2 gescheiden LAN netwerken opzetten met FritzBox 7581

Pagina: 1
Acties:

Vraag


Acties:
  • 0 Henk 'm!

  • hans_1990
  • Registratie: April 2006
  • Niet online
Mijn netwerk bestaat momenteel uit een EdgeRouter die achter een FritzBox modem staat. De FritzBox deelt IP adresses uit in de 192.168.178.X range. De EdgeRouter deelt adressen uit op een ander subnet, zodat de apparaten achter de FritzBox niet bij de apparaten achter de EdgeRouter kunnen komen

FritzBox 7581 (modem & router: 192.168.178.1)
D-Link DIR-860L (router incl. WIFi: 192.168.178.2)
> iptv box xs4all
> pc
> printer
EdgerouterX (router: 192.168.178.3, deelt adressen uit met 192.168.1.38-243)
> pc
> UniFi AC LR (standelone mode for WiFi, 192.168.1.2)
> Netgear ProSafe plus switch (GS105Ev2, 192.168.1.3)
>> iptv box xs4all
>> playstation 3
>> IKEA tradfry hub

Kan iemand mij helpen met de firewall regel om de router IPTV van XS4ALL door de firewall te krijgen naar TV achter de EdgeRouter?
Ik heb onderstaande bronnen gebruikt:
https://community.ui.com/...ed-45c6-99d8-d820f01b7f08.
Onderstaand de output van $show ip multicast mfc:
code:
1
2
3
4
5
6
Group           Origin           In          Out                Pkts         Bytes  Wrong                                            
224.3.2.6       213.75.167.58    eth0        switch0            4216        1.46MB      0                                            
239.255.255.250 192.168.1.39     eth0        switch0             599      264.72KB    599         TV1                             
239.255.255.250 192.168.178.1    eth0        switch0              69       14.79KB      0          FritzBox                           
239.255.255.250 192.168.178.25   eth0        switch0             135       58.86KB      0         TV2                            
239.255.255.250 192.168.1.46     eth0        switch0              36       16.78KB     36          Laptop


- Waar ik niet uit kom is welke source en destination adressen/ranges ik moet gebruiken in de "Allow IPTV Multicast UDP" regel.
- Ook twijfel ik aan de alt-subnet van de IGMP snooping, klopt dit?

Zonder adressen in de firewall regel "Allow IPTV Multicast UDP" werkt de TV naar behoren, maar zo geef ik wel heel veel vrij in de firewall.


code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
----------------
Configuration File
----------------
firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow IPTV Multicast UDP"
            destination {
                address ???????????????
            }
            log disable
            protocol udp
            source {
                address ???????????????
            }
        }
        rule 20 {
            action accept
            description "Allow IGMP"
            log disable
            protocol igmp
        }
        rule 30 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 40 {
            action accept
            description "Allow ICMP"
            log disable
            protocol icmp
        }
        rule 50 {
            action drop
            description "Drop invalid state"
            log disable
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow IPTV Multicast UDP"
            destination {
                address ???????????????
            }
            log disable
            protocol udp
            source {
                address ???????????????
            }
        }
        rule 20 {
            action accept
            description "Allow IGMP"
            log disable
            protocol igmp
        }
        rule 30 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 40 {
            action accept
            description "Allow ICMP"
            log disable
            protocol icmp
        }
        rule 50 {
            action drop
            description "Drop invalid state"
            log disable
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.178.10/24 ???????????????
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth4 {
        description Local
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.1.1/24
        description Local
        mtu 1500
        switch-port {
            interface eth1 {
            }
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
    }
}
protocols {
    igmp-proxy {
        interface eth0 {
            alt-subnet 0.0.0.0/0
            role upstream
            threshold 1
        }
        interface eth2 {
            alt-subnet 0.0.0.0/0
            role downstream
            threshold 1
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 192.168.1.1
                lease 86400
                start 192.168.1.38 {
                    stop 192.168.1.243
                }
                static-mapping GS105Ev2 {
                    ip-address 192.168.1.3
                    mac-address [REDACTED]
                }
                static-mapping UAP-AC-LR {
                    ip-address 192.168.1.2
                    mac-address [REDACTED]
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on switch0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
    }
    unms {
        disable
    }
}
system {
    gateway-address 192.168.178.1 ???????????????
    [REDACTED]
}

[ Voor 104% gewijzigd door hans_1990 op 13-10-2019 20:40 ]