26 (edytowany przez krystiano.kris 2018-09-24 15:31:50)

Odp: Ftp linksys wrt1900acs

Jak narazie to mam problem z tym :
Robie wedlug poradnika
https://vpnonline.pl/openwrt_pptp

ale mam taki log

Mon Sep 24 15:22:57 2018 daemon.info pppd[5801]: Plugin pptp.so loaded.
Mon Sep 24 15:22:57 2018 daemon.info pppd[5801]: PPTP plugin version 1.00
Mon Sep 24 15:22:57 2018 daemon.notice pppd[5801]: pppd 2.4.7 started by root, uid 0
Mon Sep 24 15:22:58 2018 kern.info kernel: [  261.964610] pptp-vpnonline: renamed from ppp0
Mon Sep 24 15:22:58 2018 daemon.info pppd[5801]: Using interface pptp-vpnonline
Mon Sep 24 15:22:58 2018 daemon.notice pppd[5801]: Connect: pptp-vpnonline <--> pptp (pl01.vpnonline.eu)
Mon Sep 24 15:23:25 2018 daemon.info pppd[5634]: Closing PPTP connection
Mon Sep 24 15:23:28 2018 daemon.warn pppd[5801]: LCP: timeout sending Config-Requests
Mon Sep 24 15:23:28 2018 daemon.notice pppd[5801]: Connection terminated.
Mon Sep 24 15:23:28 2018 daemon.notice pppd[5801]: Modem hangup
Mon Sep 24 15:23:28 2018 daemon.info pppd[5801]: Exit.
Mon Sep 24 15:23:28 2018 daemon.notice netifd: Interface 'vpnonline' is now down
Mon Sep 24 15:23:28 2018 daemon.notice netifd: Interface 'vpnonline' is setting up now
Mon Sep 24 15:23:28 2018 daemon.info pppd[5983]: Plugin pptp.so loaded.
Mon Sep 24 15:23:28 2018 daemon.info pppd[5983]: PPTP plugin version 1.00
Mon Sep 24 15:23:28 2018 daemon.notice pppd[5983]: pppd 2.4.7 started by root, uid 0
Mon Sep 24 15:23:29 2018 kern.info kernel: [  293.231643] pptp-vpnonline: renamed from ppp0
Mon Sep 24 15:23:29 2018 daemon.info pppd[5983]: Using interface pptp-vpnonline
Mon Sep 24 15:23:29 2018 daemon.notice pppd[5983]: Connect: pptp-vpnonline <--> pptp (pl01.vpnonline.eu)


dobra nie wazne zmienilem protokol i poszlo

teraz konfigi do wybranych ip bo jak narazie to wszystko idzie przez vpn

27

Odp: Ftp linksys wrt1900acs

Poddaje sie , nie dam rady :-(

28

Odp: Ftp linksys wrt1900acs

Dobra podszedlem na spokojnie do tego.
Mam polaczenie vpn (protokol L2TP) zrobilem zgodnie z poradnikiem : https://eko.one.pl/?p=openwrt-routing
i dodalem tylko jedno ip (dekodera)

jednak nadal caly ruch idzie przez vpn

Prosze o pomoc

29

Odp: Ftp linksys wrt1900acs

vpn masz zrobiony tak że trasę domyślną masz przez vpn, więc cały ruch idzie przez vpn.

Nie rób trasy domyślnej przez vpn.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

30 (edytowany przez krystiano.kris 2018-09-25 15:28:42)

Odp: Ftp linksys wrt1900acs

Cezary napisał/a:

vpn masz zrobiony tak że trasę domyślną masz przez vpn, więc cały ruch idzie przez vpn.

Nie rób trasy domyślnej przez vpn.

I tutaj chyba utknalem , dzieki za cierpliwosc do mnie.

Nie bardzo wiem co mam zrobić

31

Odp: Ftp linksys wrt1900acs

Bardzo bym prosil o "poprowadzenie za reke" z tym problemem (jak dla mnie)
Juz musialem 2 razy instalowac openwrt na ruterze bo tak namieszalem.

32

Odp: Ftp linksys wrt1900acs

Pokaż jaki masz konfig tego vpna.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

33

Odp: Ftp linksys wrt1900acs

Cezary napisał/a:

Pokaż jaki masz konfig tego vpna.

To jest vpnonline a ustawialem tak jak :
https://vpnonline.pl/openwrt_pptp
Z tym że protokół L2TP.

Jezeli jest nieodpowiedni to będę musiał chyba poszukać innego.

Jak trzeba to zrobię screeny wszystkiego.

34

Odp: Ftp linksys wrt1900acs

Nie, pokaż jak ty ustawiłeś a nie jak wygląda poradnik na stronie operatora. Pokaż wyniki poleceń (tekst nie screenshoty)

uci show network
uci show firewall
ifconfig -a
route -n

usera/hasło możesz sobie wygwiazdkować ale reszty nie ruszaj.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

35

Odp: Ftp linksys wrt1900acs

uci show network:

root@OpenWrt:~# uci show network
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd67:b398:2b93::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth0.1'
network.lan.proto='static'
network.lan.ipaddr='192.168.1.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.wan=interface
network.wan.ifname='eth1.2'
network.wan.proto='dhcp'
network.wan6=interface
network.wan6.ifname='eth1.2'
network.wan6.proto='dhcpv6'
network.wan6.reqaddress='try'
network.wan6.reqprefix='auto'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].ports='0 1 2 3 5t'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='4 6t'
network.vpnonline=interface
network.vpnonline.proto='l2tp'
network.vpnonline.username='********'
network.vpnonline.password='**********'
network.vpnonline.ipv6='auto'
network.vpnonline.server='de01.vpnonline.eu'
network.vpnonline.buffering='1'
network.@route[0]=route

uci show firewall

root@OpenWrt:~# uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[0].network='lan'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@zone[1].network='Vpn wan wan6 vpnonline'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fc00::/6'
firewall.@rule[3].dest_ip='fc00::/6'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-IPSec-ESP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Allow-ISAKMP'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
firewall.@rule[9]=rule
firewall.@rule[9]._name='FTP'
firewall.@rule[9].src='wan'
firewall.@rule[9].target='ACCEPT'
firewall.@rule[9].proto='tcp'
firewall.@rule[9].dest_port='21'
firewall.@redirect[0]=redirect
firewall.@redirect[0].target='DNAT'
firewall.@redirect[0].src='wan'
firewall.@redirect[0].dest='lan'
firewall.@redirect[0].proto='tcp udp'
firewall.@redirect[0].src_dport='1083'
firewall.@redirect[0].dest_ip='192.168.1.101'
firewall.@redirect[0].dest_port='1083'
firewall.@redirect[0].name='oscam'
firewall.@redirect[1]=redirect
firewall.@redirect[1].target='DNAT'
firewall.@redirect[1].src='wan'
firewall.@redirect[1].dest='lan'
firewall.@redirect[1].proto='tcp udp'
firewall.@redirect[1].src_dport='83'
firewall.@redirect[1].dest_ip='192.168.1.102'
firewall.@redirect[1].dest_port='83'
firewall.@redirect[1].name='oscam_sypialnia'
firewall.@rule[10]=rule
firewall.@rule[10].name='OpenVPN'
firewall.@rule[10].target='ACCEPT'
firewall.@rule[10].src='wan'
firewall.@rule[10].proto='udp'
firewall.@rule[10].dest_port='993'
firewall.@rule[11]=rule
firewall.@rule[11].enabled='1'
firewall.@rule[11].target='ACCEPT'
firewall.@rule[11].src='wan'
firewall.@rule[11].dest='lan'

ifconfig -a

root@OpenWrt:~# ifconfig -a
br-lan    Link encap:Ethernet  HWaddr 16:91:82:2A:76:7B
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          inet6 addr: fd67:b398:2b93::1/60 Scope:Global
          inet6 addr: fe80::1491:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:695300 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1812349 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:102530698 (97.7 MiB)  TX bytes:2527874087 (2.3 GiB)

erspan0   Link encap:Ethernet  HWaddr 00:00:00:00:00:00
          BROADCAST MULTICAST  MTU:1450  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

eth0      Link encap:Ethernet  HWaddr 16:91:82:2A:76:7B
          inet6 addr: fe80::1491:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:331008 errors:0 dropped:0 overruns:0 frame:0
          TX packets:318751 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:532
          RX bytes:54026384 (51.5 MiB)  TX bytes:301808142 (287.8 MiB)
          Interrupt:37

eth0.1    Link encap:Ethernet  HWaddr 16:91:82:2A:76:7B
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:325663 errors:0 dropped:67 overruns:0 frame:0
          TX packets:318719 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:47852814 (45.6 MiB)  TX bytes:300529281 (286.6 MiB)

eth1      Link encap:Ethernet  HWaddr 14:91:82:2A:76:7B
          inet6 addr: fe80::1691:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2146339 errors:0 dropped:0 overruns:0 frame:0
          TX packets:643521 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:532
          RX bytes:2543732971 (2.3 GiB)  TX bytes:101451485 (96.7 MiB)
          Interrupt:36

eth1.2    Link encap:Ethernet  HWaddr 14:91:82:2A:76:7B
          inet addr:81.99.132.253  Bcast:81.99.135.255  Mask:255.255.252.0
          inet6 addr: fe80::1691:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1793958 errors:0 dropped:0 overruns:0 frame:0
          TX packets:643515 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2488471785 (2.3 GiB)  TX bytes:98876713 (94.2 MiB)

gre0      Link encap:UNSPEC  HWaddr 00-00-00-00-62-00-50-E2-00-00-00-00-00-00-00-00
          NOARP  MTU:1476  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

gretap0   Link encap:Ethernet  HWaddr 00:00:00:00:00:00
          BROADCAST MULTICAST  MTU:1462  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

l2tp-vpnonline Link encap:Point-to-Point Protocol
          inet addr:10.100.201.69  P-t-P:10.100.201.254  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1420  Metric:1
          RX packets:6368 errors:0 dropped:0 overruns:0 frame:0
          TX packets:4217 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:3
          RX bytes:3945564 (3.7 MiB)  TX bytes:952068 (929.7 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:308 errors:0 dropped:0 overruns:0 frame:0
          TX packets:308 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:28135 (27.4 KiB)  TX bytes:28135 (27.4 KiB)

wlan0     Link encap:Ethernet  HWaddr 16:91:82:2A:76:7D
          inet6 addr: fe80::1491:82ff:fe2a:767d/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:276484 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1696678 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:42624818 (40.6 MiB)  TX bytes:2246585043 (2.0 GiB)

wlan1     Link encap:Ethernet  HWaddr 16:91:82:2A:76:7C
          inet6 addr: fe80::1491:82ff:fe2a:767c/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:109260 errors:0 dropped:0 overruns:0 frame:0
          TX packets:108016 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:23341754 (22.2 MiB)  TX bytes:49535200 (47.2 MiB)

route -n

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.100.201.254  0.0.0.0         UG    0      0        0 l2tp-vpnonline
10.100.201.254  0.0.0.0         255.255.255.255 UH    0      0        0 l2tp-vpnonline
81.99.132.0     0.0.0.0         255.255.252.0   U     0      0        0 eth1.2
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
195.201.220.59  81.99.132.1     255.255.255.255 UGH   0      0        0 eth1.2

36

Odp: Ftp linksys wrt1900acs

uci set network.vpnonline.pppd_options="nodefaultroute"
uci commit
reboot

i zobacz co będzie.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

37

Odp: Ftp linksys wrt1900acs

Dalej caly ruch idzie przez VPN

38 (edytowany przez Cezary 2018-09-26 14:33:22)

Odp: Ftp linksys wrt1900acs

Pokaż route -n ponownie.

Poprawka - wywal l2tp i zmień sobie protokół na inny.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

39

Odp: Ftp linksys wrt1900acs

route -n przed zmiana protokolu

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.100.201.254  0.0.0.0         UG    0      0        0 l2tp-vpn                            online
10.100.201.254  0.0.0.0         255.255.255.255 UH    0      0        0 l2tp-vpn                            online
81.99.132.0     0.0.0.0         255.255.252.0   U     0      0        0 eth1.2
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
195.201.220.59  81.99.132.1     255.255.255.255 UGH   0      0        0 eth1.2

po zmianie mam w logu tak

Wed Sep 26 14:45:15 2018 daemon.warn pppd[5180]: LCP: timeout sending Config-Requests
Wed Sep 26 14:45:15 2018 daemon.notice pppd[5180]: Connection terminated.
Wed Sep 26 14:45:15 2018 daemon.notice pppd[5180]: Modem hangup
Wed Sep 26 14:45:15 2018 daemon.info pppd[5180]: Exit.
Wed Sep 26 14:45:15 2018 daemon.notice netifd: Interface 'vpnonline' is now down
Wed Sep 26 14:45:15 2018 daemon.notice netifd: Interface 'vpnonline' is setting up now
Wed Sep 26 14:45:15 2018 daemon.info pppd[5422]: Plugin pptp.so loaded.
Wed Sep 26 14:45:15 2018 daemon.info pppd[5422]: PPTP plugin version 1.00
Wed Sep 26 14:45:15 2018 daemon.notice pppd[5422]: pppd 2.4.7 started by root, uid 0
Wed Sep 26 14:45:16 2018 kern.info kernel: [  114.493369] pptp-vpnonline: renamed from ppp0
Wed Sep 26 14:45:16 2018 daemon.info pppd[5422]: Using interface pptp-vpnonline
Wed Sep 26 14:45:16 2018 daemon.notice pppd[5422]: Connect: pptp-vpnonline <--> pptp (de01.vpnonline.eu)
Wed Sep 26 14:45:47 2018 daemon.warn pppd[5422]: LCP: timeout sending Config-Requests
Wed Sep 26 14:45:47 2018 daemon.notice pppd[5422]: Connection terminated.
Wed Sep 26 14:45:47 2018 daemon.notice pppd[5422]: Modem hangup
Wed Sep 26 14:45:47 2018 daemon.info pppd[5422]: Exit.

no i rote -n

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         81.99.132.1     0.0.0.0         UG    0      0        0 eth1.2
81.99.132.0     0.0.0.0         255.255.252.0   U     0      0        0 eth1.2
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
195.201.220.59  81.99.132.1     255.255.255.255 UGH   0      0        0 eth1.2

40

Odp: Ftp linksys wrt1900acs

Teraz to nie uzyskujesz połączenia z operatorem.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

41

Odp: Ftp linksys wrt1900acs

No wlasnie nie wiem teraz co jest grane , po l2tp laczy sie bez zadnego problemu a po pptp nie

42 (edytowany przez krystiano.kris 2018-09-26 16:56:51)

Odp: Ftp linksys wrt1900acs

Dobra kolego cezary , przepraszam za cale to zamieszanie.
podarowalem sobie tamten vpn i podlaczylem inny.

mozemy zaczac od poczatku - dziekuje

Mam teraz polaczenie vpn , zalaczam konfigi :
uci show network

root@OpenWrt:~# uci show network
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd67:b398:2b93::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth0.1'
network.lan.proto='static'
network.lan.ipaddr='192.168.1.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.wan=interface
network.wan.ifname='eth1.2'
network.wan.force_link='1'
network.wan.proto='dhcp'
network.wan.peerdns='0'
network.wan.dns='8.8.8.8' '8.8.4.4'
network.wan6=interface
network.wan6.ifname='eth1.2'
network.wan6.proto='dhcpv6'
network.wan6.reqaddress='try'
network.wan6.reqprefix='auto'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].ports='0 1 2 3 5t'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='4 6t'
network.@route[0]=route
network.nordvpntun=interface
network.nordvpntun.proto='none'
network.nordvpntun.ifname='tun0'

uci show firewall

root@OpenWrt:~# uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[0].network='lan'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@zone[1].network='Vpn wan wan6 vpnonline vpn'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fc00::/6'
firewall.@rule[3].dest_ip='fc00::/6'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-IPSec-ESP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Allow-ISAKMP'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
firewall.@rule[9]=rule
firewall.@rule[9]._name='FTP'
firewall.@rule[9].src='wan'
firewall.@rule[9].target='ACCEPT'
firewall.@rule[9].proto='tcp'
firewall.@rule[9].dest_port='21'
firewall.@redirect[0]=redirect
firewall.@redirect[0].target='DNAT'
firewall.@redirect[0].src='wan'
firewall.@redirect[0].dest='lan'
firewall.@redirect[0].proto='tcp udp'
firewall.@redirect[0].src_dport='1083'
firewall.@redirect[0].dest_ip='192.168.1.101'
firewall.@redirect[0].dest_port='1083'
firewall.@redirect[0].name='oscam'
firewall.@redirect[1]=redirect
firewall.@redirect[1].target='DNAT'
firewall.@redirect[1].src='wan'
firewall.@redirect[1].dest='lan'
firewall.@redirect[1].proto='tcp udp'
firewall.@redirect[1].src_dport='83'
firewall.@redirect[1].dest_ip='192.168.1.102'
firewall.@redirect[1].dest_port='83'
firewall.@redirect[1].name='oscam_sypialnia'
firewall.@rule[10]=rule
firewall.@rule[10].name='OpenVPN'
firewall.@rule[10].target='ACCEPT'
firewall.@rule[10].src='wan'
firewall.@rule[10].proto='udp'
firewall.@rule[10].dest_port='993'
firewall.@rule[11]=rule
firewall.@rule[11].enabled='1'
firewall.@rule[11].target='ACCEPT'
firewall.@rule[11].src='wan'
firewall.@rule[11].dest='lan'
firewall.@zone[2]=zone
firewall.@zone[2].name='vpnfirewall'
firewall.@zone[2].input='REJECT'
firewall.@zone[2].output='ACCEPT'
firewall.@zone[2].forward='REJECT'
firewall.@zone[2].masq='1'
firewall.@zone[2].mtu_fix='1'
firewall.@zone[2].network='nordvpntun'
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src='lan'
firewall.@forwarding[1].dest='vpnfirewall'

ifconfig -a

root@OpenWrt:~# ifconfig -a
br-lan    Link encap:Ethernet  HWaddr 16:91:82:2A:76:7B
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          inet6 addr: fd67:b398:2b93::1/60 Scope:Global
          inet6 addr: fe80::1491:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:16926 errors:0 dropped:0 overruns:0 frame:0
          TX packets:14263 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2441323 (2.3 MiB)  TX bytes:6747155 (6.4 MiB)

erspan0   Link encap:Ethernet  HWaddr 00:00:00:00:00:00
          BROADCAST MULTICAST  MTU:1450  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

eth0      Link encap:Ethernet  HWaddr 16:91:82:2A:76:7B
          inet6 addr: fe80::1491:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:15292 errors:0 dropped:0 overruns:0 frame:0
          TX packets:13664 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:532
          RX bytes:2717993 (2.5 MiB)  TX bytes:6625170 (6.3 MiB)
          Interrupt:37

eth0.1    Link encap:Ethernet  HWaddr 16:91:82:2A:76:7B
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:14898 errors:0 dropped:1 overruns:0 frame:0
          TX packets:13634 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2425230 (2.3 MiB)  TX bytes:6566634 (6.2 MiB)

eth1      Link encap:Ethernet  HWaddr 14:91:82:2A:76:7B
          inet6 addr: fe80::1691:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:7437 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5855 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:532
          RX bytes:5102948 (4.8 MiB)  TX bytes:2139351 (2.0 MiB)
          Interrupt:36

eth1.2    Link encap:Ethernet  HWaddr 14:91:82:2A:76:7B
          inet addr:81.99.132.253  Bcast:81.99.135.255  Mask:255.255.252.0
          inet6 addr: fe80::1691:82ff:fe2a:767b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:6118 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5848 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:4900494 (4.6 MiB)  TX bytes:2115133 (2.0 MiB)

gre0      Link encap:UNSPEC  HWaddr 00-00-00-00-62-00-97-0F-00-00-00-00-00-00-00-00
          NOARP  MTU:1476  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

gretap0   Link encap:Ethernet  HWaddr 00:00:00:00:00:00
          BROADCAST MULTICAST  MTU:1462  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:158 errors:0 dropped:0 overruns:0 frame:0
          TX packets:158 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:14227 (13.8 KiB)  TX bytes:14227 (13.8 KiB)

tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          inet addr:10.7.7.63  P-t-P:10.7.7.63  Mask:255.255.255.0
          inet6 addr: fe80::f640:59a8:182c:243c/64 Scope:Link
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:8256 errors:0 dropped:0 overruns:0 frame:0
          TX packets:7090 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          RX bytes:4294839 (4.0 MiB)  TX bytes:1512970 (1.4 MiB)

wlan0     Link encap:Ethernet  HWaddr 16:91:82:2A:76:7D
          inet6 addr: fe80::1491:82ff:fe2a:767d/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1637 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2158 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:414355 (404.6 KiB)  TX bytes:642790 (627.7 KiB)

wlan1     Link encap:Ethernet  HWaddr 16:91:82:2A:76:7C
          inet6 addr: fe80::1491:82ff:fe2a:767c/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1860 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2165 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:327440 (319.7 KiB)  TX bytes:715936 (699.1 KiB)

route -n

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.7.7.1        128.0.0.0       UG    0      0        0 tun0
0.0.0.0         81.99.132.1     0.0.0.0         UG    0      0        0 eth1.2
10.7.7.0        0.0.0.0         255.255.255.0   U     0      0        0 tun0
31.171.154.155  81.99.132.1     255.255.255.255 UGH   0      0        0 eth1.2
81.99.132.0     0.0.0.0         255.255.252.0   U     0      0        0 eth1.2
128.0.0.0       10.7.7.1        128.0.0.0       UG    0      0        0 tun0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan

caly ruch idzie przez VPN a ja chce tylko 1 lub 2 ip

43

Odp: Ftp linksys wrt1900acs

A co to za vpn? OpenVPN?

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

44

Odp: Ftp linksys wrt1900acs

Tak
NordVpn - OpenVPN

45

Odp: Ftp linksys wrt1900acs

Światowiec smile

do konfiga klienta dodaj route-noexec - nie wykona żadnych tras. Wtedy masz wolną rękę i możesz zrobić z tunelem co chcesz.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

46 (edytowany przez krystiano.kris 2018-09-26 17:28:21)

Odp: Ftp linksys wrt1900acs

hmmmm dodane i dalej leci wszystko przez vpn i chyba teraz to nie wiem gdzie konfigurowac trasy.

plik rc.local mam tak

ip rule add from 192.168.1.101 table vpn
ip route add default via 10.7.7.1 dev tun0 table vpn
ip route flush cache
/etc/openvpn/reconnect.sh &
# Put your custom commands here that should be executed once
# the system init finished. By default this file does nothing.

exit 0

tylko nie krzycz , ucze sie smile

47

Odp: Ftp linksys wrt1900acs

Pokaz route -n

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

48

Odp: Ftp linksys wrt1900acs

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.7.7.1        128.0.0.0       UG    0      0        0 tun0
0.0.0.0         81.99.132.1     0.0.0.0         UG    0      0        0 eth1.2
10.7.7.0        0.0.0.0         255.255.255.0   U     0      0        0 tun0
31.171.154.155  81.99.132.1     255.255.255.255 UGH   0      0        0 eth1.2
81.99.132.0     0.0.0.0         255.255.252.0   U     0      0        0 eth1.2
128.0.0.0       10.7.7.1        128.0.0.0       UG    0      0        0 tun0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan

49

Odp: Ftp linksys wrt1900acs

Pokaż konfig openvpn i wynik polecenia logread

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

50

Odp: Ftp linksys wrt1900acs

config:

client
dev tun
proto tcp
remote 31.171.154.155 443
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0

remote-cert-tls server

#mute 10000
auth-user-pass /etc/openvpn/secret
ca ca.crt
tls-auth ta.key 1
comp-lzo
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
key-direction 1