Odp: Tryb AP i AP Client na WR1043ND jak skonfigurowac?
W wersji z luci jest samba, z extrootem nie ma. Do doinstalowania to jest.
Nie jesteś zalogowany. Proszę się zalogować lub zarejestrować.
eko.one.pl → Oprogramowanie / Software → Tryb AP i AP Client na WR1043ND jak skonfigurowac?
Strony Poprzednia 1 2 3 4
Zaloguj się lub zarejestruj by napisać odpowiedź
W wersji z luci jest samba, z extrootem nie ma. Do doinstalowania to jest.
Jest ta samba. Nie wiem jak moglem wczesniej nie zauwarzyc. Wpisalem tych kilka komend ktore byly na 2 stronie tego tematu ktore odnosily sie do samby. Narazie zabralem routery do siebie wiec na ten moment nie mam jak sprawdzic logow ale wieczorem wezme laptopa i pokombinuje. Ale tak to wyglada jakby dalej cos firewall w cliencie nie przepuszczal w strone komputera. Narazie livebox jest nie uzywany. Logi podam kolo 18 bo teraz do pracy lece.
@kowalmisiek
no to leć
ja będę raczej późno lub z rana
jak rozumiem masz dwa komputery zrób sobie w domu laba i dawaj logi
poprzednio działało więc musi działać co się mogło zmienić ?
logi z routerów
route -n
ifconfig
iptables -L -v -n
iptables -t nat -L -v -n
cat /etc/config/network
cat /etc/config/firewall
cat /etc/firewall.userjak podłączysz komputery to z windows dawaj
route print
ipconfigdruga rzecz pingowałeś komputery a routery też ? Trzeba sprawdzić czy routery się zestawiły sprawdzałeś to ?
ping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60opisz dokładnie z czego logi aby się nie pogubić
Nie wiem co u Ciebie nie tak. U mnie działa coś takiego zrobione specjalnie na Twoje potrzeby. I nie wiem cobym nie robił działa.
Poprzednio bylo troszke inaczej bo nie bylo drugiego kompa. A pingi puszczałem jedynie z komputera na AP do clienta lub z komputera do clienta na AP. Czyli bez uzycia drugiego komputera. Cos blokuje. Hmm kuzyn cos robil na komputerze wiec dopiero jutro podam logi. Jutro mowil ze pozyczy albo najwyzej pojde do kolegi u ktorego bedzie zainstalowany Client. Ale dopiero po pracy wiec kolo 17
jeśli działa z kompa na ap lub apclient to MUSI działać ona innego kompa nie ma mocnych no chyba że coś na tym drugim kompie jest niedorobione.
A musi działać patrzyłeś jak pakiety idą do miejsca docelowego opisałem to wyżej to będziesz wiedział czemu musi dojść.
AP
route -n
root@kowal:~# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan
192.168.1.0 192.168.2.60 255.255.255.0 UG 0 0 0 br-lan
root@kowal:~#ifconfig
root@kowal:~# ifconfig
br-lan Link encap:Ethernet HWaddr 94:0C:6D:AE:B6:CA
inet addr:192.168.2.1 Bcast:192.168.2.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:3553 errors:0 dropped:0 overruns:0 frame:0
TX packets:515 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:764598 (746.6 KiB) TX bytes:67414 (65.8 KiB)
eth0 Link encap:Ethernet HWaddr 94:0C:6D:AE:B6:CA
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:3528 errors:0 dropped:0 overruns:0 frame:0
TX packets:1060 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:825977 (806.6 KiB) TX bytes:318306 (310.8 KiB)
Interrupt:4
eth0.1 Link encap:Ethernet HWaddr 94:0C:6D:AE:B6:CA
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:3528 errors:0 dropped:0 overruns:0 frame:0
TX packets:446 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:776585 (758.3 KiB) TX bytes:67772 (66.1 KiB)
eth0.2 Link encap:Ethernet HWaddr 94:0C:6D:AE:B6:CA
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:613 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:249491 (243.6 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:10 errors:0 dropped:0 overruns:0 frame:0
TX packets:10 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:960 (960.0 B) TX bytes:960 (960.0 B)
mon.wlan0 Link encap:UNSPEC HWaddr 94-0C-6D-AE-B6-CA-00-00-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:40 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3593 (3.5 KiB) TX bytes:0 (0.0 B)
wlan0 Link encap:Ethernet HWaddr 94:0C:6D:AE:B6:CA
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:185 errors:0 dropped:0 overruns:0 frame:0
TX packets:3431 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:17435 (17.0 KiB) TX bytes:868956 (848.5 KiB)
root@kowal:~#iptables -L -v -n
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 192.168.1.0/24 192.168.2.0/24
190 11610 ACCEPT all -- * * 192.168.2.0/24 192.168.1.0/24
0 0 zone_wan_MSSFIX all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 forwarding_rule all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
225 40255 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
10 960 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
62 9838 output_rule all -- * * 0.0.0.0/0 0.0.0.0/0
62 9838 output all -- * * 0.0.0.0/0 0.0.0.0/0
Chain forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_lan_forward all -- br-lan * 0.0.0.0/0 0.0.0.0/0
Chain forwarding_3g (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan (1 references)
pkts bytes target prot opt in out source destination
Chain input (1 references)
pkts bytes target prot opt in out source destination
312 30386 zone_lan all -- br-lan * 0.0.0.0/0 0.0.0.0/0
Chain input_3g (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan (1 references)
pkts bytes target prot opt in out source destination
Chain output (1 references)
pkts bytes target prot opt in out source destination
62 9838 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain reject (3 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
5 240 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_3g (0 references)
pkts bytes target prot opt in out source destination
0 0 input_3g all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_3g_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_DROP (0 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_REJECT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_3g all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
312 30386 input_lan all -- * * 0.0.0.0/0 0.0.0.0/0
312 30386 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
312 30386 ACCEPT all -- br-lan * 0.0.0.0/0 0.0.0.0/0
62 9838 ACCEPT all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * br-lan 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_lan_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_lan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_DROP (0 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_MSSFIX (1 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_REJECT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
root@kowal:~#iptables -t nat -L -v -n
root@kowal:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 1870 packets, 585K bytes)
pkts bytes target prot opt in out source destination
1870 585K zone_lan_prerouting all -- br-lan * 0.0.0.0/0 0.0.0.0/0
1870 585K prerouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 64 packets, 5766 bytes)
pkts bytes target prot opt in out source destination
64 5766 postrouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
64 5766 zone_wan_nat all -- * * 0.0.0.0/0 0.0.0.0/0
64 5766 zone_3g_nat all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 14 packets, 2710 bytes)
pkts bytes target prot opt in out source destination
Chain postrouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_3g (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_lan (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_wan (1 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_nat (1 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_3g all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_nat (0 references)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_prerouting (1 references)
pkts bytes target prot opt in out source destination
1870 585K prerouting_lan all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_nat (1 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_wan all -- * * 0.0.0.0/0 0.0.0.0/0
root@kowal:~#cat /etc/config/network
root@kowal:~# cat /etc/config/network
config 'interface' 'loopback'
option 'ifname' 'lo'
option 'proto' 'static'
option 'ipaddr' '127.0.0.1'
option 'netmask' '255.0.0.0'
config 'interface' 'lan'
option 'ifname' 'eth0.1'
option 'type' 'bridge'
option 'proto' 'static'
option 'ipaddr' '192.168.2.1'
option 'netmask' '255.255.255.0'
config 'interface' 'wan'
option 'ifname' 'eth0.2'
option 'proto' 'dhcp'
config 'interface' '3g'
option 'device' '/dev/ttyUSB0'
option 'apn' 'internet'
option 'service' 'umts'
option 'proto' '3g'
option 'hotplug' 1
option 'pincode' '0000'
config 'switch'
option 'name' 'rtl8366rb'
option 'reset' '1'
option 'enable_vlan' '1'
config 'switch_vlan'
option 'device' 'rtl8366rb'
option 'vlan' '1'
option 'ports' '1 2 3 4 5t'
config 'switch_vlan'
option 'device' 'rtl8366rb'
option 'vlan' '2'
option 'ports' '0 5t'
config 'route'
option 'interface' 'lan'
option 'netmask' '255.255.255.0'
option 'target' '192.168.1.0'
option 'gateway' '192.168.2.60'root@kowal:~#cat /etc/config/firewall
root@kowal:~# cat /etc/config/firewall
config defaults
option syn_flood 1
option input ACCEPT
option output ACCEPT
option forward REJECT
config zone
option name lan
option input ACCEPT
option output ACCEPT
option forward REJECT
config zone
option name wan
option input REJECT
option output ACCEPT
option forward REJECT
option masq 1
option mtu_fix 1
config zone
option name 3g
option input REJECT
option output ACCEPT
option forward REJECT
option masq 1
config forwarding
option src lan
option dest 3g
config forwarding
option src lan
option dest wan
# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
option src wan
option proto udp
option dest_port 68
option target ACCEPT
#Allow ping
config rule
option src wan
option proto icmp
option icmp_type echo-request
option target ACCEPT
# include a file with users custom iptables rules
config include
option path /etc/firewall.user
### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
# option src lan
# option src_ip 192.168.45.2
# option dest wan
# option proto tcp
# option target REJECT
# block a specific mac on wan
#config rule
# option dest wan
# option src_mac 00:11:22:33:44:66
# option target REJECT
# block incoming ICMP traffic on a zone
#config rule
# option src lan
# option proto ICMP
# option target DROP
# port redirect port coming in on wan to lan
#config redirect
# option src wan
# option src_dport 80
# option dest lan
# option dest_ip 192.168.16.235
# option dest_port 80
# option proto tcp
### FULL CONFIG SECTIONS
#config rule
# option src lan
# option src_ip 192.168.45.2
# option src_mac 00:11:22:33:44:55
# option src_port 80
# option dest wan
# option dest_ip 194.25.2.129
# option dest_port 120
# option proto tcp
# option target REJECT
#config redirect
# option src lan
# option src_ip 192.168.45.2
# option src_mac 00:11:22:33:44:55
# option src_port 1024
# option src_dport 80
# option dest_ip 194.25.2.129
# option dest_port 120
# option proto tcp
root@kowal:~#cat /etc/firewall.user
root@kowal:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
iptables -I FORWARD --src 192.168.2.0/24 --dst 192.168.1.0/24 -j ACCEPT
iptables -I FORWARD --src 192.168.1.0/24 --dst 192.168.2.0/24 -j ACCEPT
root@kowal:~#route print
ipconfigping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60A tutaj probuje z komputera podlaczonego do AP pingowac drugi komputer podlaczony do clienta i jak widac sie nieda.
Client
route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan
0.0.0.0 192.168.2.1 0.0.0.0 UG 0 0 0 wlan0
root@kliciok:~#ifconfig
root@kliciok:~# ifconfig
br-lan Link encap:Ethernet HWaddr 94:0C:6D:EE:61:70
inet addr:192.168.1.60 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5601 errors:0 dropped:0 overruns:0 frame:0
TX packets:680 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1280475 (1.2 MiB) TX bytes:107797 (105.2 KiB)
eth0 Link encap:Ethernet HWaddr 94:0C:6D:EE:61:70
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5673 errors:0 dropped:0 overruns:0 frame:0
TX packets:682 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1389539 (1.3 MiB) TX bytes:111602 (108.9 KiB)
Interrupt:4
eth0.1 Link encap:Ethernet HWaddr 94:0C:6D:EE:61:70
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5605 errors:0 dropped:0 overruns:0 frame:0
TX packets:680 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1303097 (1.2 MiB) TX bytes:110517 (107.9 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:25 errors:0 dropped:0 overruns:0 frame:0
TX packets:25 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:3260 (3.1 KiB) TX bytes:3260 (3.1 KiB)
wlan0 Link encap:Ethernet HWaddr 94:0C:6D:EE:61:70
inet addr:192.168.2.60 Bcast:192.168.2.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:961 errors:0 dropped:0 overruns:0 frame:0
TX packets:116 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:224942 (219.6 KiB) TX bytes:12463 (12.1 KiB)
root@kliciok:~#iptables -L -v -n
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
309 58939 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
10 638 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
308 47312 output_rule all -- * * 0.0.0.0/0 0.0.0.0/0
308 47312 output all -- * * 0.0.0.0/0 0.0.0.0/0
Chain forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_lan_forward all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_forward all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
Chain forwarding_3g (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan (1 references)
pkts bytes target prot opt in out source destination
Chain input (1 references)
pkts bytes target prot opt in out source destination
744 113K zone_lan all -- br-lan * 0.0.0.0/0 0.0.0.0/0
191 25684 zone_wan all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
Chain input_3g (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan (1 references)
pkts bytes target prot opt in out source destination
Chain output (1 references)
pkts bytes target prot opt in out source destination
308 47312 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
16 1568 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain reject (5 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
10 480 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_3g (0 references)
pkts bytes target prot opt in out source destination
0 0 input_3g all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_3g_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_DROP (0 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_REJECT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_3g all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
744 113K input_lan all -- * * 0.0.0.0/0 0.0.0.0/0
744 113K zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_ACCEPT (3 references)
pkts bytes target prot opt in out source destination
744 113K ACCEPT all -- br-lan * 0.0.0.0/0 0.0.0.0/0
292 45744 ACCEPT all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * br-lan 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_lan_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_lan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
191 25684 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0
191 25684 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
191 25684 ACCEPT all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
16 1568 ACCEPT all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * wlan0 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_wan_REJECT (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
root@kliciok:~#
root@kliciok:~#iptables -t nat -L -v -n
root@kliciok:~# iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 2608 packets, 942K bytes)
pkts bytes target prot opt in out source destination
352 121K zone_wan_prerouting all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
2256 820K zone_lan_prerouting all -- br-lan * 0.0.0.0/0 0.0.0.0/0
2608 942K prerouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 95 packets, 9800 bytes)
pkts bytes target prot opt in out source destination
95 9800 postrouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
95 9800 zone_3g_nat all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 73 packets, 8484 bytes)
pkts bytes target prot opt in out source destination
Chain postrouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_3g (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_lan (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_wan (1 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_nat (1 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_3g all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_nat (0 references)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_prerouting (1 references)
pkts bytes target prot opt in out source destination
2256 820K prerouting_lan all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_nat (0 references)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_prerouting (1 references)
pkts bytes target prot opt in out source destination
352 121K prerouting_wan all -- * * 0.0.0.0/0 0.0.0.0/0
root@kliciok:~#cat /etc/config/network
root@kliciok:~# cat /etc/config/network
config 'interface' 'loopback'
option 'ifname' 'lo'
option 'proto' 'static'
option 'ipaddr' '127.0.0.1'
option 'netmask' '255.0.0.0'
config 'interface' 'lan'
option 'ifname' 'eth0.1'
option 'type' 'bridge'
option 'proto' 'static'
option 'ipaddr' '192.168.1.60'
option 'netmask' '255.255.255.0'
option 'dns' '192.168.1.1'
config 'interface' 'wan'
option 'ifname' 'wlan0'
option 'proto' 'static'
option 'ipaddr' '192.168.2.60'
option 'netmask' '255.255.255.0'
option 'gateway' '192.168.2.1'
option 'dns' '192.168.2.1'
config 'interface' '3g'
option 'device' '/dev/ttyUSB0'
option 'apn' 'internet'
option 'service' 'umts'
option 'proto' '3g'
option 'hotplug' 1
option 'pincode' '0000'
config 'switch'
option 'name' 'rtl8366rb'
option 'reset' '1'
option 'enable_vlan' '1'
config 'switch_vlan'
option 'device' 'rtl8366rb'
option 'vlan' '1'
option 'ports' '1 2 3 4 5t'
config 'switch_vlan'
option 'device' 'rtl8366rb'
option 'vlan' '2'
option 'ports' '0 5t'
root@kliciok:~#cat /etc/config/firewall
root@kliciok:~# cat /etc/config/firewall
config defaults
option syn_flood 1
option input ACCEPT
option output ACCEPT
option forward REJECT
config zone
option name lan
option input ACCEPT
option output ACCEPT
option forward REJECT
config zone
option name wan
option input ACCEPT
option output ACCEPT
option forward ACCEPT
config zone
option name 3g
option input REJECT
option output ACCEPT
option forward REJECT
option masq 1
config forwarding
option src lan
option dest 3g
config forwarding
option src wan
option dest lan
config forwarding
option src lan
option dest wan
# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
option src wan
option proto udp
option dest_port 68
option target ACCEPT
#Allow ping
config rule
option src wan
option proto icmp
option icmp_type echo-request
option target ACCEPT
# include a file with users custom iptables rules
config include
option path /etc/firewall.user
### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
# option src lan
# option src_ip 192.168.45.2
# option dest wan
# option proto tcp
# option target REJECT
# block a specific mac on wan
#config rule
# option dest wan
# option src_mac 00:11:22:33:44:66
# option target REJECT
# block incoming ICMP traffic on a zone
#config rule
# option src lan
# option proto ICMP
# option target DROP
# port redirect port coming in on wan to lan
#config redirect
# option src wan
# option src_dport 80
# option dest lan
# option dest_ip 192.168.16.235
# option dest_port 80
# option proto tcp
### FULL CONFIG SECTIONS
#config rule
# option src lan
# option src_ip 192.168.45.2
# option src_mac 00:11:22:33:44:55
# option src_port 80
# option dest wan
# option dest_ip 194.25.2.129
# option dest_port 120
# option proto tcp
# option target REJECT
#config redirect
# option src lan
# option src_ip 192.168.45.2
# option src_mac 00:11:22:33:44:55
# option src_port 1024
# option src_dport 80
# option dest_ip 194.25.2.129
# option dest_port 120
# option proto tcp
root@kliciok:~#cat /etc/firewall.user
root@kliciok:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
iptables -I FORWARD -j ACCEPTroot@kliciok:~#route print
ipconfigping 192.168.2.1
ping 192.168.2.60
ping 192.168.1.60A tu pingi z clienta. Jak widac wszystko dochodzi ladnie.
[url=http://ifotos.pl/zobacz/siec3_eqpwax.JPG/][img]http://ifotos.pl/mini/siec3_eqpwax.JPG[/img][/url]Podlanczalem na odwrot routery czyli raz AP do pc1 i ap do pc2 z tym samym efektem. Czyli cos jest nie tak na routerze. Firewalle sa wszystkie na kompach wylaczone i nawet odinstalowalem antyvirusy. Cos na 100% jest nie tak na routerze ktoryms.
APCLIENT
root@kliciok:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
iptables -I FORWARD -j ACCEPTroot@kliciok:~#a to nie błąd ? patrz ostatni wiersz tego wyżej. W jednym wierszu powinno być tylko
iptables -I FORWARD -j ACCEPTa wywal całkowicie
root@kliciok:~#restart firewalla i powinno być ok.
jak nie daj z apclient
iptables -L -v -n
cat /etc/firewall.userHmmm. Jest cos dziwnego. Jak wchodze przez putty i wpisuje komende
cat /etc/firewall.user
to pojawia sie to
root@kliciok:~# cat /etc/firewall.user
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
iptables -I FORWARD -j ACCEPTroot@kliciok:~#A jak wchodze przez winscp w ten plik to pisze normalnie tak jak powinno byc czyli
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
iptables -I FORWARD -j ACCEPTAle tak jak pokazuje sie w putty to:
iptables -I FORWARD -j ACCEPTroot@kliciok:~#To moge dalej w tej linijce pisac komendy. Tak jakby samo "root@kliciok:~#" nie przeskoczylo nizej. Jakak komenda resetuje sie firewall? PS Bedziesz moze jutro w jakichs godzinach na forum? Bo chcial bym wkoncu skonczyc to? ![]()
niedziela
/etc/init.d/firewall restart
i log z wykonania polecenia
Log z restartu
root@kliciok:~# /etc/init.d/firewall restart
Loading defaults
Loading synflood protection
Adding custom chains
Loading zones
Loading forwarding
Loading redirects
Loading rules
Loading includes
Loading zone defaults
root@kliciok:~#A tak wyglada ten plik po restarcie w winscp
#!/bin/sh /etc/rc.common
# Copyright (C) 2008 OpenWrt.org
START=45
start() {
. /lib/firewall/uci_firewall.sh
fw_init
}
stop() {
. /lib/firewall/uci_firewall.sh
fw_stop
}PS o ktorej gdzies tak jutro bedziesz na forum?
jest możliwość zalogowania zdalnego najpierw na ap a potem na apclient ? z internetu abym się dostał do ruterów
zrób jeszcze tak na apclient z putty
echo "iptables -I FORWARD -j ACCEPT" > /etc/firewall.user/etc/init.d/firewall restartpotem z apclient
iptables -L -v -nkurcze teraz gdzies sie wybieram i nie dam rady sie bawic. Wiem tyle ze po resecie firewalla nie moge z dosa juz pingowac komputerow. Przedtem moglem z AP pingowac komputer po stronie clienta a teraz juz nie moge. Napisz plus minus o ktorej godzinie mial bys jutro czas a najlepiej jak bys mial gadu gadu i mi na pw numer podal. Jak jest taka mazliwosc zebys mogl wejsc przez neta na te routery to jak najbardziej.
Log
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
9 988 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
4 872 output_rule all -- * * 0.0.0.0/0 0.0.0.0/0
4 872 output all -- * * 0.0.0.0/0 0.0.0.0/0
Chain forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_lan_forward all -- br-lan * 0.0.0.0/0 0.0.0 .0/0
0 0 zone_wan_forward all -- wlan0 * 0.0.0.0/0 0.0.0 .0/0
Chain forwarding_3g (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan (1 references)
pkts bytes target prot opt in out source destination
Chain input (1 references)
pkts bytes target prot opt in out source destination
4 872 zone_lan all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
Chain input_3g (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan (1 references)
pkts bytes target prot opt in out source destination
Chain output (1 references)
pkts bytes target prot opt in out source destination
4 872 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
0 0 zone_3g_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0 /0
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain reject (5 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_3g (0 references)
pkts bytes target prot opt in out source destination
0 0 input_3g all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_3g_REJECT all -- * * 0.0.0.0/0 0.0.0.0 /0
Chain zone_3g_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_DROP (0 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_REJECT (2 references)
pkts bytes target prot opt in out source destination
Chain zone_3g_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_3g all -- * * 0.0.0.0/0 0.0.0.0/ 0
0 0 zone_3g_REJECT all -- * * 0.0.0.0/0 0.0.0.0 /0
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
4 872 input_lan all -- * * 0.0.0.0/0 0.0.0.0/0
4 872 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
Chain zone_lan_ACCEPT (3 references)
pkts bytes target prot opt in out source destination
4 872 ACCEPT all -- br-lan * 0.0.0.0/0 0.0.0.0/0
4 872 ACCEPT all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * br-lan 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_lan_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
0 0 zone_3g_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0 /0
0 0 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0 /0
0 0 zone_lan_REJECT all -- * * 0.0.0.0/0 0.0.0. 0/0
Chain zone_wan (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
Chain zone_wan_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * wlan0 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_wan_REJECT (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * wlan0 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
0 0 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0 /0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0. 0/0
root@kliciok:~#to nie jest pełny log
daj z
iptables -L FORWARD -v -nlog
root@kliciok:~# iptables -L FORWARD -v -n
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 forwarding_rule all -- * * 0.0.0.0/0 0.0.00/0
0 0 forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
root@kliciok:~#Co dalej zrobic po tym logu? Narazie nie mam jak sprawdzic czy dziala bo nie mam 2 kompa w domu ale jak cos do kumpla podejde i sie sprawdzi. Chociaz po resecie raczej dzialac nie bedzie.
A czy mogl bys mi skopiowac twoje ustawienia z firewala z clienta i AP? Moze bym poprostu takie same wpisal jak ty i by dzialalo?
dla mnie wygląda na ok. wszystko ok. bez błędów.
bez dostania się do routerów nic nie wymyślę.
w tym momencie masz internet z modemu .... ?
modem przydziela adresy z zakresu .... ?
Hmmm po resecie jest dalej to co bylo. Z komputera podlaczonego do clienta dalej nie moge pingowac do kompa podlanczonego do ap.(komp 192.168.1.45 -> 192.168.1.60 -> 192.168.2.1 -> komp 192.168.2.44) Mieszalem cos w luci i w firewallu dalem wszystko na accept ale nic to nie dalo. Powiedz mi taka rzecz. Meszkasz gdzies w okolicach krakowa? Jak tak to bym podjechal do ciebie z tymi tp-linkami i zaplacil bym cos za to zebys to skonfigurowal bo mne juz to dobija. A co do zakresu IP to moge ci podac nr ip ale wolal bym nie na forum bo zbyt wiele osob by moglo zaczac sie bawic tym. Jak cos to podaj email to wysle. A jak jestes z krakowa lub okolic to wolal bym podjechac i dac kase bo mnie juz to dobija naprawde.
odezwij sie na rpc[at]rpc.one.pl
Tam gdzie jest to "at" rozumiem ze ma byc "@"? Przeczytalem cos o oprogramowaniu DD-wrt. Widze ze jest wersja na tego tplinka. Moze na nim sprobuje sie polaczyc? Co ty na to? Moze jest latwiejszy w skonfigurowaniu? Sprawdzales go kiedys moze Rafał? Powiedz mi co to tak na chlopski rozum jest ten tryb WDS? I przez niego niby jak sie polacze bede mial ip na cliencie i na ap z tego samego zakresu?
Siec juz dziala. Dzis sie bawilem i sie lacza normalnie i moge wchodzic na na udostepnione rzeczy miedzy 2 komputerami.
Internet juz skonfigurowalem tak ze dziala juz moj internet przez pppoe w sieci. Co do internetu z neostrady to nie wiem czy dziala bo nie wiem jak to sprawdzic ale kolega zrobil tak jak to napisales Rafal czyli
Co do konfiguracji livebox
Należy dodać trasę statyczna do routera livebox
Logujesz się do konfiguracji livebox na 192.168.1.1 potem
Konfiguracja zaawansowana -> Sieć -> Konfiguracja routingu(konfiguracja tras).
patrz na zdjęcie
http://yfrog.com/0e731249389268j
Uzupełniasz pola:
Identyfikator sieci docelowej: 192.168.2.0
Maska podsieci docelowej: 255.255.255.0
IP następnego przeskoku: 192.168.1.60
Potem klikasz "Dodaj"
i trasa powinna zostać dodana do listy poniżej
zapisujesz wprowadzone zmiany i to wszystko.. Mam jeszcze problem z polaczeniem. Siec dziala zbyt wolno. Kopiowanie przez siec filmu zajmuje jakies 30 min a to tylko 700mb jest. Predkosc kopiowania to okolo 1mb i mniej. Cos jest nie tak z wifi chyba jeszcze.
Strony Poprzednia 1 2 3 4
Zaloguj się lub zarejestruj by napisać odpowiedź
eko.one.pl → Oprogramowanie / Software → Tryb AP i AP Client na WR1043ND jak skonfigurowac?
Forum oparte o PunBB, wspierane przez Informer Technologies, Inc