Routerkonfigurationtsdateien (Raspberry): Unterschied zwischen den Versionen
		
		
		
		
		
		Zur Navigation springen
		Zur Suche springen
		
				
		
		
	
 (Die Seite wurde neu angelegt: „== 11.05.2016 ==  ''/etc/network/interfaces'':  <pre> source-directory /etc/network/interfaces.d  auto lo iface lo inet loopback  auto eth0 iface eth0 inet sta…“)  | 
				|||
| (3 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 1: | Zeile 1: | ||
== 22.05.2016 ==  | |||
''/etc/network/interfaces'':  | |||
<pre>  | |||
# interfaces(5) file used by ifup(8) and ifdown(8)  | |||
# Please note that this file is written to be used with dhcpcd  | |||
# For static IP, consult /etc/dhcpcd.conf and 'man dhcpcd.conf'  | |||
# Include files from /etc/network/interfaces.d:  | |||
source-directory /etc/network/interfaces.d  | |||
auto lo  | |||
iface lo inet loopback  | |||
auto eth0  | |||
iface eth0 inet static  | |||
    address 10.1.0.1  | |||
    netmask 255.255.255.0  | |||
auto wlan0  | |||
allow-hotplug wlan0  | |||
iface wlan0 inet static  | |||
    wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf  | |||
    address 10.0.0.98  | |||
    netmask 255.255.255.0  | |||
    gateway 10.0.0.138  | |||
    dns-nameservers 10.0.0.138  | |||
# NAT und Masquerading aktivieren  | |||
up /sbin/iptables -A FORWARD -o wlan0 -i eth0 -m conntrack --ctstate NEW -j ACCEPT  | |||
up /sbin/iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT  | |||
up /sbin/iptables -t nat -F POSTROUTING  | |||
up /sbin/iptables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE  | |||
# IP-Forwarding aktivieren  | |||
up sysctl -w net.ipv4.ip_forward=1  | |||
up sysctl -w net.ipv6.conf.all.forwarding=1  | |||
# Port TCP 81 an IP-Adresse 10.1.0.150:80 (Webif)  | |||
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 81 -j DNAT --to-destination 10.1.0.150:80  | |||
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 81 -j ACCEPT  | |||
# Port TCP (100)22 an IP-Adresse 10.1.0.150:22 (ssh)  | |||
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 10022 -j DNAT --to-destination 10.1.0.150:22  | |||
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 10022 -j ACCEPT  | |||
# Port TCP 84 an IP-Adresse 10.1.0.150:83 (OSCam)  | |||
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 84 -j DNAT --to-destination 10.1.0.150:83  | |||
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 84 -j ACCEPT  | |||
# Port TCP 81 auch ueber OpenVPN an 10.1.0.150 weiterleiten  | |||
up /sbin/iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 81 -j DNAT --to-destination 10.1.0.150:80  | |||
up /sbin/iptables -A FORWARD -i tun0 -d 10.1.0.150 -p tcp --dport 81 -j ACCEPT  | |||
# Port UDP 1194 an IP-Adresse 10.1.0.150 (OpenVPN)  | |||
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p udp --dport 1194 -j DNAT --to-destination 10.1.0.150  | |||
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p udp --dport 1194 -j ACCEPT  | |||
# Route für OpenVPN-Pakete aus Ethernet-Schnittstelle  | |||
up route add -net 10.7.0.0 netmask 255.255.255.0 gw 10.1.0.1 metric 1  | |||
</pre>  | |||
== 11.05.2016 ==  | == 11.05.2016 ==  | ||
| Zeile 48: | Zeile 112: | ||
up route add -net 10.7.0.0 netmask 255.255.255.0 gw 10.1.0.1 metric 1  | up route add -net 10.7.0.0 netmask 255.255.255.0 gw 10.1.0.1 metric 1  | ||
</pre>  | </pre>  | ||
Zurück zu [[Router (Raspbian)]]  | |||
Aktuelle Version vom 22. Mai 2016, 09:20 Uhr
22.05.2016
/etc/network/interfaces:
# interfaces(5) file used by ifup(8) and ifdown(8)
# Please note that this file is written to be used with dhcpcd
# For static IP, consult /etc/dhcpcd.conf and 'man dhcpcd.conf'
# Include files from /etc/network/interfaces.d:
source-directory /etc/network/interfaces.d
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
    address 10.1.0.1
    netmask 255.255.255.0
auto wlan0
allow-hotplug wlan0
iface wlan0 inet static
    wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf
    address 10.0.0.98
    netmask 255.255.255.0
    gateway 10.0.0.138
    dns-nameservers 10.0.0.138
# NAT und Masquerading aktivieren
up /sbin/iptables -A FORWARD -o wlan0 -i eth0 -m conntrack --ctstate NEW -j ACCEPT
up /sbin/iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
up /sbin/iptables -t nat -F POSTROUTING
up /sbin/iptables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE
# IP-Forwarding aktivieren
up sysctl -w net.ipv4.ip_forward=1
up sysctl -w net.ipv6.conf.all.forwarding=1
# Port TCP 81 an IP-Adresse 10.1.0.150:80 (Webif)
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 81 -j DNAT --to-destination 10.1.0.150:80
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 81 -j ACCEPT
# Port TCP (100)22 an IP-Adresse 10.1.0.150:22 (ssh)
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 10022 -j DNAT --to-destination 10.1.0.150:22
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 10022 -j ACCEPT
# Port TCP 84 an IP-Adresse 10.1.0.150:83 (OSCam)
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 84 -j DNAT --to-destination 10.1.0.150:83
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 84 -j ACCEPT
# Port TCP 81 auch ueber OpenVPN an 10.1.0.150 weiterleiten
up /sbin/iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 81 -j DNAT --to-destination 10.1.0.150:80
up /sbin/iptables -A FORWARD -i tun0 -d 10.1.0.150 -p tcp --dport 81 -j ACCEPT
# Port UDP 1194 an IP-Adresse 10.1.0.150 (OpenVPN)
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p udp --dport 1194 -j DNAT --to-destination 10.1.0.150
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p udp --dport 1194 -j ACCEPT
# Route für OpenVPN-Pakete aus Ethernet-Schnittstelle
up route add -net 10.7.0.0 netmask 255.255.255.0 gw 10.1.0.1 metric 1
11.05.2016
/etc/network/interfaces:
source-directory /etc/network/interfaces.d
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
    address 10.1.0.1
    netmask 255.255.255.0
auto wlan0
allow-hotplug wlan0
iface wlan0 inet static
    wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf
    address 10.0.0.98
    netmask 255.255.255.0
    gateway 10.0.0.138
    dns-nameservers 10.0.0.138
# NAT und Masquerading aktivieren
up /sbin/iptables -A FORWARD -o wlan0 -i eth0 -m conntrack --ctstate NEW -j ACCEPT
up /sbin/iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
up /sbin/iptables -t nat -F POSTROUTING
up /sbin/iptables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE
# IP-Forwarding aktivieren
up sysctl -w net.ipv4.ip_forward=1
up sysctl -w net.ipv6.conf.all.forwarding=1
# Port TCP 81 an IP-Adresse 10.1.0.150:80 (Webif)
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 81 -j DNAT --to-destination 10.1.0.150:80
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p tcp --dport 81 -j ACCEPT
# Port TCP 81 auch ueber OpenVPN an 10.1.0.150 weiterleiten
up /sbin/iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 81 -j DNAT --to-destination 10.1.0.150:80
up /sbin/iptables -A FORWARD -i tun0 -d 10.1.0.150 -p tcp --dport 81 -j ACCEPT
# Port UDP 1194 an IP-Adresse 10.1.0.150 (OpenVPN)
up /sbin/iptables -t nat -A PREROUTING -i wlan0 -p udp --dport 1194 -j DNAT --to-destination 10.1.0.150
up /sbin/iptables -A FORWARD -i wlan0 -d 10.1.0.150 -p udp --dport 1194 -j ACCEPT
# Route für OpenVPN-Pakete aus Ethernet-Schnittstelle
up route add -net 10.7.0.0 netmask 255.255.255.0 gw 10.1.0.1 metric 1
Zurück zu Router (Raspbian)