john9527
Part of the Furniture
Yes....it must be marked executablea question: i have to do this?
chmod a+rx /jffs/scripts/firewall-start
EDIT: Also, since I'm not sure how you created the file....run
dos2unix /jffs/scripts/firewall-start
Yes....it must be marked executablea question: i have to do this?
chmod a+rx /jffs/scripts/firewall-start
Yes....it must be marked executable
EDIT: Also, since I'm not sure how you created the file....run
dos2unix /jffs/scripts/firewall-start
That should do it.....give it a go!in fact I had not done: I do it now and then reboot ok?
I'm not sure I fully understand your question.....but there is an inactivity timeout that is set for the router gui.a question: I see that browsers of PCs that are not locked, often make the page refreshes.
for example if you are in the configuration page of Asus Router, after just comes out and asks me to authenticate again
How I can block any IP Cam access from web (WAN) in an ASUS router UI settings, while allowing the cam to check only a certain time server on the web, but not serve any data. At the same time allowing access to the cam from LAN and receive video stream from its integrated server on any PC on LAN?
You boys are over complicating this a bit aren't you?
For any client you don't want internet access for...
Click on network map on the left under general
Click on the Client icon on the right for the specific client
Click on block internet access
Click Apply
Or
Setup the camera with a static ip address and leave the default gateway blank - make sure you create reservations for these or change the dhcp scope so it does not overlap
Setup your cameras to point to an internal ntp server
I have 5 different brands of ip cameras and they all have an ntp field.... Also I don't rely on the cameras to provide the timestamp, my blue iris server does that.You've made the assumption that the NTP server the camera uses can be changed and there is an available internal NTP server.
We access internet from PCs via the same router. For what IP should I setup such filter - only for IP cam? And block everything else in both directions? I don't see in my router Firewall settings separate filter choices for WAN and LAN traffic. Are they in different UI windows?
I have 5 different brands of ip cameras and they all have an ntp field.... Also I don't rely on the cameras to provide the timestamp, my blue iris server does that.
Hi,Hello, I have a IP Camera with some shady software on it. Replacing the camera and system is out of the budget right now so I want to prevent the camera from accessing the internet by using router features.
I have the latest asuswrt build (Dec 24 2015 I think) and using the Network Service Filter I put each camera and the NVR ip's as the source IP address's and set destination port range to 80 and for protocol i set a rule for TCP and UDP. But I notice that I can still access the internet from a device using ping (ICMP protocol which there is not a setting for). I'm not expert on hacking via the web, so the fact that a device can reach the web via ping but not www lets me know I probably need to do a lot more to achieve my goal.
How can I use the asuswrt-merlin software to make sure a device with shady software cant be accessed via the WWW, and can't access the WWW? I have the Asus RT-AC66U
Sorry to join an old thread however I am trying to achieve the same thing on my RT-AC68U 380.66.4.
I can confirm my script is executing in the system log however the traffic on the IPs is not getting blocked.
Can someone advise if I have something wrong or some syntax has changed since this post?
#!/bin/sh
iptables -I FORWARD 1 -s 191.128.1.99 -o eth0 -p udp --dport 123 -j ACCEPT
iptables -I FORWARD 2 -s 191.128.1.99 -o eth0 -j DROP
iptables -I FORWARD 3 -s 191.128.1.42 -o eth0 -p udp --dport 123 -j ACCEPT
iptables -I FORWARD 4 -s 191.128.1.42 -o eth0 -j DROP
iptables -I FORWARD 5 -s 191.128.1.60 -o eth0 -p udp --dport 123 -j ACCEPT
iptables -I FORWARD 6 -s 191.128.1.60 -o eth0 -j DROP
iptables -I FORWARD 6 -s 191.128.1.200 -o eth0 -j DROP
echo "*" >>/tmp/000firewall-start
iptables -I FORWARD -s xxx.xxx.xxx.xxx -i br0 ! -o tun2+ -j DROP
iptables -I FORWARD -m iprange --src-range xxx.xxx.xxx.xxx,xxx.xxx.xxx.xxx -i br0 ! -o tun2+ -j DROP
./IPCamsBlock.sh status
(IPCamsBlock.sh): 28121 v1.01 I/P Cameras Firewall blocking.... status
num pkts bytes target prot opt in out source destination
1 884 67184 ACCEPT udp -- br0 eth0 0.0.0.0/0 0.0.0.0/0 udp dpt:123
2 546 32760 DROP all -- br0 !tun2+ 10.88.8.120 0.0.0.0/0
3 0 0 DROP all -- br0 !tun2+ 10.88.8.121 0.0.0.0/0
4 0 0 DROP all -- br0 !tun2+ 10.88.8.122 0.0.0.0/0
5 7561 1961K DROP all -- br0 !tun2+ 10.88.8.123 0.0.0.0/0
6 0 0 DROP all -- br0 !tun2+ 10.88.8.124 0.0.0.0/0
7 1177 71221 DROP all -- br0 !tun2+ 10.88.8.125 0.0.0.0/0
(IPCamsBlock.sh): 28121 I/P Cameras Firewall blocking status request completed.
Those seem to be public, not private IP addresses, you better double check them.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!