] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41467 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:33 2025 kern.warn kernel: [3011056.549581] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.124 DST=192.168.1.6 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=39104 DF PROTO=TCP SPT=42655 DPT=21 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:34 2025 kern.warn kernel: [3011057.552784] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.124 DST=192.168.1.6 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=39105 DF PROTO=TCP SPT=42655 DPT=21 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:36 2025 kern.warn kernel: [3011059.568600] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.124 DST=192.168.1.6 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=39106 DF PROTO=TCP SPT=42655 DPT=21 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:40 2025 kern.warn kernel: [3011064.034148] banIP/inp-wan/drop/blocklistv4: IN=eth0.2 OUT= 

chodzi o to, że mam te adresy IP zablokowane w liście zablokowanych, ale chciałbym zablokować jego MAC tylko że on jak tu widać jest trochę długi.
Jaki adres MAC powinienem zablokować?

12

(40 odpowiedzi, napisanych Sprzęt / Hardware)

ok

13

(40 odpowiedzi, napisanych Sprzęt / Hardware)

Sterowanie działa w Archer C7, natomiast Archer C6U nie działa

14

(40 odpowiedzi, napisanych Sprzęt / Hardware)

@Cezary jesteś wstanie coś z tym Archer C6u v1 zrobić o czym pisał @MiG25?
smile

15

(40 odpowiedzi, napisanych Sprzęt / Hardware)

Dzięki, teraz to z Luci działa :-)

16

(40 odpowiedzi, napisanych Sprzęt / Hardware)

z luci wykonuję komendę: (system/Twoje komendy)

echo "0" > /sys/class/gpio/tp-link:power:usb/value

dostaje odpowiedź:

# 'echo' '0' '>' '/sys/class/gpio/tp-link:power:usb/value'
0 > /sys/class/gpio/tp-link:power:usb/value
Komenda wykonana (Kod: 0)

ale nie wyłącza

17

(40 odpowiedzi, napisanych Sprzęt / Hardware)

z terminala działa
echo "0" > /sys/class/gpio/tp-link:power:usb/value   wyłącza
echo "1" > /sys/class/gpio/tp-link:power:usb/value    włącza
ale dodanie w Luci do twoje komendy już nie włącza ani nie wyłącza

18

(40 odpowiedzi, napisanych Sprzęt / Hardware)

tak jest w  /sys/class/gpio
ale co dalej jak wyłączyć zasilanie na usb

19

(40 odpowiedzi, napisanych Sprzęt / Hardware)

niestety też nie działa

root@Garaz-Archer-C7-v5:~# echo "19" > /sys/class/gpio/export
ash: write error: Resource busy
root@Garaz-Archer-C7-v5:~#

20

(40 odpowiedzi, napisanych Sprzęt / Hardware)

Mam jeszcze tplinka Archer c7, czy tu można wyłączyć zasilanie USB?

root@Garaz-Archer-C7-v5:~# cat /sys/kernel/debug/gpio
gpiochip0: GPIOs 0-31, parent: platform/18040000.gpio, 18040000.gpio:
 gpio-1   (                    |green:wps           ) out hi ACTIVE LOW
 gpio-2   (                    |WPS button          ) in  hi IRQ ACTIVE LOW
 gpio-5   (                    |Reset button        ) in  hi IRQ ACTIVE LOW
 gpio-6   (                    |green:system        ) out lo ACTIVE LOW
 gpio-7   (                    |green:usb           ) out hi ACTIVE LOW
 gpio-8   (                    |green:lan1          ) out lo ACTIVE LOW
 gpio-9   (                    |green:wlan5g        ) out lo ACTIVE LOW
 gpio-14  (                    |green:wlan2g        ) out lo ACTIVE LOW
 gpio-15  (                    |green:lan4          ) out hi ACTIVE LOW
 gpio-16  (                    |green:lan3          ) out lo ACTIVE LOW
 gpio-17  (                    |green:lan2          ) out lo ACTIVE LOW
 gpio-19  (                    |tp-link:power:usb   ) out hi
 gpio-20  (                    |orange:wan          ) out hi ACTIVE LOW
 gpio-21  (                    |green:wan           ) out hi ACTIVE LOW
root@Garaz-Archer-C7-v5:~# ls -al /sys/class/gpio
drwxr-xr-x    2 root     root             0 Jan  1  1970 .
drwxr-xr-x   33 root     root             0 Jan  1  1970 ..
--w-------    1 root     root          4096 Jan  1  1970 export
lrwxrwxrwx    1 root     root             0 Jan  1  1970 gpiochip0 -> ../../devices/platform/ahb/ahb:apb/18040000.gpio/gpio/gpiochip0
lrwxrwxrwx    1 root     root             0 Jan  1  1970 tp-link:power:usb -> ../../devices/platform/ahb/ahb:apb/18040000.gpio/gpiochip0/gpio/tp-link:power:usb
--w-------    1 root     root          4096 Jan  1  1970 unexport
root@Garaz-Archer-C7-v5:~#

21

(40 odpowiedzi, napisanych Sprzęt / Hardware)

szkoda że się nie da w ten sposób, jaki moduł przekaźnikowy polecacie aby sterować tym wentylatorem z poziomu routera?

22

(40 odpowiedzi, napisanych Sprzęt / Hardware)

W /sys/class/regulator/
mam dwa katalogi
regulator.0
regulator.1
w regulator.1 jest plik state o zawartości enabled niestety nie mogę go zmienić na disabled więc tak jak piszesz nie mogę niestety sterować

23

(40 odpowiedzi, napisanych Sprzęt / Hardware)

Cezary napisał/a:

W /sys/class/regulator/ masz to prawdopodobnie jako regulator. Zobaczy czy do state możesz zapisać "enabled". Jeżeli nie to nie możesz tym sterować.

w state jest enabled

24

(40 odpowiedzi, napisanych Sprzęt / Hardware)

echo "419" > /sys/class/gpio/export

utworzył sie katalog ale uruchomienie

 echo "419" > /sys/class/gpio/export
echo out > /sys/class/gpio/gpio419/direction
echo 1 > /sys/class/gpio/gpio419/value
echo 0 > /sys/class/gpio/gpio419/value 

nie wyłącza wnetylatora

root@Salon_Archer_C6U_v1:~# echo "483" > /sys/class/gpio/export
ash: write error: Resource busy

25

(40 odpowiedzi, napisanych Sprzęt / Hardware)

 
root@Salon_Archer_C6U_v1:~# cat /sys/kernel/debug/gpio
gpiochip2: GPIOs 416-447, parent: platform/1e000600.gpio, 1e000600.gpio-bank2:

gpiochip1: GPIOs 448-479, parent: platform/1e000600.gpio, 1e000600.gpio-bank1:
 gpio-461 (                    |green:wan           ) out hi ACTIVE LOW

gpiochip0: GPIOs 480-511, parent: platform/1e000600.gpio, 1e000600.gpio-bank0:
 gpio-483 (                    |regulator           ) out hi
 gpio-484 (                    |green:power         ) out lo ACTIVE LOW
 gpio-488 (                    |reset               ) in  hi IRQ ACTIVE LOW
 gpio-490 (                    |wps                 ) in  hi IRQ ACTIVE LOW
 gpio-493 (                    |green:usb           ) out hi ACTIVE LOW
 gpio-494 (                    |orange:wan          ) out hi ACTIVE LOW
 gpio-495 (                    |green:lan           ) out lo ACTIVE LOW
 gpio-496 (                    |green:wifi5g        ) out hi ACTIVE LOW
 gpio-498 (                    |green:wifi2g        ) out hi ACTIVE LOW
 gpio-499 (                    |reset               ) out hi ACTIVE LOW
root@Salon_Archer_C6U_v1:~# ls -al /sys/class/gpio
drwxr-xr-x    2 root     root             0 Jan  1  1970 .
drwxr-xr-x   36 root     root             0 Jan  1  1970 ..
--w-------    1 root     root          4096 Jul 22 13:22 export
lrwxrwxrwx    1 root     root             0 Jan  1  1970 gpiochip416 -> ../../devices/platform/1e000000.palmbus/1e000600.gpio/gpio/gpiochip416
lrwxrwxrwx    1 root     root             0 Jan  1  1970 gpiochip448 -> ../../devices/platform/1e000000.palmbus/1e000600.gpio/gpio/gpiochip448
lrwxrwxrwx    1 root     root             0 Jan  1  1970 gpiochip480 -> ../../devices/platform/1e000000.palmbus/1e000600.gpio/gpio/gpiochip480
--w-------    1 root     root          4096 Jan  1  1970 unexport
root@Salon_Archer_C6U_v1:~#