Problemă SmartTV, MirrorShare și Wired
Last Updated: May 21 2019 16:46, Started by
KyKyKyKy
, May 11 2019 16:17
·
0
#1
Posted 11 May 2019 - 16:17
Salutare!
Am un LG 43UK6200PLA conectat pe cablu la un switch. Problema intervine atunci când doresc să dublez ecranul telefonului cu acesta. Dacă îl țin conectat prin cablu, telefonul nu-l va găsi niciodată, dar pe WiFi merge fără probleme. Gateway și subnet sunt aceleași pentru ambele, iar Adresele sunt date de Kaon-ul de la RDS prin DHCP. Ce aș putea face? Nu l-aș ține pe WiFi pentru că sunt momente când Kaon-ul își reduce aproape la 0 acoperirea pe 5 GHz. |
#2
Posted 11 May 2019 - 16:25
Pai nu cumva sunt 2 retele diferite? Pe cablu merge pe 2.4 si pe Wi-Fi pe 5?
|
#3
Posted 11 May 2019 - 16:35
@kiki
Cauta in kaon AP ISOLATION (la wifi) si debifeaza. Succes! |
#4
Posted 11 May 2019 - 17:08
diahim, on 11 mai 2019 - 16:25, said:
Pai nu cumva sunt 2 retele diferite? Pe cablu merge pe 2.4 si pe Wi-Fi pe 5? Cu alte cuvinte ap isolation blocheaza traficul intre interfetele wired si wireless (in ambele directii deobicei sau particular din wlan spre lan/wlan). Se poate si ce zici tu acolo dar nu cu kaon/asus/x-link-uri/etc din supermarche sau cel putin nu cu firmware oficial si se cheama vlan-uri Edited by ogo, 11 May 2019 - 17:10. |
#5
Posted 11 May 2019 - 17:30
#6
Posted 11 May 2019 - 19:06
Eu am un Archer C2, calculator pe fir, o tableta pe wifi si un mini android pe fir - merge lacrima din calculator in ambele FTP.
Apoi, pe telefon wifi, mini android pe fir > iarasi merge OK FTP. Si telefon + tv, ambele pe wifi > merge screen cast OK. Fara nici o setare speciala nicaieri. Da, pune poze. Verifica si scrie aici adresele IP ale dispozitivelor. |
#7
Posted 11 May 2019 - 21:54
Kiki, incearca la RDS direct, sigur au drepturi elevate pentru a anula ap isolation.
SAU Daca ai acces la shell, ce output are comanda: sudo iptables -vL -t filter --line-numbers |grep "br" |
#8
Posted 11 May 2019 - 22:54
Nu știe de sudo, poate su, dar nu am încercat. am băgat direct iptables și îmi dă așa:
# iptables -vL -t filter --line-numbers |grep "br" 3 0 0 ACCEPT all -- br47 any anywhere anywher e 4 608K 67M ACCEPT all -- br0 any anywhere anywher e 2 4597K 822M ACCEPT all -- br0 any anywhere anywher e 10 0 0 ACCEPT all -- br47 any anywhere anywher e 25 557 106K ACCEPT udp -- ppp0 br0 anywhere anywher e udp dpt:isakmp 26 0 0 ACCEPT esp -- ppp0 br0 anywhere anywher e # buyonevideo, on 11 mai 2019 - 19:06, said:
Eu am un Archer C2, calculator pe fir, o tableta pe wifi si un mini android pe fir - merge lacrima din calculator in ambele FTP. Apoi, pe telefon wifi, mini android pe fir > iarasi merge OK FTP. Si telefon + tv, ambele pe wifi > merge screen cast OK. Fara nici o setare speciala nicaieri. Da, pune poze. Verifica si scrie aici adresele IP ale dispozitivelor. Încerc doar Screen Mirroring. Ambele pe Wi-Fi se văd instant, dacă e TV-ul pe cablu nu. |
#10
Posted 12 May 2019 - 00:20
KAON-RCSRDS login: admin Password: RLX Linux version 2.0 _ _ _ | | | ||_| _ _ | | _ _ | | _ ____ _ _ _ _ | |/ || |\ \/ / | || | _ \| | | |\ \/ / | |_/ | |/ \ | || | | | | |_| |/ \ |_| |_|\_/\_/ |_||_|_| |_|\____|\_/\_/ For further information check: http://processor.realtek.com/ # iptables -L --line-numbers Chain INPUT (policy DROP) num target prot opt source destination 1 CheckACL all -- anywhere anywhere 2 ACCEPT all -- anywhere anywhere state RELATED, ESTABLISHED 3 ACCEPT all -- anywhere anywhere 4 ACCEPT all -- anywhere anywhere 5 ACCEPT tcp -- anywhere 188-25-170-124.rdsnet.ro tcp dpt:8 899 6 DROP udp -- anywhere 188-25-170-124.rdsnet.ro udp dpt:1 900 7 ACCEPT icmp -- anywhere 188-25-170-124.rdsnet.ro icmp echo -request 8 ACCEPT all -- anywhere anywhere 9 ACCEPT udp -- anywhere anywhere udp dpt:5060 10 ACCEPT udp -- anywhere anywhere udp dpt:5061 Chain FORWARD (policy DROP) num target prot opt source destination 1 TCPMSS tcp -- anywhere anywhere tcp flags:SYN, RST/SYN TCPMSS clamp to PMTU 2 ACCEPT all -- anywhere anywhere 3 ACCEPT udp -- anywhere anywhere udp spt:l2tp 4 ACCEPT udp -- anywhere anywhere udp dpt:l2tp 5 ACCEPT tcp -- anywhere anywhere tcp dpt:1723 6 ACCEPT tcp -- anywhere anywhere tcp spt:1723 7 ACCEPT 47 -- anywhere anywhere 8 ACCEPT udp -- anywhere base-address.mcast.net/4 udp 9 DROP all -- anywhere anywhere state INVALID 10 ACCEPT all -- anywhere anywhere 11 ACCEPT tcp -- anywhere 192.168.1.205 tcp dpt:https 12 ACCEPT udp -- anywhere 192.168.1.205 udp dpt:https 13 ACCEPT tcp -- anywhere 192.168.1.220 tcp dpt:1967 14 ACCEPT udp -- anywhere 192.168.1.220 udp dpt:1967 15 ACCEPT tcp -- anywhere 192.168.1.220 tcp dpt:http 16 ACCEPT udp -- anywhere 192.168.1.220 udp dpt:http 17 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:1994 18 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:1994 19 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:5230 20 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:5230 21 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:8181 22 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:8181 23 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:http 24 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:http 25 ACCEPT udp -- anywhere anywhere udp dpt:isakmp 26 ACCEPT esp -- anywhere anywhere 27 ACCEPT all -- anywhere anywhere state RELATED, ESTABLISHED Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain CheckACL (1 references) num target prot opt source destination 1 ACCEPT tcp -- vinci.rdsnet.ro anywhere tcp dpt:8899 2 ACCEPT tcp -- static-10-204-0-34.rdsnet.ro anywhere tcp d pt:8899 3 ACCEPT tcp -- 81-196-12-148.rdsnet.ro anywhere tcp dpt:88 99 4 ACCEPT tcp -- network-212-54-122.rdsnet.ro/23 anywhere tc p dpt:8899 5 ACCEPT tcp -- vinci.rdsnet.ro anywhere tcp dpt:8900 6 ACCEPT tcp -- static-10-204-0-34.rdsnet.ro anywhere tcp d pt:8900 7 ACCEPT tcp -- 81-196-12-148.rdsnet.ro anywhere tcp dpt:89 00 8 ACCEPT tcp -- network-212-54-122.rdsnet.ro/23 anywhere tc p dpt:8900 9 DROP tcp -- anywhere anywhere tcp dpt:8899 10 DROP tcp -- anywhere anywhere tcp dpt:8900 11 ACCEPT all -- anywhere anywhere Chain MINIUPNPD (0 references) num target prot opt source destination 1 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:44022 2 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:5230 3 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:5230 4 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:1994 5 ACCEPT tcp -- anywhere 192.168.1.220 tcp dpt:1967 6 ACCEPT udp -- anywhere 192.168.1.220 udp dpt:1967 7 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:54301 8 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:54133 9 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:58629 10 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:55094 11 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:54723 12 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:5230 13 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:5230 14 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:1994 15 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:47156 16 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:1843 17 ACCEPT tcp -- anywhere 192.168.1.210 tcp dpt:22715 18 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:1669 19 ACCEPT udp -- anywhere 192.168.1.210 udp dpt:52273 20 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:35031 21 ACCEPT udp -- anywhere 192.168.1.5 udp dpt:44480 # |
|
#11
Posted 12 May 2019 - 02:50
erm2.
pentru ultima oara: iptables -vL -t filter --line-numbersoutput-ul trebuia sa fie mult mai detaliat la LIST, probabil ruleaza un kernel antic uname -rsi iptables si mai antice iptables -V + iwconfigdaca nu merge: /sbin/ifconfig -asau netstat -i si ip route FYG: RCS are acces deplin si neconditionat la router-ul tau (dar cam asa e cu toate echipamentele CPE controlate de ISP): chain input (toate pachetele ce vin din internet si sunt destinate exclusiv router-ului tau): regula nr 1 accepta toate regulile din chain-ul ACL (access control list) (unde sunt definite ce ip-uri/subnet-uri si pe ce porturi/protocoale se pot conecta la router-ul tau: vinci.rds / static-10 / 81.196. / si network/23). Edited by ogo, 12 May 2019 - 02:54. |
#12
Posted 12 May 2019 - 13:02
#13
Posted 12 May 2019 - 13:39
ogo, on 12 mai 2019 - 02:50, said:
erm2. pentru ultima oara: iptables -vL -t filter --line-numbersoutput-ul trebuia sa fie mult mai detaliat la LIST, probabil ruleaza un kernel antic uname -rsi iptables si mai antice iptables -V + iwconfigdaca nu merge: /sbin/ifconfig -asau netstat -i si ip route FYG: RCS are acces deplin si neconditionat la router-ul tau (dar cam asa e cu toate echipamentele CPE controlate de ISP): chain input (toate pachetele ce vin din internet si sunt destinate exclusiv router-ului tau): regula nr 1 accepta toate regulile din chain-ul ACL (access control list) (unde sunt definite ce ip-uri/subnet-uri si pe ce porturi/protocoale se pot conecta la router-ul tau: vinci.rds / static-10 / 81.196. / si network/23). KAON-RCSRDS login: admin Password: RLX Linux version 2.0 _ _ _ | | | ||_| _ _ | | _ _ | | _ ____ _ _ _ _ | |/ || |\ \/ / | || | _ \| | | |\ \/ / | |_/ | |/ \ | || | | | | |_| |/ \ |_| |_|\_/\_/ |_||_|_| |_|\____|\_/\_/ For further information check: http://processor.realtek.com/ # iptables -vL -t filter --line-numbers Chain INPUT (policy DROP 425K packets, 28M bytes) num pkts bytes target prot opt in out source destina tion 1 3216K 304M CheckACL all -- any any anywhere anywher e 2 1177K 121M ACCEPT all -- any any anywhere anywher e state RELATED,ESTABLISHED 3 0 0 ACCEPT all -- br47 any anywhere anywher e 4 622K 69M ACCEPT all -- br0 any anywhere anywher e 5 59 2364 ACCEPT tcp -- ppp0 any anywhere 188-25- 170-124.rdsnet.ro tcp dpt:8899 6 94 12071 DROP udp -- ppp0 any anywhere 188-25- 170-124.rdsnet.ro udp dpt:1900 7 1462 58680 ACCEPT icmp -- ppp0 any anywhere 188-25- 170-124.rdsnet.ro icmp echo-request 8 0 0 ACCEPT all -- lo any anywhere anywher e 9 1496 655K ACCEPT udp -- ppp0 any anywhere anywher e udp dpt:5060 10 35 15081 ACCEPT udp -- ppp0 any anywhere anywher e udp dpt:5061 Chain FORWARD (policy DROP 0 packets, 0 bytes) num pkts bytes target prot opt in out source destina tion 1 523K 29M TCPMSS tcp -- any any anywhere anywher e tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 2 4726K 846M ACCEPT all -- br0 any anywhere anywher e 3 5 669 ACCEPT udp -- any any anywhere anywher e udp spt:l2tp 4 0 0 ACCEPT udp -- any any anywhere anywher e udp dpt:l2tp 5 0 0 ACCEPT tcp -- any any anywhere anywher e tcp dpt:1723 6 0 0 ACCEPT tcp -- any any anywhere anywher e tcp spt:1723 7 0 0 ACCEPT 47 -- any any anywhere anywher e 8 0 0 ACCEPT udp -- eth1.201 any anywhere base- address.mcast.net/4 udp 9 0 0 DROP all -- any any anywhere anywher e state INVALID 10 0 0 ACCEPT all -- br47 any anywhere anywher e 11 206 16840 ACCEPT tcp -- ppp0 any anywhere 192.168 .1.205 tcp dpt:https 12 0 0 ACCEPT udp -- ppp0 any anywhere 192.168 .1.205 udp dpt:https 13 1686 184K ACCEPT tcp -- ppp0 any anywhere 192.168 .1.220 tcp dpt:1967 14 534K 76M ACCEPT udp -- ppp0 any anywhere 192.168 .1.220 udp dpt:1967 15 1399 64648 ACCEPT tcp -- ppp0 any anywhere 192.168 .1.220 tcp dpt:http 16 3 951 ACCEPT udp -- ppp0 any anywhere 192.168 .1.220 udp dpt:http 17 8 344 ACCEPT tcp -- ppp0 any anywhere 192.168 .1.210 tcp dpt:1994 18 0 0 ACCEPT udp -- ppp0 any anywhere 192.168 .1.210 udp dpt:1994 19 40772 4204K ACCEPT tcp -- ppp0 any anywhere 192.168 .1.210 tcp dpt:5230 20 510K 71M ACCEPT udp -- ppp0 any anywhere 192.168 .1.210 udp dpt:5230 21 1224 112K ACCEPT tcp -- ppp0 any anywhere 192.168 .1.210 tcp dpt:8181 22 0 0 ACCEPT udp -- ppp0 any anywhere 192.168 .1.210 udp dpt:8181 23 12 528 ACCEPT tcp -- ppp0 any anywhere 192.168 .1.210 tcp dpt:http 24 0 0 ACCEPT udp -- ppp0 any anywhere 192.168 .1.210 udp dpt:http 25 575 109K ACCEPT udp -- ppp0 br0 anywhere anywher e udp dpt:isakmp 26 0 0 ACCEPT esp -- ppp0 br0 anywhere anywher e 27 3674K 2614M ACCEPT all -- ppp0 any anywhere anywher e state RELATED,ESTABLISHED Chain OUTPUT (policy ACCEPT 2584K packets, 265M bytes) num pkts bytes target prot opt in out source destina tion Chain CheckACL (1 references) num pkts bytes target prot opt in out source destina tion 1 0 0 ACCEPT tcp -- eth8.11 any vinci.rdsnet.ro anywhe re tcp dpt:8899 2 0 0 ACCEPT tcp -- eth8.11 any static-10-204-0-34.rdsnet.r o anywhere tcp dpt:8899 3 0 0 ACCEPT tcp -- eth8.11 any 81-196-12-148.rdsnet.ro an ywhere tcp dpt:8899 4 0 0 ACCEPT tcp -- eth8.11 any network-212-54-122.rdsnet.r o/23 anywhere tcp dpt:8899 5 0 0 ACCEPT tcp -- eth8.11 any vinci.rdsnet.ro anywhe re tcp dpt:8900 6 0 0 ACCEPT tcp -- eth8.11 any static-10-204-0-34.rdsnet.r o anywhere tcp dpt:8900 7 0 0 ACCEPT tcp -- eth8.11 any 81-196-12-148.rdsnet.ro an ywhere tcp dpt:8900 8 0 0 ACCEPT tcp -- eth8.11 any network-212-54-122.rdsnet.r o/23 anywhere tcp dpt:8900 9 0 0 DROP tcp -- eth8.11 any anywhere anywhe re tcp dpt:8899 10 0 0 DROP tcp -- eth8.11 any anywhere anywhe re tcp dpt:8900 11 989K 85M ACCEPT all -- eth8.11 any anywhere anywhe re Chain MINIUPNPD (0 references) num pkts bytes target prot opt in out source destina tion 1 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:44022 2 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.210 tcp dpt:5230 3 0 0 ACCEPT udp -- any any anywhere 192.168 .1.210 udp dpt:5230 4 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.210 tcp dpt:1994 5 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.220 tcp dpt:1967 6 0 0 ACCEPT udp -- any any anywhere 192.168 .1.220 udp dpt:1967 7 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:54301 8 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:54133 9 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:58629 10 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:55094 11 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:54723 12 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.210 tcp dpt:5230 13 0 0 ACCEPT udp -- any any anywhere 192.168 .1.210 udp dpt:5230 14 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.210 tcp dpt:1994 15 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:47156 16 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.210 tcp dpt:1843 17 0 0 ACCEPT tcp -- any any anywhere 192.168 .1.210 tcp dpt:22715 18 0 0 ACCEPT udp -- any any anywhere 192.168 .1.210 udp dpt:1669 19 0 0 ACCEPT udp -- any any anywhere 192.168 .1.210 udp dpt:52273 20 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:35031 21 0 0 ACCEPT udp -- any any anywhere 192.168 .1.5 udp dpt:44480 # uname -r -sh: uname: not found # iptables -V iptables v1.4.4 # /sbin/ifconfig -a -sh: /sbin/ifconfig: not found # netstat -i netstat: invalid option -- i BusyBox v1.13.4 (2019-03-27 12:47:36 KST) multi-call binary Usage: netstat [-laentuwxr] Display networking information Options: -l Display listening server sockets -a Display all sockets (default: connected) -e Display other/more information -n Don't resolve names -t Tcp sockets -u Udp sockets -w Raw sockets -x Unix sockets -r Display routing table # ip route ip: message truncated ip: message truncated ip: message truncated default via 10.0.0.1 dev ppp0 10.0.0.1 dev ppp0 src 188.25.170.124 81.196.12.148 via 100.66.69.1 dev if42 100.66.69.0/24 dev if42 src 100.66.69.194 100.127.255.1 via 100.66.69.1 dev if42 100.127.255.5 via 100.66.69.1 dev if42 192.168.1.0/24 dev if41 224.0.0.0/4 dev if41 239.255.255.250 dev if41 # LE: Ei folosesc TR069, iar ACL-ul nu este în meniu ca la Telekom. Pe admin există TR069 și se poate dezactiva. Testat. Edited by KyKyKyKy, 12 May 2019 - 14:01. |
#14
Posted 12 May 2019 - 15:06
Telefonul e conectat pe reteaua de 2.4?
Ca cica asa ar trebui. Pe de alta parte, mai se vaita unii ca NU merge asa (nu se stie de ce, nu s-a gasit solutie). Adica telefon wifi si tv ethernet. Solutia "ocolitoare" ar fi sa activezi si wifi la tv (simultan... desi nu cred ca se poate). Edited by buyonevideo, 12 May 2019 - 15:08. |
#15
Posted 12 May 2019 - 20:05
kiki - ma dau batut - nu vad din regulile alea vreuna care sa interzica accesul intre interfetele bridge - poate la kaon functioneaza altfel
Plus de asta nicio comanda uzual folosita (/sbin/ifconfig / netstat - i / ) nu arata toate interfetele active - ma intereseaza mai ales alea bridged. ip link show<- nici asta nu merge? Iar counter-ul la pachetele dropped pe chain-ul forward sunt 0 - deci nu pare a fi din firewall. |
|
#16
Posted 12 May 2019 - 21:21
KAON-RCSRDS login: admin Password: RLX Linux version 2.0 _ _ _ | | | ||_| _ _ | | _ _ | | _ ____ _ _ _ _ | |/ || |\ \/ / | || | _ \| | | |\ \/ / | |_/ | |/ \ | || | | | | |_| |/ \ |_| |_|\_/\_/ |_||_|_| |_|\____|\_/\_/ For further information check: http://processor.realtek.com/ # ip link show BusyBox v1.13.4 (2019-03-27 12:47:36 KST) multi-call binary Usage: ip [OPTIONS] {address | route | tunnel | } {COMMAND} ip [OPTIONS] OBJECT {COMMAND} where OBJECT := {address | route | tunnel | } OPTIONS := { -f[amily] { inet | inet6 | link } | -o[neline] } # |
#17
Posted 13 May 2019 - 08:05
Mda. Asta e. Versiunea e din 2009, atat iptables cat si busybox-ul.
|
#18
Posted 13 May 2019 - 12:51
O să îi montez un AP Asus pe unul dintre switch-uri, apoi să văd.
Deși cred că acest sharing va merge numai prin WiFi. |
Anunturi
Bun venit pe Forumul Softpedia!
▶ 0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users