No to jest taka sytuacja, w sieci jest kilka komputerów i telefonów, moje i żony oraz syna.
Z tego całego majdanu syn ma dwa komputery o takich adresach:
E8:94:F6:21:E2:0B - stacjonarny
44:1C:A8:18:1D:A7 - laptop
Ustawiłem ograniczenie na wszystko i zrobiłem dwie reguły w whiteliście:
1) dla mnie i dla żony przepuszczająca wszystko
2) dla syna TYLKO dla komputera stacjonarnego i tylko na listę określonych domen
Skutek jest taki, że komputer stacjonarny syna ma dostęp tylko do tego co ma ustawione w regule czyli strony teamsów, microsoftu itd, za to jego laptop, który w ogóle nie dostał reguły i nie ma jego MACa nigdzie dodanego ma dostęp DO WSZYSTKIEGO!
Na lapku jest Win10, oto wynik polecenia ipconfig /all:
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-IKPE3SM
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : lan
Ethernet adapter Ethernet:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller
Physical Address. . . . . . . . . : 30-65-EC-AA-F9-63
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Wireless LAN adapter Połączenie lokalne* 1:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
Physical Address. . . . . . . . . : 46-1C-A8-18-1D-A7
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Wireless LAN adapter Połączenie lokalne* 2:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
Physical Address. . . . . . . . . : 56-1C-A8-18-1D-A7
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Wireless LAN adapter Wi-Fi:
Connection-specific DNS Suffix . : lan
Description . . . . . . . . . . . : Qualcomm Atheros QCA61x4 Wireless Network Adapter
Physical Address. . . . . . . . . : 44-1C-A8-18-1D-A7
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::10df:d059:f6d1:7104%12(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.30(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : wtorek, 30 marca 2021 09:08:53
Lease Expires . . . . . . . . . . : wtorek, 30 marca 2021 21:48:22
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 105127080
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-F0-97-04-30-65-EC-AA-F9-63
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
A poniżej pełna zawartość pliku konfiguracyjnego firewalla z Gargoyla:
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option enforce_dhcp_assignments '1'
option force_router_dns '1'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config include
option path '/etc/firewall.user'
option reload '1'
config include
option type 'script'
option path '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'
option family 'any'
option reload '1'
config include 'openvpn_include_file'
option path '/etc/openvpn.firewall'
option reload '1'
config include 'wireguard_include_file'
option path '/etc/wireguard.firewall'
option reload '1'
config redirect_disabled 'redirect_disabled_number_0'
option name 'syncthing'
option src 'wan'
option dest 'lan'
option family 'ipv4'
option proto 'tcp'
option src_dport '22000'
option dest_ip '192.168.1.10'
option dest_port '22000'
config restriction_rule 'rule_1'
option is_ingress '0'
option description 'bloada'
option family 'any'
option enabled '1'
config whitelist_rule 'exception_1'
option is_ingress '0'
option description 'Madzia_ja'
option family 'any'
option local_addr '14:F6:D8:8C:91:BE,F8:16:54:E4:D2:11,80:35:C1:3D:CE:1F,F8:E4:E3:D8:19:95,2C:D0:66:E2:62:B0'
option enabled '1'
config whitelist_rule 'exception_2'
option is_ingress '0'
option description 'Kornik_school'
option family 'any'
option local_addr 'E8:94:F6:21:E2:0B'
option proto 'both'
option url_domain_contains '"wikipedia","wikimedia","windows","teams","skype.com","microsoftonline","microsoft","office.net","office.com","live.com","sharepoint.com","akmaihd.net","svc.ms","sharepointonline.com","nuadu","onenote.com","msecnd","googletagmanager","hotjar","msauth","msftauth","userway","google","gstatic","gdynia","spotify"'
option enabled '1'
I teraz niech ktoś mi powie o co kaman? Czy openWRT ma buga w firewallu? Czy Windows 10 umie omijać reguły w firewallach? A może ruter Xiaomi ma jakiś problem?