1 (edytowany przez roblad 2013-10-12 09:31:28)

Temat: Routing pomiedzy LAN a WAN2 - zasoby LAN niewidoczne

Witam,

Mam prosbe o pomoc, mam 2 WANy na routerze WAN i WAN2. Chcialbym polaczyc mozliwosc dostepu do zasobow lokalnych routera
LAN tego routera to 192.168.100.0/255.255.255.0 tam wchodzi WAN 10.0.0.155 ale tez WAN2 192.168.200.100 GW 192.168.200.1.

WAN2 jest wpiety poprzez router posredniczacy, do ktorego mozna sie polaczyc po wifi LAN 192.168.200.0. W sieci routera LAN
(na ktory wchodzi WAN2 - 192.168.200.100) 192.168.100.0 mam drukarke pod adresem 192.168.100.109.

Chcialbym aby po podlaczeniu do wifi do routera z siecia LAN 192.168.200.0 byly widoczne zasoby z routera gdzie wchodzi WAN2 o adresie sieci
192.168.100.0. Resumujac siec 192.168.200.0 jest WAN2 w routerze z LAN 192.168.100.0 i ni jak po konfiguracji firewala na routerze z siecia
192.168.100.0 oraz robienia forwardow WAN2 > LAN nie jest to widoczne.

http://fotoo.pl/show.php?img=630668_roz … d.jpg.html

patrzac na powyzszy rysunek po podlaczeniu sie do wifi routera xx chcialbym widziec zasoby LAN routera yy. W 2 strone to dziala czyli jak jestem na routerze yy to moge dostac sie do zasobow LAN routera xx.

2

Odp: Routing pomiedzy LAN a WAN2 - zasoby LAN niewidoczne

Czy ktos ma pomysl jak to ustawic ?

3 (edytowany przez snifer 2013-10-12 19:53:49)

Odp: Routing pomiedzy LAN a WAN2 - zasoby LAN niewidoczne

Na ruterze, tym z lan 192.168.200.1 musisz dopisać statyczny ruting do klasy 192.168.100.0/24, jako bramę wskazać adres WAN2 tego rutera z klasą 100.0 (tutaj masz chyba 192.168.200.100).
Na pierwszym masz nata na WAN2 więc w drugą stronę działa (192.168.100.0>192.168.200.0) a żeby działało w tę co chcesz to kompy w puli 192.168.200.0 muszą wiedzieć gdzie patrzeć.
Możesz to wyklikać jak masz jakieś www (luci czy garogyle a nawet w fabrycznym się powinno dać), jak masz czyste OpenWRT to możesz dopisać w /etc/config/network

route
    option target '192.168.100.0'
    option netmask '255.255.255.0'
    option gateway '192.168.200.100'

Ten sposób zadziała przy założeniu że kompy które wbijają się na wifi mają bramę ustawioną na 192.168.200.1

Archer C7 v.2 + LEDE by Cezary http://beta.speedtest.net/pl/result/6621599402

4 (edytowany przez roblad 2013-10-13 00:36:52)

Odp: Routing pomiedzy LAN a WAN2 - zasoby LAN niewidoczne

Cos nie bardzo na tym routerze xx zrobilem po ciezkich akcjach (TENDA -zmiana poprzez wyexportowanie konfiguracji - backup i dopisanie wsekcji static route statycznego routingu - ale zadzialalo)

mam taka tabele:

Destination IP           Subnet Mask              Gateway               Metric   Interface
239.255.255.250          255.255.255.255     0.0.0.0                         0     br0
xxx.xxx.xxx.xxx          255.255.255.224     0.0.0.0                         0         eth2.2
192.168.100.0          255.255.255.0     192.168.200.100     0     br0
192.168.200.0          255.255.255.0      0.0.0.0                         0            br0
0.0.0.0                          0.0.0.0                      xxx.xxx.xxx.xxx         0      eth2.2

Druga strona jest taka:

Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.0.0.1        0.0.0.0         UG    10     0        0 eth0.2
0.0.0.0         192.168.200.1   0.0.0.0         UG    20     0        0 eth0.3
0.0.0.0         10.64.64.64     0.0.0.0         UG    30     0        0 3g-wan3
10.0.0.0        0.0.0.0         255.255.255.0   U     10     0        0 eth0.2
10.8.0.0        0.0.0.0         255.255.255.0   U     0      0        0 tun0
10.64.64.64     0.0.0.0         255.255.255.255 UH    0      0        0 3g-wan3
192.168.100.0   0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.200.0   0.0.0.0         255.255.255.0   U     20     0        0 eth0.3


no i nie widac z xx LAN na yy


moze cos na firewalu trzeba przestawic albo jeszcze jakis routing dodac

Z sieci 192.168.200.0 moge sie tylko pingowac na 192.168.100.100 inne adresy sa niewidoczne zadna usluga na 192.168.100.100 nie jest dostepna 80/443 porty


moj firewal

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        option network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option conntrack '1'

config zone
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan wan2 wan3'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config zone
        option name 'wan2'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan2'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan2'

config zone
        option name 'wan3'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan3'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan3'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-Ping'
        option src 'wan2'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-Ping'
        option src 'wan3'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fe80::/10'
        option src_port '547'
        option dest_ip 'fe80::/10'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config include
        option path '/etc/firewall.user'

config include
        option path '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'

config include 'openvpn_include_file'
        option path '/etc/openvpn.firewall'
        option reload '1'

config include 'miniupnpd'
        option type 'script'
        option path '/usr/share/miniupnpd/firewall.include'
        option family 'IPv4'
        option reload '1'

config zone 'vpn_zone'
        option name 'vpn'
        option network 'vpn'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        option mtu_fix '1'
        option masq '1'

config forwarding 'vpn_lan_forwarding'
        option src 'lan'
        option dest 'vpn'

config remote_accept 'ra_openvpn'
        option zone 'wan'
        option local_port '8086'
        option remote_port '8086'
        option proto 'udp'

config forwarding 'vpn_wan_forwarding'
        option src 'vpn'
        option dest 'wan'

config remote_accept 'ra_443_8085'
        option local_port '443'
        option remote_port '8085'
        option proto 'tcp'
        option zone 'wan'

nmap

Starting Nmap 6.40 ( http://nmap.org ) at 2013-10-13 00:26 CEST
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 00:26
Scanning 192.168.100.100 [4 ports]
Completed Ping Scan at 00:26, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 00:26
Completed Parallel DNS resolution of 1 host. at 00:26, 13.00s elapsed
Initiating SYN Stealth Scan at 00:26
Scanning 192.168.100.100 [1000 ports]
Increasing send delay for 192.168.100.100 from 0 to 5 due to 35 out of 86 dropped probes since last increase.
Increasing send delay for 192.168.100.100 from 5 to 10 due to 15 out of 36 dropped probes since last increase.
Completed SYN Stealth Scan at 00:27, 38.14s elapsed (1000 total ports)
Initiating Service scan at 00:27
Initiating OS detection (try #1) against 192.168.100.100
Retrying OS detection (try #2) against 192.168.100.100
Initiating Traceroute at 00:27
Completed Traceroute at 00:27, 0.01s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 00:27
Completed Parallel DNS resolution of 2 hosts. at 00:27, 13.00s elapsed
NSE: Script scanning 192.168.100.100.
Initiating NSE at 00:27
Completed NSE at 00:27, 0.00s elapsed
Nmap scan report for 192.168.100.100
Host is up (0.0023s latency).
All 1000 scanned ports on 192.168.100.100 are closed
Too many fingerprints match this host to give specific OS details
Network Distance: 2 hops

TRACEROUTE (using port 3306/tcp)
HOP RTT     ADDRESS
1   7.82 ms 192.168.200.1
2   4.69 ms 192.168.100.100

NSE: Script Post-scanning.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 67.53 seconds
           Raw packets sent: 2009 (89.512KB) | Rcvd: 1032 (42.804KB)

Po zmianie w zone wan2

        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'

zobaczylem port https na ktorym mam forward zrobiony na wan do widzenia na zewnatrz

wydaje mi sie ze role w firewalu dla zone wan jest nadpisana dla wan2

config zone
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan wan2 wan3'    <<<<< to jest chyba problemem, ale jak to obejsc jak sie chce miec openvpn i mwana3
        option conntrack '1'

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        option network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option conntrack '1'

config zone
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan wan2 wan3'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config zone
        option name 'wan2'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan2'
        option conntrack '1'

w firewalu gdzies jest problem bo jak zmienilem

w zonie

        option network 'wan wan2 wan3'
        option network 'wan  wan3'

to zaczelo forwardowac pakiety

Ktos moze pomoc w prawidlowej konfiguracji firewala ?

czy jak zostawie
    option network 'wan  wan3'
w zonie 'wan'

to wszystko mi bedize dzialac prawidlowo z uslugami czy gdzies cos nie zglupieje ?

5

Odp: Routing pomiedzy LAN a WAN2 - zasoby LAN niewidoczne

Ostatecznie wybralem rozwiazanie gdzie dziala mwan3 i openvpn
WAN2 i tak mam za innym wirewalem z routera xx wiec dalem imput ACCEPT

Dodalem jeszcze role dot VPN

  * Forward 'lan' -> 'wan'
   * Forward 'lan' -> 'wan2'
   * Forward 'lan' -> 'wan3'
   * Forward 'lan' -> 'vpn'
   * Forward 'vpn' -> 'wan'
   * Forward 'vpn' -> 'wan2'


trzeba bylo jeszcze powielic forward portow tak jak dla wan to tez na wan2


moj konfig firewala wyglada tak

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        option network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option conntrack '1'

config zone
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan wan3'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config zone
        option name 'wan2'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan2'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan2'

config zone
        option name 'wan3'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option network 'wan3'
        option conntrack '1'

config forwarding
        option src 'lan'
        option dest 'wan3'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-Ping'
        option src 'wan2'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-Ping'
        option src 'wan3'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fe80::/10'
        option src_port '547'
        option dest_ip 'fe80::/10'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config include
        option path '/etc/firewall.user'

config include
        option path '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'

config include 'openvpn_include_file'
        option path '/etc/openvpn.firewall'
        option reload '1'

config include 'miniupnpd'
        option type 'script'
        option path '/usr/share/miniupnpd/firewall.include'
        option family 'IPv4'
        option reload '1'

config zone 'vpn_zone'
        option name 'vpn'
        option network 'vpn'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        option mtu_fix '1'
        option masq '1'

config forwarding 'vpn_lan_forwarding'
        option src 'lan'
        option dest 'vpn'

config remote_accept 'ra_openvpn'
        option zone 'wan'
        option local_port '8086'
        option remote_port '8086'
        option proto 'udp'

config remote_accept 'ra_openvpn_2'       
        option zone 'wan2'                  
        option local_port '8086'
        option remote_port '8086'    
        option proto 'udp'   

config forwarding 'vpn_wan_forwarding'
        option src 'vpn'
        option dest 'wan'

config forwarding 'vpn_wan2_forwarding'      
        option src 'vpn'       
        option dest 'wan2'   
        
config remote_accept 'ra_443_8085'
        option local_port '443'
        option remote_port '8085'
        option proto 'tcp'
        option zone 'wan'

                                                
config remote_accept 'ra_443_8085_wan2'     
        option local_port '443'        
        option remote_port '8085'      
        option proto 'tcp'        
        option zone 'wan2' 

i smiga

A co do routerow TENDA czy PENTAGRAM

to jest tam wiele ciekawych opcji po wyexportowaniu ustawien tworzy sie plik

RouterCfm.cfg

w ktorym mozna nawet ustawic sobie opcje klienta wifi

jest opcja do ustawienia serwera czasu, szereg blokad oraz parametry radia

ja sobie dodalem trase statyczna i zaczytalem to spowrotem do routera

#The following line must not be removed.
Default
WebInit=en
HostName=Pent
Login=admin
Password=admin
OperationMode=1
Platform=RT3052
wanConnectionMode=DHCP
wan_ipaddr=0.0.0.0
wan_netmask=0.0.0.0
wan_gateway=0.0.0.0
wan_primary_dns=208.67.222.222
wan_secondary_dns=208.67.222.220
wan_pppoe_user=pppoe_user
wan_pppoe_pass=pppoe_passwd
wan_pppoe_mtu=1460
wan_pppoe_mru=1460
wan_l2tp_server=l2tp_server
wan_l2tp_user=l2tp_user
wan_l2tp_pass=l2tp_passwd
wan_l2tp_mode=1
wan_l2tp_ip=0.0.0.0
wan_l2tp_netmask=0.0.0.0
wan_l2tp_gateway=0.0.0.0
wan_pptp_server=pptp_server
wan_pptp_user=pptp_user
wan_pptp_pass=pptp_passwd
wan_pptp_mtu=1478
wan_pptp_mode=0
wan_pptp_ip=192.168.1.1
TZ=13
TZSel=26
NTPServerIP=
NTPSync=
DDNSProvider=0
DDNS=
DDNSAccount=
DDNSPassword=
CountryRegion=1
CountryRegionABand=7
CountryCode=CN     <<< to jest ciekawe bo mamy najwieksza moz i dmucha radiem jak trzeba
BssidNum=1
SSID1=robert_private_2_net_tel
WirelessMode=9
TxRate=0
Channel=2
BasicRate=15
BeaconPeriod=50
DtimPeriod=1
TxPower=100
DisableOLBC=0
BGProtection=0
TxAntenna=
RxAntenna=
TxPreamble=0
RTSThreshold=2347
FragThreshold=2346
TxBurst=0
PktAggregate=0
TurboRate=0
WmmCapable=0
APAifsn=3;7;1;1
APCwmin=4;4;3;2
APCwmax=6;10;4;3
APTxop=0;0;94;47
APACM=0;0;0;0
BSSAifsn=3;7;2;2
BSSCwmin=4;4;3;2
BSSCwmax=10;10;4;3
BSSTxop=0;0;94;47
BSSACM=0;0;0;0
AckPolicy=0;0;0;0
APSDCapable=0
DLSCapable=0
NoForwarding=0
NoForwardingBTNBSSID=0
HideSSID=0
ShortSlot=0
AutoChannelSelect=0
SecurityMode=0
VLANEnable=0
VLANName=
VLANID=0
VLANPriority=0
WscConfMode=0
WscConfStatus=2
WscAKMP=1
WscConfigured=0
WscModeOption=0
WscActionIndex=9
WscPinCode=
WscRegResult=1
WscUseUPnP=1
WscUseUFD=0
WscSSID=RalinkInitialAP
WscKeyMGMT=WPA-EAP
WscConfigMethod=138
HT_HTC=1
HT_RDG=1
HT_LinkAdapt=0
HT_OpMode=0
HT_MpduDensity=5
HT_EXTCHA=6
HT_BW=1
HT_AutoBA=1
HT_BADecline=0
HT_AMSDU=1
HT_BAWinSize=64
HT_GI=1
HT_STBC=1
HT_MCS=33
HT_PROTECT=1
HT_MIMOPS=3
HT_40MHZ_INTOLERANT=0
HT_TxStream=2
HT_RxStream=2
NintendoCapable=0
AccessPolicy0=0
AccessControlList0=
AccessPolicy1=0
AccessControlList1=
AccessPolicy2=0
AccessControlList2=
AccessPolicy3=0
AccessControlList3=
WdsEnable=0
WdsEncrypType=NONE
WdsList=
WdsKey=
WirelessEvent=0
RADIUS_Server=0
RADIUS_Port=1812
RADIUS_Key=
RADIUS_Acct_Server=
RADIUS_Acct_Port=1813
RADIUS_Acct_Key=
session_timeout_interval=3600
idle_timeout_interval=0
staWirelessMode=9
SinglePortFW1=
static_route_0=192.168.100.0;255.255.255.0;192.168.200.100
static_route_1=
static_route_2=
static_route_3=
static_route_4=
static_route_5=
static_route_6=
static_route_7=
static_route_8=
static_route_9=
static_route_10=
static_route_11=
static_route_12=
static_route_13=
static_route_14=
static_route_15=
wan_l2tp_mtu=1460
wan_l2tp_wip=
wan_l2tp_wmask=
wan_l2tp_wgw=
TimeMode=1
AcessPolicy=2
AccessControlList=
SSID2=
WPAPSK2=
Key1Str2=
Key2Str2=
Key3Str2=
Key4Str2=
own_ip_addr=192.168.200.1
EAPifname=br0
PreAuthifname=br0
macCloneEnabled=0
macCloneMac=
pptpMPPE=0
dynamicMTU=1500
staticMTU=1500
TendaVer=6
upnpEnabled=0
pppoeREnabled=0
dhcpStatic1=
dhcpStatic2=
dhcpStatic3=
dhcpipmacbind=0
dhcpipmaclist=
wan_1x_name=
wan_1x_pass=
x1AdrMode=1
x1_Mtu=1500
sta_ssid=
sta_mac=
sta_channel=6
sta_sec=3
sta_pass=
sta_wpaAlgorithms=1
sta_wep_key_index=4
sta_wep_mode=0
sta_wep_key_fmt=1
sta_wep_key_1=
sta_wep_key_2=
sta_wep_key_3=
sta_wep_key_4=
tc_enable=0
tc_isp_uprate=512
tc_isp_downrate=2048
tc_list_1=
tc_list_2=
tc_list_3=
tc_list_4=
tc_list_5=
tc_list_6=
tc_list_7=
tc_list_8=
tc_list_9=
tc_list_10=
tc_list_11=
tc_list_12=
tc_list_13=
tc_list_14=
tc_list_15=
tc_list_16=
tc_list_17=
tc_list_18=
tc_list_19=
tc_list_20=
pt_enable=0
pt_list_1=
pt_list_2=
pt_list_3=
pt_list_4=
pt_list_5=
pt_list_6=
pt_list_7=
pt_list_8=
pt_list_9=
pt_list_10=
nat_alg=11111
fmg_enable_manage=0
fmg_email_enable=0
fmg_email_smtpServer=
fmg_email_fromAddress=
fmg_email_toAddress=
fmg_email_userName=
fmg_email_password=
fmg_email_sendTime=60
fmg_email_issendByTime=0
fmg_email_issendByNum=1
fmg_email_sendNum=200
WirelessEnable=1
ApClinetEnable=0
NetAccountEnable=0
wwan_disable_nat=0
DHCP_plus_Name=
DHCP_plus_Pwd=
wpsMode=0
HT_DisallowTKIP=1