Jump to content

SUBIECTE NOI
« 1 / 5 »
RSS
Cum sterg mails din Promotions

Vanzare cumparare fara transfer b...

Receptie ciudata, in functie de t...

Dupa 20 ani de facultate, am uita...
 Mobile.de ofera imprumut de bani ...

problema test grila

Digi24 a disparut de pe TV Lg

Drept de proprietate intelectuala...
 Jante noi shitbox

Trinitas TV 4K

Dacia 1316 cu 6 usi ...

Frecventa modificata radio
 Un nou pericol pt batrani

Ar trebui sa vindem imobiliarele ...

Dupa renuntarea la aparat dentar

pelerinaj in Balcik
 

Problemă SmartTV, MirrorShare și Wired

- - - - -
  • Please log in to reply
33 replies to this topic

#1
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008
Salutare!
Am un LG 43UK6200PLA conectat pe cablu la un switch. Problema intervine atunci când doresc să dublez ecranul telefonului cu acesta. Dacă îl țin conectat prin cablu, telefonul nu-l va găsi niciodată, dar pe WiFi merge fără probleme.
Gateway și subnet sunt aceleași pentru ambele, iar  Adresele sunt date de Kaon-ul de la RDS prin DHCP.

Ce aș putea face?
Nu l-aș ține pe WiFi pentru că sunt momente când Kaon-ul își reduce aproape la 0 acoperirea pe 5 GHz.

#2
diahim

diahim

    Senior Member

  • Grup: Senior Members
  • Posts: 2,043
  • Înscris: 24.04.2011
Pai nu cumva sunt 2 retele diferite? Pe cablu merge pe 2.4 si pe Wi-Fi pe 5?

#3
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006
@kiki
Cauta in kaon AP ISOLATION (la wifi) si debifeaza.
Succes!


#4
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006

View Postdiahim, on 11 mai 2019 - 16:25, said:

Pai nu cumva sunt 2 retele diferite? Pe cablu merge pe 2.4 si pe Wi-Fi pe 5?
Err. NICIODATA? Cel putin nu in mass market unde toate interfetele layer2 wired si wireless fac parte din acelasi subnet si se “vad” intre ele  (mai putin cand se foloseste ap isolation: care izoleaza clientii wifi (si 2.4 si 5Ghz ca sa nu fie nicio confuzie) de cei pe cablu si inclusiv de ceilalti clienti wifi aflati in acelasi subnet - fiind dupa parerea mea, aiurea setat default on).
Cu alte cuvinte ap isolation blocheaza traficul intre interfetele wired si wireless (in ambele directii deobicei sau particular din wlan spre lan/wlan).

Se poate si ce zici tu acolo dar nu cu kaon/asus/x-link-uri/etc din supermarche sau cel putin nu cu firmware oficial si se cheama vlan-uri :)

Edited by ogo, 11 May 2019 - 17:10.


#5
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008

View Postogo, on 11 mai 2019 - 16:35, said:

@kiki
Cauta in kaon AP ISOLATION (la wifi) si debifeaza.
Succes!

Treaba este că nu găsesc așa ceva pe el.
Dacă trebuie, pun și capturi.

#6
buyonevideo

buyonevideo

    STATI ACASA !! :)

  • Grup: Senior Members
  • Posts: 7,442
  • Înscris: 06.02.2016
Eu am un Archer C2, calculator pe fir, o tableta pe wifi si un mini android pe fir - merge lacrima din calculator in ambele FTP.
Apoi, pe telefon wifi, mini android pe fir > iarasi merge OK FTP.
Si telefon + tv, ambele pe wifi > merge screen cast OK.
Fara nici o setare speciala nicaieri.

Da, pune poze.
Verifica si scrie aici adresele IP ale dispozitivelor.

#7
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006
Kiki, incearca la RDS direct, sigur au drepturi elevate pentru a anula ap isolation.

SAU

Daca ai acces la shell, ce output are comanda:
sudo iptables -vL -t filter --line-numbers |grep "br"


#8
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008
Nu știe de sudo, poate su, dar nu am încercat. am băgat direct iptables și îmi dă așa:
# iptables -vL -t filter --line-numbers |grep "br"
3		0	 0 ACCEPT	 all  --  br47   any	 anywhere			 anywher																																							 e
4	 608K   67M ACCEPT	 all  --  br0	any	 anywhere			 anywher																																							 e
2	4597K  822M ACCEPT	 all  --  br0	any	 anywhere			 anywher																																							 e
10	   0	 0 ACCEPT	 all  --  br47   any	 anywhere			 anywher																																							 e
25	 557  106K ACCEPT	 udp  --  ppp0   br0	 anywhere			 anywher																																							 e			udp dpt:isakmp
26	   0	 0 ACCEPT	 esp  --  ppp0   br0	 anywhere			 anywher																																							 e
#


View Postbuyonevideo, on 11 mai 2019 - 19:06, said:

Eu am un Archer C2, calculator pe fir, o tableta pe wifi si un mini android pe fir - merge lacrima din calculator in ambele FTP.
Apoi, pe telefon wifi, mini android pe fir > iarasi merge OK FTP.
Si telefon + tv, ambele pe wifi > merge screen cast OK.
Fara nici o setare speciala nicaieri.

Da, pune poze.
Verifica si scrie aici adresele IP ale dispozitivelor.
Cu FTP nu am încercat sau dlna server.
Încerc doar Screen Mirroring.
Ambele pe Wi-Fi se văd instant, dacă e TV-ul pe cablu nu.

#9
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006
erm.
iptables -L --line-numbers
ce zice?

#10
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008
KAON-RCSRDS login: admin
Password:
RLX Linux version 2.0
		 _		   _  _
		| |		 | ||_|
   _  _ | | _  _	| | _ ____  _   _  _  _
  | |/ || |\ \/ /   | || |  _ \| | | |\ \/ /
  | |_/ | |/	\   | || | | | | |_| |/	\
  |_|   |_|\_/\_/   |_||_|_| |_|\____|\_/\_/
For further information check:
http://processor.realtek.com/
# iptables -L --line-numbers
Chain INPUT (policy DROP)
num  target	 prot opt source			   destination
1	CheckACL   all  --  anywhere			 anywhere
2	ACCEPT	 all  --  anywhere			 anywhere			state RELATED,																																							 ESTABLISHED
3	ACCEPT	 all  --  anywhere			 anywhere
4	ACCEPT	 all  --  anywhere			 anywhere
5	ACCEPT	 tcp  --  anywhere			 188-25-170-124.rdsnet.ro tcp dpt:8																																							 899
6	DROP	   udp  --  anywhere			 188-25-170-124.rdsnet.ro udp dpt:1																																							 900
7	ACCEPT	 icmp --  anywhere			 188-25-170-124.rdsnet.ro icmp echo																																							 -request
8	ACCEPT	 all  --  anywhere			 anywhere
9	ACCEPT	 udp  --  anywhere			 anywhere			udp dpt:5060
10   ACCEPT	 udp  --  anywhere			 anywhere			udp dpt:5061
Chain FORWARD (policy DROP)
num  target	 prot opt source			   destination
1	TCPMSS	 tcp  --  anywhere			 anywhere			tcp flags:SYN,																																							 RST/SYN TCPMSS clamp to PMTU
2	ACCEPT	 all  --  anywhere			 anywhere
3	ACCEPT	 udp  --  anywhere			 anywhere			udp spt:l2tp
4	ACCEPT	 udp  --  anywhere			 anywhere			udp dpt:l2tp
5	ACCEPT	 tcp  --  anywhere			 anywhere			tcp dpt:1723
6	ACCEPT	 tcp  --  anywhere			 anywhere			tcp spt:1723
7	ACCEPT	 47   --  anywhere			 anywhere
8	ACCEPT	 udp  --  anywhere			 base-address.mcast.net/4 udp
9	DROP	   all  --  anywhere			 anywhere			state INVALID
10   ACCEPT	 all  --  anywhere			 anywhere
11   ACCEPT	 tcp  --  anywhere			 192.168.1.205	   tcp dpt:https
12   ACCEPT	 udp  --  anywhere			 192.168.1.205	   udp dpt:https
13   ACCEPT	 tcp  --  anywhere			 192.168.1.220	   tcp dpt:1967
14   ACCEPT	 udp  --  anywhere			 192.168.1.220	   udp dpt:1967
15   ACCEPT	 tcp  --  anywhere			 192.168.1.220	   tcp dpt:http
16   ACCEPT	 udp  --  anywhere			 192.168.1.220	   udp dpt:http
17   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:1994
18   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:1994
19   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:5230
20   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:5230
21   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:8181
22   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:8181
23   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:http
24   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:http
25   ACCEPT	 udp  --  anywhere			 anywhere			udp dpt:isakmp																																							
26   ACCEPT	 esp  --  anywhere			 anywhere
27   ACCEPT	 all  --  anywhere			 anywhere			state RELATED,																																							 ESTABLISHED
Chain OUTPUT (policy ACCEPT)
num  target	 prot opt source			   destination
Chain CheckACL (1 references)
num  target	 prot opt source			   destination
1	ACCEPT	 tcp  --  vinci.rdsnet.ro	  anywhere			tcp dpt:8899
2	ACCEPT	 tcp  --  static-10-204-0-34.rdsnet.ro  anywhere			tcp d																																							 pt:8899
3	ACCEPT	 tcp  --  81-196-12-148.rdsnet.ro  anywhere			tcp dpt:88																																							 99
4	ACCEPT	 tcp  --  network-212-54-122.rdsnet.ro/23  anywhere			tc																																							 p dpt:8899
5	ACCEPT	 tcp  --  vinci.rdsnet.ro	  anywhere			tcp dpt:8900
6	ACCEPT	 tcp  --  static-10-204-0-34.rdsnet.ro  anywhere			tcp d																																							 pt:8900
7	ACCEPT	 tcp  --  81-196-12-148.rdsnet.ro  anywhere			tcp dpt:89																																							 00
8	ACCEPT	 tcp  --  network-212-54-122.rdsnet.ro/23  anywhere			tc																																							 p dpt:8900
9	DROP	   tcp  --  anywhere			 anywhere			tcp dpt:8899
10   DROP	   tcp  --  anywhere			 anywhere			tcp dpt:8900
11   ACCEPT	 all  --  anywhere			 anywhere
Chain MINIUPNPD (0 references)
num  target	 prot opt source			   destination
1	ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:44022
2	ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:5230
3	ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:5230
4	ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:1994
5	ACCEPT	 tcp  --  anywhere			 192.168.1.220	   tcp dpt:1967
6	ACCEPT	 udp  --  anywhere			 192.168.1.220	   udp dpt:1967
7	ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:54301
8	ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:54133
9	ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:58629
10   ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:55094
11   ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:54723
12   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:5230
13   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:5230
14   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:1994
15   ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:47156
16   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:1843
17   ACCEPT	 tcp  --  anywhere			 192.168.1.210	   tcp dpt:22715
18   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:1669
19   ACCEPT	 udp  --  anywhere			 192.168.1.210	   udp dpt:52273
20   ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:35031
21   ACCEPT	 udp  --  anywhere			 192.168.1.5		 udp dpt:44480
#



#11
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006
erm2.
pentru ultima oara:

iptables -vL -t filter --line-numbers
output-ul trebuia sa fie mult mai detaliat la LIST, probabil ruleaza un kernel antic
uname -r
si iptables si mai antice
iptables -V

+
iwconfig
daca nu merge:
/sbin/ifconfig -a
sau
netstat -i
  

si
ip route


FYG:
RCS are acces deplin si neconditionat la router-ul tau (dar cam asa e cu toate echipamentele CPE controlate de ISP):
chain input (toate pachetele ce vin din internet si sunt destinate exclusiv router-ului tau):  regula nr 1 accepta toate regulile din chain-ul ACL (access control list) (unde sunt definite ce ip-uri/subnet-uri si pe ce porturi/protocoale se pot conecta la router-ul tau: vinci.rds / static-10 / 81.196. /  si network/23).

Edited by ogo, 12 May 2019 - 02:54.


#12
underb

underb

    Guru Member

  • Grup: Senior Members
  • Posts: 17,491
  • Înscris: 08.03.2015

View Postdiahim, on 11 mai 2019 - 16:25, said:

Pai nu cumva sunt 2 retele diferite? Pe cablu merge pe 2.4 si pe Wi-Fi pe 5?
LOL!

2.4 si 5GHz sunt frecventa undelor radio emise de antena routerului si nu au nicio treaba cu ce curge prin cablu.

#13
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008

View Postogo, on 12 mai 2019 - 02:50, said:

erm2.
pentru ultima oara:

iptables -vL -t filter --line-numbers
output-ul trebuia sa fie mult mai detaliat la LIST, probabil ruleaza un kernel antic
uname -r
si iptables si mai antice
iptables -V

+
iwconfig
daca nu merge:
/sbin/ifconfig -a
sau
netstat -i
  

si
ip route


FYG:
RCS are acces deplin si neconditionat la router-ul tau (dar cam asa e cu toate echipamentele CPE controlate de ISP):
chain input (toate pachetele ce vin din internet si sunt destinate exclusiv router-ului tau):  regula nr 1 accepta toate regulile din chain-ul ACL (access control list) (unde sunt definite ce ip-uri/subnet-uri si pe ce porturi/protocoale se pot conecta la router-ul tau: vinci.rds / static-10 / 81.196. /  si network/23).

KAON-RCSRDS login: admin
Password:
RLX Linux version 2.0
		 _		 _ _
	 | |		 | ||_|
_ _ | | _ _ | | _ ____ _ _ _ _
| |/ || |\ \/ / | || | _ \| | | |\ \/ /
| |_/ | |/ \ | || | | | | |_| |/ \
|_| |_|\_/\_/ |_||_|_| |_|\____|\_/\_/
For further information check:
http://processor.realtek.com/
# iptables -vL -t filter --line-numbers
Chain INPUT (policy DROP 425K packets, 28M bytes)
num pkts bytes target	 prot opt in	 out	 source			 destina																																							 tion
1 3216K 304M CheckACL all -- any any	 anywhere			 anywher																																							 e
2 1177K 121M ACCEPT	 all -- any any	 anywhere			 anywher																																							 e		 state RELATED,ESTABLISHED
3	 0	 0 ACCEPT	 all -- br47 any	 anywhere			 anywher																																							 e
4	 622K 69M ACCEPT	 all -- br0 any	 anywhere			 anywher																																							 e
5	 59 2364 ACCEPT	 tcp -- ppp0 any	 anywhere			 188-25-																																							 170-124.rdsnet.ro tcp dpt:8899
6	 94 12071 DROP	 udp -- ppp0 any	 anywhere			 188-25-																																							 170-124.rdsnet.ro udp dpt:1900
7	 1462 58680 ACCEPT	 icmp -- ppp0 any	 anywhere			 188-25-																																							 170-124.rdsnet.ro icmp echo-request
8	 0	 0 ACCEPT	 all -- lo	 any	 anywhere			 anywher																																							 e
9	 1496 655K ACCEPT	 udp -- ppp0 any	 anywhere			 anywher																																							 e		 udp dpt:5060
10	 35 15081 ACCEPT	 udp -- ppp0 any	 anywhere			 anywher																																							 e		 udp dpt:5061
Chain FORWARD (policy DROP 0 packets, 0 bytes)
num pkts bytes target	 prot opt in	 out	 source			 destina																																							 tion
1	 523K 29M TCPMSS	 tcp -- any any	 anywhere			 anywher																																							 e		 tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
2 4726K 846M ACCEPT	 all -- br0 any	 anywhere			 anywher																																							 e
3	 5 669 ACCEPT	 udp -- any any	 anywhere			 anywher																																							 e		 udp spt:l2tp
4	 0	 0 ACCEPT	 udp -- any any	 anywhere			 anywher																																							 e		 udp dpt:l2tp
5	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 anywher																																							 e		 tcp dpt:1723
6	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 anywher																																							 e		 tcp spt:1723
7	 0	 0 ACCEPT	 47 -- any any	 anywhere			 anywher																																							 e
8	 0	 0 ACCEPT	 udp -- eth1.201 any	 anywhere			 base-																																							 address.mcast.net/4 udp
9	 0	 0 DROP	 all -- any any	 anywhere			 anywher																																							 e		 state INVALID
10	 0	 0 ACCEPT	 all -- br47 any	 anywhere			 anywher																																							 e
11	 206 16840 ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.205	 tcp dpt:https
12	 0	 0 ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.205	 udp dpt:https
13 1686 184K ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.220	 tcp dpt:1967
14 534K 76M ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.220	 udp dpt:1967
15 1399 64648 ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.220	 tcp dpt:http
16	 3 951 ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.220	 udp dpt:http
17	 8 344 ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 tcp dpt:1994
18	 0	 0 ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 udp dpt:1994
19 40772 4204K ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 tcp dpt:5230
20 510K 71M ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 udp dpt:5230
21 1224 112K ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 tcp dpt:8181
22	 0	 0 ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 udp dpt:8181
23	 12 528 ACCEPT	 tcp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 tcp dpt:http
24	 0	 0 ACCEPT	 udp -- ppp0 any	 anywhere			 192.168																																							 .1.210	 udp dpt:http
25	 575 109K ACCEPT	 udp -- ppp0 br0	 anywhere			 anywher																																							 e		 udp dpt:isakmp
26	 0	 0 ACCEPT	 esp -- ppp0 br0	 anywhere			 anywher																																							 e
27 3674K 2614M ACCEPT	 all -- ppp0 any	 anywhere			 anywher																																							 e		 state RELATED,ESTABLISHED
Chain OUTPUT (policy ACCEPT 2584K packets, 265M bytes)
num pkts bytes target	 prot opt in	 out	 source			 destina																																							 tion
Chain CheckACL (1 references)
num pkts bytes target	 prot opt in	 out	 source			 destina																																							 tion
1	 0	 0 ACCEPT	 tcp -- eth8.11 any	 vinci.rdsnet.ro	 anywhe																																							 re		 tcp dpt:8899
2	 0	 0 ACCEPT	 tcp -- eth8.11 any	 static-10-204-0-34.rdsnet.r																																							 o anywhere		 tcp dpt:8899
3	 0	 0 ACCEPT	 tcp -- eth8.11 any	 81-196-12-148.rdsnet.ro an																																							 ywhere		 tcp dpt:8899
4	 0	 0 ACCEPT	 tcp -- eth8.11 any	 network-212-54-122.rdsnet.r																																							 o/23 anywhere		 tcp dpt:8899
5	 0	 0 ACCEPT	 tcp -- eth8.11 any	 vinci.rdsnet.ro	 anywhe																																							 re		 tcp dpt:8900
6	 0	 0 ACCEPT	 tcp -- eth8.11 any	 static-10-204-0-34.rdsnet.r																																							 o anywhere		 tcp dpt:8900
7	 0	 0 ACCEPT	 tcp -- eth8.11 any	 81-196-12-148.rdsnet.ro an																																							 ywhere		 tcp dpt:8900
8	 0	 0 ACCEPT	 tcp -- eth8.11 any	 network-212-54-122.rdsnet.r																																							 o/23 anywhere		 tcp dpt:8900
9	 0	 0 DROP	 tcp -- eth8.11 any	 anywhere			 anywhe																																							 re		 tcp dpt:8899
10	 0	 0 DROP	 tcp -- eth8.11 any	 anywhere			 anywhe																																							 re		 tcp dpt:8900
11 989K 85M ACCEPT	 all -- eth8.11 any	 anywhere			 anywhe																																							 re
Chain MINIUPNPD (0 references)
num pkts bytes target	 prot opt in	 out	 source			 destina																																							 tion
1	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:44022
2	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.210	 tcp dpt:5230
3	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.210	 udp dpt:5230
4	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.210	 tcp dpt:1994
5	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.220	 tcp dpt:1967
6	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.220	 udp dpt:1967
7	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:54301
8	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:54133
9	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:58629
10	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:55094
11	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:54723
12	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.210	 tcp dpt:5230
13	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.210	 udp dpt:5230
14	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.210	 tcp dpt:1994
15	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:47156
16	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.210	 tcp dpt:1843
17	 0	 0 ACCEPT	 tcp -- any any	 anywhere			 192.168																																							 .1.210	 tcp dpt:22715
18	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.210	 udp dpt:1669
19	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.210	 udp dpt:52273
20	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:35031
21	 0	 0 ACCEPT	 udp -- any any	 anywhere			 192.168																																							 .1.5		 udp dpt:44480
# uname -r
-sh: uname: not found
# iptables -V
iptables v1.4.4
# /sbin/ifconfig -a
-sh: /sbin/ifconfig: not found
# netstat -i
netstat: invalid option -- i
BusyBox v1.13.4 (2019-03-27 12:47:36 KST) multi-call binary
Usage: netstat [-laentuwxr]
Display networking information
Options:
	 -l	 Display listening server sockets
	 -a	 Display all sockets (default: connected)
	 -e	 Display other/more information
	 -n	 Don't resolve names
	 -t	 Tcp sockets
	 -u	 Udp sockets
	 -w	 Raw sockets
	 -x	 Unix sockets
	 -r	 Display routing table
# ip route
ip: message truncated
ip: message truncated
ip: message truncated
default via 10.0.0.1 dev ppp0
10.0.0.1 dev ppp0 src 188.25.170.124
81.196.12.148 via 100.66.69.1 dev if42
100.66.69.0/24 dev if42 src 100.66.69.194
100.127.255.1 via 100.66.69.1 dev if42
100.127.255.5 via 100.66.69.1 dev if42
192.168.1.0/24 dev if41
224.0.0.0/4 dev if41
239.255.255.250 dev if41
#


LE:
Ei folosesc TR069, iar ACL-ul nu este în meniu ca la Telekom.
Pe admin există TR069 și se poate dezactiva. Testat. :)

Edited by KyKyKyKy, 12 May 2019 - 14:01.


#14
buyonevideo

buyonevideo

    STATI ACASA !! :)

  • Grup: Senior Members
  • Posts: 7,442
  • Înscris: 06.02.2016
Telefonul e conectat pe reteaua de 2.4?
Ca cica asa ar trebui.

Pe de alta parte, mai se vaita unii ca NU merge asa (nu se stie de ce, nu s-a gasit solutie).
Adica telefon wifi si tv ethernet.
Solutia "ocolitoare" ar fi sa activezi si wifi la tv (simultan... desi nu cred ca se poate).

Edited by buyonevideo, 12 May 2019 - 15:08.


#15
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006
kiki - ma dau batut - nu vad din regulile alea vreuna care sa interzica accesul intre interfetele bridge - poate la kaon functioneaza altfel
Plus de asta nicio comanda uzual folosita (/sbin/ifconfig / netstat - i / ) nu arata toate interfetele active - ma intereseaza mai ales alea bridged.
ip link show
   <- nici asta nu merge? :D  
Iar counter-ul la pachetele dropped pe chain-ul forward sunt 0 - deci nu pare a fi din firewall.

#16
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008
KAON-RCSRDS login: admin
Password:
RLX Linux version 2.0
		 _		   _  _
		| |		 | ||_|
   _  _ | | _  _	| | _ ____  _   _  _  _
  | |/ || |\ \/ /   | || |  _ \| | | |\ \/ /
  | |_/ | |/	\   | || | | | | |_| |/	\
  |_|   |_|\_/\_/   |_||_|_| |_|\____|\_/\_/
For further information check:
http://processor.realtek.com/
# ip link show
BusyBox v1.13.4 (2019-03-27 12:47:36 KST) multi-call binary
Usage: ip [OPTIONS] {address | route | tunnel | } {COMMAND}
ip [OPTIONS] OBJECT {COMMAND}
where OBJECT := {address | route | tunnel | }
OPTIONS := { -f[amily] { inet | inet6 | link } | -o[neline] }
#




#17
ogo

ogo

    Senior Member

  • Grup: Senior Members
  • Posts: 4,537
  • Înscris: 07.03.2006
Mda. Asta e. Versiunea e din 2009, atat iptables cat si busybox-ul.

#18
KyKyKyKy

KyKyKyKy

    Guru Member

  • Grup: Senior Members
  • Posts: 23,193
  • Înscris: 18.04.2008
O să îi montez un AP Asus pe unul dintre switch-uri, apoi să văd.
Deși cred că acest sharing va merge numai prin WiFi.

Anunturi

Bun venit pe Forumul Softpedia!

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Forumul Softpedia foloseste "cookies" pentru a imbunatati experienta utilizatorilor Accept
Pentru detalii si optiuni legate de cookies si datele personale, consultati Politica de utilizare cookies si Politica de confidentialitate