|
|
|
![]() |
|
Strumenti |
![]() |
#4841 |
Senior Member
Iscritto dal: Jan 2006
Messaggi: 723
|
la mia intenzione è propio quella, solo ke come detto qualsiasi apparecchio con quegli ip anke se lo imposto su telefonino, non vanno. per farli andare con regole applicate devo installargli tcp optimizer... scoperto per caso, quindi sui tel nn posso utilizzarlo e quindi nn navigano. devo per forza disattivare TUTTE le regole se voglio ke vadano
l'output di iptables --list come si fà?
__________________
•AMD Ryzen7 2700X, cooled by arctic freezer 34 eSports DUO •Asus PRIME X470-PRO •2x8Gb DDR4 3200 Corsair Vengeance • GTX 750Ti •Samsung evo 860 •Seagate Sata3 500Gb •WD 2Tb sata3. •Nec 7261S •EVGA SuperNOVA 750 G3 •Asus MX239H |
![]() |
![]() |
![]() |
#4842 |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
ma scusa...non puoi fare un bel lavoro di prenotazione indirizzi e setti le regole per ciascun indirizzo prenotato?
cioè tu stai dicendo che hai settato qui 2 ip, e per il dhcp, i primi che si connettono alla rete avranno quegli ip (.1 e .2) ma tuttavia non navigano nonostante le porte aperte? |
![]() |
![]() |
![]() |
#4843 | |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
Quote:
nessun riavvio a me con il 1014...con due sessioni, una da 40 ore e una da 24 (temporale di mezzo, meglio staccare ![]() vediamo tra qualche giorno... |
|
![]() |
![]() |
![]() |
#4844 | |
Senior Member
Iscritto dal: May 2006
Messaggi: 7413
|
Quote:
__________________
If you wanna make the world a better place, take a look at yourself and then make a change. MJ |
|
![]() |
![]() |
![]() |
#4845 | |
Senior Member
Iscritto dal: Apr 2000
Città: Vicino a Montecatini(Pistoia) Moto:Kawasaki Ninja ZX-9R Scudetti: 29
Messaggi: 53971
|
Quote:
Edit: letto ora... |
|
![]() |
![]() |
![]() |
#4846 | |
Senior Member
Iscritto dal: Jan 2006
Messaggi: 723
|
Quote:
anke se ho il dhcp e i pc prendono quegli indirizzi (0.1 e 0.2) non navigano lo stesso..
__________________
•AMD Ryzen7 2700X, cooled by arctic freezer 34 eSports DUO •Asus PRIME X470-PRO •2x8Gb DDR4 3200 Corsair Vengeance • GTX 750Ti •Samsung evo 860 •Seagate Sata3 500Gb •WD 2Tb sata3. •Nec 7261S •EVGA SuperNOVA 750 G3 •Asus MX239H |
|
![]() |
![]() |
![]() |
#4847 | |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
Quote:
no scusa...tu stai usando dhcp e ip fissi allo stesso tempo?? Non so se il router digerisce bene questa cosa... Pianificazione degli indirizzi, figliolo...perchè devi complicare la vita al router? |
|
![]() |
![]() |
![]() |
#4848 | |
Senior Member
Iscritto dal: May 2006
Messaggi: 7413
|
Quote:
Non vedo perchè disabilitare una funzione tanto comoda visto che non crea affatto conflitto.
__________________
If you wanna make the world a better place, take a look at yourself and then make a change. MJ |
|
![]() |
![]() |
![]() |
#4849 |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
ma magari da conflitto, visto che il router vorrebbe assegnargli un indirizzo e il pc lo impedisce.
Io farei un piano di indirizzamento come si deve, con una regola per ogni dispositivo nel fw, e il dhcp attivo per i nuovi arrivati, e una regola per i nuovi arrivati. Più ordinato di così. |
![]() |
![]() |
![]() |
#4850 |
Senior Member
Iscritto dal: Apr 2000
Città: Vicino a Montecatini(Pistoia) Moto:Kawasaki Ninja ZX-9R Scudetti: 29
Messaggi: 53971
|
|
![]() |
![]() |
![]() |
#4851 |
Senior Member
Iscritto dal: Jan 2006
Messaggi: 723
|
Codice:
# iptables --list Chain INPUT (policy DROP) target prot opt source destination OPENVPN all -- anywhere anywhere REAIM all -- anywhere anywhere BASIC_SERVICE all -- anywhere anywhere LOCAL_SERVICE all -- anywhere anywhere WAN_PING all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ACCEPT all -- anywhere 224.0.0.252 ACCEPT all -- anywhere 224.0.0.253 ACCEPT all -- anywhere 239.255.255.250 ALGS all -- anywhere anywhere OUT_FILTER all -- anywhere anywhere CFILTER_IM all -- anywhere anywhere CFILTER all -- anywhere anywhere FW_BASIC all -- anywhere anywhere IN_FILTER all -- anywhere anywhere MINIUPNPD all -- anywhere anywhere DMZ all -- anywhere anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destination MINIUPNPD_O all -- anywhere anywhere LAN_PING all -- anywhere anywhere Chain ALGS (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp spt:80 ACCEPT tcp -- anywhere anywhere tcp spt:389 ACCEPT tcp -- anywhere anywhere tcp spt:522 ACCEPT tcp -- anywhere anywhere tcp spt:1503 ACCEPT tcp -- anywhere anywhere tcp spt:1720 ACCEPT tcp -- anywhere anywhere tcp spt:1731 ACCEPT tcp -- anywhere anywhere tcp spt:1863 ACCEPT tcp -- anywhere anywhere tcp spt:6701 ACCEPT tcp -- anywhere anywhere tcp spt:6891 ACCEPT tcp -- anywhere anywhere tcp spt:6901 ACCEPT tcp -- anywhere anywhere tcp spt:7001 ACCEPT udp -- anywhere anywhere udp spt:5060 ACCEPT udp -- anywhere anywhere udp spt:6901 Chain BASIC_SERVICE (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED DOS_SERVICE all -- anywhere anywhere Chain BLOCK (14 references) target prot opt source destination LOG all -- anywhere anywhere LOG level warning prefix `[BLOCK]' REJECT tcp -- anywhere anywhere tcp dpt:80 reject-with http-block Chain CFILTER (1 references) target prot opt source destination HTTP tcp -- anywhere anywhere tcp dpt:80 flags:FIN,SYN,RST,PSH,ACK,URG/PSH,ACK STRING match GET HTTP tcp -- anywhere anywhere tcp dpt:80 flags:FIN,SYN,RST,PSH,ACK,URG/PSH,ACK STRING match POST HTTP tcp -- anywhere anywhere tcp dpt:80 flags:FIN,SYN,RST,PSH,ACK,URG/PSH,ACK STRING match HEAD Chain CFILTER_IM (1 references) target prot opt source destination Chain DIS_IMPORTS (0 references) target prot opt source destination Chain DMZ (1 references) target prot opt source destination Chain DOS (6 references) target prot opt source destination RETURN all -- anywhere anywhere SCAN all -- anywhere anywhere psd weight-threshold: 21 delay-threshold: 300 lo-ports-weight: 3 hi-ports-weight: 1 RETURN tcp -- anywhere anywhere limit: avg 50/sec burst 80 tcp flags:SYN,RST,ACK/SYN RETURN udp -- anywhere anywhere limit: avg 60/sec burst 100 RETURN icmp -- anywhere anywhere icmp echo-request limit: avg 5/sec burst 60 LOG all -- anywhere anywhere limit: avg 10/sec burst 5 LOG level warning prefix `[DOS]' DROP all -- anywhere anywhere Chain DOS_BASIC (1 references) target prot opt source destination DOS tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN DOS udp -- anywhere anywhere DOS icmp -- anywhere anywhere icmp echo-request Chain DOS_SERVICE (1 references) target prot opt source destination DOS tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN DOS udp -- anywhere anywhere DOS icmp -- anywhere anywhere icmp echo-request Chain FW_BASIC (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED DOS_BASIC all -- anywhere anywhere ACCEPT all -- anywhere anywhere MARK match 0x2511 ACCEPT all -- anywhere anywhere Chain HTTP (3 references) target prot opt source destination BLOCK all -- anywhere anywhere STRING match porno BLOCK all -- anywhere anywhere STRING match figa BLOCK all -- anywhere anywhere STRING match gay BLOCK all -- anywhere anywhere STRING match tette BLOCK all -- anywhere anywhere STRING match culo BLOCK all -- anywhere anywhere STRING match cazzo BLOCK all -- anywhere anywhere STRING match fuck BLOCK all -- anywhere anywhere STRING match pussy BLOCK all -- anywhere anywhere STRING match pene BLOCK all -- anywhere anywhere STRING match porn BLOCK all -- anywhere anywhere STRING match youtube BLOCK all -- anywhere anywhere STRING match youporn BLOCK all -- anywhere anywhere STRING match youjizz BLOCK all -- anywhere anywhere STRING match dailymotion Chain IN_FILTER (1 references) target prot opt source destination RETURN all -- anywhere anywhere ACCEPT tcp -- anywhere 192.168.0.1 tcp dpt:51348 ACCEPT udp -- anywhere 192.168.0.1 udp dpt:51348 ACCEPT tcp -- anywhere 192.168.0.1 tcp dpt:37295 ACCEPT udp -- anywhere 192.168.0.1 udp dpt:46534 Chain LAN_PING (1 references) target prot opt source destination Chain LOCAL_SERVICE (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere MARK match 0x2511 REMOTE_HTTPS all -- anywhere anywhere REMOTE_HTTP all -- anywhere anywhere REMOTE_TEL all -- anywhere anywhere REMOTE_SSH all -- anywhere anywhere REMOTE_NTP all -- anywhere anywhere REMOTE_SNMP all -- anywhere anywhere Chain MINIUPNPD (1 references) target prot opt source destination Chain MINIUPNPD_O (1 references) target prot opt source destination Chain OPENVPN (1 references) target prot opt source destination Chain OUT_FILTER (1 references) target prot opt source destination RETURN all -- anywhere anywhere LOG all -- !192.168.0.1 anywhere LOG level warning prefix `[Any(ALL) rule not match]' LOG all -- 192.168.0.1 anywhere LOG level warning prefix `[Any(ALL) rule match]' ACCEPT all -- 192.168.0.1 anywhere LOG all -- !192.168.0.2 anywhere LOG level warning prefix `[Any(ALL) rule not match]' LOG all -- 192.168.0.2 anywhere LOG level warning prefix `[Any(ALL) rule match]' ACCEPT all -- 192.168.0.2 anywhere LOG all -- !anywhere anywhere LOG level warning prefix `[Any(ALL) rule not match]' LOG all -- anywhere anywhere LOG level warning prefix `[Any(ALL) rule match]' DROP all -- anywhere anywhere Chain REAIM (1 references) target prot opt source destination Chain REMOTE_HTTP (1 references) target prot opt source destination Chain REMOTE_HTTPS (1 references) target prot opt source destination Chain REMOTE_NTP (1 references) target prot opt source destination Chain REMOTE_SNMP (1 references) target prot opt source destination Chain REMOTE_SSH (1 references) target prot opt source destination Chain REMOTE_TEL (1 references) target prot opt source destination Chain SCAN (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 10/sec burst 5 LOG level warning prefix `[PORT SCAN]' DROP all -- anywhere anywhere Chain WAN_PING (1 references) target prot opt source destination #
__________________
•AMD Ryzen7 2700X, cooled by arctic freezer 34 eSports DUO •Asus PRIME X470-PRO •2x8Gb DDR4 3200 Corsair Vengeance • GTX 750Ti •Samsung evo 860 •Seagate Sata3 500Gb •WD 2Tb sata3. •Nec 7261S •EVGA SuperNOVA 750 G3 •Asus MX239H Ultima modifica di cionci : 17-04-2010 alle 14:34. |
![]() |
![]() |
![]() |
#4852 |
Senior Member
Iscritto dal: Apr 2000
Città: Vicino a Montecatini(Pistoia) Moto:Kawasaki Ninja ZX-9R Scudetti: 29
Messaggi: 53971
|
Ti ho messo il tag code, almeno si legge meglio
![]() |
![]() |
![]() |
![]() |
#4853 |
Senior Member
Iscritto dal: Apr 2000
Città: Vicino a Montecatini(Pistoia) Moto:Kawasaki Ninja ZX-9R Scudetti: 29
Messaggi: 53971
|
Potresti disabilitare il logging (registro) e poi riprovare ?
|
![]() |
![]() |
![]() |
#4854 |
Senior Member
Iscritto dal: Jan 2006
Messaggi: 723
|
Codice HTML:
# iptables --list Chain INPUT (policy DROP) target prot opt source destination OPENVPN all -- anywhere anywhere REAIM all -- anywhere anywhere BASIC_SERVICE all -- anywhere anywhere LOCAL_SERVICE all -- anywhere anywhere WAN_PING all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ACCEPT all -- anywhere 224.0.0.252 ACCEPT all -- anywhere 224.0.0.253 ACCEPT all -- anywhere 239.255.255.250 ALGS all -- anywhere anywhere OUT_FILTER all -- anywhere anywhere CFILTER_IM all -- anywhere anywhere CFILTER all -- anywhere anywhere FW_BASIC all -- anywhere anywhere IN_FILTER all -- anywhere anywhere MINIUPNPD all -- anywhere anywhere DMZ all -- anywhere anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destination MINIUPNPD_O all -- anywhere anywhere LAN_PING all -- anywhere anywhere Chain ALGS (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp spt:80 ACCEPT tcp -- anywhere anywhere tcp spt:389 ACCEPT tcp -- anywhere anywhere tcp spt:522 ACCEPT tcp -- anywhere anywhere tcp spt:1503 ACCEPT tcp -- anywhere anywhere tcp spt:1720 ACCEPT tcp -- anywhere anywhere tcp spt:1731 ACCEPT tcp -- anywhere anywhere tcp spt:1863 ACCEPT tcp -- anywhere anywhere tcp spt:6701 ACCEPT tcp -- anywhere anywhere tcp spt:6891 ACCEPT tcp -- anywhere anywhere tcp spt:6901 ACCEPT tcp -- anywhere anywhere tcp spt:7001 ACCEPT udp -- anywhere anywhere udp spt:5060 ACCEPT udp -- anywhere anywhere udp spt:6901 Chain BASIC_SERVICE (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED DOS_SERVICE all -- anywhere anywhere Chain BLOCK (14 references) target prot opt source destination LOG all -- anywhere anywhere LOG level warning prefix `[BLOCK]' REJECT tcp -- anywhere anywhere tcp dpt:80 reject-with http-block Chain CFILTER (1 references) target prot opt source destination HTTP tcp -- anywhere anywhere tcp dpt:80 flags:FIN,SYN,RST,PSH,ACK,URG/PSH,ACK STRING match GET HTTP tcp -- anywhere anywhere tcp dpt:80 flags:FIN,SYN,RST,PSH,ACK,URG/PSH,ACK STRING match POST HTTP tcp -- anywhere anywhere tcp dpt:80 flags:FIN,SYN,RST,PSH,ACK,URG/PSH,ACK STRING match HEAD Chain CFILTER_IM (1 references) target prot opt source destination Chain DIS_IMPORTS (0 references) target prot opt source destination Chain DMZ (1 references) target prot opt source destination Chain DOS (6 references) target prot opt source destination RETURN all -- anywhere anywhere SCAN all -- anywhere anywhere psd weight-threshold: 21 delay-threshold: 300 lo-ports-weight: 3 hi-ports-weight: 1 RETURN tcp -- anywhere anywhere limit: avg 50/sec burst 80 tcp flags:SYN,RST,ACK/SYN RETURN udp -- anywhere anywhere limit: avg 60/sec burst 100 RETURN icmp -- anywhere anywhere icmp echo-request limit: avg 5/sec burst 60 LOG all -- anywhere anywhere limit: avg 10/sec burst 5 LOG level warning prefix `[DOS]' DROP all -- anywhere anywhere Chain DOS_BASIC (1 references) target prot opt source destination DOS tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN DOS udp -- anywhere anywhere DOS icmp -- anywhere anywhere icmp echo-request Chain DOS_SERVICE (1 references) target prot opt source destination DOS tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN DOS udp -- anywhere anywhere DOS icmp -- anywhere anywhere icmp echo-request Chain FW_BASIC (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED DOS_BASIC all -- anywhere anywhere ACCEPT all -- anywhere anywhere MARK match 0x2511 ACCEPT all -- anywhere anywhere Chain HTTP (3 references) target prot opt source destination BLOCK all -- anywhere anywhere STRING match porno BLOCK all -- anywhere anywhere STRING match figa BLOCK all -- anywhere anywhere STRING match gay BLOCK all -- anywhere anywhere STRING match tette BLOCK all -- anywhere anywhere STRING match culo BLOCK all -- anywhere anywhere STRING match cazzo BLOCK all -- anywhere anywhere STRING match fuck BLOCK all -- anywhere anywhere STRING match pussy BLOCK all -- anywhere anywhere STRING match pene BLOCK all -- anywhere anywhere STRING match porn BLOCK all -- anywhere anywhere STRING match youtube BLOCK all -- anywhere anywhere STRING match youporn BLOCK all -- anywhere anywhere STRING match youjizz BLOCK all -- anywhere anywhere STRING match dailymotion Chain IN_FILTER (1 references) target prot opt source destination RETURN all -- anywhere anywhere ACCEPT tcp -- anywhere 192.168.0.1 tcp dpt:51348 ACCEPT udp -- anywhere 192.168.0.1 udp dpt:51348 ACCEPT tcp -- anywhere 192.168.0.1 tcp dpt:37295 ACCEPT udp -- anywhere 192.168.0.1 udp dpt:46534 Chain LAN_PING (1 references) target prot opt source destination Chain LOCAL_SERVICE (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere MARK match 0x2511 REMOTE_HTTPS all -- anywhere anywhere REMOTE_HTTP all -- anywhere anywhere REMOTE_TEL all -- anywhere anywhere REMOTE_SSH all -- anywhere anywhere REMOTE_NTP all -- anywhere anywhere REMOTE_SNMP all -- anywhere anywhere Chain MINIUPNPD (1 references) target prot opt source destination Chain MINIUPNPD_O (1 references) target prot opt source destination Chain OPENVPN (1 references) target prot opt source destination Chain OUT_FILTER (1 references) target prot opt source destination RETURN all -- anywhere anywhere LOG all -- !192.168.0.1 anywhere LOG level warning prefix `[Any(ALL) rule not match]' LOG all -- 192.168.0.1 anywhere LOG level warning prefix `[Any(ALL) rule match]' ACCEPT all -- 192.168.0.1 anywhere LOG all -- !192.168.0.2 anywhere LOG level warning prefix `[Any(ALL) rule not match]' LOG all -- 192.168.0.2 anywhere LOG level warning prefix `[Any(ALL) rule match]' ACCEPT all -- 192.168.0.2 anywhere LOG all -- !anywhere anywhere LOG level warning prefix `[Any(ALL) rule not match]' LOG all -- anywhere anywhere LOG level warning prefix `[Any(ALL) rule match]' DROP all -- anywhere anywhere Chain REAIM (1 references) target prot opt source destination Chain REMOTE_HTTP (1 references) target prot opt source destination Chain REMOTE_HTTPS (1 references) target prot opt source destination Chain REMOTE_NTP (1 references) target prot opt source destination Chain REMOTE_SNMP (1 references) target prot opt source destination Chain REMOTE_SSH (1 references) target prot opt source destination Chain REMOTE_TEL (1 references) target prot opt source destination Chain SCAN (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 10/sec burst 5 LOG level warning prefix `[PORT SCAN]' DROP all -- anywhere anywhere Chain WAN_PING (1 references) target prot opt source destination #
__________________
•AMD Ryzen7 2700X, cooled by arctic freezer 34 eSports DUO •Asus PRIME X470-PRO •2x8Gb DDR4 3200 Corsair Vengeance • GTX 750Ti •Samsung evo 860 •Seagate Sata3 500Gb •WD 2Tb sata3. •Nec 7261S •EVGA SuperNOVA 750 G3 •Asus MX239H |
![]() |
![]() |
![]() |
#4855 |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
confermo c'è un bug nel firewall...
se faccio il block any nei servizi in uscita e sopra gli metto una regola che apre la porta 80, naviga solo su google, gli altri siti vengono bloccati (il fw li blocca, con pagina in caricamento perenne), non capisco perchè. 1014 ovviamente. |
![]() |
![]() |
![]() |
#4856 |
Senior Member
Iscritto dal: Jan 2006
Messaggi: 723
|
supermario invece di solo la porta 80 fai any all.
prova xkè a caurusapulus non succede, mentre a me da molti firmware mentre il bug del blocca siti e confermato cmq in pratica le regole da me impostate servono in casa per abilitare solo 1 o 2 pc alla navigazione internet e gli altri solo in rete
__________________
•AMD Ryzen7 2700X, cooled by arctic freezer 34 eSports DUO •Asus PRIME X470-PRO •2x8Gb DDR4 3200 Corsair Vengeance • GTX 750Ti •Samsung evo 860 •Seagate Sata3 500Gb •WD 2Tb sata3. •Nec 7261S •EVGA SuperNOVA 750 G3 •Asus MX239H |
![]() |
![]() |
![]() |
#4857 |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
si mi succede anche a me...un any(all) che consente tutte le porte in uscita sopra un any(all) che blocca tutte le porte in uscita non fa navigare se non su google e altri pochissimi siti.
Prima ovviamente avevo sbloccato non solo la 80 ma anche la 53 dei dns, ma la cosa non cambia. E ovviamente nel registro non c'è traccia di nessun blocco da parte del fw C'è un problema nel fw. E confermo anche il blocca siti non funzionante nel caso di regole in uscita any(all). Non c'è un firmware senza bugs ![]() |
![]() |
![]() |
![]() |
#4858 |
Senior Member
Iscritto dal: May 2006
Messaggi: 7413
|
Anche Stev-O è umano
![]()
__________________
If you wanna make the world a better place, take a look at yourself and then make a change. MJ |
![]() |
![]() |
![]() |
#4859 |
Senior Member
Iscritto dal: Apr 2000
Città: Vicino a Montecatini(Pistoia) Moto:Kawasaki Ninja ZX-9R Scudetti: 29
Messaggi: 53971
|
Sembrano legati fra loro questo blocca siti ed il problema al firewall (visto che navighi su alcuni siti). Disattivando il blocca siti quelle regole del firewall funzionano ?
|
![]() |
![]() |
![]() |
#4860 |
Bannato
Iscritto dal: Feb 2007
Città: Trezzo sull'Adda (MI) Moto: Kawa ER-6n '07 Orange
Messaggi: 1614
|
no. Sono due problemi separati. I siti non funzionano se dietro quelle regole E il blocca siti non funziona quando ci sono quelle regole. Non è il blocca siti la causa, dovrebbe essere il fw
|
![]() |
![]() |
![]() |
Strumenti | |
|
|
Tutti gli orari sono GMT +1. Ora sono le: 07:59.