Jump to content

Tido

Members
  • Posts

    1539
  • Joined

  • Last visited

Everything posted by Tido

  1. Hi, just out of curiosity, did you run Step1, it is in my manual: // Step 1 // scan networks: iwlist wlan0 scan show available channels: iwlist wlan0 channel find least used channel: cat /proc/net/rtl819xC/wlan0/best_channel // Step 2 // Just configuring these didn't enable n-mode for my nix router. Turns out hostapd checks for neighboring SSID's. If there are a lot of those, it won't activate the secondary n-channel. A quick inSSIDer scan showed me my neighbours were in fact using the secondary channel. Apparently many routers don't have this check (as described in RFC) built in. I used the patch described in the url below to disable the neighborhood network check, and force hostapd to run in n-mode. http://www.brunsware.de/blog/gentoo/hostapd-40mhz-disable-neighbor-check.html source: stackoverflow // Step 3 // Some more interesting information on the bottom of page 5 of this doc HT40- and HT40+
  2. Well, if it is true what you say - please quote where it is mentioned: Product Information RTL8192CU I cannot find it. Your comment sounds like FUD (to discourage people). So proof us, where is it written that they have chosen the wrong product, beside USB2.0 connection !! The RTL8192CE (PCI Express Interface) is used quite often: List of 802.11ac Hardware search with your browser for rtl8192c. The specification beside USB2.0 sounds quiet similar to me.
  3. Hi, Concerning the setup, on page 5 I wrote: connect the single WAN port to your current Router. So the router is in this scenario not directly connected to the cablemodem /DSL. If I think now, my comments in 'interfaces' lead to this assumption for eth0.101 I will have to review that and think /test changes. Thank you
  4. Well, I don't know how or what these solution do different to iptables and because I have basically no clue about firewalls I thought it was good to go with a built solution. For whatever reason, while I was google'ing for this topic I found this to me very interesting posting: http://rolfebozier.com/archives/51 It is not long, but I got the impression that he goes into each detail. So either this or shorewall will become my firewall solution
  5. Hi, In order to secure my BPi-R1 I want to install a firewall on top of armbian. So please, no tipps for complete 'firewall distribution like IPcop, IPfire'. So I thought about, what is necessary to protect 'my cloud', which may be not the first interest for a hacker. My test candidates: Open Edgewize Shorewall ConfigServer Security & Firewall (csf) iptables (do it on your own) I collected some information of their functions, but I don't know what is crucial. Application Layer Filtering Just managing your network by port numbers and ip addresses is no longer sufficient. With the growing levels of web use, and http based applications, deep packet inspection is needed to properly manage your network securely. User authentication (invite some friends to share pictures) Blacklist Whitelist As the R1 can hold a HDD I want to load it with things like: LAMP http://ampache.org/ http://www.seafile.com/en/home/ http://syncthing.net/ https://sourceforge.net/projects/xbian/ OpenMediaVault may be testing owncloud I would like to know, what is your take on that and how do you secure your devices? Cheers Tido
  6. To use just apt update ... looks like you are a Linux Mint user, they wrote a python-programm to do so. The real APT needs the complete command: apt-get update apt-get upgrade apt-cache show ... apt-cache search .. hmm, Mr. Google could have told you that right away.
×
×
  • Create New...

Important Information

Terms of Use - Privacy Policy - Guidelines