No chciałbym aby radius tym zawiadywał. na wszystkich routerach dump to fajnie działa tylko z tym głównym problem
Nie jesteś zalogowany. Proszę się zalogować lub zarejestrować.
eko.one.pl → Posty przez mario026
No chciałbym aby radius tym zawiadywał. na wszystkich routerach dump to fajnie działa tylko z tym głównym problem
tylko dlaczego robi bridge br-vlan20 zamiast użyć który istnieje w network? jak go do tego zmusić aby nie tworzył nowego mostu?
Teraz próbowałem połączyć się z mac tym wpisanym ether, ta sama sytuacja nie dostał ip, jezeli łączę się loginem przypisanym w radius do sieci lokalnej to dostaje ip.
Oto fragment logu
Thu Sep 25 07:47:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa RADIUS: VLAN ID 20
Thu Sep 25 07:47:33 2025 daemon.err hostapd: VLAN: vlan_add: ADD_VLAN_CMD failed for br-lan: File exists
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.123948] br-vlan20: port 1(br-lan.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.129878] br-vlan20: port 1(br-lan.20) entered disabled state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.135895] br-lan.20: entered allmulticast mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.140504] br-lan: entered allmulticast mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.145087] br-lan.20: entered promiscuous mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.149612] br-lan: entered promiscuous mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.154238] br-vlan20: port 1(br-lan.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.160150] br-vlan20: port 1(br-lan.20) entered forwarding state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.166612] br-vlan20: port 2(phy0-ap1.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.172732] br-vlan20: port 2(phy0-ap1.20) entered disabled state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.178841] mt798x-wmac 18000000.wifi phy0-ap1.20: entered allmulticast mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.186053] mt798x-wmac 18000000.wifi phy0-ap1.20: entered promiscuous mode
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.193124] br-vlan20: port 2(phy0-ap1.20) entered blocking state
Thu Sep 25 07:47:33 2025 kern.info kernel: [68582.199202] br-vlan20: port 2(phy0-ap1.20) entered forwarding state
Thu Sep 25 07:47:33 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-SUCCESS2 a4:a4:90:58:1e:aa
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa WPA: pairwise key handshake completed (RSN)
Thu Sep 25 07:47:33 2025 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:33 2025 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED a4:a4:90:58:1e:aa auth_alg=open
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa RADIUS: starting accounting session 76C8977B650B6BCA
Thu Sep 25 07:47:33 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Thu Sep 25 07:47:33 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:34 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:36 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:39 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:47 2025 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on br-vlan20 which has no address
Thu Sep 25 07:47:51 2025 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:51 2025 daemon.info hostapd: phy0-ap1: STA a4:a4:90:58:1e:aa RADIUS: stopped accounting session 76C8977B650B6BCA
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.443277] br-vlan20: port 2(phy0-ap1.20) entered disabled state
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.503099] mt798x-wmac 18000000.wifi phy0-ap1.20 (unregistering): left allmulticast mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.511268] mt798x-wmac 18000000.wifi phy0-ap1.20 (unregistering): left promiscuous mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.519355] br-vlan20: port 2(phy0-ap1.20) entered disabled state
Thu Sep 25 07:47:51 2025 daemon.err hostapd: VLAN: br_delif: Failure determining interface index for 'phy0-ap1.20'
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.677520] br-lan.20: left allmulticast mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.681889] br-lan: left allmulticast mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.685986] br-lan.20: left promiscuous mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.690239] br-lan: left promiscuous mode
Thu Sep 25 07:47:51 2025 kern.info kernel: [68600.694469] br-vlan20: port 1(br-lan.20) entered disabled state
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa IEEE 802.11: authenticated
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa IEEE 802.11: associated (aid 2)
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-EAP-STARTED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-EAP-SUCCESS2 a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa WPA: pairwise key handshake completed (RSN)
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: EAPOL-4WAY-HS-COMPLETED a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.notice hostapd: phy1-ap1: AP-STA-CONNECTED a4:a4:90:58:1e:aa auth_alg=open
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa RADIUS: starting accounting session FAADB1DD9762D6D6
Thu Sep 25 07:47:55 2025 daemon.info hostapd: phy1-ap1: STA a4:a4:90:58:1e:aa IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Thu Sep 25 07:47:55 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.1.84 a4:a4:90:58:1e:aa
Thu Sep 25 07:47:55 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.1.84 a4:a4:90:58:1e:aa Telefon-Mariusz-XCover6-Promac tego telefonu to: a4:a4:90:58:1e:aa
mam wyłączone bo ip dostają klienci po mac łacze sie swoim telefonem ale z losowym mac. Dla testu załączę i zobaczę
edit.
Niestety załaczenie nic nie dało
Witam!
Mam 3 apeki dump (Asus ax4200) z openwrt 24.10 Cezarego i i ten sam asus jako router główny. Logowaniem do sieci wifi u mnie
zawiaduje radiius którego mam na raspberry pi, wszystko jakoś to śmiga, ale problem mam z routerem głównym, tj. jeżeli, chcę się zalogować loginem gościa do sieci wifi to nie otrzymuję ip (np telefon zatrzymuje się na pobieraniu ip). Natomiast jak łączę się do sieci obojętnie do którego apeka dump to dostaję ip sieci gościnnej bez problemu. Może ktoś spojrzeć na moją konfiguracje, co tu jest nie tak?
tak mam na głównym:
network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fdf4:2f9f:1a17::/48'
option packet_steering '0'
config device
option name 'br-lan'
option type 'bridge'
option vlan_filtering '1'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
config bridge-vlan
option device 'br-lan'
option vlan '1'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
list ports 'eth0:t'
config bridge-vlan
option device 'br-lan'
option vlan '20'
list ports 'lan1:t'
list ports 'eth0:t'
config interface 'lan'
option proto 'static'
option device 'br-lan.1'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
list dns '8.8.8.8'
list dns '8.8.4.4'
config interface 'guest'
option proto 'static'
option device 'br-lan.20'
option ipaddr '192.168.2.1'
option netmask '255.255.255.0'
list dns '8.8.8.8'
config interface 'wan'
option device 'eth1'
option proto 'dhcp'
config interface 'wan6'
option device 'eth1'
option proto 'dhcpv6'wireless:
config wifi-device 'radio0'
option type 'mac80211'
option path 'platform/soc/18000000.wifi'
option band '2g'
option channel '2'
option htmode 'HE40'
option country 'PL'
option cell_density '0'
option noscan '1'
config wifi-iface 'default_radio0'
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'Ap'\''dom'
option encryption 'psk2'
option macfilter 'deny'
option key 'haslo'
option ieee80211r '1'
option ft_over_ds '0'
option ft_psk_generate_local '1'
option hidden '1'
option mobility_domain '4f61'
config wifi-device 'radio1'
option type 'mac80211'
option path 'platform/soc/18000000.wifi+1'
option band '5g'
option channel '128'
option htmode 'HE160'
option country 'PL'
option cell_density '0'
option txpower '26'
config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'Ap'\''dom-5G'
option encryption 'psk2'
option key 'haslo'
option macfilter 'deny'
option ieee80211r '1'
option hidden '1'
option ft_over_ds '0'
option ft_psk_generate_local '1'
option mobility_domain '4f63'
config wifi-iface 'wifinet2'
option device 'radio0'
option mode 'ap'
option ssid 'Ap'\''dom-Mariusz'
option encryption 'wpa2'
option auth_server '192.168.1.43'
option auth_port '1812'
option auth_secret 'haslo'
option acct_server '192.168.1.43'
option acct_port '1813'
option acct_secret 'haslo'
option ieee80211r '1'
option ft_over_ds '1'
option network 'lan'
option mobility_domain '4f62'
option nasid 'glowny'
option dynamic_vlan '1'
option vlan_naming '1'
option vlan_tagged_interface 'br-lan'
option vlan_bridge 'br-vlan'
option ieee80211k '1'
config wifi-iface 'wifinet3'
option device 'radio1'
option mode 'ap'
option ssid 'Ap'\''dom-Mariusz-5G'
option encryption 'wpa2'
option auth_server '192.168.1.43'
option auth_port '1812'
option auth_secret 'haslo'
option acct_server '192.168.1.43'
option acct_port '1813'
option acct_secret 'haslo'
option ieee80211r '1'
option ft_over_ds '1'
option network 'lan'
option mobility_domain '4f60'
option nasid 'glowny-5g'
option dynamic_vlan '1'
option vlan_naming '1'
option vlan_tagged_interface 'br-lan'
option vlan_bridge 'br-vlan'
option ieee80211k '1'dhcp:
config dnsmasq
option domainneeded '1'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option cachesize '1000'
option authoritative '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
option localservice '1'
option ednspacket_max '1232'
option sequential_ip '1'
config dhcp 'lan'
option interface 'lan'
option start '2'
option limit '150'
option leasetime '12h'
option dhcpv4 'server'
option dhcpv6 'hybrid'
option ra 'hybrid'
option master '1'
option dynamicdhcp '0'
config dhcp 'guest'
option interface 'guest'
option start '100'
option limit '150'
option leasetime '12h'
option dhcpv4 'server'
option ignore '0'
option force '1'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'firewall:
config defaults
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option synflood_protect '1'
option flow_offloading '1'
option flow_offloading_hw '1'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config rule
option src 'guest'
option name 'Allow-DHCP-Guest'
list proto 'udp'
option target 'ACCEPT'
option dest_port '67-68'
option family 'ipv4'
config rule
option src 'guest'
option name 'Allow-DNS-Guest'
option dest_port '53'
option target 'ACCEPT'
option family 'ipv4'
config zone
option name 'guest'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option masq '1'
list network 'guest'
config forwarding
option src 'guest'
option dest 'wan'a tak mam na pierwszym lepszym apeku dump
network:
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd95:bee7:583b::/48'
option packet_steering '0'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth1'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
config bridge-vlan
option device 'br-lan'
option vlan '1'
list ports 'eth1'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
config bridge-vlan
option device 'br-lan'
option vlan '20'
list ports 'lan1:t'
config interface 'lan'
option device 'br-lan.1'
option proto 'static'
option ipaddr '192.168.1.201'
option netmask '255.255.255.0'
option gateway '192.168.1.1'
list dns '192.168.1.1'wireless:
config wifi-device 'radio0'
option type 'mac80211'
option path 'platform/soc/18000000.wifi'
option band '2g'
option channel '11'
option htmode 'HE40'
option country 'PL'
option cell_density '0'
option noscan '1'
config wifi-iface 'default_radio0'
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'Ap'\''dom'
option encryption 'psk2'
option key 'haslo'
option ieee80211r '1'
option hidden '1'
option ft_over_ds '1'
option ft_psk_generate_local '1'
option mobility_domain '4f61'
config wifi-device 'radio1'
option type 'mac80211'
option path 'platform/soc/18000000.wifi+1'
option band '5g'
option channel '108'
option htmode 'HE160'
option country 'PL'
option cell_density '0'
config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'Ap'\''dom-5G'
option encryption 'psk2'
option key 'haslo'
option ieee80211r '1'
option hidden '1'
option ft_over_ds '1'
option ft_psk_generate_local '1'
option mobility_domain '4f63'
config wifi-iface 'wifinet2'
option device 'radio0'
option mode 'ap'
option ssid 'Ap'\''dom-Mariusz'
option encryption 'wpa2'
option auth_server '192.168.1.43'
option auth_port '1812'
option auth_secret 'haslo'
option acct_port '1813'
option acct_secret 'haslo'
option acct_server '192.168.1.43'
option ieee80211r '1'
option ft_over_ds '1'
option network 'lan'
option mobility_domain '4f62'
option nasid 'tv'
option vlan_tagged_interface 'br-lan'
option vlan_bridge 'br-vlan'
option vlan_naming '1'
option ieee80211k '1'
option dynamic_vlan '1'
config wifi-iface 'wifinet3'
option device 'radio1'
option mode 'ap'
option ssid 'Ap'\''dom-Mariusz-5G'
option encryption 'wpa2'
option auth_server '192.168.1.43'
option auth_port '1812'
option auth_secret 'haslo'
option acct_server '192.168.1.43'
option acct_port '1813'
option acct_secret 'haslo'
option ieee80211r '1'
option ft_over_ds '1'
option network 'lan'
option mobility_domain '4f60'
option nasid 'tv-5g'
option dynamic_vlan '1'
option vlan_naming '1'
option vlan_tagged_interface 'br-lan'
option vlan_bridge 'br-vlan'
option ieee80211k '1'Dzieki @Cezary :-)
Przy następnej aktualizacji wypróbuję.
ps. korzystam z Twoich obrazów
Witam!
Mam pewien problem przy aktualizacji moich routerów, chodzi o to że korzystam z radiusa i trzeba mieć zainstalowane
wpad nie w wersji mini tak jak jest to standardowo.
Po aktualizacji przez Aktualizacja interaktywna wgrywany jest wpad w wersji mini i rzeba najpierw go usunąć a później zainstalować tz. wersję full.
Problem polega na tym że mam 2 apeki które łączą sie po wifi i po aktualizacji nie działa radio.
Można to jakoś ogarnąć, aby aktualizacja nie wgrywała wpad mini?
Ale to jest oprogramowanie na komputer, tak?
Zdaje sobie sprawę ale mam kilkanaście portów pootwieranych i muszę mieć też dostęp z internetu z kilku lokalizacji też mobilnego
Ok
@Cezary dzięki za szybką odpowiedź, blokuję po IP
mam takie wpisy w blokowanych:
87.236.0.0/16
92.204.0.0/16
146.0.0.0/16
151.106.0.0/16
152.32.0.0/16
167.99.0.0/16 rozumiem że taki format może być, tak?
Witam!
od jakiegoś czasu ktoś próbuje dostać się do mojej sieci więc zainstalowałem banIP, ale mam mały problem z zablokowaniem pewnego MAC-a
tak wygląda fragment dziennika zapory:
Sat Feb 15 21:10:06 2025 kern.warn kernel: [3010969.311650] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.26 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=8946 DF PROTO=TCP SPT=60051 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:09 2025 kern.warn kernel: [3010972.357240] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.26 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=8948 DF PROTO=TCP SPT=60051 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:13 2025 kern.warn kernel: [3010976.658140] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41462 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:14 2025 kern.warn kernel: [3010977.678932] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41463 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:15 2025 kern.warn kernel: [3010978.704055] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41464 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:16 2025 kern.warn kernel: [3010979.726904] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41465 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:17 2025 kern.warn kernel: [3010980.751992] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41466 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:10:18 2025 kern.warn kernel: [3010981.774953] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=45.55.186.92 DST=192.168.1.43 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=41467 DF PROTO=TCP SPT=39887 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:33 2025 kern.warn kernel: [3011056.549581] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.124 DST=192.168.1.6 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=39104 DF PROTO=TCP SPT=42655 DPT=21 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:34 2025 kern.warn kernel: [3011057.552784] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.124 DST=192.168.1.6 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=39105 DF PROTO=TCP SPT=42655 DPT=21 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:36 2025 kern.warn kernel: [3011059.568600] banIP/fwd-wan/drop/blocklistv4: IN=eth0.2 OUT=br-lan MAC=1c:3b:f3:50:29:7c:b8:a3:77:e3:fd:6c:08:00:45:00:00:3c SRC=87.236.176.124 DST=192.168.1.6 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=39106 DF PROTO=TCP SPT=42655 DPT=21 WINDOW=64240 RES=0x00 SYN URGP=0
Sat Feb 15 21:11:40 2025 kern.warn kernel: [3011064.034148] banIP/inp-wan/drop/blocklistv4: IN=eth0.2 OUT= chodzi o to, że mam te adresy IP zablokowane w liście zablokowanych, ale chciałbym zablokować jego MAC tylko że on jak tu widać jest trochę długi.
Jaki adres MAC powinienem zablokować?
ok
Sterowanie działa w Archer C7, natomiast Archer C6U nie działa
@Cezary jesteś wstanie coś z tym Archer C6u v1 zrobić o czym pisał @MiG25?![]()
Dzięki, teraz to z Luci działa :-)
z luci wykonuję komendę: (system/Twoje komendy)
echo "0" > /sys/class/gpio/tp-link:power:usb/valuedostaje odpowiedź:
# 'echo' '0' '>' '/sys/class/gpio/tp-link:power:usb/value'
0 > /sys/class/gpio/tp-link:power:usb/value
Komenda wykonana (Kod: 0)ale nie wyłącza
z terminala działa
echo "0" > /sys/class/gpio/tp-link:power:usb/value wyłącza
echo "1" > /sys/class/gpio/tp-link:power:usb/value włącza
ale dodanie w Luci do twoje komendy już nie włącza ani nie wyłącza
tak jest w /sys/class/gpio
ale co dalej jak wyłączyć zasilanie na usb
niestety też nie działa
root@Garaz-Archer-C7-v5:~# echo "19" > /sys/class/gpio/export
ash: write error: Resource busy
root@Garaz-Archer-C7-v5:~#Mam jeszcze tplinka Archer c7, czy tu można wyłączyć zasilanie USB?
root@Garaz-Archer-C7-v5:~# cat /sys/kernel/debug/gpio
gpiochip0: GPIOs 0-31, parent: platform/18040000.gpio, 18040000.gpio:
gpio-1 ( |green:wps ) out hi ACTIVE LOW
gpio-2 ( |WPS button ) in hi IRQ ACTIVE LOW
gpio-5 ( |Reset button ) in hi IRQ ACTIVE LOW
gpio-6 ( |green:system ) out lo ACTIVE LOW
gpio-7 ( |green:usb ) out hi ACTIVE LOW
gpio-8 ( |green:lan1 ) out lo ACTIVE LOW
gpio-9 ( |green:wlan5g ) out lo ACTIVE LOW
gpio-14 ( |green:wlan2g ) out lo ACTIVE LOW
gpio-15 ( |green:lan4 ) out hi ACTIVE LOW
gpio-16 ( |green:lan3 ) out lo ACTIVE LOW
gpio-17 ( |green:lan2 ) out lo ACTIVE LOW
gpio-19 ( |tp-link:power:usb ) out hi
gpio-20 ( |orange:wan ) out hi ACTIVE LOW
gpio-21 ( |green:wan ) out hi ACTIVE LOWroot@Garaz-Archer-C7-v5:~# ls -al /sys/class/gpio
drwxr-xr-x 2 root root 0 Jan 1 1970 .
drwxr-xr-x 33 root root 0 Jan 1 1970 ..
--w------- 1 root root 4096 Jan 1 1970 export
lrwxrwxrwx 1 root root 0 Jan 1 1970 gpiochip0 -> ../../devices/platform/ahb/ahb:apb/18040000.gpio/gpio/gpiochip0
lrwxrwxrwx 1 root root 0 Jan 1 1970 tp-link:power:usb -> ../../devices/platform/ahb/ahb:apb/18040000.gpio/gpiochip0/gpio/tp-link:power:usb
--w------- 1 root root 4096 Jan 1 1970 unexport
root@Garaz-Archer-C7-v5:~#szkoda że się nie da w ten sposób, jaki moduł przekaźnikowy polecacie aby sterować tym wentylatorem z poziomu routera?
W /sys/class/regulator/
mam dwa katalogi
regulator.0
regulator.1
w regulator.1 jest plik state o zawartości enabled niestety nie mogę go zmienić na disabled więc tak jak piszesz nie mogę niestety sterować
W /sys/class/regulator/ masz to prawdopodobnie jako regulator. Zobaczy czy do state możesz zapisać "enabled". Jeżeli nie to nie możesz tym sterować.
w state jest enabled
echo "419" > /sys/class/gpio/exportutworzył sie katalog ale uruchomienie
echo "419" > /sys/class/gpio/export
echo out > /sys/class/gpio/gpio419/direction
echo 1 > /sys/class/gpio/gpio419/value
echo 0 > /sys/class/gpio/gpio419/value nie wyłącza wnetylatora
root@Salon_Archer_C6U_v1:~# echo "483" > /sys/class/gpio/export
ash: write error: Resource busy
root@Salon_Archer_C6U_v1:~# cat /sys/kernel/debug/gpio
gpiochip2: GPIOs 416-447, parent: platform/1e000600.gpio, 1e000600.gpio-bank2:
gpiochip1: GPIOs 448-479, parent: platform/1e000600.gpio, 1e000600.gpio-bank1:
gpio-461 ( |green:wan ) out hi ACTIVE LOW
gpiochip0: GPIOs 480-511, parent: platform/1e000600.gpio, 1e000600.gpio-bank0:
gpio-483 ( |regulator ) out hi
gpio-484 ( |green:power ) out lo ACTIVE LOW
gpio-488 ( |reset ) in hi IRQ ACTIVE LOW
gpio-490 ( |wps ) in hi IRQ ACTIVE LOW
gpio-493 ( |green:usb ) out hi ACTIVE LOW
gpio-494 ( |orange:wan ) out hi ACTIVE LOW
gpio-495 ( |green:lan ) out lo ACTIVE LOW
gpio-496 ( |green:wifi5g ) out hi ACTIVE LOW
gpio-498 ( |green:wifi2g ) out hi ACTIVE LOW
gpio-499 ( |reset ) out hi ACTIVE LOW
root@Salon_Archer_C6U_v1:~# ls -al /sys/class/gpio
drwxr-xr-x 2 root root 0 Jan 1 1970 .
drwxr-xr-x 36 root root 0 Jan 1 1970 ..
--w------- 1 root root 4096 Jul 22 13:22 export
lrwxrwxrwx 1 root root 0 Jan 1 1970 gpiochip416 -> ../../devices/platform/1e000000.palmbus/1e000600.gpio/gpio/gpiochip416
lrwxrwxrwx 1 root root 0 Jan 1 1970 gpiochip448 -> ../../devices/platform/1e000000.palmbus/1e000600.gpio/gpio/gpiochip448
lrwxrwxrwx 1 root root 0 Jan 1 1970 gpiochip480 -> ../../devices/platform/1e000000.palmbus/1e000600.gpio/gpio/gpiochip480
--w------- 1 root root 4096 Jan 1 1970 unexport
root@Salon_Archer_C6U_v1:~#eko.one.pl → Posty przez mario026
Forum oparte o PunBB, wspierane przez Informer Technologies, Inc