Odp: 2 byczki w firmware :)
uci show firewall - to jest polecenie które masz wpisać w konsoli.
Nie jesteś zalogowany. Proszę się zalogować lub zarejestrować.
eko.one.pl → Oprogramowanie / Software → 2 byczki w firmware :)
Strony Poprzednia 1 2 3 4
Zaloguj się lub zarejestruj by napisać odpowiedź
uci show firewall - to jest polecenie które masz wpisać w konsoli.
Przed restartem routera :
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable pack et-too-big time-exceeded bad-header unknown-header-type router-solicitation neig hbour-solicitation router-advertisement neighbour-advertisement
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable pack et-too-big time-exceeded bad-header unknown-header-type
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.fir ewall
firewall.openvpn_include_file=include
firewall.openvpn_include_file.path=/etc/openvpn.firewall
firewall.tor_include_file=include
firewall.tor_include_file.path=/etc/tor.firewall
firewall.redirect_enabled_number_0=redirect
firewall.redirect_enabled_number_0.name=serwer
firewall.redirect_enabled_number_0.src=wan
firewall.redirect_enabled_number_0.dest=lan
firewall.redirect_enabled_number_0.proto=tcp
firewall.redirect_enabled_number_0.src_dport=3389
firewall.redirect_enabled_number_0.dest_ip=192.168.2.10
firewall.redirect_enabled_number_0.dest_port=3389
firewall.redirect_enabled_number_1=redirect
firewall.redirect_enabled_number_1.name=serwer
firewall.redirect_enabled_number_1.src=wan
firewall.redirect_enabled_number_1.dest=lan
firewall.redirect_enabled_number_1.proto=udp
firewall.redirect_enabled_number_1.src_dport=3389
firewall.redirect_enabled_number_1.dest_ip=192.168.2.10
firewall.redirect_enabled_number_1.dest_port=3389
firewall.redirect_enabled_number_2=redirect
firewall.redirect_enabled_number_2.name=renata
firewall.redirect_enabled_number_2.src=wan
firewall.redirect_enabled_number_2.dest=lan
firewall.redirect_enabled_number_2.proto=tcp
firewall.redirect_enabled_number_2.src_dport=3390
firewall.redirect_enabled_number_2.dest_ip=192.168.2.24
firewall.redirect_enabled_number_2.dest_port=3390
firewall.redirect_enabled_number_3=redirect
firewall.redirect_enabled_number_3.name=renata
firewall.redirect_enabled_number_3.src=wan
firewall.redirect_enabled_number_3.dest=lan
firewall.redirect_enabled_number_3.proto=udp
firewall.redirect_enabled_number_3.src_dport=3390
firewall.redirect_enabled_number_3.dest_ip=192.168.2.24
firewall.redirect_enabled_number_3.dest_port=3390
firewall.redirect_enabled_number_4=redirect
firewall.redirect_enabled_number_4.name=beata
firewall.redirect_enabled_number_4.src=wan
firewall.redirect_enabled_number_4.dest=lan
firewall.redirect_enabled_number_4.proto=tcp
firewall.redirect_enabled_number_4.src_dport=3391
firewall.redirect_enabled_number_4.dest_ip=192.168.2.23
firewall.redirect_enabled_number_4.dest_port=3391
firewall.redirect_enabled_number_5=redirect
firewall.redirect_enabled_number_5.name=beata
firewall.redirect_enabled_number_5.src=wan
firewall.redirect_enabled_number_5.dest=lan
firewall.redirect_enabled_number_5.proto=udp
firewall.redirect_enabled_number_5.src_dport=3391
firewall.redirect_enabled_number_5.dest_ip=192.168.2.23
firewall.redirect_enabled_number_5.dest_port=3391
firewall.redirect_enabled_number_6=redirect
firewall.redirect_enabled_number_6.name=mamcia
firewall.redirect_enabled_number_6.src=wan
firewall.redirect_enabled_number_6.dest=lan
firewall.redirect_enabled_number_6.proto=tcp
firewall.redirect_enabled_number_6.src_dport=3392
firewall.redirect_enabled_number_6.dest_ip=192.168.2.21
firewall.redirect_enabled_number_6.dest_port=3392
firewall.redirect_enabled_number_7=redirect
firewall.redirect_enabled_number_7.name=mamcia
firewall.redirect_enabled_number_7.src=wan
firewall.redirect_enabled_number_7.dest=lan
firewall.redirect_enabled_number_7.proto=udp
firewall.redirect_enabled_number_7.src_dport=3392
firewall.redirect_enabled_number_7.dest_ip=192.168.2.21
firewall.redirect_enabled_number_7.dest_port=3392
firewall.redirect_enabled_number_8=redirect
firewall.redirect_enabled_number_8.name=teresa
firewall.redirect_enabled_number_8.src=wan
firewall.redirect_enabled_number_8.dest=lan
firewall.redirect_enabled_number_8.proto=tcp
firewall.redirect_enabled_number_8.src_dport=3393
firewall.redirect_enabled_number_8.dest_ip=192.168.2.22
firewall.redirect_enabled_number_8.dest_port=3393
firewall.redirect_enabled_number_9=redirect
firewall.redirect_enabled_number_9.name=teresa
firewall.redirect_enabled_number_9.src=wan
firewall.redirect_enabled_number_9.dest=lan
firewall.redirect_enabled_number_9.proto=udp
firewall.redirect_enabled_number_9.src_dport=3393
firewall.redirect_enabled_number_9.dest_ip=192.168.2.22
firewall.redirect_enabled_number_9.dest_port=3393
firewall.redirect_enabled_number_10=redirect
firewall.redirect_enabled_number_10.name=aga
firewall.redirect_enabled_number_10.src=wan
firewall.redirect_enabled_number_10.dest=lan
firewall.redirect_enabled_number_10.proto=tcp
firewall.redirect_enabled_number_10.src_dport=3395
firewall.redirect_enabled_number_10.dest_ip=192.168.2.99
firewall.redirect_enabled_number_10.dest_port=3395
firewall.redirect_enabled_number_11=redirect
firewall.redirect_enabled_number_11.name=aga
firewall.redirect_enabled_number_11.src=wan
firewall.redirect_enabled_number_11.dest=lan
firewall.redirect_enabled_number_11.proto=udp
firewall.redirect_enabled_number_11.src_dport=3395
firewall.redirect_enabled_number_11.dest_ip=192.168.2.99
firewall.redirect_enabled_number_11.dest_port=3395
firewall.redirect_enabled_number_12=redirect
firewall.redirect_enabled_number_12.name=monika
firewall.redirect_enabled_number_12.src=wan
firewall.redirect_enabled_number_12.dest=lan
firewall.redirect_enabled_number_12.proto=tcp
firewall.redirect_enabled_number_12.src_dport=3394
firewall.redirect_enabled_number_12.dest_ip=192.168.2.26
firewall.redirect_enabled_number_12.dest_port=3394
firewall.redirect_enabled_number_13=redirect
firewall.redirect_enabled_number_13.name=monika
firewall.redirect_enabled_number_13.src=wan
firewall.redirect_enabled_number_13.dest=lan
firewall.redirect_enabled_number_13.proto=udp
firewall.redirect_enabled_number_13.src_dport=3394
firewall.redirect_enabled_number_13.dest_ip=192.168.2.26
firewall.redirect_enabled_number_13.dest_port=3394
firewall.redirect_enabled_number_14=redirect
firewall.redirect_enabled_number_14.name=joanna
firewall.redirect_enabled_number_14.src=wan
firewall.redirect_enabled_number_14.dest=lan
firewall.redirect_enabled_number_14.proto=tcp
firewall.redirect_enabled_number_14.src_dport=3396
firewall.redirect_enabled_number_14.dest_ip=192.168.2.25
firewall.redirect_enabled_number_14.dest_port=3396
firewall.redirect_enabled_number_15=redirect
firewall.redirect_enabled_number_15.name=joanna
firewall.redirect_enabled_number_15.src=wan
firewall.redirect_enabled_number_15.dest=lan
firewall.redirect_enabled_number_15.proto=udp
firewall.redirect_enabled_number_15.src_dport=3396
firewall.redirect_enabled_number_15.dest_ip=192.168.2.25
firewall.redirect_enabled_number_15.dest_port=3396
firewall.redirect_enabled_number_16=redirect
firewall.redirect_enabled_number_16.name=backup
firewall.redirect_enabled_number_16.src=wan
firewall.redirect_enabled_number_16.dest=lan
firewall.redirect_enabled_number_16.proto=tcp
firewall.redirect_enabled_number_16.src_dport=5000
firewall.redirect_enabled_number_16.dest_ip=192.168.2.7
firewall.redirect_enabled_number_16.dest_port=5000
firewall.redirect_enabled_number_17=redirect
firewall.redirect_enabled_number_17.name=backup
firewall.redirect_enabled_number_17.src=wan
firewall.redirect_enabled_number_17.dest=lan
firewall.redirect_enabled_number_17.proto=udp
firewall.redirect_enabled_number_17.src_dport=5000
firewall.redirect_enabled_number_17.dest_ip=192.168.2.7
firewall.redirect_enabled_number_17.dest_port=5000
firewall.miniupnpd=include
firewall.miniupnpd.type=script
firewall.miniupnpd.path=/usr/share/miniupnpd/firewall.include
firewall.miniupnpd.family=IPv4
firewall.miniupnpd.reload=1
firewall.ra_443_443=remote_accept
firewall.ra_443_443.local_port=443
firewall.ra_443_443.remote_port=443
firewall.ra_443_443.proto=tcp
firewall.ra_443_443.zone=wan
firewall.ra_80_9090=remote_accept
firewall.ra_80_9090.local_port=80
firewall.ra_80_9090.remote_port=9090
firewall.ra_80_9090.proto=tcp
firewall.ra_80_9090.zone=wan
firewall.ra_22_2222=remote_accept
firewall.ra_22_2222.local_port=22
firewall.ra_22_2222.remote_port=2222
firewall.ra_22_2222.proto=tcp
firewall.ra_22_2222.zone=wan
Po restarcie:
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type router-solicitation neighbour-solicitation router-advertisement neighbour-advertisement
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall
firewall.openvpn_include_file=include
firewall.openvpn_include_file.path=/etc/openvpn.firewall
firewall.tor_include_file=include
firewall.tor_include_file.path=/etc/tor.firewall
firewall.redirect_enabled_number_0=redirect
firewall.redirect_enabled_number_0.name=serwer
firewall.redirect_enabled_number_0.src=wan
firewall.redirect_enabled_number_0.dest=lan
firewall.redirect_enabled_number_0.proto=tcp
firewall.redirect_enabled_number_0.src_dport=3389
firewall.redirect_enabled_number_0.dest_ip=192.168.2.10
firewall.redirect_enabled_number_0.dest_port=3389
firewall.redirect_enabled_number_1=redirect
firewall.redirect_enabled_number_1.name=serwer
firewall.redirect_enabled_number_1.src=wan
firewall.redirect_enabled_number_1.dest=lan
firewall.redirect_enabled_number_1.proto=udp
firewall.redirect_enabled_number_1.src_dport=3389
firewall.redirect_enabled_number_1.dest_ip=192.168.2.10
firewall.redirect_enabled_number_1.dest_port=3389
firewall.redirect_enabled_number_2=redirect
firewall.redirect_enabled_number_2.name=renata
firewall.redirect_enabled_number_2.src=wan
firewall.redirect_enabled_number_2.dest=lan
firewall.redirect_enabled_number_2.proto=tcp
firewall.redirect_enabled_number_2.src_dport=3390
firewall.redirect_enabled_number_2.dest_ip=192.168.2.24
firewall.redirect_enabled_number_2.dest_port=3390
firewall.redirect_enabled_number_3=redirect
firewall.redirect_enabled_number_3.name=renata
firewall.redirect_enabled_number_3.src=wan
firewall.redirect_enabled_number_3.dest=lan
firewall.redirect_enabled_number_3.proto=udp
firewall.redirect_enabled_number_3.src_dport=3390
firewall.redirect_enabled_number_3.dest_ip=192.168.2.24
firewall.redirect_enabled_number_3.dest_port=3390
firewall.redirect_enabled_number_4=redirect
firewall.redirect_enabled_number_4.name=beata
firewall.redirect_enabled_number_4.src=wan
firewall.redirect_enabled_number_4.dest=lan
firewall.redirect_enabled_number_4.proto=tcp
firewall.redirect_enabled_number_4.src_dport=3391
firewall.redirect_enabled_number_4.dest_ip=192.168.2.23
firewall.redirect_enabled_number_4.dest_port=3391
firewall.redirect_enabled_number_5=redirect
firewall.redirect_enabled_number_5.name=beata
firewall.redirect_enabled_number_5.src=wan
firewall.redirect_enabled_number_5.dest=lan
firewall.redirect_enabled_number_5.proto=udp
firewall.redirect_enabled_number_5.src_dport=3391
firewall.redirect_enabled_number_5.dest_ip=192.168.2.23
firewall.redirect_enabled_number_5.dest_port=3391
firewall.redirect_enabled_number_6=redirect
firewall.redirect_enabled_number_6.name=mamcia
firewall.redirect_enabled_number_6.src=wan
firewall.redirect_enabled_number_6.dest=lan
firewall.redirect_enabled_number_6.proto=tcp
firewall.redirect_enabled_number_6.src_dport=3392
firewall.redirect_enabled_number_6.dest_ip=192.168.2.21
firewall.redirect_enabled_number_6.dest_port=3392
firewall.redirect_enabled_number_7=redirect
firewall.redirect_enabled_number_7.name=mamcia
firewall.redirect_enabled_number_7.src=wan
firewall.redirect_enabled_number_7.dest=lan
firewall.redirect_enabled_number_7.proto=udp
firewall.redirect_enabled_number_7.src_dport=3392
firewall.redirect_enabled_number_7.dest_ip=192.168.2.21
firewall.redirect_enabled_number_7.dest_port=3392
firewall.redirect_enabled_number_8=redirect
firewall.redirect_enabled_number_8.name=teresa
firewall.redirect_enabled_number_8.src=wan
firewall.redirect_enabled_number_8.dest=lan
firewall.redirect_enabled_number_8.proto=tcp
firewall.redirect_enabled_number_8.src_dport=3393
firewall.redirect_enabled_number_8.dest_ip=192.168.2.22
firewall.redirect_enabled_number_8.dest_port=3393
firewall.redirect_enabled_number_9=redirect
firewall.redirect_enabled_number_9.name=teresa
firewall.redirect_enabled_number_9.src=wan
firewall.redirect_enabled_number_9.dest=lan
firewall.redirect_enabled_number_9.proto=udp
firewall.redirect_enabled_number_9.src_dport=3393
firewall.redirect_enabled_number_9.dest_ip=192.168.2.22
firewall.redirect_enabled_number_9.dest_port=3393
firewall.redirect_enabled_number_10=redirect
firewall.redirect_enabled_number_10.name=aga
firewall.redirect_enabled_number_10.src=wan
firewall.redirect_enabled_number_10.dest=lan
firewall.redirect_enabled_number_10.proto=tcp
firewall.redirect_enabled_number_10.src_dport=3395
firewall.redirect_enabled_number_10.dest_ip=192.168.2.99
firewall.redirect_enabled_number_10.dest_port=3395
firewall.redirect_enabled_number_11=redirect
firewall.redirect_enabled_number_11.name=aga
firewall.redirect_enabled_number_11.src=wan
firewall.redirect_enabled_number_11.dest=lan
firewall.redirect_enabled_number_11.proto=udp
firewall.redirect_enabled_number_11.src_dport=3395
firewall.redirect_enabled_number_11.dest_ip=192.168.2.99
firewall.redirect_enabled_number_11.dest_port=3395
firewall.redirect_enabled_number_12=redirect
firewall.redirect_enabled_number_12.name=monika
firewall.redirect_enabled_number_12.src=wan
firewall.redirect_enabled_number_12.dest=lan
firewall.redirect_enabled_number_12.proto=tcp
firewall.redirect_enabled_number_12.src_dport=3394
firewall.redirect_enabled_number_12.dest_ip=192.168.2.26
firewall.redirect_enabled_number_12.dest_port=3394
firewall.redirect_enabled_number_13=redirect
firewall.redirect_enabled_number_13.name=monika
firewall.redirect_enabled_number_13.src=wan
firewall.redirect_enabled_number_13.dest=lan
firewall.redirect_enabled_number_13.proto=udp
firewall.redirect_enabled_number_13.src_dport=3394
firewall.redirect_enabled_number_13.dest_ip=192.168.2.26
firewall.redirect_enabled_number_13.dest_port=3394
firewall.redirect_enabled_number_14=redirect
firewall.redirect_enabled_number_14.name=joanna
firewall.redirect_enabled_number_14.src=wan
firewall.redirect_enabled_number_14.dest=lan
firewall.redirect_enabled_number_14.proto=tcp
firewall.redirect_enabled_number_14.src_dport=3396
firewall.redirect_enabled_number_14.dest_ip=192.168.2.25
firewall.redirect_enabled_number_14.dest_port=3396
firewall.redirect_enabled_number_15=redirect
firewall.redirect_enabled_number_15.name=joanna
firewall.redirect_enabled_number_15.src=wan
firewall.redirect_enabled_number_15.dest=lan
firewall.redirect_enabled_number_15.proto=udp
firewall.redirect_enabled_number_15.src_dport=3396
firewall.redirect_enabled_number_15.dest_ip=192.168.2.25
firewall.redirect_enabled_number_15.dest_port=3396
firewall.redirect_enabled_number_16=redirect
firewall.redirect_enabled_number_16.name=backup
firewall.redirect_enabled_number_16.src=wan
firewall.redirect_enabled_number_16.dest=lan
firewall.redirect_enabled_number_16.proto=tcp
firewall.redirect_enabled_number_16.src_dport=5000
firewall.redirect_enabled_number_16.dest_ip=192.168.2.7
firewall.redirect_enabled_number_16.dest_port=5000
firewall.redirect_enabled_number_17=redirect
firewall.redirect_enabled_number_17.name=backup
firewall.redirect_enabled_number_17.src=wan
firewall.redirect_enabled_number_17.dest=lan
firewall.redirect_enabled_number_17.proto=udp
firewall.redirect_enabled_number_17.src_dport=5000
firewall.redirect_enabled_number_17.dest_ip=192.168.2.7
firewall.redirect_enabled_number_17.dest_port=5000
firewall.miniupnpd=include
firewall.miniupnpd.type=script
firewall.miniupnpd.path=/usr/share/miniupnpd/firewall.include
firewall.miniupnpd.family=IPv4
firewall.miniupnpd.reload=1
firewall.ra_443_443=remote_accept
firewall.ra_443_443.local_port=443
firewall.ra_443_443.remote_port=443
firewall.ra_443_443.proto=tcp
firewall.ra_443_443.zone=wan
firewall.ra_80_9090=remote_accept
firewall.ra_80_9090.local_port=80
firewall.ra_80_9090.remote_port=9090
firewall.ra_80_9090.proto=tcp
firewall.ra_80_9090.zone=wan
firewall.ra_22_2222=remote_accept
firewall.ra_22_2222.local_port=22
firewall.ra_22_2222.remote_port=2222
firewall.ra_22_2222.proto=tcp
firewall.ra_22_2222.zone=wan
To nie jest kompletny plik firewalla z 1.5.10.11. Brakuje właśnie w nim rzeczy z którymi miałeś problem. Czemu zrobiłeś odtworzenie plików z poprzedniej wersji?
Cezary.. eee - nic nie robiłem. Po prostu sflashowałem router ze starej wersji nowym firmwarem i tyle.
Nawet nie wiem jak się robi to co mówisz
Jestem typowym userem graficznych UI. Nie bawię się w konsolę itd.
Właśnie że nie. I łatwo to udowodnić, spójrz do /rom/etc/config/firewall i przyjrzyj się jak wygląda sekcja /usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall, ma dodatkowe wpisy których ty nie masz.
Lub wgraj system na czysto, bez zachowywania konfiguracji lub odtwarzania jej z backupu i zobaczysz.
tak jest kierowniku
W weekend zapodam flasha bez zachowania konfiguracji.
Ja też dodam dwa małe byczki testowane na TL-WR841N/ND v8
1.(To już zgłaszałem dawno temu)
Pugin (init.d Manager for Gargoyle / Usługi) i bwmon_gargoyle--> autostart odznaczone-->daje stop --> zapisz zmiany
I po restarcie bwmon_gargoyle nadal sobie wesoło działa.
2.Plugin (WiFi site survey for Gargoyle / Otoczenie Wi-Fi) fajny przydatny plugin
Wszystko jest ok grafika już nie zanika jak kiedyś,tyle że on podaje stare sieci nie istniejące.
Przykładowo włączam WIFI w jakimś urządzeniu i tu ok on to widzi, następnie wyłączam a ten dalej ją uparcie widzi choć tej sieci ju od dawna brak. ( oczywiście dawałem ponownie i po 2 minutach)
Nie testowałem tego dokładnie ale wygląda na to że on sprawdza czy są nowe a stare pozostawia bez zmian.
1. Tak, i to nie jest błąd - procesy systemowe włączą bwmon przy najbliższej możliwej okazji - zapisaniu zmian, zmian w konfiguracji, restarcie itd.
2. Zgłoś do autora.
Oj Cezary ty chyba jesteś bliższy autorowi niźli ja.
Plugin jest przydatny a to tylko maleńki błąd, moim zdaniem tam powinien być label sprawdź ponownie , bez odświeżania co 2 min.
Od którejś wersji mam inny problem z routerem tl-mr3220 v1 - mianowicie po aktualizacji systemu nie wstaje WIFI. Trzeba podłączyć się kablem (a notorycznie aktualizowałem router u drugiej połówki, gdzie nie było skrętki...) i włączyć WIFI przez GUI. Duszenie przycisku mniej niż 2 sekundy nic nie daje - słychać, że router "wchodzi na obroty", mieli mieli i nic. Wifi nie uruchamia się po aktualizacji.
Nigdy się nie uruchamiało. Zarówno openwrt jak i gargoyle ma domyślnie wyłączone wifi. A duszenie przycisku świeżo po wgraniu nic nie da, bo nie ma jeszcze ustawionej konfiguracji. Jak ustawisz to będziesz mógł to przyciskiem włączyć/wyłączyć. Świeżo po wgraniu nie ma czego włączyć bo jeszcze nie jest ustawiona.
Chyba, że kolega mleczakm ma na myśli aktualizację z zachowaniem ustawień?
Odnośnie pluginu "Otoczenie WIFI" (czy jakoś tak):
Mi tam ten plugin od ver. *.10 nie działa wcale, na *.09 bywało jeszcze raz tak raz siak - raz się wczytała jakaś lista dostępnych obiektów WIFI, raz nie - wykresy tylko co któryś raz - raz od razu a raz wcale, za innym razem dopiero za którymś tam restartem routera - RAM mam dość, flash też, prędkość procka przyzwoita jak na router'y a i tak nie działa i tak - szkoda, że autor go nie rozwija wcale.
Teraz nawet po pobraniu listy skądś tam nie ma żadnej reakcji (wcześniej właśnie pobranie i wczytanie owej listy inicjowało jakieś tam, różne, jak opisałem wcześniej - wskazania) - a wgrałem przecież tym razem na czysto fw. bez zachowania ustawień.
Autor od 3 miesięcy go nie ruszył
, jest taki sam od 12 tygodni...
No to coś mi się musiało pomylić, chociaż rękę dałbym sobie uciąć że kiedyś wifi działało od początku... Dzięki za odpowiedź.
Autor od 3 miesięcy go nie ruszył
, jest taki sam od 12 tygodni...
Domyślam się tylko, że może mieć to związek z jakimiś zmianami w samym gargoyle, o których czytałem przy którejś niedawnej, wcześniejszej wersji, dotyczących większej kompatybilności dla różnych, nowych tematów/skórek - a więc zapewne coś z *js czy ajax*.
Przy pobieraniu danych (zapisywaniu) w monitorze sieci wywala błąd
500 Internal Error
Something unexpected went wrong running a CGI program.
httpd_gargoyle/1.0 14mar2008 Poprawione jest to w we wczorajszej wersji. Jak używasz starszej to zrób chmod 755 /www/*
Ok działa. Tak mam starszą wersje tj Gargoyle 1.5.10.11 (r37768)
Strony Poprzednia 1 2 3 4
Zaloguj się lub zarejestruj by napisać odpowiedź
eko.one.pl → Oprogramowanie / Software → 2 byczki w firmware :)
Forum oparte o PunBB, wspierane przez Informer Technologies, Inc