[ipcop] bluetooth ppp link

Pagina: 1
Acties:

  • ny-hardcore
  • Registratie: Maart 2002
  • Laatst online: 05-05 16:35
Ben bezig om bluetooth ondersteuning te krijgen op mijn ipcop box.

heb volgende :

kernel 2.4.21 met bluez + alle standaard ipcop modules
Bluez tools voor dund , pand, sdpd etc.
2 x jewl bluestick

Wat heb ik :

2 x jewelbluestick , ze werken, krijg een ppp link tussen laptop en ipcopbox.

Nu krijg ik alleen nog niet de default route op de laptop goed, (win98)
en ik heb het vermoeden dat de ipcop alle packets op de ppp0 dropt, kan alleen pingen van 192.168.0.254 (laptop) naar 192.168.0.1 (ipcop)

de volgende config bestanden heb ik :
/etc/ppp/peers/dun
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
# do not require auth
noauth

# do not use modem control lines we aren't using a real serial line
local

# do not determinate local ip from hostname
noipdefault

# usefull ARP proxing
#proxyarp

# do not enable default route
#nodefaultroute


# do not use ipx
noipx

# set disconnect timeout
idle 0

# local ip : remote ip
192.168.0.1:192.168.0.254

# dns
ms-dns 192.168.0.1

# netmask
netmask 255.255.255.0


miijn routing table (zonder ppp verbinding) is volgende :
code:
1
2
3
192.168.0.0     *               255.255.255.0   U     0      0        0 eth0
213.51.44.0     *               255.255.252.0   U     0      0        0 eth1
default         ubr2-ca3-0-sec. 0.0.0.0         UG    0      0        0 eth1


met PPP verbinding :
code:
1
2
3
4
192.168.0.254   *               255.255.255.255 UH    0      0        0 ppp0
192.168.0.0     *               255.255.255.0   U     0      0        0 eth0
213.51.44.0     *               255.255.252.0   U     0      0        0 eth1
default         ubr2-ca3-0-sec. 0.0.0.0         UG    0      0        0 eth1


iptables --list
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
iptables --list
Chain INPUT (policy DROP)
target     prot opt source               destination
PSCAN      tcp  --  anywhere             anywhere           tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
PSCAN      tcp  --  anywhere             anywhere           tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
           tcp  --  anywhere             anywhere           tcp flags:SYN,RST,ACK/SYN limit: avg 10/sec burst 5
CUSTOMINPUT  all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED
ACCEPT     all  --  anywhere             anywhere
ACCEPT     icmp --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere
RED        all  --  anywhere             anywhere
XTACCESS   all  --  anywhere             anywhere
LOG        all  --  anywhere             anywhere           limit: avg 10/min burst 5 LOG level warning prefix `INPUT '

Chain FORWARD (policy DROP)
target     prot opt source               destination
PSCAN      tcp  --  anywhere             anywhere           tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
PSCAN      tcp  --  anywhere             anywhere           tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
CUSTOMFORWARD  all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere
PORTFWACCESS  all  --  anywhere             anywhere
DMZHOLES   all  --  anywhere             anywhere
LOG        all  --  anywhere             anywhere           limit: avg 10/min burst 5 LOG level warning prefix `OUTPUT '

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain CUSTOMFORWARD (1 references)
target     prot opt source               destination

Chain CUSTOMINPUT (1 references)
target     prot opt source               destination

Chain DMZHOLES (1 references)
target     prot opt source               destination

Chain PORTFWACCESS (1 references)
target     prot opt source               destination

Chain PSCAN (4 references)
target     prot opt source               destination
LOG        tcp  --  anywhere             anywhere           limit: avg 10/min burst 5 LOG level warning prefix `TCP Scan? '
LOG        udp  --  anywhere             anywhere           limit: avg 10/min burst 5 LOG level warning prefix `UDP Scan? '
LOG        icmp --  anywhere             anywhere           limit: avg 10/min burst 5 LOG level warning prefix `ICMP Scan? '
LOG        all  -f  anywhere             anywhere           limit: avg 10/min burst 5 LOG level warning prefix `FRAG Scan? '
DROP       all  --  anywhere             anywhere

Chain RED (1 references)
target     prot opt source               destination
ACCEPT     tcp  --  anywhere             anywhere           tcp spt:bootps dpt:bootpc
ACCEPT     udp  --  anywhere             anywhere           udp spt:bootps dpt:bootpc
ACCEPT     gre  --  anywhere             anywhere
ACCEPT     ipv6-crypt--  anywhere             anywhere
ACCEPT     ipv6-auth--  anywhere             anywhere
ACCEPT     udp  --  anywhere             anywhere           udp spt:isakmp dpt:isakmp
DROP       all  --  anywhere             10.0.0.0/8
DROP       all  --  anywhere             127.0.0.0/8
DROP       all  --  anywhere             169.254.0.0/16
DROP       all  --  anywhere             172.16.0.0/12
DROP       all  --  anywhere             192.168.0.0/16

Chain XTACCESS (1 references)
target     prot opt source               destination


hoe krijg ik nu de gateway goed op de win98 box ,
en hoe kan ik alles wat op ppp0 binnekomt forwarden naar eth1 (mijn wan verbinding)

[ Voor 51% gewijzigd door ny-hardcore op 30-06-2003 21:35 . Reden: iptables --list ]

cd /pub && more beer