76

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

W wersji z luci jest samba, z extrootem nie ma. Do doinstalowania to jest.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

77 (edytowany przez kowalmisiek 2010-07-13 06:07:58)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Jest ta samba. Nie wiem jak moglem wczesniej nie zauwarzyc. Wpisalem tych kilka komend ktore byly na 2 stronie tego tematu ktore odnosily sie do samby. Narazie zabralem routery do siebie wiec na ten moment nie mam jak sprawdzic logow ale wieczorem wezme laptopa i pokombinuje. Ale tak to wyglada jakby dalej cos firewall w cliencie nie przepuszczal w strone komputera. Narazie livebox jest nie uzywany. Logi podam kolo 18 bo teraz do pracy lece.

78 (edytowany przez rpc 2010-07-13 07:49:26)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

@kowalmisiek

no to leć smile ja będę raczej późno lub z rana

jak rozumiem masz dwa komputery zrób sobie w domu laba i dawaj logi

poprzednio działało więc musi działać co się mogło zmienić ?
logi z routerów

route -n
ifconfig
iptables -L -v -n
iptables -t nat -L -v -n
cat /etc/config/network
cat /etc/config/firewall
cat /etc/firewall.user

jak podłączysz komputery to z windows dawaj

route print
ipconfig

druga rzecz pingowałeś komputery a routery też ? Trzeba sprawdzić czy routery się zestawiły sprawdzałeś to ?

ping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60

opisz dokładnie z czego logi aby się nie pogubić

Nie wiem co u Ciebie nie tak. U mnie działa coś takiego zrobione specjalnie na Twoje potrzeby. I nie wiem cobym nie robił działa.

79

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Poprzednio bylo troszke inaczej bo nie bylo drugiego kompa. A pingi puszczałem jedynie z komputera na AP do clienta lub z komputera do clienta na AP. Czyli bez uzycia drugiego komputera. Cos blokuje. Hmm kuzyn cos robil na komputerze wiec dopiero jutro podam logi. Jutro mowil ze pozyczy albo najwyzej pojde do kolegi u ktorego bedzie zainstalowany Client. Ale dopiero po pracy wiec kolo 17

80

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

jeśli działa z kompa na ap lub apclient to MUSI działać ona innego kompa nie ma mocnych no chyba że coś na tym drugim kompie jest niedorobione.
A musi działać patrzyłeś jak pakiety idą do miejsca docelowego opisałem to wyżej to będziesz wiedział czemu musi dojść.

81

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

AP








route -n

root@kowal:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.1.0     192.168.2.60    255.255.255.0   UG    0      0        0 br-lan
root@kowal:~#


ifconfig

root@kowal:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          inet addr:192.168.2.1  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3553 errors:0 dropped:0 overruns:0 frame:0
          TX packets:515 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:764598 (746.6 KiB)  TX bytes:67414 (65.8 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3528 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1060 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:825977 (806.6 KiB)  TX bytes:318306 (310.8 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3528 errors:0 dropped:0 overruns:0 frame:0
          TX packets:446 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:776585 (758.3 KiB)  TX bytes:67772 (66.1 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:613 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:249491 (243.6 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:10 errors:0 dropped:0 overruns:0 frame:0
          TX packets:10 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:960 (960.0 B)  TX bytes:960 (960.0 B)

mon.wlan0 Link encap:UNSPEC  HWaddr 94-0C-6D-AE-B6-CA-00-00-00-00-00-00-00-00-00-00
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:40 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:3593 (3.5 KiB)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:AE:B6:CA
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:185 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3431 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:17435 (17.0 KiB)  TX bytes:868956 (848.5 KiB)

root@kowal:~#

iptables -L -v -n


Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     all  --  *      *       192.168.1.0/24       192.168.2.0/24
  190 11610 ACCEPT     all  --  *      *       192.168.2.0/24       192.168.1.0/24
    0     0 zone_wan_MSSFIX  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 forwarding_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forward    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
  225 40255 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
   10   960 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
   62  9838 output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
   62  9838 output     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0

Chain forwarding_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  312 30386 zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   

Chain input_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   62  9838 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain reject (3 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    5   240 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain zone_3g (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 input_3g   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_3g_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  312 30386 input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
  312 30386 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 
  312 30386 ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
   62  9838 ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      br-lan  0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
    0     0 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_wan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_MSSFIX (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kowal:~#

iptables -t nat -L -v -n


root@kowal:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 1870 packets, 585K bytes)
 pkts bytes target     prot opt in     out     source               destination 
 1870  585K zone_lan_prerouting  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
 1870  585K prerouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 64 packets, 5766 bytes)
 pkts bytes target     prot opt in     out     source               destination 
   64  5766 postrouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   64  5766 zone_wan_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   64  5766 zone_3g_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0 

Chain OUTPUT (policy ACCEPT 14 packets, 2710 bytes)
 pkts bytes target     prot opt in     out     source               destination 

Chain postrouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0  

Chain zone_lan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
 1870  585K prerouting_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_wan_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kowal:~#


cat /etc/config/network

root@kowal:~# cat /etc/config/network
config 'interface' 'loopback'
       option 'ifname'   'lo'
       option 'proto'    'static'
       option 'ipaddr'   '127.0.0.1'
       option 'netmask'  '255.0.0.0'

config 'interface' 'lan'
        option 'ifname'   'eth0.1'
        option 'type'     'bridge'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.2.1'
        option 'netmask'  '255.255.255.0'

config 'interface' 'wan'
        option 'ifname' 'eth0.2'
        option 'proto' 'dhcp'

config 'interface' '3g'
        option 'device' '/dev/ttyUSB0'
        option 'apn' 'internet'
        option 'service' 'umts'
        option 'proto' '3g'
        option 'hotplug' 1
        option 'pincode' '0000'

config 'switch'
        option 'name' 'rtl8366rb'
        option 'reset' '1'
        option 'enable_vlan' '1'

config 'switch_vlan'
        option 'device' 'rtl8366rb'
        option 'vlan' '1'
        option 'ports' '1 2 3 4 5t'

config 'switch_vlan'
        option 'device' 'rtl8366rb'
        option 'vlan' '2'
        option 'ports' '0 5t'


config 'route'
option 'interface' 'lan'
option 'netmask' '255.255.255.0'
option 'target' '192.168.1.0'
option 'gateway' '192.168.2.60'root@kowal:~#

cat /etc/config/firewall



root@kowal:~# cat /etc/config/firewall
config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT

config zone
        option name             lan
        option input    ACCEPT
        option output   ACCEPT
        option forward  REJECT

config zone
        option name             wan
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1
        option mtu_fix  1

config zone
        option name             3g
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1

config forwarding
        option src      lan
        option dest     3g

config forwarding
        option src      lan
        option dest     wan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT

#Allow ping
config rule
        option src wan
        option proto icmp
        option icmp_type echo-request
        option target ACCEPT

# include a file with users custom iptables rules
config include
        option path /etc/firewall.user


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option dest             wan
#       option proto    tcp
#       option target   REJECT

# block a specific mac on wan
#config rule
#       option dest             wan
#       option src_mac  00:11:22:33:44:66
#       option target   REJECT

# block incoming ICMP traffic on a zone
#config rule
#       option src              lan
#       option proto    ICMP
#       option target   DROP

# port redirect port coming in on wan to lan
#config redirect
#       option src                      wan
#       option src_dport        80
#       option dest                     lan
#       option dest_ip          192.168.16.235
#       option dest_port        80
#       option proto            tcp


### FULL CONFIG SECTIONS
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port 80
#       option dest             wan
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
#       option target   REJECT

#config redirect
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port         1024
#       option src_dport        80
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
root@kowal:~#


cat /etc/firewall.user


root@kowal:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

iptables -I FORWARD --src 192.168.2.0/24 --dst 192.168.1.0/24 -j ACCEPT
iptables -I FORWARD --src 192.168.1.0/24 --dst 192.168.2.0/24 -j ACCEPT
root@kowal:~#


route print
ipconfig

http://ifotos.pl/mini/siec_eqpnxr.JPG



ping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60

http://ifotos.pl/mini/siec2_eqpnns.JPG


A tutaj probuje z komputera podlaczonego do AP pingowac drugi komputer podlaczony do clienta i jak widac sie nieda.

http://ifotos.pl/mini/siec3_eqpnsr.JPG





Client



route -n


Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.2.0     0.0.0.0         255.255.255.0   U     0      0        0 wlan0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
0.0.0.0         192.168.2.1     0.0.0.0         UG    0      0        0 wlan0
root@kliciok:~#

ifconfig

root@kliciok:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.1.60  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5601 errors:0 dropped:0 overruns:0 frame:0
          TX packets:680 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:1280475 (1.2 MiB)  TX bytes:107797 (105.2 KiB)

eth0      Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5673 errors:0 dropped:0 overruns:0 frame:0
          TX packets:682 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:1389539 (1.3 MiB)  TX bytes:111602 (108.9 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5605 errors:0 dropped:0 overruns:0 frame:0
          TX packets:680 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:1303097 (1.2 MiB)  TX bytes:110517 (107.9 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:25 errors:0 dropped:0 overruns:0 frame:0
          TX packets:25 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:3260 (3.1 KiB)  TX bytes:3260 (3.1 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:0C:6D:EE:61:70
          inet addr:192.168.2.60  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:961 errors:0 dropped:0 overruns:0 frame:0
          TX packets:116 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:224942 (219.6 KiB)  TX bytes:12463 (12.1 KiB)

root@kliciok:~#

iptables -L -v -n


Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
  309 58939 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
   10   638 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
  308 47312 output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
  308 47312 output     all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_forward  all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0

Chain forwarding_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  744  113K zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
  191 25684 zone_wan   all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   

Chain input_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  308 47312 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   16  1568 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain reject (5 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   10   480 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   

Chain zone_3g (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 input_3g   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_3g_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 forwarding_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  744  113K input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
  744  113K zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination 
  744  113K ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
  292 45744 ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      br-lan  0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0   

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
  191 25684 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
  191 25684 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_ACCEPT (4 references)
 pkts bytes target     prot opt in     out     source               destination 
  191 25684 ACCEPT     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
   16  1568 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
    0     0 DROP       all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 TCPMSS     tcp  --  *      wlan0   0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_wan_REJECT (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
    0     0 reject     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kliciok:~#

root@kliciok:~#

iptables -t nat -L -v -n

root@kliciok:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 2608 packets, 942K bytes)
 pkts bytes target     prot opt in     out     source               destination 
  352  121K zone_wan_prerouting  all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0
 2256  820K zone_lan_prerouting  all  --  br-lan *       0.0.0.0/0            0.0.0.0/0
 2608  942K prerouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 95 packets, 9800 bytes)
 pkts bytes target     prot opt in     out     source               destination 
   95  9800 postrouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   95  9800 zone_3g_nat  all  --  *      *       0.0.0.0/0            0.0.0.0/0 

Chain OUTPUT (policy ACCEPT 73 packets, 8484 bytes)
 pkts bytes target     prot opt in     out     source               destination 

Chain postrouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain prerouting_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_nat (1 references)
 pkts bytes target     prot opt in     out     source               destination 

Chain zone_3g_prerouting (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 prerouting_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_lan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0  

Chain zone_lan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
 2256  820K prerouting_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain zone_wan_nat (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 MASQUERADE  all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0  

Chain zone_wan_prerouting (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  352  121K prerouting_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0
root@kliciok:~#

cat /etc/config/network

root@kliciok:~# cat /etc/config/network
config 'interface' 'loopback'
       option 'ifname'   'lo'
       option 'proto'    'static'
       option 'ipaddr'   '127.0.0.1'
       option 'netmask'  '255.0.0.0'

config 'interface' 'lan'
        option 'ifname'   'eth0.1'
        option 'type'     'bridge'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.1.60'
        option 'netmask'  '255.255.255.0'
         option 'dns'  '192.168.1.1'

config 'interface' 'wan'
        option 'ifname'   'wlan0'
        option 'proto'    'static'
        option 'ipaddr'   '192.168.2.60'
        option 'netmask'  '255.255.255.0'
        option 'gateway'   '192.168.2.1'
        option 'dns'  '192.168.2.1'


config 'interface' '3g'
        option 'device' '/dev/ttyUSB0'
        option 'apn' 'internet'
        option 'service' 'umts'
        option 'proto' '3g'
        option 'hotplug' 1
        option 'pincode' '0000'

config 'switch'
        option 'name' 'rtl8366rb'
        option 'reset' '1'
        option 'enable_vlan' '1'

config 'switch_vlan'
        option 'device' 'rtl8366rb'
        option 'vlan' '1'
        option 'ports' '1 2 3 4 5t'

config 'switch_vlan'
        option 'device' 'rtl8366rb'
        option 'vlan' '2'
        option 'ports' '0 5t'
root@kliciok:~#


cat /etc/config/firewall



root@kliciok:~# cat /etc/config/firewall
config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT

config zone
        option name             lan
        option input    ACCEPT
        option output   ACCEPT
        option forward  REJECT

config zone
        option name             wan
        option input    ACCEPT
        option output   ACCEPT
        option forward  ACCEPT

config zone
        option name             3g
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq             1

config forwarding
        option src      lan
        option dest     3g

config forwarding
        option src      wan
        option dest     lan

config forwarding
    option src      lan
    option dest     wan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT

#Allow ping
config rule
        option src wan
        option proto icmp
        option icmp_type echo-request
        option target ACCEPT

# include a file with users custom iptables rules
config include
        option path /etc/firewall.user


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option dest             wan
#       option proto    tcp
#       option target   REJECT

# block a specific mac on wan
#config rule
#       option dest             wan
#       option src_mac  00:11:22:33:44:66
#       option target   REJECT

# block incoming ICMP traffic on a zone
#config rule
#       option src              lan
#       option proto    ICMP
#       option target   DROP

# port redirect port coming in on wan to lan
#config redirect
#       option src                      wan
#       option src_dport        80
#       option dest                     lan
#       option dest_ip          192.168.16.235
#       option dest_port        80
#       option proto            tcp


### FULL CONFIG SECTIONS
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port 80
#       option dest             wan
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
#       option target   REJECT

#config redirect
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port         1024
#       option src_dport        80
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
root@kliciok:~#


cat /etc/firewall.user

root@kliciok:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

iptables -I FORWARD -j ACCEPTroot@kliciok:~#

route print
ipconfig

http://ifotos.pl/mini/siec_eqpwsr.JPG


ping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60

http://ifotos.pl/mini/siec2_eqpwsw.JPG



A tu pingi z clienta. Jak widac wszystko dochodzi ladnie.

[url=http://ifotos.pl/zobacz/siec3_eqpwax.JPG/][img]http://ifotos.pl/mini/siec3_eqpwax.JPG[/img][/url]

Podlanczalem na odwrot routery czyli raz AP do pc1 i ap do pc2 z tym samym efektem. Czyli cos jest nie tak na routerze. Firewalle sa wszystkie na kompach wylaczone i nawet odinstalowalem antyvirusy. Cos na 100% jest nie tak na routerze ktoryms.

82

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

APCLIENT

root@kliciok:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

iptables -I FORWARD -j ACCEPTroot@kliciok:~#

a to nie błąd ? patrz ostatni wiersz tego wyżej. W jednym wierszu powinno być tylko

iptables -I FORWARD -j ACCEPT

a wywal całkowicie

root@kliciok:~#

restart firewalla i powinno być ok.
jak nie daj z apclient

iptables -L -v -n
cat /etc/firewall.user

83 (edytowany przez kowalmisiek 2010-07-16 15:22:00)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Hmmm. Jest cos dziwnego. Jak wchodze przez putty i wpisuje komende

cat /etc/firewall.user

to pojawia sie to

root@kliciok:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

iptables -I FORWARD -j ACCEPTroot@kliciok:~#

A jak wchodze przez winscp w ten plik to pisze normalnie tak jak powinno byc czyli

# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

iptables -I FORWARD -j ACCEPT

Ale tak jak pokazuje sie w putty to:

iptables -I FORWARD -j ACCEPTroot@kliciok:~#

To moge dalej w tej linijce pisac komendy. Tak jakby samo "root@kliciok:~#" nie przeskoczylo nizej. Jakak komenda resetuje sie firewall? PS Bedziesz moze jutro w jakichs godzinach na forum? Bo chcial bym wkoncu skonczyc to? smile

84

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

niedziela

/etc/init.d/firewall restart

i log z wykonania polecenia

85 (edytowany przez kowalmisiek 2010-07-17 16:35:03)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Log z restartu

root@kliciok:~# /etc/init.d/firewall restart
Loading defaults
Loading synflood protection
Adding custom chains
Loading zones
Loading forwarding
Loading redirects
Loading rules
Loading includes
Loading zone defaults
root@kliciok:~#

A tak wyglada ten plik po restarcie w winscp

#!/bin/sh /etc/rc.common
# Copyright (C) 2008 OpenWrt.org

START=45

start() {
    . /lib/firewall/uci_firewall.sh
    fw_init
}

stop() {
    . /lib/firewall/uci_firewall.sh
    fw_stop    
}

PS o ktorej gdzies tak jutro bedziesz na forum?

86 (edytowany przez rpc 2010-07-17 17:30:10)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

jest możliwość zalogowania zdalnego najpierw na ap a potem na apclient ? z internetu abym się dostał do ruterów

zrób jeszcze tak na apclient z putty

echo "iptables -I FORWARD -j ACCEPT" > /etc/firewall.user
/etc/init.d/firewall restart

potem z apclient

iptables -L -v -n

87 (edytowany przez kowalmisiek 2010-07-18 09:30:06)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

kurcze teraz gdzies sie wybieram i nie dam rady sie bawic. Wiem tyle ze po resecie firewalla nie moge z dosa juz pingowac komputerow. Przedtem moglem z AP pingowac komputer po stronie clienta a teraz juz nie moge. Napisz plus minus o ktorej godzinie mial bys jutro czas a najlepiej jak bys mial gadu gadu i mi na pw numer podal. Jak jest taka mazliwosc zebys mogl wejsc przez neta na te routery to jak najbardziej.
Log

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination                                              
    9   988 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                        state RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0                                                
    4   872 output_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0                                              
    4   872 output     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                

Chain forward (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 zone_lan_forward  all  --  br-lan *       0.0.0.0/0            0.0.0                                             .0/0
    0     0 zone_wan_forward  all  --  wlan0  *       0.0.0.0/0            0.0.0                                             .0/0

Chain forwarding_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain forwarding_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain forwarding_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain forwarding_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain input (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    4   872 zone_lan   all  --  br-lan *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 zone_wan   all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0                                                

Chain input_3g (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain input_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain input_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain input_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain output (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    4   872 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0                                             /0

Chain output_rule (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain reject (5 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0                                                        reject-with tcp-reset
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                        reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 RETURN     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0                                                        tcp flags:0x17/0x02 limit: avg 25/sec burst 50
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                

Chain zone_3g (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 input_3g   all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0                                             /0

Chain zone_3g_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain zone_3g_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain zone_3g_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain zone_3g_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination                                              

Chain zone_3g_forward (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 forwarding_3g  all  --  *      *       0.0.0.0/0            0.0.0.0/                                             0
    0     0 zone_3g_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.0                                             /0

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    4   872 input_lan  all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                
    4   872 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0

Chain zone_lan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    4   872 ACCEPT     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0                                                
    4   872 ACCEPT     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0                                                

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 DROP       all  --  br-lan *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 DROP       all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0                                                

Chain zone_lan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 TCPMSS     tcp  --  *      br-lan  0.0.0.0/0            0.0.0.0/0                                                        tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 reject     all  --  br-lan *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 reject     all  --  *      br-lan  0.0.0.0/0            0.0.0.0/0                                                

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0
    0     0 zone_3g_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.0                                             /0
    0     0 forwarding_lan  all  --  *      *       0.0.0.0/0            0.0.0.0                                             /0
    0     0 zone_lan_REJECT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0

Chain zone_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0                                                        udp dpt:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0                                                        icmp type 8
    0     0 input_wan  all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0

Chain zone_wan_ACCEPT (4 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 ACCEPT     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0                                                

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 DROP       all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 DROP       all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0                                                

Chain zone_wan_MSSFIX (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 TCPMSS     tcp  --  *      wlan0   0.0.0.0/0            0.0.0.0/0                                                        tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain zone_wan_REJECT (0 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 reject     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0                                                
    0     0 reject     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0                                                

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination                                              
    0     0 zone_lan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0
    0     0 forwarding_wan  all  --  *      *       0.0.0.0/0            0.0.0.0                                             /0
    0     0 zone_wan_ACCEPT  all  --  *      *       0.0.0.0/0            0.0.0.                                             0/0
root@kliciok:~#

88

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

to nie jest pełny log

daj z

iptables -L FORWARD -v -n

89 (edytowany przez kowalmisiek 2010-07-18 15:22:56)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

log

root@kliciok:~# iptables -L FORWARD -v -n
Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0  
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 forwarding_rule  all  --  *      *       0.0.0.0/0            0.0.00/0
    0     0 forward    all  --  *      *       0.0.0.0/0            0.0.0.0/0  
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0  
root@kliciok:~#

Co dalej  zrobic po tym logu? Narazie nie mam jak sprawdzic czy dziala bo nie mam 2 kompa w domu ale jak cos do kumpla podejde i sie sprawdzi. Chociaz po resecie raczej dzialac nie bedzie.

A czy mogl bys mi skopiowac twoje ustawienia z firewala z clienta i AP? Moze bym poprostu takie same wpisal jak ty i by dzialalo?

90

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

dla mnie wygląda na ok. wszystko ok.  bez błędów.
bez dostania się do routerów nic nie wymyślę.

w tym momencie masz internet z modemu .... ?
modem przydziela adresy z zakresu .... ?

91

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Hmmm po resecie jest dalej to co bylo. Z komputera podlaczonego do clienta dalej nie moge pingowac do kompa podlanczonego do ap.(komp 192.168.1.45 -> 192.168.1.60 -> 192.168.2.1 -> komp 192.168.2.44) Mieszalem cos w luci i w firewallu dalem wszystko na accept ale nic to nie dalo. Powiedz mi taka rzecz. Meszkasz gdzies w okolicach krakowa? Jak tak to bym podjechal do ciebie z tymi tp-linkami i zaplacil bym cos za to zebys to skonfigurowal bo mne juz to dobija. A co do zakresu IP to moge ci podac nr ip ale wolal bym nie na forum bo zbyt wiele osob by moglo zaczac sie bawic tym. Jak cos to podaj email to wysle. A jak jestes z krakowa lub okolic to wolal bym podjechac i dac kase bo mnie juz to dobija naprawde.

92

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

odezwij sie na rpc[at]rpc.one.pl

93 (edytowany przez kowalmisiek 2010-07-19 19:56:17)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Tam gdzie jest to "at" rozumiem ze ma byc "@"? Przeczytalem cos o oprogramowaniu DD-wrt. Widze ze jest wersja na tego tplinka. Moze na nim sprobuje sie polaczyc? Co ty na to? Moze jest latwiejszy w skonfigurowaniu? Sprawdzales go kiedys moze Rafał? Powiedz mi co to tak na chlopski rozum jest ten tryb WDS? I przez niego niby jak sie polacze bede mial ip na cliencie i na ap z tego samego zakresu?

94 (edytowany przez kowalmisiek 2010-07-27 21:37:21)

Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?

Siec juz dziala. Dzis sie bawilem i sie lacza normalnie i moge wchodzic na na udostepnione rzeczy miedzy 2 komputerami.
Internet juz skonfigurowalem tak ze dziala juz moj internet przez pppoe w sieci. Co do internetu z neostrady to nie wiem czy dziala bo nie wiem jak to sprawdzic ale kolega zrobil tak jak to napisales Rafal czyli

Co do konfiguracji livebox
Należy dodać trasę statyczna do routera livebox
Logujesz się do konfiguracji livebox na 192.168.1.1 potem
Konfiguracja zaawansowana -> Sieć -> Konfiguracja routingu(konfiguracja tras).
patrz na zdjęcie
http://yfrog.com/0e731249389268j
Uzupełniasz pola:
Identyfikator sieci docelowej: 192.168.2.0
Maska podsieci docelowej: 255.255.255.0
IP następnego przeskoku: 192.168.1.60
Potem klikasz "Dodaj"
i trasa powinna zostać dodana do listy poniżej

zapisujesz wprowadzone zmiany i to wszystko.

. Mam jeszcze problem z polaczeniem. Siec dziala zbyt wolno. Kopiowanie przez siec filmu zajmuje jakies 30 min a to tylko 700mb jest. Predkosc kopiowania to okolo 1mb i mniej. Cos jest nie tak z wifi chyba jeszcze.