Hozzászólások
-
SzerzőBejegyzés
-
Valószínűsítem, hogy portforward, mert biztos, hogy nem virtual servert csináltam 🙂
A tuzfal.txt :Code:Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT tcp — 195.184.180.4 0.0.0.0/0 tcp flags:!0x17/0x02
ACCEPT udp — 195.184.180.4 0.0.0.0/0
ACCEPT tcp — 195.184.181.4 0.0.0.0/0 tcp flags:!0x17/0x02
ACCEPT udp — 195.184.181.4 0.0.0.0/0
ACCEPT 0 — 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0 limit: avg 10/sec burst 5
DROP 0 — 0.0.0.0/0 255.255.255.255
DROP 0 — 0.0.0.0/0 192.168.2.255
DROP 0 — 224.0.0.0/8 0.0.0.0/0
DROP 0 — 0.0.0.0/0 224.0.0.0/8
DROP 0 — 255.255.255.255 0.0.0.0/0
DROP 0 — 0.0.0.0/0 0.0.0.0
DROP 0 — 0.0.0.0/0 0.0.0.0/0 state INVALID
LSI 0 -f 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5
INBOUND 0 — 0.0.0.0/0 0.0.0.0/0
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Unknown Input’Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0 limit: avg 10/sec burst 5
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Unknown Forward’Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT tcp — 192.168.2.158 195.184.180.4 tcp dpt:53
ACCEPT udp — 192.168.2.158 195.184.180.4 udp dpt:53
ACCEPT tcp — 192.168.2.158 195.184.181.4 tcp dpt:53
ACCEPT udp — 192.168.2.158 195.184.181.4 udp dpt:53
ACCEPT 0 — 0.0.0.0/0 0.0.0.0/0
DROP 0 — 224.0.0.0/8 0.0.0.0/0
DROP 0 — 0.0.0.0/0 224.0.0.0/8
DROP 0 — 255.255.255.255 0.0.0.0/0
DROP 0 — 0.0.0.0/0 0.0.0.0
DROP 0 — 0.0.0.0/0 0.0.0.0/0 state INVALID
OUTBOUND 0 — 0.0.0.0/0 0.0.0.0/0
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Unknown Output’Chain INBOUND (1 references)
target prot opt source destination
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 0 — 0.0.26.225 0.0.0.0/0
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:6881
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 udp dpt:6881
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:6981
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 udp dpt:6981
LSI 0 — 0.0.0.0/0 0.0.0.0/0Chain LOG_FILTER (5 references)
target prot opt source destinationChain LSI (2 references)
target prot opt source destination
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02
LOG tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x04 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x04
LOG icmp — 0.0.0.0/0 0.0.0.0/0 icmp type 8 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP icmp — 0.0.0.0/0 0.0.0.0/0 icmp type 8
LOG 0 — 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP 0 — 0.0.0.0/0 0.0.0.0/0Chain LSO (0 references)
target prot opt source destination
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec burst 5 LOG flags 0 level 6 prefix `Outbound ‘
REJECT 0 — 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachableChain OUTBOUND (1 references)
target prot opt source destination
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 0 — 0.0.0.0/0 0.0.0.0/0Valószínűsítem, hogy portforward, mert biztos, hogy nem virtual servert csináltam 🙂
A tuzfal.txt :Code:Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT tcp — 195.184.180.4 0.0.0.0/0 tcp flags:!0x17/0x02
ACCEPT udp — 195.184.180.4 0.0.0.0/0
ACCEPT tcp — 195.184.181.4 0.0.0.0/0 tcp flags:!0x17/0x02
ACCEPT udp — 195.184.181.4 0.0.0.0/0
ACCEPT 0 — 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0 limit: avg 10/sec burst 5
DROP 0 — 0.0.0.0/0 255.255.255.255
DROP 0 — 0.0.0.0/0 192.168.2.255
DROP 0 — 224.0.0.0/8 0.0.0.0/0
DROP 0 — 0.0.0.0/0 224.0.0.0/8
DROP 0 — 255.255.255.255 0.0.0.0/0
DROP 0 — 0.0.0.0/0 0.0.0.0
DROP 0 — 0.0.0.0/0 0.0.0.0/0 state INVALID
LSI 0 -f 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5
INBOUND 0 — 0.0.0.0/0 0.0.0.0/0
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Unknown Input’Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0 limit: avg 10/sec burst 5
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Unknown Forward’Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT tcp — 192.168.2.158 195.184.180.4 tcp dpt:53
ACCEPT udp — 192.168.2.158 195.184.180.4 udp dpt:53
ACCEPT tcp — 192.168.2.158 195.184.181.4 tcp dpt:53
ACCEPT udp — 192.168.2.158 195.184.181.4 udp dpt:53
ACCEPT 0 — 0.0.0.0/0 0.0.0.0/0
DROP 0 — 224.0.0.0/8 0.0.0.0/0
DROP 0 — 0.0.0.0/0 224.0.0.0/8
DROP 0 — 255.255.255.255 0.0.0.0/0
DROP 0 — 0.0.0.0/0 0.0.0.0
DROP 0 — 0.0.0.0/0 0.0.0.0/0 state INVALID
OUTBOUND 0 — 0.0.0.0/0 0.0.0.0/0
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Unknown Output’Chain INBOUND (1 references)
target prot opt source destination
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 0 — 0.0.26.225 0.0.0.0/0
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:6881
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 udp dpt:6881
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:6981
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 udp dpt:6981
LSI 0 — 0.0.0.0/0 0.0.0.0/0Chain LOG_FILTER (5 references)
target prot opt source destinationChain LSI (2 references)
target prot opt source destination
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02
LOG tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x04 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP tcp — 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x04
LOG icmp — 0.0.0.0/0 0.0.0.0/0 icmp type 8 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP icmp — 0.0.0.0/0 0.0.0.0/0 icmp type 8
LOG 0 — 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec burst 5 LOG flags 0 level 6 prefix `Inbound ‘
DROP 0 — 0.0.0.0/0 0.0.0.0/0Chain LSO (0 references)
target prot opt source destination
LOG_FILTER 0 — 0.0.0.0/0 0.0.0.0/0
LOG 0 — 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec burst 5 LOG flags 0 level 6 prefix `Outbound ‘
REJECT 0 — 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachableChain OUTBOUND (1 references)
target prot opt source destination
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT udp — 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 0 — 0.0.0.0/0 0.0.0.0/0Köszi lacix, sikerült…
SCART-ra kellett beállítanom, s sokkal szebb a kép, mint w*nd*ws-on.
Köszönöm mégegyszer!Köszi lacix, sikerült…
SCART-ra kellett beállítanom, s sokkal szebb a kép, mint w*nd*ws-on.
Köszönöm mégegyszer!kösz, meglesem
kösz, meglesem
És bam, meg tudnád mondani, hogy miképpen sikerült beállítanod?
(Nem tudtam, hogy a video norm, az ezt jelenti) mert amúgy, Pal-on van, de akkor sem lett jobb… nekemÉs bam, meg tudnád mondani, hogy miképpen sikerült beállítanod?
(Nem tudtam, hogy a video norm, az ezt jelenti) mert amúgy, Pal-on van, de akkor sem lett jobb… nekemKifejtenéd kicsit bővebben? XD
Kifejtenéd kicsit bővebben? XD
-
SzerzőBejegyzés
legutóbbi hsz