I sometimes get similar symptoms on one of the bands at a time (2.4 or 5Ghz), what I usually do to solve it is hide and un-hide the SSID, after that the radio remains stable until a reset occurs.
thanks, will try that if it happens again.
I sometimes get similar symptoms on one of the bands at a time (2.4 or 5Ghz), what I usually do to solve it is hide and un-hide the SSID, after that the radio remains stable until a reset occurs.
That should be OK.If I wanted to downgrade to an older version (from V16 to V13) would that be possible without resetting to defaults?
If I wanted to downgrade to an older version (from V16 to V13) would that be possible without resetting to defaults?
If I wanted to downgrade to an older version (from V16 to V13) would that be possible without resetting to defaults?
ThanksThat should be OK.
Thanks for confirmingJohn has said a factory reset is not needed when going from one version to the other with this fork.
Both versions are stable, the problem I am having is with the traffic monitor. It isnt showing correct values. The older v13 (which was the previous version I had) had that working properly.Why would you want to downgrade to a much older version, if you don't mind me asking? Is v13 better/more stable than the latest release?
@Shayne We'll have to see your firewall-start before we can help you.
Err, OK. That looks kind of strange. So you want to block outgoing traffic from the router, not clients on your LAN. Correct?Right now I am working on a few , listed below
#!/bin/sh
iptables -I OUTPUT -d xxx.xxx.xxx.xxx -j DROP
iptables -A OUTPUT -d xxx.xxx.xxx.xxx -j DROP
iptables -I OUTPUT -d xxx.xxx.xxx.xxx -j REJECT
iptables -A OUTPUT -d xxx.xxx.xxx.xxx -j REJECT
I am looking to log the dropped IP and need a point, thanks.
I do not see the log function in help, as I see with online linux examples.
iptables -I OUTPUT -d xxx.xxx.xxx.xxx -j LOG --log-prefix "IP:# "
Regards
#!/bin/sh
iptables -I OUTPUT -d xxx.xxx.xxx.xxx -j logdrop
Err, OK. That looks kind of strange. So you want to block outgoing traffic from the router, not clients on your LAN. Correct?
You can use the existing "logdrop" chain to log DROP messages to syslog.Code:#!/bin/sh iptables -I OUTPUT -d xxx.xxx.xxx.xxx -j logdrop
It makes no difference, so set it to "none".I tried it with the GUI firewall "logged packet types" set to none, dropped, both and still no logging (which one should be set in the GUI, should none still work and it is overridden?).
No. That is the point I made earlier. The OUTPUT chain is only for traffic originating from the router itself, not the LAN.If I ping out, from a local machine, to one of the ip's it should be logged correct?
iptables -I FORWARD 5 -d xxx.xxx.xxx.xxx -i br0 -j logdrop
Thank you;^^^^
On the first page of this long tread
The following routers were released after the base code used for this fork was available, and are NOT supported.
- AC87U, AC3200 (and the retail R versions)
Try something like this:Is there a way to create a REJECT_log chain?
#!/bin/sh
iptables -N logreject
iptables -A logreject -j LOG --log-prefix "REJECT "
iptables -A logreject -j REJECT
iptables -I FORWARD 5 -d xxx.xxx.xxx.xxx -i br0 -j logreject
iptables -I FORWARD 5 -d yyy.yyy.yyy.yyy -i br0 -j logreject
iptables -I FORWARD 5 -d zzz.zzz.zzz.zzz -i br0 -j logreject
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!