Talk:Separate LAN and WLAN

From DD-WRT Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 07:24, 12 July 2007 (edit)
Devu6ka2 (Talk | contribs)
(medecine)
← Previous diff
Current revision (20:54, 14 February 2020) (edit) (undo)
Tag (Talk | contribs)
(iptables vs. ebtables? - Add an alternative leaving the wireless interfaces unbridged)
 
(5 intermediate revisions not shown.)
Line 12: Line 12:
== dnsmasq errors out with Can't bind 192.168.1.1 socket already in use == == dnsmasq errors out with Can't bind 192.168.1.1 socket already in use ==
-== medecine ==+== iptables vs. ebtables? ==
 +Is there any reason that isolation of (bridged) wireless interfaces can't be achieved with ebtables? As far as I can tell, I have been able to isolate both wireless interfaces with the following startup script:
-<a href=http://celebrex.awardspace.us/celebrex-side-effects.html > celebrex side effects </a>+ insmod ebtables
 + insmod ebtable_filter
 + insmod ebtable_broute
 + insmod ebt_ip
 +
 + #DHCP
 + ebtables -t filter -I INPUT 1 -p IPv4 --ip-proto udp --ip-dport 67 -j ACCEPT
 + #DNS
 + ebtables -t filter -I INPUT 2 -p IPv4 --ip-proto udp --ip-dport 53 -j ACCEPT
 + ebtables -t filter -I INPUT 3 -p IPv4 --ip-proto tcp --ip-dport 53 -j ACCEPT
 + #PROTECT ROUTER
 + ebtables -t filter -I INPUT 4 -p IPv4 -i eth1 --ip-dst 192.168.0.0/16 -j DROP
 + ebtables -t filter -I INPUT 5 -p IPv4 -i eth2 --ip-dst 192.168.0.0/16 -j DROP
 +
 + #ISOLATE
 + ebtables -t filter -I FORWARD 1 -i eth1 -j DROP
 + ebtables -t filter -I FORWARD 2 -i eth2 -j DROP
 + ebtables -t filter -I FORWARD 3 -o eth1 -j DROP
 + ebtables -t filter -I FORWARD 4 -o eth2 -j DROP
 +
 + #DHCP
 + ebtables -t filter -I OUTPUT 1 -p IPv4 --ip-proto udp --ip-sport 67 -j ACCEPT
 + #DNS
 + ebtables -t filter -I OUTPUT 2 -p IPv4 --ip-proto udp --ip-sport 53 -j ACCEPT
 + ebtables -t filter -I OUTPUT 3 -p IPv4 --ip-proto tcp --ip-sport 53 -j ACCEPT
 + #PROTECT ROUTER
 + ebtables -t filter -I OUTPUT 4 -p IPv4 -o eth1 --ip-src 192.168.0.0/16 -j DROP
 + ebtables -t filter -I OUTPUT 5 -p IPv4 -o eth2 --ip-src 192.168.0.0/16 -j DROP
-<a href=http://celebrex.awardspace.us/celebrex-cancer.html > celebrex cancer </a>+--[[User:Tag|Tag]] 08:06, 14 February 2020 (CET)
- +: Or, after removing from br0, why is it necessary to attach to a new bridge? Leaving the wireless interfaces unbridged leads to a nice, succinct startup script:
-<a href=http://celebrex.awardspace.us/celebrex-lawyer.html > celebrex lawyer </a>+ iptables -I FORWARD 1 -i eth1 -o ! vlan2 -j DROP
- + iptables -I FORWARD 2 -i eth2 -o ! vlan2 -j DROP
-<a href=http://celebrex.awardspace.us/celebrex-dosage-dose.html > celebrex dosage dose </a>+: --[[User:Tag|Tag]] 21:54, 14 February 2020 (CET)
- +
-<a href=http://celebrex.awardspace.us/celebrex-used-for.html > celebrex used for </a>+
- +
-<a href=http://celebrex.awardspace.us/celebrex-info.html > celebrex info </a>+
- +
-<a href=http://celebrex.awardspace.us/celebrex-risk-and-side-effects.html > celebrex risk and side effects </a>+
- +
- +
-<a href=http://celebrex.awardspace.us/celebrex-class-action.html > celebrex class action </a>+
- +
-<a href=http://celebrex.awardspace.us/celebrex-vs-vioxx.html > celebrex vs vioxx </a>+
- +
-<a href=http://celebrex.awardspace.us/celebrex-online.html > celebrex online </a>+
- +
- +
-<a href= " http://celebrex.awardspace.us/200-celebrex-drug-mg.html " > 200 celebrex drug mg </a>+
- +
-<a href= " http://celebrex.awardspace.us/celebrex-pharmacokinetics.html " > celebrex pharmacokinetics </a>+
- +
-<a href= " http://celebrex.awardspace.us/celebrex-attorney-tx.html " > celebrex attorney tx </a>+
- +
-<a href= " http://celebrex.awardspace.us/celebrex-use.html " > celebrex use </a>+
-<a href= " http://celebrex.awardspace.us/celebrex-celebrex-link-mmx.info-mmx.info-site.html " > celebrex celebrex link mmx.info mmx.info site </a>+
- +
-<a href= " http://celebrex.awardspace.us/celebrex-doctor-medication.html " > celebrex doctor medication </a>+
-<a href= " http://celebrex.awardspace.us/celebrex-capsule.html " > celebrex capsule </a>+
- +
-<a href= " http://celebrex.awardspace.us/celebrex-and-weight-gain.html " > celebrex and weight gain </a>+
- +
-<a href= " http://celebrex.awardspace.us/celebrex-lawsuit-risk.html " > celebrex lawsuit risk </a>+
- +
-<a href= " http://celebrex.awardspace.us/attorney-celebrex-contraindications-vioxx.html " > attorney celebrex contraindications vioxx </a>+

Current revision

Improvements that are not yet included on this page:
1. DHCP issue resolved
2. WPA/WPA2 didn't work with the steps I posted originally - Works with the updated instructions.
3. Firewall rules tightened up a bit. (The router is arguably "more secure" from the Wireless clients than with my last set of instructions)


[edit] No update yet

Almost a yearand still no update of the page... Towsonu2003 23:21, 7 Sep 2006 (CEST)

obviosly dead, need some input on this --whiteboy 05:26, 14 Dec 2006 (CET)

[edit] dnsmasq errors out with Can't bind 192.168.1.1 socket already in use

[edit] iptables vs. ebtables?

Is there any reason that isolation of (bridged) wireless interfaces can't be achieved with ebtables? As far as I can tell, I have been able to isolate both wireless interfaces with the following startup script:

insmod ebtables
insmod ebtable_filter
insmod ebtable_broute
insmod ebt_ip

#DHCP
ebtables -t filter -I INPUT 1 -p IPv4 --ip-proto udp --ip-dport 67 -j ACCEPT
#DNS
ebtables -t filter -I INPUT 2 -p IPv4 --ip-proto udp --ip-dport 53 -j ACCEPT
ebtables -t filter -I INPUT 3 -p IPv4 --ip-proto tcp --ip-dport 53 -j ACCEPT
#PROTECT ROUTER
ebtables -t filter -I INPUT 4 -p IPv4 -i eth1 --ip-dst 192.168.0.0/16 -j DROP
ebtables -t filter -I INPUT 5 -p IPv4 -i eth2 --ip-dst 192.168.0.0/16 -j DROP

#ISOLATE
ebtables -t filter -I FORWARD 1 -i eth1 -j DROP
ebtables -t filter -I FORWARD 2 -i eth2 -j DROP
ebtables -t filter -I FORWARD 3 -o eth1 -j DROP
ebtables -t filter -I FORWARD 4 -o eth2 -j DROP

#DHCP
ebtables -t filter -I OUTPUT 1 -p IPv4 --ip-proto udp --ip-sport 67 -j ACCEPT
#DNS
ebtables -t filter -I OUTPUT 2 -p IPv4 --ip-proto udp --ip-sport 53 -j ACCEPT
ebtables -t filter -I OUTPUT 3 -p IPv4 --ip-proto tcp --ip-sport 53 -j ACCEPT
#PROTECT ROUTER
ebtables -t filter -I OUTPUT 4 -p IPv4 -o eth1 --ip-src 192.168.0.0/16 -j DROP
ebtables -t filter -I OUTPUT 5 -p IPv4 -o eth2 --ip-src 192.168.0.0/16 -j DROP

--Tag 08:06, 14 February 2020 (CET)

Or, after removing from br0, why is it necessary to attach to a new bridge? Leaving the wireless interfaces unbridged leads to a nice, succinct startup script:
iptables -I FORWARD 1 -i eth1 -o ! vlan2 -j DROP
iptables -I FORWARD 2 -i eth2 -o ! vlan2 -j DROP
--Tag 21:54, 14 February 2020 (CET)