Renaming the old file before the copy means you lost the execute permission on the file.
You now need to chmod +x the new file to make it executable.
After doing that check again with ls -l to make sure it has execute permissions.
Block MAC Address Bug
Moderator: Moderators
Re: Block MAC Address Bug
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Re: Block MAC Address Bug
Apologies for that:
Did that, went into dhcp - hit save didn't make any difference. Rebooted gargoyle (is that necessary?) didn't make any difference.
Attached updated files,
* note I changed the ip of my machine to 192.168.1.251 as I wondered if the issue was I was assigning the machine within the dhcp range but that made no difference. Also if it helps I am pointing both gateway and dns at 192.168.1.1
** I still think it was run initially though as it did clear my wireless name to gargoyle and authentication key - unless that was a side effect of not running the file
Did that, went into dhcp - hit save didn't make any difference. Rebooted gargoyle (is that necessary?) didn't make any difference.
Attached updated files,
* note I changed the ip of my machine to 192.168.1.251 as I wondered if the issue was I was assigning the machine within the dhcp range but that made no difference. Also if it helps I am pointing both gateway and dns at 192.168.1.1
** I still think it was run initially though as it did clear my wireless name to gargoyle and authentication key - unless that was a side effect of not running the file
- Attachments
-
- files.zip
- iptables and ls dir as requested
- (532 Bytes) Downloaded 412 times
Netgear wndr3700 v2 Gargoyle 1.8.0
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
Re: Block MAC Address Bug
Here's another copy, same as before but with some debug output that may help figure out why it is not working for you.
Replace your existing file with this and then run
from the command line and post the resulting output.
Replace your existing file with this and then run
Code: Select all
/etc/init.d/firewall restart
- Attachments
-
- gargoyle_firewall_util.zip
- (4.84 KiB) Downloaded 407 times
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Re: Block MAC Address Bug
Paul,
Just about todo this but I note that the previous file has broken QOS - no traffic is showing through QOS and when I look at the connected list it is all showing NA - even though I have a catch all. I'll wait on your response before I put the fix on but will revert and then post if the revert restores QOS
Tals
Just about todo this but I note that the previous file has broken QOS - no traffic is showing through QOS and when I look at the connected list it is all showing NA - even though I have a catch all. I'll wait on your response before I put the fix on but will revert and then post if the revert restores QOS
Tals
Netgear wndr3700 v2 Gargoyle 1.8.0
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
Re: Block MAC Address Bug
OK reverting the file restored the QOS once I resaved the QOS screen (it said disabled till that point). Now going to try your file.
Netgear wndr3700 v2 Gargoyle 1.8.0
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
Re: Block MAC Address Bug
Message I get is:
IP Tables information now done is
QOS is working correctly./etc/init.d/firewall restart
Loading defaults
Loading synflood protection
Adding custom chains
Loading zones
Loading forwardings
Loading redirects
Loading rules
Loading includes
'etc/rc.common: .: line 4: can't open '/etc/functions.sh
Optimizing conntrack
Loading interfaces
IP Tables information now done is
192.168.1.251 is not blocked
cat iptables
Chain forward (1 references)
pkts bytes target prot opt in out source destination
48 2404 zone_lan_forward all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_forward all -- pppoe-wan * 0.0.0.0/0 0.0.0.0/0
Netgear wndr3700 v2 Gargoyle 1.8.0
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
Re: Block MAC Address Bug
The output you showed me indicates the file I sent is not being executed.
I suspect it got corrupted in some way when you copied it.
You might 'cat' it out to see what you can see.
I suspect it got corrupted in some way when you copied it.
You might 'cat' it out to see what you can see.
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Re: Block MAC Address Bug
Paul
Many thanks for your patience, it was indeed getting corrupted on copy. I was using winscp (commander mode) and with the mode set to binary it was adding M's to the end of the line. Changed to text mode and copied fine.
I then put your original fix back on and the tests work fine (i.e I get blocked when I change my ip) and then did the iptables command which confirms that it is listing correctly all the IP's
QOS is also working fine.
Tals
Many thanks for your patience, it was indeed getting corrupted on copy. I was using winscp (commander mode) and with the mode set to binary it was adding M's to the end of the line. Changed to text mode and copied fine.
I then put your original fix back on and the tests work fine (i.e I get blocked when I change my ip) and then did the iptables command which confirms that it is listing correctly all the IP's
QOS is also working fine.
Tals
Netgear wndr3700 v2 Gargoyle 1.8.0
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
TP-Link Archer C7 v2 1.10.X (Built 20180122-0707)
Re: Block MAC Address Bug
O WoW..... Guess I should have paid more attention to the boards..
Maybe I should have subscribed to this.
I'll try this out when I get back from Vacation.
The month of June was horrible at work (70+ hours/Week) and Junior lost his laptop for most of it due to misbehaving..
Thank You for such a great firmware!
Maybe I should have subscribed to this.
I'll try this out when I get back from Vacation.
The month of June was horrible at work (70+ hours/Week) and Junior lost his laptop for most of it due to misbehaving..
Thank You for such a great firmware!