Właśnie zmieniłem nazwę i ruszyło - dziękuję
Nie jesteś zalogowany. Proszę się zalogować lub zarejestrować.
eko.one.pl → Posty przez Pawci_o
Właśnie zmieniłem nazwę i ruszyło - dziękuję
Witam wszystkich, posiadam ruter Tp-link TL-WDR 4300 ver. 1.4 z wgranym gargoyle jednak dziś po problemach z zasilaniem ruter po włączeniu do prądu miga wszystkimi diodami jeden raz i się restartuje i tak cały czas - czy może mi ktoś pomóc i podpowiedzieć czy da się go jeszcze uratować a jeśli tak to w jaki sposób lub gdzie szukać instrukcji w jaki sposób to zrobić.
z góry dziękuję za pomoc.
- albo informacja że użytkownik dostał adres z dhcp
- albo sprawdzasz wpisy w /proc/net/arp - jak się pojawi nowy wpis to znaczy że ten ktoś zaczyna generować ruch
Super cezary ta druga opcja ale jak to zrobić z automatu - żeby dostać info że na email ze ktoś zaczął generować ruch ?
komp jest cały czas włączony wiec pierwsza opcja odpada.
Witam,
proszę o informację czy da się wykonać logowanie informacji o rozpoczęciu ruchu na konkretnym IP - ktoś zaczął używać kompa, posiadam ruter jak w temacie z gargoyle 1.8.1 ruter jest spięty OpenVPN i takim samym w innej lokalizacji ale chcę te logowania mieć u klienta OpenVPN.
jeśli się da to proszę o informację w jaki sposób to wykonać ? fajnie by było jak by był wysyłany e-mail z informacją że ruch się rozpoczął - użytkownik zaczął pracować. pomoże mi ktoś w rozwiązaniu mojego problemu ?
na chwilę obecną jest 5 stacji, programy będą kożystały tylko z SQL i z plików na udostępnionych katalogach, programy to Sage Symfonia, Enova, Płatnik - programy księgowe.
do końca roku liczba użytkowników wzrośnie do 7...
Witam, mam pytanie ponieważ nie mam dość dużej wiedzy w tym temacie, chodzi o Agregację łączy,
posiadam sieć w której - ruter dostawcy światłowodu jest w piwnicy od niego skrętką idzie net do góry gdzie jest TP-LINK WDR 4300 z gargoyle 1.8.1 do niego po kablach jest podłączone część urządzeń oraz 1 switch Tp-Link SG1005D - do niego są podłączone kolejne urządzenia, obecnie sieć wymaga modyfikacji polegającej na dołożeniu serwera Fujitsu, który to posiada dwie karty sieciowe oraz dołożenie dysku Qnap TS-231P - pytanie moje dotyczy agregacji łącza, jaki switch kupić wspierający LACP i w jaki sposób podłączyć serwer i QNAP aby wszystko działało jak potrzeba no i czy w ruterze również trzeba coś konfigurować ?
jeśli chodzi o switch to znalazłem TL-SG2008 w przystępnej dla mnie cenie, nie wiem co z ruterem czy ten da radę czy też trzeba go wymienić ?
czy wogóle ta modyfikacja opłacalna - czy zysk wydajności będzie zauważalny, serwer będzie głównie wykorzystywany do pracy na SQL, oraz kilka programów z których będą korzystały stacje robocze no i jako serwer do przechowywania plików
QNAP - będzie podmapowywany w nocy i plik bat będzie zapisywał na niego kopie zapasowe danych z serwera i odmapowywał go z serwera.
proszę o pomoc w rozwiązaniu mojego problemu
Problem rozwiązany - wystarczyło wyłączyć wymuszanie przydzielania adresów ip
Witam, wczoraj przeszedłem z 182 na 1.9.2.2 (r49483) i występują problem na windows Phone i android z wi-fi - z siecią się łączy ale nie ma internetu, iphone i laptopy bez problemów działają - sieć ma zabezpiczenie wpa2 psk. w ruterze mam ustawione serwery dns googla.
2,4GHZ:
Punkt dostępowy AP
szerokość kanału 20
moc MAX
filtrowanie MAC wyłączone
sieć gościnna wyłączona.
oba telefony na których nie działa dostają poprawne adresy IP - zgodne z przypisaniem w konfiguracji DHCP adres bramki poprawny ale jako dns mają adres bramki.
proszę o pomoc w rozwiązaniu problemu.
wszystko jasne - poszło - źle wpisywałem... adres
sierota ze mnie.. przepraszam za zamieszanie - wszystko działa- dziękuję za pomoc.
Adres IP WAN:
192.168.11.129
Maska podsieci WAN:
255.255.255.0
wszystko dzieje się na R2 zrobiłem tak po wgraniu nowego Gargoyle:
ustawiłem Adres Ip LAN: 192.168.99.40
podłączyłem w UI zasób z USB
dodałem do zapory:
uci add firewall rule
uci set firewall.@rule[-1].name=a1
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=tcp
uci set firewall.@rule[-1].dest_port=137
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a2
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=tcp
uci set firewall.@rule[-1].dest_port=138
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a3
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=tcp
uci set firewall.@rule[-1].dest_port=139
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a4
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=tcp
uci set firewall.@rule[-1].dest_port=389
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a5
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=tcp
uci set firewall.@rule[-1].dest_port=445
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a6
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=tcp
uci set firewall.@rule[-1].dest_port=901
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a7
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=udp
uci set firewall.@rule[-1].dest_port=137
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a8
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=udp
uci set firewall.@rule[-1].dest_port=138
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a9
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=udp
uci set firewall.@rule[-1].dest_port=139
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a10
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=udp
uci set firewall.@rule[-1].dest_port=389
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a11
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=udp
uci set firewall.@rule[-1].dest_port=445
uci commit firewall
uci add firewall rule
uci set firewall.@rule[-1].name=a12
uci set firewall.@rule[-1].src=wan
uci set firewall.@rule[-1].target=ACCEPT
uci set firewall.@rule[-1].proto=udp
uci set firewall.@rule[-1].dest_port=901
uci commit firewall
wykonałemdodanie do
/etc/config/samba
do sekcji "samba"
option interface 'loopback lan wan'
/etc/init.d/samba restart
restart rutera R2 i na komputerze 2( podłączonym po LAN do R2) widzę zasób a na komputerze 1 nie widzę.
no to ja już nic z tego nie wiem, bądz tak dobry i napisz mi po kolei co mam zrobić na R2 ?
no ok czyli na R1 co mam ustawić - jakie porty mam przekierować ? na R2 ?
i dalej nie widać na komputerze 1 - który jest wpięty w R1, wpisuję w eksploratorze plików w adresie \\192.168.99.40\kopie
no to mam tak:
R1
Adres urządzenia 192.168.11.33
maska 255.255.255.0
R2
Adres urządzenia 192.168.99.40
maska 255.255.255.0
jak podłaczasz 2 router do wan robisz 2 podsiec inna adresacja wtedy musisz zrobic przekieroanie portów to co pisał Cezary a jak do lan to musisz wyłaczyć serwer dhcp tak ze masz zwyły switch i adresy dostaja z pierwszago routera
czyli w R1 mam 192.168.11.x
a w R2 ustawiam: 192.168.99.x
porty mam otwarte ale nie mam zadnego przekierowania - gdzie i jakie przekierowanie mam ustawić ?
zmieniłem z powrotem na 192.168.11.x
plik po próbie połączenia z komputera 1
iptables -v -L
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
7 445 bw_ingress all -- eth0.2 any anywhere anywhere
138 15028 delegate_input all -- any any anywhere anywher e
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
84 65725 bw_ingress all -- eth0.2 any anywhere anywhere
84 65725 ingress_restrictions all -- eth0.2 any anywhere a nywhere
86 18514 egress_restrictions all -- any eth0.2 anywhere an ywhere
176 84625 delegate_forward all -- any any anywhere anywh ere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
89 15675 delegate_output all -- any any anywhere anywhe re
Chain bw_ingress (2 references)
pkts bytes target prot opt in out source destination
91 66170 CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
89 66106 CONNMARK all -- any any anywhere 192.168.11.0 /24 CONNMARK xset 0xf000000/0xff000000
5 381 CONNMARK all -- any any anywhere 192.168.11.1 29 CONNMARK xset 0xf000000/0xff000000
2 64 RETURN all -- any any anywhere anywhere connmark match 0x0/0xf000000
89 66106 CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
0 0 all -- any any anywhere anywhere bandwidth --id total1-download-2-449 --type combined --current_bandwidth 0 --reset_interval 2 --reset_time 2 --intervals_to_save 449
0 0 all -- any any anywhere anywhere bandwidth --id bdist1-download-minute-15 --type individual_dst --reset_i nterval minute --intervals_to_save 15
0 0 all -- any any anywhere anywhere bandwidth --id total2-download-minute-359 --type combined --current_band width 0 --reset_interval minute --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist2-download-900-24 --type individual_dst --reset_inte rval 900 --reset_time 900 --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total3-download-180-479 --type combined --current_bandwid th 0 --reset_interval 180 --reset_time 180 --intervals_to_save 479
0 0 all -- any any anywhere anywhere bandwidth --id bdist3-download-hour-24 --type individual_dst --reset_int erval hour --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total4-download-7200-359 --type combined --current_bandwi dth 0 --reset_interval 7200 --reset_time 7200 --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist4-download-day-31 --type individual_dst --reset_inte rval day --intervals_to_save 31
0 0 all -- any any anywhere anywhere bandwidth --id total5-download-day-365 --type combined --current_bandwid th 0 --reset_interval day --intervals_to_save 365
0 0 all -- any any anywhere anywhere bandwidth --id bdist5-download-month-12 --type individual_dst --reset_in terval month --intervals_to_save 12
Chain delegate_forward (1 references)
pkts bytes target prot opt in out source destination
176 84625 forwarding_rule all -- any any anywhere anywhe re /* user chain for forwarding */
163 81223 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
13 3402 zone_lan_forward all -- br-lan any anywhere anywh ere
0 0 zone_wan_forward all -- eth0.2 any anywhere anywh ere
0 0 reject all -- any any anywhere anywhere
Chain delegate_input (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- lo any anywhere anywhere
138 15028 input_rule all -- any any anywhere anywhere /* user chain for input */
118 13051 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
2 104 syn_flood tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
17 1873 zone_lan_input all -- br-lan any anywhere anywher e
3 104 zone_wan_input all -- eth0.2 any anywhere anywher e
Chain delegate_output (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any lo anywhere anywhere
89 15675 output_rule all -- any any anywhere anywhere /* user chain for output */
76 14106 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
8 1209 zone_lan_output all -- any br-lan anywhere anywhe re
5 360 zone_wan_output all -- any eth0.2 anywhere anywhe re
Chain egress_restrictions (1 references)
pkts bytes target prot opt in out source destination
86 18514 egress_whitelist all -- any any anywhere anywh ere
Chain egress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain ingress_restrictions (1 references)
pkts bytes target prot opt in out source destination
84 65725 ingress_whitelist all -- any any anywhere anyw here
Chain ingress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_B (1 references)
pkts bytes target prot opt in out source destination
Chain reject (3 references)
pkts bytes target prot opt in out source destination
1 40 REJECT tcp -- any any anywhere anywhere reject-with tcp-reset
0 0 REJECT all -- any any anywhere anywhere reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
2 104 RETURN tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
0 0 DROP all -- any any anywhere anywhere
Chain zone_lan_dest_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
8 1209 ACCEPT all -- any br-lan anywhere anywhere
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
13 3402 pf_loopback_B all -- any any anywhere anywhere
6 386 ACCEPT all -- br-lan br-lan anywhere anywhere
7 3016 forwarding_lan_rule all -- any any anywhere an ywhere /* user chain for forwarding */
7 3016 zone_wan_dest_ACCEPT all -- any any anywhere a nywhere /* forwarding lan -> wan */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_lan_dest_ACCEPT all -- any any anywhere a nywhere
Chain zone_lan_input (1 references)
pkts bytes target prot opt in out source destination
17 1873 input_lan_rule all -- any any anywhere anywher e /* user chain for input */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
17 1873 zone_lan_src_ACCEPT all -- any any anywhere an ywhere
Chain zone_lan_output (1 references)
pkts bytes target prot opt in out source destination
8 1209 output_lan_rule all -- any any anywhere anywhe re /* user chain for output */
8 1209 zone_lan_dest_ACCEPT all -- any any anywhere a nywhere
Chain zone_lan_src_ACCEPT (1 references)
pkts bytes target prot opt in out source destination
17 1873 ACCEPT all -- br-lan any anywhere anywhere
Chain zone_wan_dest_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
12 3376 ACCEPT all -- any eth0.2 anywhere anywhere
Chain zone_wan_dest_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any eth0.2 anywhere anywhere
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_wan_rule all -- any any anywhere an ywhere /* user chain for forwarding */
0 0 zone_lan_dest_ACCEPT esp -- any any anywhere a nywhere /* @rule[7] */
0 0 zone_lan_dest_ACCEPT udp -- any any anywhere a nywhere udp dpt:isakmp /* @rule[8] */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_wan_dest_REJECT all -- any any anywhere a nywhere
Chain zone_wan_input (1 references)
pkts bytes target prot opt in out source destination
3 104 input_wan_rule all -- any any anywhere anywher e /* user chain for input */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:bootpc /* Allow-DHCP-Renew */
0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request /* Allow-Ping */
2 64 ACCEPT igmp -- any any anywhere anywhere /* Allow-IGMP */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ns /* a1 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-dgm /* a2 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ssn /* a3 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ldap /* a4 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:microsoft-ds /* a5 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:901 /* a6 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:netbios-ns /* a7 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:netbios-ssn /* a9 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:ldap /* a10 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:microsoft-ds /* a11 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:901 /* a12 */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
1 40 zone_wan_src_REJECT all -- any any anywhere an ywhere
Chain zone_wan_output (1 references)
pkts bytes target prot opt in out source destination
5 360 output_wan_rule all -- any any anywhere anywhe re /* user chain for output */
5 360 zone_wan_dest_ACCEPT all -- any any anywhere a nywhere
Chain zone_wan_src_REJECT (1 references)
pkts bytes target prot opt in out source destination
1 40 reject all -- eth0.2 any anywhere anywhere
w między czasie wgrałem na nowo Gargoyle, dodałem porty do zapory, dodałem dysk usb, wpis w sambie restart i dalej nic - teraz nie wiem co z tymi sieciami? maja być takie same czy inne ?
rutery miały taką samą 192.168.11.x
teraz zminiłem w R2 na 192.168.99.x
i dalej nie widać - nie wiem jakie mają być te sieci ?
nano /var/etc/smb.conf
GNU nano 2.4.1 File: /var/etc/smb.conf
[global]
netbios name = Gargoyle
display charset = UTF-8
interfaces = 127.0.0.1/8 lo 192.168.99.40/24 br-lan 192.168.11.129/24 e$
server string = Samba on Gargoyle
unix charset = UTF-8
workgroup = WORKGROUP
browseable = yes
deadtime = 30
domain master = yes
encrypt passwords = true
enable core files = no
guest account = root
guest ok = yes
local master = yes
load printers = no
map to guest = Bad User
max protocol = SMB2
min receivefile size = 16384
a może w configu dodać option interface 'loopback lan wan' do sekcji config sambashare 'kopie'?
obecnie konfig:
config samba 'global'
option workgroup 'WORKGROUP'
option interface 'loopback lan wan'
config sambashare 'kopie'
option name 'kopie'
option create_mask '0777'
option dir_mask '0777'
option browseable 'yes'
option read_only 'no'
list users_rw 'admin'
option guest_ok 'no'
option path '/tmp/usb_mount/23e581bb-8baf-4f98-a3d5-cbd7ba2c6307'
dalej nie widać zasobu.
iptables -v -L
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
30 2473 bw_ingress all -- eth0.2 any anywhere anywhere
93 7930 delegate_input all -- any any anywhere anywhere
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
141 59956 bw_ingress all -- eth0.2 any anywhere anywhere
141 59956 ingress_restrictions all -- eth0.2 any anywhere anywhere
174 40168 egress_restrictions all -- any eth0.2 anywhere anywhere
315 100K delegate_forward all -- any any anywhere anywhere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
75 9595 delegate_output all -- any any anywhere anywhere
Chain bw_ingress (2 references)
pkts bytes target prot opt in out source destination
171 62429 CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
169 62365 CONNMARK all -- any any anywhere 192.168.11.0/24 CONNMARK xset 0xf000000/0xff000000
22 1941 CONNMARK all -- any any anywhere 192.168.11.129 CONNMARK xset 0xf000000/0xff000000
2 64 RETURN all -- any any anywhere anywhere connmark match 0x0/0xf000000
169 62365 CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
0 0 all -- any any anywhere anywhere bandwidth --id total1-download-2-449 --type combined --current_bandwidth 0 --reset_interval 2 --reset_time 2 --intervals_to_save 449
0 0 all -- any any anywhere anywhere bandwidth --id bdist1-download-minute-15 --type individual_dst --reset_interval minute --intervals_to_save 15
0 0 all -- any any anywhere anywhere bandwidth --id total2-download-minute-359 --type combined --current_bandwidth 0 --reset_interval minute --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist2-download-900-24 --type individual_dst --reset_interval 900 --reset_time 900 --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total3-download-180-479 --type combined --current_bandwidth 0 --reset_interval 180 --reset_time 180 --intervals_to_save 479
0 0 all -- any any anywhere anywhere bandwidth --id bdist3-download-hour-24 --type individual_dst --reset_interval hour --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total4-download-7200-359 --type combined --current_bandwidth 0 --reset_interval 7200 --reset_time 7200 --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist4-download-day-31 --type individual_dst --reset_interval day --intervals_to_save 31
0 0 all -- any any anywhere anywhere bandwidth --id total5-download-day-365 --type combined --current_bandwidth 0 --reset_interval day --intervals_to_save 365
0 0 all -- any any anywhere anywhere bandwidth --id bdist5-download-month-12 --type individual_dst --reset_interval month --intervals_to_save 12
Chain delegate_forward (1 references)
pkts bytes target prot opt in out source destination
315 100K forwarding_rule all -- any any anywhere anywhere /* user chain for forwarding */
301 96744 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
14 3380 zone_lan_forward all -- br-lan any anywhere anywhere
0 0 zone_wan_forward all -- eth0.2 any anywhere anywhere
0 0 reject all -- any any anywhere anywhere
Chain delegate_input (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- lo any anywhere anywhere
93 7930 input_rule all -- any any anywhere anywhere /* user chain for input */
65 5358 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
1 52 syn_flood tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
19 1969 zone_lan_input all -- br-lan any anywhere anywhere
9 603 zone_wan_input all -- eth0.2 any anywhere anywhere
Chain delegate_output (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any lo anywhere anywhere
75 9595 output_rule all -- any any anywhere anywhere /* user chain for output */
48 6956 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
4 990 zone_lan_output all -- any br-lan anywhere anywhere
23 1649 zone_wan_output all -- any eth0.2 anywhere anywhere
Chain egress_restrictions (1 references)
pkts bytes target prot opt in out source destination
174 40168 egress_whitelist all -- any any anywhere anywhere
Chain egress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain ingress_restrictions (1 references)
pkts bytes target prot opt in out source destination
141 59956 ingress_whitelist all -- any any anywhere anywhere
Chain ingress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan_rule (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
Chain output_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_B (1 references)
pkts bytes target prot opt in out source destination
Chain reject (3 references)
pkts bytes target prot opt in out source destination
1 71 REJECT tcp -- any any anywhere anywhere reject-with tcp-reset
0 0 REJECT all -- any any anywhere anywhere reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
1 52 RETURN tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
0 0 DROP all -- any any anywhere anywhere
Chain zone_lan_dest_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
4 990 ACCEPT all -- any br-lan anywhere anywhere
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
14 3380 pf_loopback_B all -- any any anywhere anywhere
0 0 ACCEPT all -- br-lan br-lan anywhere anywhere
14 3380 forwarding_lan_rule all -- any any anywhere anywhere /* user chain for forwarding */
14 3380 zone_wan_dest_ACCEPT all -- any any anywhere anywhere /* forwarding lan -> wan */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_lan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_input (1 references)
pkts bytes target prot opt in out source destination
19 1969 input_lan_rule all -- any any anywhere anywhere /* user chain for input */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
19 1969 zone_lan_src_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_output (1 references)
pkts bytes target prot opt in out source destination
4 990 output_lan_rule all -- any any anywhere anywhere /* user chain for output */
4 990 zone_lan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_src_ACCEPT (1 references)
pkts bytes target prot opt in out source destination
19 1969 ACCEPT all -- br-lan any anywhere anywhere
Chain zone_wan_dest_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
37 5029 ACCEPT all -- any eth0.2 anywhere anywhere
Chain zone_wan_dest_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any eth0.2 anywhere anywhere
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_wan_rule all -- any any anywhere anywhere /* user chain for forwarding */
0 0 zone_lan_dest_ACCEPT esp -- any any anywhere anywhere /* @rule[7] */
0 0 zone_lan_dest_ACCEPT udp -- any any anywhere anywhere udp dpt:isakmp /* @rule[8] */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_wan_dest_REJECT all -- any any anywhere anywhere
Chain zone_wan_input (1 references)
pkts bytes target prot opt in out source destination
9 603 input_wan_rule all -- any any anywhere anywhere /* user chain for input */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:bootpc /* Allow-DHCP-Renew */
0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request /* Allow-Ping */
2 64 ACCEPT igmp -- any any anywhere anywhere /* Allow-IGMP */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https /* ssh */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ns /* ssh1 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-dgm /* ssh2 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ssn /* ssh */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ldap /* ssh3 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:microsoft-ds /* ssh4 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:901 /* ssh5 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ns /* a1 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-dgm /* a2 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ssn /* a3 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ldap /* a4 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:microsoft-ds /* a5 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:901 /* a6 */
6 468 ACCEPT udp -- any any anywhere anywhere udp dpt:netbios-ns /* a7 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:netbios-dgm /* a8 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:netbios-ssn /* a9 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:ldap /* a10 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:microsoft-ds /* a11 */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:901 /* a12 */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
1 71 zone_wan_src_REJECT all -- any any anywhere anywhere
Chain zone_wan_output (1 references)
pkts bytes target prot opt in out source destination
23 1649 output_wan_rule all -- any any anywhere anywhere /* user chain for output */
23 1649 zone_wan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_wan_src_REJECT (1 references)
pkts bytes target prot opt in out source destination
1 71 reject all -- eth0.2 any anywhere anywhere
ok już to robię
?
czyli porty tak mają być:
netbios-ns 137/tcp # NETBIOS Name Service
netbios-ns 137/udp
netbios-dgm 138/tcp # NETBIOS Datagram Service
netbios-dgm 138/udp
netbios-ssn 139/tcp # NETBIOS session service
netbios-ssn 139/udp
iptables -v -L
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 bw_ingress all -- eth0.2 any anywhere anywhere
6 759 delegate_input all -- any any anywhere anywhere
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 bw_ingress all -- eth0.2 any anywhere anywhere
11 2633 ingress_restrictions all -- eth0.2 any anywhere anywhere
11 1578 egress_restrictions all -- any eth0.2 anywhere anywhere
70 25261 delegate_forward all -- any any anywhere anywhere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4 679 delegate_output all -- any any anywhere anywhere
Chain bw_ingress (2 references)
pkts bytes target prot opt in out source destination
0 0 CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
0 0 CONNMARK all -- any any anywhere 192.168.11.0/24 CONNMARK xset 0xf000000/0xff000000
0 0 CONNMARK all -- any any anywhere 192.168.11.129 CONNMARK xset 0xf000000/0xff000000
0 0 RETURN all -- any any anywhere anywhere connmark match 0x0/0xf000000
0 0 CONNMARK all -- any any anywhere anywhere CONNMARK and 0xffffff
0 0 all -- any any anywhere anywhere bandwidth --id total1-download-2-449 --type combined --current_bandwidth 0 --reset_interval 2 --reset_time 2 --intervals_to_save 449
0 0 all -- any any anywhere anywhere bandwidth --id bdist1-download-minute-15 --type individual_dst --reset_interval minute --intervals_to_save 15
0 0 all -- any any anywhere anywhere bandwidth --id total2-download-minute-359 --type combined --current_bandwidth 0 --reset_interval minute --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist2-download-900-24 --type individual_dst --reset_interval 900 --reset_time 900 --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total3-download-180-479 --type combined --current_bandwidth 0 --reset_interval 180 --reset_time 180 --intervals_to_save 479
0 0 all -- any any anywhere anywhere bandwidth --id bdist3-download-hour-24 --type individual_dst --reset_interval hour --intervals_to_save 24
0 0 all -- any any anywhere anywhere bandwidth --id total4-download-7200-359 --type combined --current_bandwidth 0 --reset_interval 7200 --reset_time 7200 --intervals_to_save 359
0 0 all -- any any anywhere anywhere bandwidth --id bdist4-download-day-31 --type individual_dst --reset_interval day --intervals_to_save 31
0 0 all -- any any anywhere anywhere bandwidth --id total5-download-day-365 --type combined --current_bandwidth 0 --reset_interval day --intervals_to_save 365
0 0 all -- any any anywhere anywhere bandwidth --id bdist5-download-month-12 --type individual_dst --reset_interval month --intervals_to_save 12
Chain delegate_forward (1 references)
pkts bytes target prot opt in out source destination
70 25261 forwarding_rule all -- any any anywhere anywhere /* user chain for forwarding */
68 25157 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
2 104 zone_lan_forward all -- br-lan any anywhere anywhere
0 0 zone_wan_forward all -- eth0.2 any anywhere anywhere
0 0 reject all -- any any anywhere anywhere
Chain delegate_input (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- lo any anywhere anywhere
6 759 input_rule all -- any any anywhere anywhere /* user chain for input */
4 264 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
0 0 syn_flood tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
2 495 zone_lan_input all -- br-lan any anywhere anywhere
0 0 zone_wan_input all -- eth0.2 any anywhere anywhere
Chain delegate_output (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any lo anywhere anywhere
4 679 output_rule all -- any any anywhere anywhere /* user chain for output */
2 184 ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
2 495 zone_lan_output all -- any br-lan anywhere anywhere
0 0 zone_wan_output all -- any eth0.2 anywhere anywhere
Chain egress_restrictions (1 references)
pkts bytes target prot opt in out source destination
11 1578 egress_whitelist all -- any any anywhere anywhere
Chain egress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain ingress_restrictions (1 references)
pkts bytes target prot opt in out source destination
11 2633 ingress_whitelist all -- any any anywhere anywhere
Chain ingress_whitelist (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan_rule (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:www
Chain output_lan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain output_wan_rule (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_B (1 references)
pkts bytes target prot opt in out source destination
Chain reject (3 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- any any anywhere anywhere reject-with tcp-reset
0 0 REJECT all -- any any anywhere anywhere reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
0 0 DROP all -- any any anywhere anywhere
Chain zone_lan_dest_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
2 495 ACCEPT all -- any br-lan anywhere anywhere
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 pf_loopback_B all -- any any anywhere anywhere
0 0 ACCEPT all -- br-lan br-lan anywhere anywhere
2 104 forwarding_lan_rule all -- any any anywhere anywhere /* user chain for forwarding */
2 104 zone_wan_dest_ACCEPT all -- any any anywhere anywhere /* forwarding lan -> wan */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_lan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_input (1 references)
pkts bytes target prot opt in out source destination
2 495 input_lan_rule all -- any any anywhere anywhere /* user chain for input */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
2 495 zone_lan_src_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_output (1 references)
pkts bytes target prot opt in out source destination
2 495 output_lan_rule all -- any any anywhere anywhere /* user chain for output */
2 495 zone_lan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_src_ACCEPT (1 references)
pkts bytes target prot opt in out source destination
2 495 ACCEPT all -- br-lan any anywhere anywhere
Chain zone_wan_dest_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
2 104 ACCEPT all -- any eth0.2 anywhere anywhere
Chain zone_wan_dest_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any eth0.2 anywhere anywhere
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_wan_rule all -- any any anywhere anywhere /* user chain for forwarding */
0 0 zone_lan_dest_ACCEPT esp -- any any anywhere anywhere /* @rule[7] */
0 0 zone_lan_dest_ACCEPT udp -- any any anywhere anywhere udp dpt:isakmp /* @rule[8] */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port forwards */
0 0 zone_wan_dest_REJECT all -- any any anywhere anywhere
Chain zone_wan_input (1 references)
pkts bytes target prot opt in out source destination
0 0 input_wan_rule all -- any any anywhere anywhere /* user chain for input */
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:bootpc /* Allow-DHCP-Renew */
0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request /* Allow-Ping */
0 0 ACCEPT igmp -- any any anywhere anywhere /* Allow-IGMP */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https /* ssh */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ns /* ssh1 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-dgm /* ssh2 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ssn /* ssh */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ldap /* ssh3 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:microsoft-ds /* ssh4 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:901 /* ssh5 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ns /* a1 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-dgm /* a2 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:netbios-ssn /* a3 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ldap /* a4 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:microsoft-ds /* a5 */
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:901 /* a6 */
0 0 ACCEPT all -- any any anywhere anywhere ctstate DNAT /* Accept port redirections */
0 0 zone_wan_src_REJECT all -- any any anywhere anywhere
Chain zone_wan_output (1 references)
pkts bytes target prot opt in out source destination
0 0 output_wan_rule all -- any any anywhere anywhere /* user chain for output */
0 0 zone_wan_dest_ACCEPT all -- any any anywhere anywhere
Chain zone_wan_src_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- eth0.2 any anywhere anywhere
eko.one.pl → Posty przez Pawci_o
Forum oparte o PunBB, wspierane przez Informer Technologies, Inc