Fórum Ubuntu CZ/SK
Ubuntu pro osobní počítače => Internet a sítě => Téma založeno: kacerek99 22 Ledna 2012, 19:46:56
-
Dobrý večer asi to neni uplně tak k linuxum ale taky se jich to tyka proto to davam sem...
mam na ubuntech FTPserver,Webmin,IRC, atd....
všude sem se dival ale numužu nic pochopitelneho najit
mam Router PowerStation2 a vnem tyto kolonky pro nastaveni port forwardu...
(http://img52.imageshack.us/img52/8380/portforward.png)
nevim kam co vyplnit
adresa meho pc je 192.168.1.85
a porty potrebuju napriklad 6667,21,22 a td..
nevim jestli mi to nejak i neblokuje linux ci neco jineho
jediny co nevim je co vyplnit do kolonky source
popripade jsou tam este jina nastaveni
(http://img851.imageshack.us/img851/7445/ostatni.png)
děkuji za všechny rady..
-
Do kolonky Source IP/mask nemusíš dávat nic, pokud teda nechceš povolit přístup jen z konkretních IP adres. Linux ti to blokovat může, pokud máš zapnutej třeba firewall. To si můžeš odzkoušet telnetem z jinýho pecka v lokální síti.
-
http://wiki.ubnt.com/AirOS
Port Forwarding entries can be specified by using the following criteria:
Private IP is the IP of the host which is connected to the internal network and needs to be accessible from the external network;
Private Port is the TCP/UDP port of the application running on the host which is connected to the internal network. The specified port will be accessible from the external network;
Type is the L3 protocol (IP) type which need to be forwarded from the internal network.
Public Port is the TCP/UDP port of the AirOS based device which will accept and forward the connections from the external network to the host connected to the internal network.
Comments is the informal field for the comment of the particular port forwarding entry. Few words about the particular port forwarding entry purpose are saved there usually.
Enabled flag enables or disables the effect of the particular port forwarding entry. All the added firewall entries are saved in system configuration file, however only the enabled port forwarding entries will be active during the AirOS system operation.
-
Do kolonky Source IP/mask nemusíš dávat nic, pokud teda nechceš povolit přístup jen z konkretních IP adres. Linux ti to blokovat může, pokud máš zapnutej třeba firewall. To si můžeš odzkoušet telnetem z jinýho pecka v lokální síti.
nemusis z jinyho kompu, staci lokalne
nmap 192.168.1.85 -P0 -p22,6667,21,22
-
nemusis z jinyho kompu, staci lokalne
nmap 192.168.1.85 -P0 -p22,6667,21,22
Musíš z jinýho kompu, jinak nezjistíš, jestli ti to projde firewallem.
-
ORLY? 8)
root@kosmik1:/home/starenka# ifconfig wlan0 | grep 'inet addr'
inet addr:192.168.1.3 Bcast:255.255.255.255 Mask:255.255.255.0
root@kosmik1:/home/starenka# nmap 192.168.1.3 -P0 -p80
Starting Nmap 5.21 ( http://nmap.org ) at 2012-01-22 21:00 CET
Nmap scan report for 192.168.1.3
Host is up (0.000044s latency).
PORT STATE SERVICE
80/tcp closed http
Nmap done: 1 IP address (1 host up) scanned in 0.06 seconds
root@kosmik1:/home/starenka# nmap 127.0.0.1 -P0 -p80
Starting Nmap 5.21 ( http://nmap.org ) at 2012-01-22 21:00 CET
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000064s latency).
PORT STATE SERVICE
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
-
ORLY? 8)
root@kosmik1:/home/starenka# ifconfig wlan0 | grep 'inet addr'
inet addr:192.168.1.3 Bcast:255.255.255.255 Mask:255.255.255.0
root@kosmik1:/home/starenka# nmap 192.168.1.3 -P0 -p80
Starting Nmap 5.21 ( http://nmap.org ) at 2012-01-22 21:00 CET
Nmap scan report for 192.168.1.3
Host is up (0.000044s latency).
PORT STATE SERVICE
80/tcp closed http
Nmap done: 1 IP address (1 host up) scanned in 0.06 seconds
root@kosmik1:/home/starenka# nmap 127.0.0.1 -P0 -p80
Starting Nmap 5.21 ( http://nmap.org ) at 2012-01-22 21:00 CET
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000064s latency).
PORT STATE SERVICE
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
Jj, a teď si otevři tu 80tku na 192.168.1.3, zapni si ufw, zablokuj příchozí spojení pomocí ufw default deny, pusť si znova ten nmap z lokálu a pak zkus telnet 192.168.1.3 80 z jinýho pecka. :)
-
Děkuji moc za všechno je to vyřešeno za všechno může muj poskytovatel...
Prosim o uzavření vlákna.