Foro
Hola madralphw,
Desde luego debe ser algo así, porque si hago un restore del fichero .cfg que hacía un momento no funcionaba, vuelve a aparecer la impresora, que después desaparece.
Seguiré probando.
Gracias
Hola e_zitro,
Bueno puedes hacer una cosa.... guarda en un fichero el contenido de iptables -L -n -v
Y luego haz iptables -F (borra todas la reglas).
Si te funciona borrando todas las reglas... eso que hay alguna que filtra, cuelga el fichero por ahí y le hecho un ojo a ver si doy con el filtro en cuestión.
Un saludo ;-)
- e_zitro27-11-2015Yo probé el VDSL
Hola de nuevo madralphw
Curiosamente en el momento que te he enviado el resultado de iptables, la impresora NO estaba visible en AirPrint, pero al poco tiempo si ha aparecido.
En ese momento he realizado una nueva conexión con el router y obtenido una nueva salida de iptables que paradójicamente es distinto a lo obtenido un momento antes.
Te adunto el nuevo output
# iptables -L -n -v
Chain INPUT (policy ACCEPT 23 packets, 6670 bytes)
pkts bytes target prot opt in out source destination
5872 667K VOIP_INPUT tcp -- * * 0.0.0.0/0 0.0.0.0/0
40585 13M VOIP_INPUT udp -- * * 0.0.0.0/0 0.0.0.0/0
46608 14M CWMP_CR all -- * * 0.0.0.0/0 0.0.0.0/0
46611 14M DOS_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
46609 14M DHCP_RELAY all -- * * 0.0.0.0/0 0.0.0.0/0
46609 14M ACL all -- * * 0.0.0.0/0 0.0.0.0/0
46325 14M FrwlInChk all -- * * 0.0.0.0/0 0.0.0.0/0Chain FORWARD (policy ACCEPT 68560 packets, 8681K bytes)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * eth0.3 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
2639 169K TCPMSS tcp -- * ppp100 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
0 0 RETURN udp -- !br+ * 0.0.0.0/0 0.0.0.0/0 destination IP range 224.0.0.0-239.255.255.255
0 0 DROP udp -- !br+ !br+ 0.0.0.0/0 0.0.0.0/0 udp dpt:68
138K 47M DOS_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0
68560 8681K Parental_Ctrl all -- br+ * 0.0.0.0/0 0.0.0.0/0
138K 47M UPNP_PRE all -- * * 0.0.0.0/0 0.0.0.0/0
138K 47M ADDRMAP_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0
138K 47M ipfilter_chain all -- * * 0.0.0.0/0 0.0.0.0/0
10888 1594K url_filter_chain tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 80
135K 47M app_filter_chain tcp -- * * 0.0.0.0/0 0.0.0.0/0
3639 328K app_filter_chain udp -- * * 0.0.0.0/0 0.0.0.0/0
138K 47M PORT_FORWARDING all -- * * 0.0.0.0/0 0.0.0.0/0
138K 47M DEFAULT_SERVER all -- * * 0.0.0.0/0 0.0.0.0/0
68560 8681K FrwlForwardInChk all -- br0 * 0.0.0.0/0 0.0.0.0/0
69820 38M FrwlForwardInChk all -- ppp100 * 0.0.0.0/0 0.0.0.0/0Chain OUTPUT (policy ACCEPT 207K packets, 24M bytes)
pkts bytes target prot opt in out source destination
207K 24M FrwlOutChk all -- * * 0.0.0.0/0 0.0.0.0/0Chain ACL (1 references)
pkts bytes target prot opt in out source destination
284 15069 acl_chain tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 80,443,23,21,22,161,53
0 0 acl_chain udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 80,443,23,21,22,161,53
0 0 acl_chain icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8Chain ADDRMAP_FORWARD (1 references)
pkts bytes target prot opt in out source destinationChain CWMP_CR (1 references)
pkts bytes target prot opt in out source destinationChain DEFAULT_SERVER (1 references)
pkts bytes target prot opt in out source destinationChain DHCP_RELAY (1 references)
pkts bytes target prot opt in out source destinationChain DOS_FORWARD (1 references)
pkts bytes target prot opt in out source destinationChain DOS_INPUT (1 references)
pkts bytes target prot opt in out source destinationChain FrwlForwardInChk (2 references)
pkts bytes target prot opt in out source destination
69820 38M ACCEPT all -- ppp100 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:23
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:161
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:161
68560 8681K FrwlOutChk all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 FrwlOutChk tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:7547
0 0 FrwlOutChk icmp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 FrwlOutChk tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:443
0 0 FrwlOutChk tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:443
0 0 FrwlOutChk tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:443
0 0 FrwlOutChk tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:443
0 0 LOG tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 6/hour burst 5 LOG flags 0 level 1 prefix `Intrusion -> '
0 0 DROP all -- ppp100 * 0.0.0.0/0 0.0.0.0/0
68560 8681K FrwlOutChk all -- * * 0.0.0.0/0 0.0.0.0/0Chain FrwlInChk (1 references)
pkts bytes target prot opt in out source destination
802 245K ACCEPT all -- ppp100 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
2576 287K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
203 16466 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
1990 103K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 520
11 688 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:23
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:161
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:161
37057 13M ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:7547
6 268 ACCEPT icmp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 ACCEPT tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:443
106 5304 LOG tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 6/hour burst 5 LOG flags 0 level 1 prefix `Intrusion -> '
3677 260K DROP all -- ppp100 * 0.0.0.0/0 0.0.0.0/0Chain FrwlOutChk (13 references)
pkts bytes target prot opt in out source destinationChain PORT_FORWARDING (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 192.168.1.33 udp dpts:8001:8008
1 40 ACCEPT tcp -- ppp100 * 0.0.0.0/0 192.168.1.33 tcp dpts:8001:8008Chain PORT_SCAN (0 references)
pkts bytes target prot opt in out source destinationChain Parental_Ctrl (1 references)
pkts bytes target prot opt in out source destinationChain UPNP_PRE (1 references)
pkts bytes target prot opt in out source destinationChain VOIP_INPUT (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 10.23.129.250 udp dpt:5060
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 10.23.129.250 udp dpt:5060Chain acl_chain (3 references)
pkts bytes target prot opt in out source destination
3 156 ACCEPT tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 80 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT udp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 80 source IP range 0.0.0.0-223.255.255.255
280 14873 ACCEPT tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 23 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT udp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 23 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 21 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT udp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 21 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 53 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT udp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 53 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT icmp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 icmp type 8 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT icmp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 icmp type 8 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT icmp -- br0 * 0.0.0.0/0 0.0.0.0/0 icmp type 8 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT udp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 22 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 80.58.63.129-80.58.63.190
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.25.1-172.20.25.254
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 172.20.45.1-172.20.45.254
0 0 ACCEPT tcp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 193.152.37.193-193.152.37.206
0 0 ACCEPT tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 0.0.0.0-223.255.255.255
0 0 ACCEPT udp -- br0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 443 source IP range 0.0.0.0-223.255.255.255
1 40 LOG all -- !lo * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/min burst 1 LOG flags 0 level 7 prefix `RemoteManagement: Action=DROP Unsecured Client Access Deny '
1 40 DROP all -- !lo * 0.0.0.0/0 0.0.0.0/0Chain app_filter_chain (2 references)
pkts bytes target prot opt in out source destinationChain ipfilter_chain (1 references)
pkts bytes target prot opt in out source destinationChain url_filter_chain (1 references)
pkts bytes target prot opt in out source destination
#- madralphw27-11-2015Yo probé el VDSL
Hola e_zitro,
¿Así que cuando pasa un rato se añade más reglas solo? o ¿Eso pasa al rato de iniciarse?
Puedes volcar también:
# ip add
# brctl show
Llevo media mirando las diferencias y no veo nada que tenga que caparlo y a mi me da que va a ser tema wifi, que no es estable, es decir, hay señal parece que se conecta, pero no llega/procesa el tráfico. (A pesar de que indica calidad suficiente). Si acercas la impresora al router, ¿Desaparece el problema?
- e_zitro27-11-2015Yo probé el VDSL
Hola madralphw
Efectivamente en las iptables no se ve nada que pueda estar filtrando el protocolo Bonjour (5353) que el que se ocupa de este dialogo.
La impresora está a menos de un metro del router y con una señal magnífica
Este es el resultado de lo que me has pedido.
Trying 192.168.1.1...
Connected to router.
Escape character is '^]'.
Login: 1234
Password:
>sh
Password:#
# ip add
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: imq0: <NOARP,UP,LOWER_UP> mtu 16000 qdisc pfifo_fast qlen 11000
link/void
3: imq1: <NOARP> mtu 16000 qdisc noop qlen 11000
link/void
4: ifb0: <BROADCAST,NOARP> mtu 1500 qdisc noop qlen 32
link/ether 7a:41:d9:1d:0d:98 brd ff:ff:ff:ff:ff:ff
5: ifb1: <BROADCAST,NOARP> mtu 1500 qdisc noop qlen 32
link/ether a6:68:18:69:50:40 brd ff:ff:ff:ff:ff:ff
6: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
7: ip6tnl0: <NOARP> mtu 1460 qdisc noop
link/tunnel6 :: brd ::
8: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
9: ra0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether e2:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e041:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
10: br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global br0
inet 192.168.249.1/30 brd 192.168.249.3 scope global br0:0
inet 1.1.1.1/24 brd 1.1.1.255 scope global br0:9
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
11: ra1: <BROADCAST,MULTICAST> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether e2:41:36:5c:fd:79 brd ff:ff:ff:ff:ff:ff
12: ra2: <BROADCAST,MULTICAST> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether e2:41:36:5c:fd:7a brd ff:ff:ff:ff:ff:ff
13: ra3: <BROADCAST,MULTICAST> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether e2:41:36:5c:fd:7b brd ff:ff:ff:ff:ff:ff
14: wds0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000
link/ether e2:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
15: wds1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000
link/ether e2:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
16: wds2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000
link/ether e2:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
17: wds3: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000
link/ether e2:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
18: eth0.3281@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
19: eth0.3282@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
20: eth0.3283@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
21: eth0.3284@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
22: eth0.3286@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
23: eth0.3287@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
24: eth0.6@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc prio
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet6 fe80::e241:36ff:fe5c:fd78/64 scope link
valid_lft forever preferred_lft forever
25: eth0.3@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1480 qdisc prio
link/ether e0:41:36:5c:fd:78 brd ff:ff:ff:ff:ff:ff
inet 10.23.129.250/19 brd 10.23.159.255 scope global eth0.3
26: ppp100: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1480 qdisc pfifo_fast qlen 3
link/ppp
inet 88.5.196.64 peer 192.168.144.1/32 scope global ppp100
inet6 2a02:9100:e038:cca4:e241:36ff:fe5c:fd78/64 scope global dynamic
valid_lft forever preferred_lft forever
inet6 fe80::e241:36ff:fe5c:fd78/10 scope link
valid_lft forever preferred_lft forever
#
# brctl show^M
bridge name bridge id STP enabled interfaces^M
br0 8000.e041365cfd78 no ra0^M
ra1^M
ra2^M
ra3^M
eth0.3281^M
eth0.3282^M
eth0.3283^M
eth0.3284^M
eth0.3286^M
eth0.3287^Mtelnet> Connection closed.
- e_zitro27-11-2015Yo probé el VDSL
Hola madralphw
Yo ya había echado un vistazo a la iptables y no había visto nada raro, de todas formas te las envío para que las veas y me digas si tu ves algo.
# iptables -L -n -v
Chain INPUT (policy ACCEPT 23 packets, 6670 bytes)
pkts bytes target prot opt in out source destination
3387 455K VOIP_INPUT tcp -- * * 0.0.0.0/0 0.0.0.0/0
37090 13M VOIP_INPUT udp -- * * 0.0.0.0/0 0.0.0.0/0
40620 13M CWMP_CR all -- * * 0.0.0.0/0 0.0.0.0/0
40623 13M DOS_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
40621 13M DHCP_RELAY all -- * * 0.0.0.0/0 0.0.0.0/0
40621 13M ACL all -- * * 0.0.0.0/0 0.0.0.0/0
40621 13M FrwlInChk all -- * * 0.0.0.0/0 0.0.0.0/0Chain FORWARD (policy ACCEPT 58824 packets, 7517K bytes)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * eth0.3 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
2269 145K TCPMSS tcp -- * ppp100 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
0 0 RETURN udp -- !br+ * 0.0.0.0/0 0.0.0.0/0 destination IP range 224.0.0.0-239.255.255.255
0 0 DROP udp -- !br+ !br+ 0.0.0.0/0 0.0.0.0/0 udp dpt:68
116K 42M DOS_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0
58824 7517K Parental_Ctrl all -- br+ * 0.0.0.0/0 0.0.0.0/0
116K 42M UPNP_PRE all -- * * 0.0.0.0/0 0.0.0.0/0
116K 42M ADDRMAP_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0
116K 42M ipfilter_chain all -- * * 0.0.0.0/0 0.0.0.0/0
8933 1245K url_filter_chain tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 80
113K 42M app_filter_chain tcp -- * * 0.0.0.0/0 0.0.0.0/0
3002 270K app_filter_chain udp -- * * 0.0.0.0/0 0.0.0.0/0
116K 42M PORT_FORWARDING all -- * * 0.0.0.0/0 0.0.0.0/0
116K 42M DEFAULT_SERVER all -- * * 0.0.0.0/0 0.0.0.0/0
58824 7517K FrwlForwardInChk all -- br0 * 0.0.0.0/0 0.0.0.0/0
56859 35M FrwlForwardInChk all -- ppp100 * 0.0.0.0/0 0.0.0.0/0Chain OUTPUT (policy ACCEPT 198K packets, 21M bytes)
pkts bytes target prot opt in out source destination
198K 21M FrwlOutChk all -- * * 0.0.0.0/0 0.0.0.0/0Chain ACL (1 references)
pkts bytes target prot opt in out source destinationChain ADDRMAP_FORWARD (1 references)
pkts bytes target prot opt in out source destinationChain CWMP_CR (1 references)
pkts bytes target prot opt in out source destinationChain DEFAULT_SERVER (1 references)
pkts bytes target prot opt in out source destinationChain DHCP_RELAY (1 references)
pkts bytes target prot opt in out source destinationChain DOS_FORWARD (1 references)
pkts bytes target prot opt in out source destinationChain DOS_INPUT (1 references)
pkts bytes target prot opt in out source destinationChain FrwlForwardInChk (2 references)
pkts bytes target prot opt in out source destination
56859 35M ACCEPT all -- ppp100 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:23
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:161
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:161
58824 7517K FrwlOutChk all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 FrwlOutChk tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:7547
0 0 FrwlOutChk icmp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 FrwlOutChk tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:22
0 0 FrwlOutChk tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:443
0 0 FrwlOutChk tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:443
0 0 FrwlOutChk tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:443
0 0 FrwlOutChk tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:443
0 0 LOG tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 6/hour burst 5 LOG flags 0 level 1 prefix `Intrusion -> '
0 0 DROP all -- ppp100 * 0.0.0.0/0 0.0.0.0/0
58824 7517K FrwlOutChk all -- * * 0.0.0.0/0 0.0.0.0/0Chain FrwlInChk (1 references)
pkts bytes target prot opt in out source destination
773 236K ACCEPT all -- ppp100 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
602 110K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
197 15948 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
1883 97916 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 520
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:23
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:23
0 0 DROP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:161
0 0 DROP udp -- br0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:161
33612 12M ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:7547
6 268 ACCEPT icmp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 ACCEPT tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- ppp100 * 80.58.63.128/25 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- ppp100 * 172.20.25.0/24 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- ppp100 * 172.20.45.0/24 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- ppp100 * 193.152.37.192/28 0.0.0.0/0 tcp dpt:443
99 4984 LOG tcp -- ppp100 * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 6/hour burst 5 LOG flags 0 level 1 prefix `Intrusion -> '
3545 251K DROP all -- ppp100 * 0.0.0.0/0 0.0.0.0/0Chain FrwlOutChk (13 references)
pkts bytes target prot opt in out source destinationChain PORT_FORWARDING (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- ppp100 * 0.0.0.0/0 192.168.1.33 udp dpts:8001:8008
1 40 ACCEPT tcp -- ppp100 * 0.0.0.0/0 192.168.1.33 tcp dpts:8001:8008Chain PORT_SCAN (0 references)
pkts bytes target prot opt in out source destinationChain Parental_Ctrl (1 references)
pkts bytes target prot opt in out source destinationChain UPNP_PRE (1 references)
pkts bytes target prot opt in out source destinationChain VOIP_INPUT (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 10.23.129.250 udp dpt:5060
0 0 ACCEPT udp -- eth0.3 * 0.0.0.0/0 10.23.129.250 udp dpt:5060Chain app_filter_chain (2 references)
pkts bytes target prot opt in out source destinationChain ipfilter_chain (1 references)
pkts bytes target prot opt in out source destinationChain url_filter_chain (1 references)
pkts bytes target prot opt in out source destination
#Saludos