26

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

tylko routing w tym wypadku koledze się nada

nie podoba mi sie routing na apclient. Niech kolega ustawi w sekcji "wan" dhcp zamiast static jak niżej:
/etc/config/network

config 'interface' 'lan'
        option 'ifname'   'eth0.1'
        option 'type'     'bridge'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.2.1'
        option 'netmask'  '255.255.255.0'

config 'interface' 'wan'
        option 'ifname' 'eth0.2'
        option 'proto' 'dhcp'

i potem restart routera i proszę logi ale już tylko

route -n
ifconfig

Co do aplikacji to komputer w sieci kolegi ten co ma mieć internet od Ciebie nie będzie używał dhcp do pobierania adresu ip. Komputer będzie musiał mieć ustawione adresy statycznie (dns,brama,adres ip) i będzie git.

Mam jeszcze jedno pytanie. Ten livebox będzie stał obok tplinka czy to jakieś odległe pomieszczenie ?

27

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

To logi z AP Clienta

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
0.0.0.0         192.168.1.2     0.0.0.0         UG    0      0        0 wlan0
root@OpenWrt:~#


root@OpenWrt:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.2.1  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:218 errors:0 dropped:0 overruns:0 frame:0
          TX packets:64 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:20437 (19.9 KiB)  TX bytes:9567 (9.3 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:326 errors:0 dropped:0 overruns:0 frame:0
          TX packets:122 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:51874 (50.6 KiB)  TX bytes:34065 (33.2 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:218 errors:0 dropped:0 overruns:0 frame:0
          TX packets:64 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:21309 (20.8 KiB)  TX bytes:9823 (9.5 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:57 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:23199 (22.6 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.4  Bcast:255.255.255.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:119 errors:0 dropped:0 overruns:0 frame:0
          TX packets:16 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:35877 (35.0 KiB)  TX bytes:2261 (2.2 KiB)

root@OpenWrt:~#

Komputery wszystkie w sieci u znajomego maja tak czy inaczej wszystkie recznie wpisane ip wiec jak chodzi o dhcp to niema problemu. Tp-link bedzie oddalony o jakies 5m moze 6m.

28 (edytowany przez rpc 2010-07-07 05:36:38)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Jedna ważna sprawa jaki adres ma LIVEBOX ?
jeśli 192.168.1.1

to ustaw nową adresację routerów na

AP - 192.168.2.1
APCLIENT - 192.168.1.60

potem restart

i

ifconfig
route -n

29 (edytowany przez kowalmisiek 2010-07-07 08:57:13)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Zrobione. Co dalej? Aha jeszcze logi


AP

root@OpenWrt:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          inet addr:192.168.2.1  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:921 errors:0 dropped:0 overruns:0 frame:0
          TX packets:63 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:241315 (235.6 KiB)  TX bytes:10029 (9.7 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:941 errors:0 dropped:0 overruns:0 frame:0
          TX packets:228 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:264173 (257.9 KiB)  TX bytes:71364 (69.6 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:931 errors:0 dropped:0 overruns:0 frame:0
          TX packets:85 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:247267 (241.4 KiB)  TX bytes:12527 (12.2 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:142 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:57794 (56.4 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

mon.wlan0 Link encap:UNSPEC  HWaddr 94-0C-6D-AE-B6-CA-00-00-00-00-00-00-00-00-00-00
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:31 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2572 (2.5 KiB)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:23 errors:0 dropped:0 overruns:0 frame:0
          TX packets:955 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2594 (2.5 KiB)  TX bytes:277871 (271.3 KiB)

root@OpenWrt:~#





root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
root@OpenWrt:~#

CLIENT


root@OpenWrt:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.60  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:612 errors:0 dropped:0 overruns:0 frame:0
          TX packets:63 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:123107 (120.2 KiB)  TX bytes:9733 (9.5 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:792 errors:0 dropped:0 overruns:0 frame:0
          TX packets:203 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:181109 (176.8 KiB)  TX bytes:67601 (66.0 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:612 errors:0 dropped:0 overruns:0 frame:0
          TX packets:63 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:125555 (122.6 KiB)  TX bytes:9985 (9.7 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:139 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:56573 (55.2 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.4  Bcast:255.255.255.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:992 errors:0 dropped:0 overruns:0 frame:0
          TX packets:21 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:261059 (254.9 KiB)  TX bytes:2766 (2.7 KiB)

root@OpenWrt:~#





root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
0.0.0.0         192.168.1.2     0.0.0.0         UG    0      0        0 wlan0
root@OpenWrt:~#

Mam pytanie. Jesli ip jest z innych grup w mojej sieci i kolegi to czy komputery beda sie widzialy w otoczeniu?

PS. W tej konfiguracji IP co napisales zaden ping nie dochodzi miedzy urzadzeniami. Ani z AP do Clienta ani z Clienta do AP. Co ciekawe patrzylem w LUCI i teraz tam wykrywa w cliencie AP a przedtem gdy TPLINK byl ustawiony na tryb "client" nie widzial. Ale AP niczego nie widzi jak daje mu scan. To normalne jest ze AP nic nie widzi?

30 (edytowany przez rpc 2010-07-07 09:32:04)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

po kolei wszystko po kolei

pokaż /etc/config/network (z APCLIENT) bo mi nie pasuje coś z adresacją
jakimś cudem wlan0 dostał 192.168.1.4 (w APCLIENT) a powinien adres z nowego zakresu 192.168.2.0/24 tak jak przestawiłeś AP

może pokaz co masz w AP w /etc/ethers ? może tam wpisałeś jakiś adres ip i mac ? zobaczymy

restartowałeś APCLIENT po AP ? na wszelki wypadek zrestartuj sam APCLIENT i zapodaj jeszcze raz

ifconfig
route -n

Na pewno będziesz miał dostęp w sieci microsoft network  obu podsieciach po adresie IP względnie po nazwie np. \\IP\zasób.
NA APCLIENT będzie odpalona samba i ona powinna przekazać hosty z obu sieci bo jest w punkcie styku ale nie wiem jak to będzie działać na routerze (czy coś z samby nie jest wykrojone przez developerów openwrt) w normalnej sieci działa bez problemu.

Mam następne rzeczy do zrobienia ale najpierw musimy dojść do porządku z APCLIENT

31 (edytowany przez kowalmisiek 2010-07-07 09:50:40)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Zresetowalem znowu.


/etc/config/network

config 'interface' 'loopback'
       option 'ifname'   'lo'
       option 'proto'    'static'
       option 'ipaddr'   '127.0.0.1'
       option 'netmask'  '255.0.0.0'

config 'interface' 'lan'
        option 'ifname'   'eth0.1'
        option 'type'     'bridge'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.1.60'
        option 'netmask'  '255.255.255.0'

config 'interface' 'wan'
        option 'ifname' 'eth0.2'
        option 'proto' 'dhcp'
        

config 'interface' '3g'
    option 'device' '/dev/ttyUSB0'
    option 'apn' 'internet'
    option 'service' 'umts'
    option 'proto' '3g'
    option 'hotplug' 1
    option 'pincode' '0000'

config 'switch'
    option 'name' 'rtl8366rb'
        option 'reset' '1'
        option 'enable_vlan' '1'

config 'switch_vlan'
        option 'device' 'rtl8366rb'
        option 'vlan' '1'
        option 'ports' '1 2 3 4 5t'

config 'switch_vlan'
        option 'device' 'rtl8366rb'
        option 'vlan' '2'
        option 'ports' '0 5t'

root@OpenWrt:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.60  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:383 errors:0 dropped:0 overruns:0 frame:0
          TX packets:198 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:87939 (85.8 KiB)  TX bytes:24686 (24.1 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:495 errors:0 dropped:0 overruns:0 frame:0
          TX packets:299 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:131325 (128.2 KiB)  TX bytes:67221 (65.6 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:384 errors:0 dropped:0 overruns:0 frame:0
          TX packets:198 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:89527 (87.4 KiB)  TX bytes:25478 (24.8 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:100 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:40700 (39.7 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:40 errors:0 dropped:0 overruns:0 frame:0
          TX packets:40 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:2632 (2.5 KiB)  TX bytes:2632 (2.5 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.2.116  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:21 errors:0 dropped:0 overruns:0 frame:0
          TX packets:17 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2161 (2.1 KiB)  TX bytes:2377 (2.3 KiB)

root@OpenWrt:~#

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
0.0.0.0         192.168.2.1     0.0.0.0         UG    0      0        0 wlan0
root@OpenWrt:~#

A jak chodzi o to /etc/ethers to jest pusty plik zarowno w AP jak i w cliencie

32 (edytowany przez rpc 2010-07-07 10:03:20)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

no to teraz jest ok.

No to małymi kroczkami


Dopisz do pliku /etc/config/network w routerze AP:

config 'route'
option 'interface' 'lan'
option 'netmask' '255.255.255.0'
option 'target' '192.168.1.0'
option 'gateway' '192.168.2.60'

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX


Na APCLIENT proszę zmienić /etc/config/firewall:

config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT

config zone
        option name             lan
        option input    ACCEPT
        option output   ACCEPT
        option forward  REJECT

config zone
        option name             wan
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1
        option mtu_fix  1

config zone
        option name             3g
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1

config forwarding
        option src      lan
        option dest     3g

config forwarding
        option src      lan
        option dest     wan

config forwarding
        option src      wan
        option dest     lan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT

#Allow ping
config rule
        option src wan
        option proto icmp
        option icmp_type echo-request
        option target ACCEPT

# include a file with users custom iptables rules
config include
        option path /etc/firewall.user

czyli na razie dopisujemy

config forwarding
        option src      wan
        option dest     lan

oraz zmiana wpisu

config zone
        option name             wan
        option input    ACCEPT
        option output   ACCEPT
        option forward  REJECT
        option masq             1
        option mtu_fix  1

Zmień nazwy routerów tak aby każdy z nich miał inną w /etc/config/system oraz /etc/config/samba oraz ustaw tę samą grupę roboczą w sambie

config samba
        option 'name'                   'openwrt'    #<- zmień aby nazwa była różna na obu routerach
        option 'workgroup'              'openwrt'  #<- zmień na tą sama grupę roboczą co u kolegi i co ma być w Twojej sieci na obu routerach

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX


Na APCLIENT zmień w pliku /etc/config/network sekcję "interface wan" z dhcp na static

config 'interface' 'wan'
        option 'ifname'   'wlan0'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.2.60'
        option 'netmask'  '255.255.255.0'
        option 'gateway'   '192.168.2.1'
        option 'dns'  '192.168.2.1'

no i restart obu routerów

a po co w apclient wpis 3g ma na nim być jakieś łącze zapasowe ?
przecież internet jest z livebox

poprosiłby z obu routerów logi po restarcie

route -n
ifconfig

33

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Dobra to logi a ja ide do pracy. Bede po 20.
AP

root@kowal:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.1.0     192.168.2.60    255.255.255.0   UG    0      0        0 br-lan
root@kowal:~#





root@kowal:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          inet addr:192.168.2.1  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:289 errors:0 dropped:0 overruns:0 frame:0
          TX packets:201 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:44895 (43.8 KiB)  TX bytes:17642 (17.2 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:270 errors:0 dropped:0 overruns:0 frame:0
          TX packets:228 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:48511 (47.3 KiB)  TX bytes:33576 (32.7 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:270 errors:0 dropped:0 overruns:0 frame:0
          TX packets:190 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:44731 (43.6 KiB)  TX bytes:17474 (17.0 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:37 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:15059 (14.7 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

mon.wlan0 Link encap:UNSPEC  HWaddr 94-0C-6D-AE-B6-CA-00-00-00-00-00-00-00-00-00-00
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:12 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:883 (883.0 B)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:17 errors:0 dropped:0 overruns:0 frame:0
          TX packets:180 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:1470 (1.4 KiB)  TX bytes:46440 (45.3 KiB)

root@kowal:~#
root@kliciok:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
0.0.0.0         192.168.2.1     0.0.0.0         UG    0      0        0 wlan0
root@kliciok:~#





root@kliciok:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.60  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:769 errors:0 dropped:0 overruns:0 frame:0
          TX packets:248 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:181293 (177.0 KiB)  TX bytes:33020 (32.2 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:899 errors:0 dropped:0 overruns:0 frame:0
          TX packets:249 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:225380 (220.0 KiB)  TX bytes:35055 (34.2 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:769 errors:0 dropped:0 overruns:0 frame:0
          TX packets:248 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:184369 (180.0 KiB)  TX bytes:34012 (33.2 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:37 errors:0 dropped:0 overruns:0 frame:0
          TX packets:37 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:2674 (2.6 KiB)  TX bytes:2674 (2.6 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.2.60  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:184 errors:0 dropped:0 overruns:0 frame:0
          TX packets:17 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:44036 (43.0 KiB)  TX bytes:1810 (1.7 KiB)

root@kliciok:~#

34 (edytowany przez rpc 2010-07-07 22:20:55)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

no to teraz powinno być można pingować hosty miedzy sieciami 192.168.2.0/24 a 192.168.1.0/24

nie było odpowiedzi na:
a po co w apclient wpis 3g ma na nim być jakieś łącze zapasowe ?
przecież internet jest z livebox
Czy na APCLIENT planujesz używać gniazda niebieskiego WAN ? Czy może przypisać Ci go jako port LAN ? do wykorzystania w sieci ?

robimy dalej

w APCLIENT należy wyłączyć dhcp ponieważ serwer dhcp działa w livebox. W pliku /etc/config/dhcp zmieniamy sekcję lan

config 'dhcp' 'lan'
        option 'interface' 'lan'
        option 'ignore' '1'

config 'dhcp' 'wan'
        option 'interface' 'wan'
        option 'ignore' '1'

Teraz hosty podłączone do APCLIENTA będą musiały mieć wpisany statycznie adres IP,dns,bramę aby mieć neta

np. takie dane wpisac do komputera
IP: 192.168.1.200
mask: 255.255.255.0
brama: 192.168.1.60
dns: 192.168.1.60

A routerze AP komputery dostają IP dynamicznie czyli bez zmian

W APCLIENT w pliku /etc/config/network dopiszemy jeszcze dns z lan na livebox

config 'interface' 'lan'
        option 'ifname'   'eth0.1'
        option 'type'     'bridge'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.1.60'
        option 'netmask'  '255.255.255.0'
        option 'dns'  '192.168.1.1'

W APCLIENT do pliku /etc/samba/smb.conf.template w sekcji global dodaj (lub zmień jeśli istnieje) poniższy wpis:

wins support = yes
os level = 200

W AP do pliku /etc/samba/smb.conf.template w sekcji global dodaj (lub zmień jeśli istnieje) poniższy wpis:

wins server = 192.168.2.60

W AP do pliku /etc/config/dhcp proszę zmienić wpis dotyczący LAN:

config 'dhcp' 'lan'
    option 'interface' 'lan'
    option 'start' '100'
    option 'limit' '150'
    option 'leasetime' '12h'
    option 'dhcp_option' '44,192.168.2.60 45,192.168.2.60 46,8 47'

zwróć uwagę na spacje w dhcp_option. Ma być dokładnie tak jak podałem

UWAGA
musisz pamiętać o jednym
W Windows sprawdź firewalle na stacjach roboczych domyślnie w zakresie maja ustawiona "tylko swoja podsiec" co ogranicza Ciebie tylko do sieci lokalnej np. 192.168.2.0/24 a nie dostaniesz się wtedy np. do 192.168.1.0/24 i vice versa. Dlatego musisz zmienić ustawienia windows np.XP: Zapora Systemu Windows->Wyjątki->Udostępnienie plików i drukarek->Edytuj->Zmień zakres->Lista niestandardowa=192.168.1.0/255.255.255.0,192.168.2.0/255.255.255.0
Lub zamiast tej listy niestandardowej włączasz na internet całe udostępnianie. W sumie jesteś w lan więc nie powinno być z tym problemu


Po tym wszystkim restart routerów i logi zaraz po restarcie routerów wkleisz tutaj

route -n
ifconfig
logread
cat /var/log/smbd.log

tylko wklejaj logi zaraz po restarcie jak się router uruchomi

Ps. Docelowo aby to wszystko działało na livebox u kolegi musisz dodać trasę statyczną tzn. że
192.168.2.0/255.255.255.0 jest osiagalne poprzez router o adresie 192.168.1.60

I powinno być ok. Może trzeba będzie coś z sambą jeszcze porobić ale to się zobaczy.
W windows ustaw w konfiguracji tcpip sieci ustaw serwer wins na 192.168.1.60 dla sieci 192.168.1.0/24, w drugiej podsieci dnsmasq powinien przydzielić, jak nie przydzieli to trzeba wpisać 192.168.2.60

35

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

mam nadzieję,że niczego nie pominąłem i że samba ma wszystko to co powinna.

36

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

No wiec tak. Pingowac z AP Client dalej nie moge na AP.

a po co w apclient wpis 3g ma na nim być jakieś łącze zapasowe ?
przecież internet jest z livebox

Poprostu sie to wgralo razem z oprogramowaniem openwrt. Co do liveboxa to chce zeby on byl alternatywa jesli sie da tak zrobic. Modem jest u mnie neti i internet ma byc z niego przesylany dalej do ludzi.

Czy na APCLIENT planujesz używać gniazda niebieskiego WAN ? Czy może przypisać Ci go jako port LAN ? do wykorzystania w sieci ?

Mozna go przeksztalcic na LAN bo wan mi jest nie potrzebne tam.




A teraz pytanie bo zatrzymalem sie na tym co napisales

W APCLIENT do pliku /etc/samba/smb.conf.template w sekcji global dodaj (lub zmień jeśli istnieje) poniższy wpis:

wins support = yes
os level = 200

W AP do pliku /etc/samba/smb.conf.template w sekcji global dodaj (lub zmień jeśli istnieje) poniższy wpis:

wins server = 192.168.2.60

nie mam czegos takiego jak "smb.conf.template " moze to sie jakos inaczej nazywa ten plik? Chyba ze mam w sambie utworzyc taki wpis? Bo juz nie wiem?

37 (edytowany przez rpc 2010-07-07 23:40:32)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

zakładałem że masz sambę na routerze zainstalowaną. hmm
skąd masz openwrt ?

a teraz zobaczymy co nie tak

powinieneś móc pingować
z AP ping 192.168.2.60
z APCLIENT ping 192.168.2.1

czy pingi są poprawne ?

daj jeszcze raz logi:

route -n
ifconwig
iwconfig
logread

bo z poprzrednich logów wygląda na wszystko w porządku

38

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Openwrt sciaglem z tej strony http://eko.one.pl/?p=openwrt-wr1043nd Co do pingow to tak: Z AP jak wysylam na 192.168.2.60 dostaje odpowiedzi (IP mojego komputera 192.168.2.7). Z APCLENTA jak wysylam pingi pod 192.168.2.1 pisze port docelowy nieosiagalny (IP Komputera 192.168.1.7). Moze cos z tymi ip zle wpisuje? Jeszcze pytanie takie skoro APClient ma ip (192.168.1.60) czemu wysylam pingi pod 192.168.2.60?

PS. Plik SAMBA jest w AP i APCLient ale niema czegos takiego jak "smb.conf.template "

APCLIENT

root@kliciok:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
0.0.0.0         192.168.2.1     0.0.0.0         UG    0      0        0 wlan0
root@kliciok:~#
root@kliciok:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.60  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:54376 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5517 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:16158693 (15.4 MiB)  TX bytes:834647 (815.0 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:54511 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5518 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:17170906 (16.3 MiB)  TX bytes:857758 (837.6 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:54381 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5517 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:16379327 (15.6 MiB)  TX bytes:856715 (836.6 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:265 errors:0 dropped:0 overruns:0 frame:0
          TX packets:265 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:44194 (43.1 KiB)  TX bytes:44194 (43.1 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.2.60  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2136 errors:0 dropped:0 overruns:0 frame:0
          TX packets:776 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:283596 (276.9 KiB)  TX bytes:91558 (89.4 KiB)

root@kliciok:~#
root@kliciok:~# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

eth0.1    no wireless extensions.

br-lan    no wireless extensions.

wlan0     IEEE 802.11bgn  ESSID:"OpenWrt"
          Mode:Managed  Frequency:2.432 GHz  Access Point: 94:0C:6D:AE:B6:CA
          Bit Rate=1 Mb/s   Tx-Power=20 dBm
          RTS thr:off   Fragment thr:off
          Encryption key:off
          Power Management:off
          Link Quality=64/70  Signal level=-46 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:0   Missed beacon:0

root@kliciok:~#
Jun  1 23:15:00 kliciok user.info kernel: Registered led device: tl-wr1043nd:green:qss
Jun  1 23:15:00 kliciok user.info kernel: Registered led device: tl-wr1043nd:green:wlan
Jun  1 23:15:00 kliciok user.info kernel: mini_fo: using base directory: /
Jun  1 23:15:00 kliciok user.info kernel: mini_fo: using storage directory: /overlay
Jun  1 23:15:00 kliciok user.info kernel: eth0: link down
Jun  1 23:15:01 kliciok user.debug kernel: ar71xx: pll_reg 0xb8050014: 0x1a000000
Jun  1 23:15:01 kliciok user.info kernel: eth0: link up (1000Mbps/Full duplex)
Jun  1 23:15:01 kliciok user.info kernel: Compat-wireless backport release: compat-wireless-2010-06-04-4-gf135eab
Jun  1 23:15:01 kliciok user.info kernel: Backport based on wireless-2.6.git v2.6.35-rc2-47270-ge46da0f
Jun  1 23:15:01 kliciok user.info kernel: device eth0.1 entered promiscuous mode
Jun  1 23:15:01 kliciok user.info kernel: device eth0 entered promiscuous mode
Jun  1 23:15:01 kliciok user.info kernel: br-lan: port 1(eth0.1) entering forwarding state
Jun  1 23:15:02 kliciok user.info kernel: cfg80211: Calling CRDA to update world regulatory domain
Jun  1 23:15:03 kliciok user.info sysinit: 0.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:03 kliciok user.info sysinit: 1.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:03 kliciok user.info sysinit: 2.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:03 kliciok user.info sysinit: 3.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:03 kliciok user.notice kernel: SCSI subsystem initialized
Jun  1 23:15:04 kliciok user.info kernel: usbcore: registered new interface driver usbfs
Jun  1 23:15:04 kliciok user.info kernel: usbcore: registered new interface driver hub
Jun  1 23:15:04 kliciok user.info kernel: usbcore: registered new device driver usb
Jun  1 23:15:04 kliciok user.info kernel: cfg80211: World regulatory domain updated:
Jun  1 23:15:04 kliciok user.info kernel:     (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
Jun  1 23:15:04 kliciok user.info kernel:     (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
Jun  1 23:15:04 kliciok user.info kernel:     (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
Jun  1 23:15:04 kliciok user.info kernel:     (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
Jun  1 23:15:04 kliciok user.info kernel:     (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
Jun  1 23:15:04 kliciok user.info kernel:     (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
Jun  1 23:15:05 kliciok user.debug kernel: phy0: Selected rate control algorithm 'minstrel_ht'
Jun  1 23:15:05 kliciok user.info kernel: phy0: Atheros AR9100 MAC/BB Rev:0 AR2133 RF Rev:a2 mem=0xb80c0000, irq=2
Jun  1 23:15:06 kliciok user.info kernel: PPP generic driver version 2.4.2
Jun  1 23:15:07 kliciok user.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
Jun  1 23:15:07 kliciok user.info kernel: NET: Registered protocol family 24
Jun  1 23:15:08 kliciok user.info kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Jun  1 23:15:08 kliciok user.info kernel: ar71xx-ehci ar71xx-ehci: Atheros AR91xx built-in EHCI controller
Jun  1 23:15:08 kliciok user.info kernel: ar71xx-ehci ar71xx-ehci: new USB bus registered, assigned bus number 1
Jun  1 23:15:08 kliciok user.info kernel: ar71xx-ehci ar71xx-ehci: irq 3, io mem 0x1b000000
Jun  1 23:15:08 kliciok user.info kernel: ar71xx-ehci ar71xx-ehci: USB 2.0 started, EHCI 1.00
Jun  1 23:15:08 kliciok user.info kernel: usb usb1: configuration #1 chosen from 1 choice
Jun  1 23:15:08 kliciok user.info kernel: hub 1-0:1.0: USB hub found
Jun  1 23:15:08 kliciok user.info kernel: hub 1-0:1.0: 1 port detected
Jun  1 23:15:08 kliciok user.warn kernel: nf_conntrack version 0.5.0 (460 buckets, 1840 max)
Jun  1 23:15:08 kliciok user.warn kernel: CONFIG_NF_CT_ACCT is deprecated and will be removed soon. Please use
Jun  1 23:15:08 kliciok user.warn kernel: nf_conntrack.acct=1 kernel parameter, acct=1 nf_conntrack module option or
Jun  1 23:15:08 kliciok user.warn kernel: sysctl net.netfilter.nf_conntrack_acct=1 to enable it.
Jun  1 23:15:08 kliciok user.notice root: Przelaczenie modemu
Jun  1 23:15:08 kliciok user.notice root: Autostart polaczenia 3G
Jun  1 23:15:08 kliciok user.notice root: Przelaczenie modemu
Jun  1 23:15:09 kliciok user.notice root: Autostart polaczenia 3G
Jun  1 23:15:09 kliciok user.info kernel: usbcore: registered new interface driver usbserial
Jun  1 23:15:09 kliciok user.info kernel: USB Serial support registered for generic
Jun  1 23:15:09 kliciok user.info kernel: usbcore: registered new interface driver usbserial_generic
Jun  1 23:15:09 kliciok user.info kernel: usbserial: USB Serial Driver core
Jun  1 23:15:09 kliciok user.info kernel: Initializing USB Mass Storage driver...
Jun  1 23:15:09 kliciok user.info kernel: usbcore: registered new interface driver usb-storage
Jun  1 23:15:09 kliciok user.info kernel: USB Mass Storage support registered.
Jun  1 23:15:09 kliciok user.info kernel: USB Serial support registered for GSM modem (1-port)
Jun  1 23:15:09 kliciok user.info kernel: usbcore: registered new interface driver option
Jun  1 23:15:09 kliciok user.info kernel: option: v0.7.2:USB Driver for GSM modems
Jun  1 23:15:09 kliciok user.info kernel: USB Serial support registered for Sierra USB modem
Jun  1 23:15:09 kliciok user.info kernel: usbcore: registered new interface driver sierra
Jun  1 23:15:09 kliciok user.info kernel: sierra: v.1.3.8:USB Driver for Sierra Wireless USB modems
Jun  1 23:15:09 kliciok user.info kernel: fuse init (API version 7.13)
Jun  1 23:15:11 kliciok user.info kernel: cfg80211: Calling CRDA for country: PL
Jun  1 23:15:11 kliciok user.info kernel: cfg80211: Regulatory domain changed to country: PL
Jun  1 23:15:11 kliciok user.info kernel:     (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
Jun  1 23:15:11 kliciok user.info kernel:     (2402000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm)
Jun  1 23:15:11 kliciok user.info kernel:     (5170000 KHz - 5250000 KHz @ 40000 KHz), (N/A, 2000 mBm)
Jun  1 23:15:11 kliciok user.info kernel:     (5250000 KHz - 5330000 KHz @ 40000 KHz), (N/A, 2000 mBm)
Jun  1 23:15:11 kliciok user.info kernel:     (5490000 KHz - 5710000 KHz @ 40000 KHz), (N/A, 2700 mBm)
Jun  1 23:15:12 kliciok user.info sysinit: ioctl[SIOCSIWENCODEEXT]: Invalid argument
Jun  1 23:15:12 kliciok user.info sysinit: ioctl[SIOCSIWENCODEEXT]: Invalid argument
Jun  1 23:15:12 kliciok user.info sysinit: Loading defaults
Jun  1 23:15:13 kliciok user.info sysinit: Loading synflood protection
Jun  1 23:15:13 kliciok user.info sysinit: Adding custom chains
Jun  1 23:15:14 kliciok user.info sysinit: Loading zones
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: authenticate with 94:0c:6d:ae:b6:ca (try 1)
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: authenticated
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: associate with 94:0c:6d:ae:b6:ca (try 1)
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: RX AssocResp from 94:0c:6d:ae:b6:ca (capab=0x411 status=0 aid=1)
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: associated
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: disassociated from 94:0c:6d:ae:b6:ca (Reason: 7)
Jun  1 23:15:14 kliciok user.debug kernel: wlan0: deauthenticating from 94:0c:6d:ae:b6:ca by local choice (reason=3)
Jun  1 23:15:14 kliciok user.info kernel: cfg80211: Calling CRDA to update world regulatory domain
Jun  1 23:15:14 kliciok user.info kernel: cfg80211: Calling CRDA for country: PL
Jun  1 23:15:14 kliciok user.info kernel: cfg80211: Regulatory domain changed to country: PL
Jun  1 23:15:14 kliciok user.info kernel:     (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
Jun  1 23:15:14 kliciok user.info kernel:     (2402000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm)
Jun  1 23:15:14 kliciok user.info kernel:     (5170000 KHz - 5250000 KHz @ 40000 KHz), (N/A, 2000 mBm)
Jun  1 23:15:14 kliciok user.info kernel:     (5250000 KHz - 5330000 KHz @ 40000 KHz), (N/A, 2000 mBm)
Jun  1 23:15:14 kliciok user.info kernel:     (5490000 KHz - 5710000 KHz @ 40000 KHz), (N/A, 2700 mBm)
Jun  1 23:15:14 kliciok user.info sysinit: Loading forwarding
Jun  1 23:15:14 kliciok user.info sysinit: Loading redirects
Jun  1 23:15:14 kliciok user.info sysinit: Loading rules
Jun  1 23:15:14 kliciok user.info sysinit: Loading includes
Jun  1 23:15:14 kliciok user.info sysinit: Loading zone defaults
Jun  1 23:15:15 kliciok user.notice root: adding lan (br-lan) to firewall zone lan
Jun  1 23:15:15 kliciok user.debug kernel: wlan0: authenticate with 94:0c:6d:ae:b6:ca (try 1)
Jun  1 23:15:15 kliciok user.debug kernel: wlan0: authenticated
Jun  1 23:15:15 kliciok user.debug kernel: wlan0: associate with 94:0c:6d:ae:b6:ca (try 1)
Jun  1 23:15:15 kliciok user.notice root: adding wan (wlan0) to firewall zone wan
Jun  1 23:15:15 kliciok user.debug kernel: wlan0: RX AssocResp from 94:0c:6d:ae:b6:ca (capab=0x411 status=0 aid=1)
Jun  1 23:15:15 kliciok user.debug kernel: wlan0: associated
Jun  1 23:15:16 kliciok authpriv.info dropbear[1064]: Running in background
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: started, version 2.52 cachesize 150
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: compile time options: IPv6 GNU-getopt no-DBus no-I18N DHCP TFTP
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: using local addresses only for domain lan
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: reading /tmp/resolv.conf.auto
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: using nameserver 192.168.2.1#53
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: using local addresses only for domain lan
Jun  1 23:15:17 kliciok daemon.info dnsmasq[1094]: read /etc/hosts - 1 addresses
Jun  1 23:15:20 kliciok user.info sysinit: setting up led WLAN
Jun  1 23:15:20 kliciok user.debug kernel: ar71xx-wdt: enabling watchdog timer
Jun  1 23:15:23 kliciok user.info sysinit: 0.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:23 kliciok user.info sysinit: 1.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:23 kliciok user.info sysinit: 2.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:23 kliciok user.info sysinit: 3.openwrt.pool.ntp.org: Unknown host
Jun  1 23:15:23 kliciok user.notice rdate: Failed to sync with ac-ntp0.net.cmu.edu
Jun  1 23:15:23 kliciok user.notice rdate: Failed to sync with ac-ntp0.net.cmu.edu
Jun  1 23:15:24 kliciok user.notice rdate: Failed to sync with ac-ntp0.net.cmu.edu
Jun  1 23:17:24 kliciok authpriv.info dropbear[1214]: Child connection from 192.168.1.7:51112
Jun  1 23:17:24 kliciok authpriv.notice dropbear[1214]: password auth succeeded for 'root' from 192.168.1.7:51112
Jun  1 23:17:35 kliciok authpriv.info dropbear[1221]: Child connection from 192.168.1.7:51128
Jun  1 23:17:39 kliciok authpriv.notice dropbear[1221]: password auth succeeded for 'root' from 192.168.1.7:51128
Jun  1 23:18:12 kliciok authpriv.info dropbear[1221]: exit after auth (root): Exited normally
Jun  1 23:18:16 kliciok authpriv.info dropbear[1214]: exit after auth (root): Exited normally
Jun  2 11:46:19 kliciok authpriv.info dropbear[1244]: Child connection from 192.168.1.7:49493
Jun  2 11:46:19 kliciok authpriv.notice dropbear[1244]: password auth succeeded for 'root' from 192.168.1.7:49493
Jun  2 11:47:20 kliciok authpriv.info dropbear[1262]: Child connection from 192.168.1.7:49504
Jun  2 11:47:21 kliciok authpriv.notice dropbear[1262]: password auth succeeded for 'root' from 192.168.1.7:49504
Jun  2 12:00:29 kliciok authpriv.info dropbear[1262]: exit after auth (root): Exited normally
Jun  2 12:00:30 kliciok authpriv.info dropbear[1244]: exit after auth (root): Exited normally
Jun  2 17:50:38 kliciok authpriv.info dropbear[1293]: Child connection from 192.168.1.7:53088
Jun  2 17:50:45 kliciok authpriv.notice dropbear[1293]: password auth succeeded for 'root' from 192.168.1.7:53088
root@kliciok:~#

AP

root@kowal:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.1.0     192.168.2.60    255.255.255.0   UG    0      0        0 br-lan
root@kowal:~#


root@kowal:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          inet addr:192.168.2.1  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1763 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1670 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:264493 (258.2 KiB)  TX bytes:147416 (143.9 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1025 errors:0 dropped:0 overruns:0 frame:0
          TX packets:23651 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:220036 (214.8 KiB)  TX bytes:9235920 (8.8 MiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1025 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1248 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:205686 (200.8 KiB)  TX bytes:117263 (114.5 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:22402 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:9117614 (8.6 MiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:213 errors:0 dropped:0 overruns:0 frame:0
          TX packets:213 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:107352 (104.8 KiB)  TX bytes:107352 (104.8 KiB)

mon.wlan0 Link encap:UNSPEC  HWaddr 94-0C-6D-AE-B6-CA-00-00-00-00-00-00-00-00-00-00
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2072 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:188070 (183.6 KiB)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:777 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2305 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:76151 (74.3 KiB)  TX bytes:365548 (356.9 KiB)

root@kowal:~#


root@kowal:~# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

eth0.1    no wireless extensions.

eth0.2    no wireless extensions.

br-lan    no wireless extensions.

wlan0     IEEE 802.11bgn  Mode:Master  Frequency:2.432 GHz  Tx-Power=20 dBm
          RTS thr:off   Fragment thr:off
          Power Management:off

mon.wlan0  IEEE 802.11bgn  Mode:Monitor  Tx-Power=20 dBm
          RTS thr:off   Fragment thr:off
          Power Management:off

root@kowal:~#


up key handshake completed (RSN)
Jun  2 00:05:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 00:15:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 00:25:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 00:35:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 00:45:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 00:55:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 01:05:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 01:15:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 01:25:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 01:35:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 01:45:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 01:55:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 02:05:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 02:15:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 02:25:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 02:35:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 02:45:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 02:55:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 03:05:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 03:15:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 03:25:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 03:35:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 03:45:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 03:55:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 04:05:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 04:15:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 04:25:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 04:35:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 04:45:14 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 04:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 05:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 05:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 05:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 05:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 05:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 05:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 06:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 06:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 06:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 06:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 06:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 06:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 07:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 07:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 07:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 07:32:36 kowal authpriv.info dropbear[1279]: exit after auth (root): error reading: No route to host
Jun  2 07:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 07:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 07:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 08:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 08:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 08:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 08:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 08:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 08:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 09:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 09:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 09:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 09:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 09:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 09:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 10:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 10:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 10:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 10:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 10:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 10:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 11:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 11:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 11:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 11:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 11:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 11:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 12:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 12:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 12:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 12:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 12:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 12:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 13:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 13:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 13:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 13:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 13:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 13:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 14:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 14:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 14:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 14:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 14:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 14:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 15:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 15:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 15:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 15:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 15:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 15:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 16:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 16:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 16:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 16:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 16:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 16:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 17:05:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 17:15:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 17:25:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 17:35:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 17:45:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
Jun  2 17:54:38 kowal authpriv.info dropbear[1981]: Child connection from 192.168.2.7:53098
Jun  2 17:54:44 kowal authpriv.notice dropbear[1981]: password auth succeeded for 'root' from 192.168.2.7:53098
Jun  2 17:55:15 kowal daemon.info hostapd: wlan0: STA 94:0c:6d:ee:61:70 WPA: group key handshake completed (RSN)
root@kowal:~#

39

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

ja prosiłem abyś zrobił pinga z routera nie z hosta

logujesz się np. putty na 192.168.2.1 i wykonujesz

ping 192.168.2.60

logujesz się np. putty na 192.168.1.60 i wykonujesz

ping 192.168.2.1

wyniki tych poleceń proszę wkleić tu

jak będzie ok to poprawimy jeszcze firewall.
co do samby jak obsy(Cezary) będzie to poproś go aby przygotował Tobie firmware z sambą zresztą pewni to czyta. Pewnie nie będzie to w tym tygodniu do tego czasu przygotujemy Ci wszystko inne. Potem sobie tylko gotowe configi przeniesiesz.

40 (edytowany przez kowalmisiek 2010-07-08 07:33:30)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Pingi dochodza miedzy routerami. Czyli dziala tylko jeszcze cos trzeba zrobic zeby komputery sie widzialy i internet byl


Client

root@kliciok:~# ping 192.168.2.1
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: seq=0 ttl=64 time=10.091 ms
64 bytes from 192.168.2.1: seq=1 ttl=64 time=1.674 ms
64 bytes from 192.168.2.1: seq=2 ttl=64 time=1.721 ms
64 bytes from 192.168.2.1: seq=3 ttl=64 time=1.682 ms
64 bytes from 192.168.2.1: seq=4 ttl=64 time=1.734 ms
64 bytes from 192.168.2.1: seq=5 ttl=64 time=3.015 ms
64 bytes from 192.168.2.1: seq=6 ttl=64 time=1.657 ms
64 bytes from 192.168.2.1: seq=7 ttl=64 time=1.709 ms
64 bytes from 192.168.2.1: seq=8 ttl=64 time=1.711 ms
64 bytes from 192.168.2.1: seq=9 ttl=64 time=1.686 ms
64 bytes from 192.168.2.1: seq=10 ttl=64 time=1.687 ms
64 bytes from 192.168.2.1: seq=11 ttl=64 time=1.716 ms
64 bytes from 192.168.2.1: seq=12 ttl=64 time=1.746 ms
64 bytes from 192.168.2.1: seq=13 ttl=64 time=1.687 ms
64 bytes from 192.168.2.1: seq=14 ttl=64 time=1.761 ms
64 bytes from 192.168.2.1: seq=15 ttl=64 time=1.694 ms
64 bytes from 192.168.2.1: seq=16 ttl=64 time=1.679 ms
64 bytes from 192.168.2.1: seq=17 ttl=64 time=1.731 ms
64 bytes from 192.168.2.1: seq=18 ttl=64 time=4.455 ms

AP

root@kowal:~# ping 192.168.2.60
PING 192.168.2.60 (192.168.2.60): 56 data bytes
64 bytes from 192.168.2.60: seq=0 ttl=64 time=2.380 ms
64 bytes from 192.168.2.60: seq=1 ttl=64 time=1.718 ms
64 bytes from 192.168.2.60: seq=2 ttl=64 time=1.722 ms
64 bytes from 192.168.2.60: seq=3 ttl=64 time=1.737 ms
64 bytes from 192.168.2.60: seq=4 ttl=64 time=1.712 ms
64 bytes from 192.168.2.60: seq=5 ttl=64 time=1.680 ms
64 bytes from 192.168.2.60: seq=6 ttl=64 time=1.671 ms
64 bytes from 192.168.2.60: seq=7 ttl=64 time=1.677 ms
64 bytes from 192.168.2.60: seq=8 ttl=64 time=1.675 ms
64 bytes from 192.168.2.60: seq=9 ttl=64 time=1.675 ms
64 bytes from 192.168.2.60: seq=10 ttl=64 time=1.661 ms
64 bytes from 192.168.2.60: seq=11 ttl=64 time=1.840 ms
64 bytes from 192.168.2.60: seq=12 ttl=64 time=1.745 ms
64 bytes from 192.168.2.60: seq=13 ttl=64 time=1.714 ms
64 bytes from 192.168.2.60: seq=14 ttl=64 time=1.677 ms
64 bytes from 192.168.2.60: seq=15 ttl=64 time=1.678 ms
64 bytes from 192.168.2.60: seq=16 ttl=64 time=1.686 ms
64 bytes from 192.168.2.60: seq=17 ttl=64 time=1.668 ms
^C
--- 192.168.2.60 ping statistics ---
18 packets transmitted, 18 packets received, 0% packet loss
round-trip min/avg/max = 1.661/1.739/2.380 ms
root@kowal:~#

PS. Jak sie wkoncu uda to zrobic zeby wszystko dzialalo jak nalezy da sie w jakis sposob utworzyc obraz tego openwrt z zapisanymi danymi. taki obraz dysku ze jak cos sie kiedys posypie zeby tylko wgrac i juz wszystko bylo ustawione?

41

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

da się trzeba poprosić cezarego aby wgrał Twoje gotowe configi do obrazów i będzie git. Będziesz miał gotowy firmware z konfiguracją smile

przejdźmy do rzeczy. pingi są ok. czyli łącze ok.

W APCLIENT w pliku /etc/config/firewall proszę zmień sekcję dotyczącą "wan" na następującą:

config zone
        option name             wan
        option input    ACCEPT
        option output   ACCEPT
        option forward  ACCEPT

po wykonanych zmianach zrób restart routera

potem proszę logi z następujących komend:

iptables -t nat -L -v -n
iptables -L -v -n
route -n

z obu routerów

oraz zawartość plików

cat /etc/config/firewall
cat /etc/firewall.user

42

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

W firewallu mam jeszcze w tej opcji wan takie cos dopisane.

option masq        1 
    option mtu_fix    1

Usunac to? Narazie zostawie i jade dalej.

APClient

root@kliciok:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 24 packets, 7664 bytes)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_wan_prerouting  all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0
   24  7664 zone_lan_prerouting  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
   24  7664 prerouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 11 packets, 924 bytes)
 pkts bytes target     prot opt in     out     source               destination 
   16  1254 postrouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   16  1254 zone_wan_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   12   992 zone_3g_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0 

Chain OUTPUT (policy ACCEPT 15 packets, 1186 bytes)
 pkts bytes target     prot opt in     out     source               destination 

Chain postrouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0  

Chain zone_lan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   24  7664 prerouting_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    4   262 MASQUERADE  all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0  

Chain zone_wan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kliciok:~#

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
   69 20882 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
   14   925 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
   67  6678 output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
   67  6678 output     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_forward  all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0

Chain forwarding_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   47  6184 zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_wan   all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   

Chain input_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   67  6678 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   15   993 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    1    68 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain reject (5 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    2   104 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain zone_3g (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 input_3g   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_3g_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   47  6184 input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
   47  6184 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination 
   47  6184 ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
   52  5685 ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      br-lan  0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
    0     0 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
   14   925 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_MSSFIX (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      wlan0   0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_wan_REJECT (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kliciok:~#
root@kliciok:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
0.0.0.0         192.168.2.1     0.0.0.0         UG    0      0        0 wlan0
root@kliciok:~#

config defaults
    option syn_flood    1
    option input        ACCEPT
    option output        ACCEPT 
    option forward        REJECT

config zone
    option name        lan
    option input    ACCEPT 
    option output    ACCEPT 
    option forward    REJECT

config zone
        option name             wan
        option input    ACCEPT
        option output   ACCEPT
        option forward  ACCEPT
    option masq        1 
    option mtu_fix    1

config zone
    option name        3g
    option input    REJECT
    option output    ACCEPT 
    option forward    REJECT
    option masq        1 

config forwarding 
    option src      lan
    option dest     3g

config forwarding 
    option src      wan
    option dest     lan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
    option src        wan
    option proto        udp
    option dest_port    68
    option target        ACCEPT

#Allow ping
config rule
    option src wan
    option proto icmp
    option icmp_type echo-request
    option target ACCEPT

# include a file with users custom iptables rules
config include
    option path /etc/firewall.user


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#    option src        lan
#    option src_ip    192.168.45.2
#    option dest        wan
#    option proto    tcp
#    option target    REJECT 

# block a specific mac on wan
#config rule
#    option dest        wan
#    option src_mac    00:11:22:33:44:66
#    option target    REJECT 

# block incoming ICMP traffic on a zone
#config rule
#    option src        lan
#    option proto    ICMP
#    option target    DROP

# port redirect port coming in on wan to lan
#config redirect
#    option src            wan
#    option src_dport    80
#    option dest            lan
#    option dest_ip        192.168.16.235
#    option dest_port    80 
#    option proto        tcp


### FULL CONFIG SECTIONS
#config rule
#    option src        lan
#    option src_ip    192.168.45.2
#    option src_mac    00:11:22:33:44:55
#    option src_port    80
#    option dest        wan
#    option dest_ip    194.25.2.129
#    option dest_port    120
#    option proto    tcp
#    option target    REJECT 

#config redirect
#    option src        lan
#    option src_ip    192.168.45.2
#    option src_mac    00:11:22:33:44:55
#    option src_port        1024
#    option src_dport    80
#    option dest_ip    194.25.2.129
#    option dest_port    120
#    option proto    tcp

# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

AP


root@kowal:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 2295 packets, 291K bytes)
 pkts bytes target     prot opt in     out     source               destination 
 2295  291K zone_lan_prerouting  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
 2295  291K prerouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 235 packets, 33802 bytes)
 pkts bytes target     prot opt in     out     source               destination 
  235 33802 postrouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  235 33802 zone_wan_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  235 33802 zone_3g_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0 

Chain OUTPUT (policy ACCEPT 129 packets, 29562 bytes)
 pkts bytes target     prot opt in     out     source               destination 

Chain postrouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0  

Chain zone_lan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
 2295  291K prerouting_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kowal:~#


        tcp flags:0x17/0x02
 1978  202K input_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0  
 1978  202K input      all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
  114  5848 zone_wan_MSSFIX  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
  114  5848 forwarding_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  114  5848 forward    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
 2109  278K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
  532  168K output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
  532  168K output     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  114  5848 zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0

Chain forwarding_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination 
 1978  202K zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   

Chain input_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  532  168K zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain reject (3 references)
 pkts bytes target     prot opt in     out     source               destination 
  106  5368 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
    8   480 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    5   260 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain zone_3g (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 input_3g   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_3g_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
 1978  202K input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
 1978  202K zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 
 1978  202K ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
  532  168K ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      br-lan  0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  114  5848 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  114  5848 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  114  5848 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  114  5848 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  114  5848 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
    0     0 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_wan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_MSSFIX (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kowal:~#


root@kowal:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.1.0     192.168.2.60    255.255.255.0   UG    0      0        0 br-lan
root@kowal:~#


root@kowal:~# cat /etc/config/firewall
config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT

config zone
        option name             lan
        option input    ACCEPT
        option output   ACCEPT
        option forward  REJECT

config zone
        option name             wan
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1
        option mtu_fix  1

config zone
        option name             3g
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1

config forwarding
        option src      lan
        option dest     3g

config forwarding
        option src      lan
        option dest     wan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT

#Allow ping
config rule
        option src wan
        option proto icmp
        option icmp_type echo-request
        option target ACCEPT

# include a file with users custom iptables rules
config include
        option path /etc/firewall.user


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option dest             wan
#       option proto    tcp
#       option target   REJECT

# block a specific mac on wan
#config rule
#       option dest             wan
#       option src_mac  00:11:22:33:44:66
#       option target   REJECT

# block incoming ICMP traffic on a zone
#config rule
#       option src              lan
#       option proto    ICMP
#       option target   DROP

# port redirect port coming in on wan to lan
#config redirect
#       option src                      wan
#       option src_dport        80
#       option dest                     lan
#       option dest_ip          192.168.16.235
#       option dest_port        80
#       option proto            tcp


### FULL CONFIG SECTIONS
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port 80
#       option dest             wan
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
#       option target   REJECT

#config redirect
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port         1024
#       option src_dport        80
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
root@kowal:~#


root@kowal:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

root@kowal:~#

43 (edytowany przez rpc 2010-07-08 20:14:47)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

od razu widzę że kolega coś pominął
ale po kolei

tak proszę usunąć wpisy TYLKO z APCLIENT

option masq        1 
option mtu_fix    1

proszę dodać do pliku /etc/config/firewall poniższy blok w APCLIENT:

config forwarding 
    option src      lan
    option dest     wan

widzę że poprzednio kolega zamienił wpis zamiast dodać. Muszą być dwa wpisy forwarding lan->wan i wan->lan

restart routera i logi tylko z APCLIENT

iptables -t nat -L -v -n
iptables -L -v -n
cat /etc/config/firewall

Co do pingów z hostów.
Póki nie masz podłączonego APCLIENTa do livebox to na hoście(komputerze) bramę musisz podać jako 192.168.1.60 a nie 192.168.1.1 dla komputera o adresie 192.168.1.7

Dla komputera o adresie 192.168.2.7 brama musi być ustawiona na 192.168.2.1 (tutaj komputer powinien wszystko co trzeba pobrać z dhcp więc nic nie ustawiasz jak masz kartę sieciową na auto)

Jak wszystko będzie ok. powinieneś móc pingować komputery między sobą czyli
ping 192.168.1.7 (z komputera 192.168.2.7)
ping 192.168.2.7 (z komputera 192.168.1.7)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

Co do konfiguracji livebox
Należy dodać trasę statyczna do routera livebox
Logujesz się do konfiguracji livebox na 192.168.1.1 potem
Konfiguracja zaawansowana -> Sieć -> Konfiguracja routingu(konfiguracja tras).
patrz na zdjęcie
http://yfrog.com/0e731249389268j
Uzupełniasz pola:
Identyfikator sieci docelowej: 192.168.2.0
Maska podsieci docelowej: 255.255.255.0
IP następnego przeskoku: 192.168.1.60
Potem klikasz "Dodaj"
i trasa powinna zostać dodana do listy poniżej

zapisujesz wprowadzone zmiany i to wszystko.

44

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Logi po restarcie:

root@kliciok:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 363 packets, 123K bytes)
 pkts bytes target     prot opt in     out     source               destination 
    1   236 zone_wan_prerouting  all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0
  362  123K zone_lan_prerouting  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
  364  124K prerouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 50 packets, 4013 bytes)
 pkts bytes target     prot opt in     out     source               destination 
   51  4081 postrouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   51  4081 zone_3g_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0 

Chain OUTPUT (policy ACCEPT 50 packets, 4013 bytes)
 pkts bytes target     prot opt in     out     source               destination 

Chain postrouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0  

Chain zone_lan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  362  123K prerouting_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0  

Chain zone_wan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    1   236 prerouting_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kliciok:~#
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
  458 69316 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
   14   925 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
   94 10908 output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
   94 10908 output     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_forward  all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0

Chain forwarding_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  125 15618 zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    2   470 zone_wan   all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   

Chain input_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   94 10908 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   16  1191 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    1    68 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain reject (5 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    5   260 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain zone_3g (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 input_3g   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_3g_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  125 15618 input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
  125 15618 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination 
  125 15618 ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
   78  9717 ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      br-lan  0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
    2   470 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    2   470 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination 
    2   470 ACCEPT     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
   15  1123 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      wlan0   0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_wan_REJECT (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kliciok:~#

root@kliciok:~# cat /etc/config/firewall
config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT

config zone
        option name             lan
        option input    ACCEPT
        option output   ACCEPT
        option forward  REJECT

config zone
        option name             wan
        option input    ACCEPT
        option output   ACCEPT
        option forward  ACCEPT

config zone
        option name             3g
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1

config forwarding
        option src      lan
        option dest     3g

config forwarding
        option src      wan
        option dest     lan

config forwarding
    option src      lan
    option dest     wan

# We need to accept udp packets on port 68,
# see [url]https://dev.openwrt.org/ticket/4108[/url]
config rule
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT

#Allow ping
config rule
        option src wan
        option proto icmp
        option icmp_type echo-request
        option target ACCEPT

# include a file with users custom iptables rules
config include
        option path /etc/firewall.user


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option dest             wan
#       option proto    tcp
#       option target   REJECT

# block a specific mac on wan
#config rule
#       option dest             wan
#       option src_mac  00:11:22:33:44:66
#       option target   REJECT

# block incoming ICMP traffic on a zone
#config rule
#       option src              lan
#       option proto    ICMP
#       option target   DROP

# port redirect port coming in on wan to lan
#config redirect
#       option src                      wan
#       option src_dport        80
#       option dest                     lan
#       option dest_ip          192.168.16.235
#       option dest_port        80
#       option proto            tcp


### FULL CONFIG SECTIONS
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port 80
#       option dest             wan
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
#       option target   REJECT

#config redirect
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port         1024
#       option src_dport        80
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
root@kliciok:~#

Kurcze nie mam 2 komputera w pokoju wiec nie mam tego jak sprawdzic. Jutro pozycze laptopa i sprawdze ale dlaczego jak jestem podlaczony do apclienta i mam ip 192.168.1.7 a brame mam 192.168.1.60 to nie moge puszczac pingow na AP czyli 192.168.2.1?

45 (edytowany przez rpc 2010-07-09 22:53:16)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

powinieneś móc pingować bez problemu. A czy z AP możesz pingować 192.168.1.7 ?

jeśli nie
w takim razie zrobimy test na APCLIENT wywołaj komendy:

iptables -I FORWARD -j ACCEPT
iptables -I INPUT -j ACCEPT
iptables -I OUTPUT -j ACCEPT

Na AP wpisz

iptables -I FORWARD --src 192.168.2.0/24 --dst 192.168.1.0/24 -j ACCEPT
iptables -I FORWARD --src 192.168.1.0/24 --dst 192.168.2.0/24 -j ACCEPT

i potem spróbuj pingować
daj znać wyniku. Wedle mnie musi działać

jak zadziała sprawdź które reguły zadziałają czy te na AP czy te na APCLIENT.

z windows jak masz daj logi z

 route print
ipconfig

46

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Rafał dziwna sprawa. Z dosa jak pinguje to nic nie dochodzi a z putty pingi dochodza. Ja przedtem z dosa probowalem i za chiny ludowe nic nie przeszlo i ciagle bylo "port docelowy nieosiagalny". Mam w kompie 2 sieciowki nawet nie wiedzialem o tym. W jednej ustawilem ip 192.168.1.7 a w drugiej dhcp ustawilo mi 192.168.2.104 i pingi w putty zarowno do ap i apclient jak i obu sieciowek dochodza. W dosie nie mam jak sprawdzic czy na inny komputer dojdzie ping bo on pinguje od razu sieciowke i nie mam jak sie przez dosa zalogowac na routerach. W karzdym razie z dosa pingowac routerow nie moge i internetu tez niema. Moze cos z ta samba jest nie tak?

47 (edytowany przez rpc 2010-07-10 19:23:46)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

zaraz zaraz moment masz dwie karty i obie podłączone do obu routerów ? To raczej błąd komputer nie wie gdzie wysyłać pinga
Wyłącz jedną kartę sieciową(a najlepiej wyjmij wtyczkę, całkowicie odłącz). Nie używaj jej w ogóle skup się na jednej karcie sieciowej

Umówmy się tak podłączasz najpierw sieciówkę (drugą masz wyłączoną) do routera AP Wszystko ustawiasz na auto tak aby komputer pobrał adres automatycznie

podaj logi najpierw z kompa. Wpisz w dos Windowsa (Start->Uruchom->cmd)

route print
ipconfig

Jakiego windowsa masz ?
Wyłącz firewalla w windows (potem sobie włączysz) do testów

muszę się zorientować co nie tak. Według mnie jest już wszystko ok. tak mi się zdaje

samba nie ma nic do tego na razie o niej zapomnij

48

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Windows 7 a firewall mialem wylaczony od poczatku. http://ifotos.pl/mini/siec_eanrap.jpg  http://ifotos.pl/mini/siec2_eanran.jpg

49

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

dobra widzę że komputer ma adres 192.168.2.104

teraz odpal cmd (terminal dos) i wpisz

ping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60
tracert 192.168.1.60

podaj proszę wynik tych poleceń

50

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

http://ifotos.pl/mini/Beztytulu_eannhp.jpg
http://ifotos.pl/mini/siec_eannhh.jpg