Jump to content

mudmanc4

Moderators
  • Posts

    14,880
  • Joined

  • Last visited

  • Days Won

    230
  • Speed Test

    My Results

Everything posted by mudmanc4

  1. Question: Is the new cable 'cat5' connected to a LAN port or the WAN port on the wireless node? Your attempts to access the admin side might be triggering a 'rebinding attack'. So it will redirect to a nulled page or error out depending. You'll most likely be required to connect directly to the wireless node to access the admin panel, depending on how it was set up.
  2. You have no idea! We've watched Seinfeld for years, repeat after repeat. Love the obvious. Which obscures the masses. None the less, is the Westel wired or a repeater? I will say you point out the obvious as wired, but I have to ask, otherwise this could account for the high latency between the two , see?
  3. Westel model number please? I don't intend to be so pedantic, but it is important to know what the device capabilities are to determine if there is a 'better' or more efficient or 'proper' configuration for the specific depth of the layout. And why is the Westel necessary in any event? Unless it is acting as a 'dummy' or hub to connect other devices.
  4. Not sure where there would be a 'red' port on that switch, could you possibly take a pic and show it here? The switch should act as a 'hub' or gigabit connection to the modem, or otherwise configured network device before it in the topology. Should be a great device for basic full usability in any network which does not require specifics.
  5. Is it possible to get the topology of your network, in other words: Modem---> switch --> windows machine Or Modem --> switch --> switch --> XP windows machine | windows 10 machine It all good, we should have the above before at least myself, has a better understanding of the layout. Also, when referring to the 'node', this could mean any number of network 'devices' in the path, a switch, a router, to keep it simple, it's a 'hop' that must be traveled to reach the destination. Which is what the tracrt shows, each 'hop' from 'node to node' is showing the 'latency' or speed / time to reach there and back divided by 2.
  6. ok no problem, lets simplify this. Take one machine out of the discussion momentary. Is there one of th[e] two machines which can be connected to either or internal 'nodes' or switches as you are referring to? If so lets use that one to test each 'switch or node'
  7. The nodes that timed out are not always abnormal, it's simply the 'security' setup to not respond. What is more concerning appears to be the XP box, where the 10 box has not this issue. Yet you are getting the same test results from both machines, correct me?
  8. May I suggest running a traceroute to east.testmy.net, and post the results here please. tracert east.testmy.net
  9. WAN = Wide Area Network ; where WAN is outside of you local network, or, the other side of the modem = 'the Internet' LAN = Local Area Network ; where LAN is your local network, or inside your dwelling or, your personal network space More or less if the switch was connected to the WAN of the modem, there would be a request from the modem to the switch for an address, or IP address. Which is possible if you had a DHCP capable switch (which the JGS524 is not manage) but no Internet connection even if so. EDIT: If you might elaborate a bit. First, there should be no WAN port on the modem if it is cable, second there should be no WAN port on the switch, per se.
  10. Though I'm not one to sidetrack tenacity, there comes a time when fruitless become soured fruit. Imaged with Debian 8, amazing that Gallium 0.4 is functioning, though not using the card memory, I wont be gaming so it's not important. Dropped the openvpn config in it's place, and connected, boom, done, onward!
  11. I wanted to include this reason in the initial post, but thought it irreverent even muddling to the point at the time. Until now. The answer is, I do not care to use OpenSuse specifically. I've been corralled or forced into it at this point. The Mac is no longer a viable developing machine due to it's age. Slow, unresponsive and utterly useless when running several applications required. Excellent daily driver however. El Capiton is a major improvement over the last several updates. Next solution is the machine I am on now, however one 17" screen does not cover my requirements; the only usable card I have for this machine is an old nvidia card, which requires (linux) proprietary drivers, the latest of which supports such a card is the 304.xx, where Debian does not have upstream viability since rev 8, and I do not expect to see it anytime in the near future. So I'm working with what I have, which can pose challenges such as this. But this one is got to be user error, there should be no reason this system would be unable to run openvpn.
  12. I've turned off susefirewall, removed iptables, removed network-manager, apparmor, the network continues to function after a reboot. What is controlling this system
  13. Your on the right track I'm certain. Something is blocking this mess, in RHEL the GUI will override writing to iptables outside of manually updating /etc/sysconfig/iptables , correct ? So I am 'assuming' at this point there is a conflict between nm and susefirewall Since '/sbin/rcSuSEfirewall2 stop' will torch everything , I'm again assuming this is no more than a wrapper to iptables just as any other gui 'firewall'
  14. #systemctl status firewalld firewalld.service Loaded: not-found (Reason: No such file or directory) Active: inactive (dead)
  15. Simple right, drop your config in the openvpn directory, not forgetting auth-user-pass /dir/to/foo within the conf file, and the VPN will start on boot. Not so much. Thanks to systemd (as I understand it at this point) which I do not even see any realistic reason for systemd at this point. Manually start the connection right, openvpn config.conf (or whatever name and flags you desire or require) Now this all works out of the box on debian, that special flavor I find myself using as a daily OS. Add opensuse 42.1 = poof, zilch, sure, the vpn makes connection, yet no traffic. Right off the bat this explains a firewall, aka iptables will require masquerading. No problem right, that's where I've hit the wall. So I flush all iptables by running vi flush-iptables.sh #!/bin/sh echo "Flushing iptables rules..." sleep 1 iptables -F iptables -X iptables -t nat -F iptables -t nat -X iptables -t mangle -F iptables -t mangle -X iptables -P INPUT ACCEPT iptables -P FORWARD ACCEPT iptables -P OUTPUT ACCEPT Then make the script executable: chmod -x flush-iptables.sh And run the script: ./flush-iptables.sh Now I need to open a few things up so I use this script to allow the VPN through: vi openvpn-iptables.sh Then: #!/bin/sh # Accept responses to pings iptables -A INPUT -p icmp -m icmp --icmp-type echo-reply -j ACCEPT # Respond to pings iptables -A INPUT -p icmp -m icmp --icmp-type echo-request -j ACCEPT # Accept traceroutes iptables -A INPUT -p udp -m udp --dport 34000:35000 -j ACCEPT #Enable forwarding echo 1 > /proc/sys/net/ipv4/ip_forward #Allow all TUN iptables -A INPUT -i tun+ -j ACCEPT iptables -A OUTPUT -o tun+ -j ACCEPT iptables -A FORWARD -o tun+ -j ACCEPT #Accept connections on 34448 iptables -A INPUT -p udp --dport 34448 -j ACCEPT #Apply forwarding iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -s 10.10.2.0/24 -j ACCEPT iptables -A FORWARD -j REJECT iptables -t nat -A POSTROUTING -s 10.10.2.0/24 -o eth0 -j MASQUERADE # Display iptables -L -v Make the file executable: chmod -x openvpn-iptables.sh Run it: ./openvpn-iptables Run #iptables-save for persistent Should be good to go, but I've gone wrong somewhere. The VPN connects, but does not masquerade nor forward through eth0, checking wireshark it's as bland as bland shows the connections to the VPN server but that's about it. Kills eth0 (I have not set only for network in the vpn config) but that matters not in this situation. Anyone complete this solution? EDIT: The config file works flawless on two other machines locally, OSX as well as Debian. I've tried using network manager GUI gnome, as well as wicked, no such luck, something is overriding iptables, or I have them completely incorrect. Here is the display: Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 64 5568 ACCEPT all -- lo any anywhere anywhere 946K 1228M ACCEPT all -- any any anywhere anywhere ctstate ESTABLISHED 135 9180 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED 0 0 input_int all -- tun0 any anywhere anywhere 1466 61996 input_ext all -- any any anywhere anywhere 0 0 LOG all -- any any anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-IN-ILL-TARGET " 0 0 DROP all -- any any anywhere anywhere Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 TCPMSS tcp -- any any anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 0 0 forward_int all -- tun0 any anywhere anywhere 0 0 forward_ext all -- eth0 any anywhere anywhere 0 0 forward_ext all -- wlan0 any anywhere anywhere 0 0 LOG all -- any any anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-FWD-ILL-ROUTING " 0 0 DROP all -- any any anywhere anywhere Chain OUTPUT (policy ACCEPT 610K packets, 58M bytes) pkts bytes target prot opt in out source destination 64 5568 ACCEPT all -- any lo anywhere anywhere Chain forward_ext (2 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp echo-reply 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp destination-unreachable 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp time-exceeded 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp parameter-problem 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp timestamp-reply 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp address-mask-reply 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp protocol-unreachable 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp redirect 0 0 ACCEPT all -- eth0 tun0 anywhere anywhere ctstate RELATED,ESTABLISHED 0 0 ACCEPT all -- wlan0 tun0 anywhere anywhere ctstate RELATED,ESTABLISHED 0 0 DROP all -- any any anywhere anywhere PKTTYPE = multicast 0 0 DROP all -- any any anywhere anywhere PKTTYPE = broadcast 0 0 LOG tcp -- any any anywhere anywhere limit: avg 3/min burst 5 tcp flags:FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-FWDext-DROP-DEFLT " 0 0 LOG icmp -- any any anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-FWDext-DROP-DEFLT " 0 0 LOG udp -- any any anywhere anywhere limit: avg 3/min burst 5 ctstate NEW LOG level warning tcp-options ip-options prefix "SFW2-FWDext-DROP-DEFLT " 0 0 DROP all -- any any anywhere anywhere Chain forward_int (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp echo-reply 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp destination-unreachable 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp time-exceeded 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp parameter-problem 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp timestamp-reply 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp address-mask-reply 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp protocol-unreachable 0 0 ACCEPT icmp -- any any anywhere anywhere ctstate RELATED,ESTABLISHED icmp redirect 0 0 ACCEPT all -- tun0 eth0 anywhere anywhere ctstate NEW,RELATED,ESTABLISHED 0 0 ACCEPT all -- tun0 wlan0 anywhere anywhere ctstate NEW,RELATED,ESTABLISHED 0 0 DROP all -- any any anywhere anywhere PKTTYPE = multicast 0 0 DROP all -- any any anywhere anywhere PKTTYPE = broadcast 0 0 LOG tcp -- any any anywhere anywhere limit: avg 3/min burst 5 tcp flags:FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-FWDint-DROP-DEFLT " 0 0 LOG icmp -- any any anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-FWDint-DROP-DEFLT " 0 0 LOG udp -- any any anywhere anywhere limit: avg 3/min burst 5 ctstate NEW LOG level warning tcp-options ip-options prefix "SFW2-FWDint-DROP-DEFLT " 0 0 reject_func all -- any any anywhere anywhere Chain input_ext (1 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- any any anywhere anywhere PKTTYPE = broadcast 0 0 ACCEPT icmp -- any any anywhere anywhere icmp source-quench 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 33 4340 DROP all -- any any anywhere anywhere PKTTYPE = multicast 0 0 DROP all -- any any anywhere anywhere PKTTYPE = broadcast 0 0 LOG tcp -- any any anywhere anywhere limit: avg 3/min burst 5 tcp flags:FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-INext-DROP-DEFLT " 0 0 LOG icmp -- any any anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-INext-DROP-DEFLT " 4 388 LOG udp -- any any anywhere anywhere limit: avg 3/min burst 5 ctstate NEW LOG level warning tcp-options ip-options prefix "SFW2-INext-DROP-DEFLT " 1433 57656 DROP all -- any any anywhere anywhere Chain input_int (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- any any anywhere anywhere Chain reject_func (1 references) pkts bytes target prot opt in out source destination 0 0 REJECT tcp -- any any anywhere anywhere reject-with tcp-reset 0 0 REJECT udp -- any any anywhere anywhere reject-with icmp-port-unreachable 0 0 REJECT all -- any any anywhere anywhere reject-with icmp-proto-unreachable
  16. You could be right. Though with all campaigns there is tracking. The campaign here being 'buy this service and receive a 100 gift card'. They are not doing this so 'be nice', what is in it for anyone if it is a gift in a corporate business? The future payments of said client? That as well I am sure. Yet completely useless to the business, hell, they could simply grant 8 clams off the monthly cost for one year if they were not after anything. The card was registered to {place subsidiary here/ or not} of TWC, as with all prepaid top tier card ( MC Visa) they are registered when they are purchased. Then assigned to an account (TWC user) when granted. They are registered under the guise of 'theft protection' and 'government security'. Otherwise people would be moving large amounts of money to and fro for any number of reasons. Can't have that. Legalities? Sure, if said promotion is run by a subsidiary, or third party I'm sure they have the legalities covered.
  17. 500 Gigs on the plan I'm in. If you go over they'll auto charge 10 clams for an additional 10 Gigs (I think) I've never gone over, but very close many times. I see no throttling of standard web ports.
  18. They are paying to find what you buy with it, therefore they can send like minded advertisements your way. But hey, it's cash. Spend it XD
  19. Yes, the Block family has deep rooted connections in Ohio, the Toledo Blade paper has made them social gems for political prowess. They get what they want. Even if that means insuring no one else in the area. You can find DSL, and Dish, but why go there unless you[r] online life consists of no more than football and facebook.
  20. Soon as there is fiber I'm hitting it up. I can't complain about service, it's near flawless and consistent as anything could be expected. But pricing a no more than a gouge, with no viable choices. Hence the price gouge.
  21. Northern Ohio southern MI, maybe further by now.
  22. Your killing me man lol I pay just over 100 bones for 65/5 , to get what you have now, It would be $250, and only 5Mbps up http://buckeyecablesystem.com/order/bex.html
  23. Are you kidding me?! I suppose you're required to have a TV service along with to get that price yes? That's excellent.
×
×
  • Create New...