AlterX

Members
  • Content Count

    28
  • Joined

  • Last visited

About AlterX

  • Rank
    Member

Profile Information

  • Gender
    Male
  • Location
    Switzerland
  1. AlterX

    Orange PI Zero optimization

    Yes I know...it is already planned to switch over to a modern vpn protocol...but for my project right now doesn't really matter. Anyway the box will be completely isolated from the internal network and also guests won't see each other.
  2. AlterX

    Gianni Romano

  3. AlterX

    Orange PI Zero optimization

    I think I found something interesting: low consumption how to change the fex: change fex settings
  4. AlterX

    Orange PI Zero optimization

    Yeah...I will check what I can do with armbian-config...thanks Not only raspberry...armbian as well on banana pi!
  5. AlterX

    Orange PI Zero optimization

    Good to know it...I will then create a second generation Anything about disabling GPU, on board wifi and something else?
  6. AlterX

    Orange PI Zero optimization

    Thank you for your reply...this could be a way to disable it, although I prefer to do it in the config.txt if it is possible...anything about disabling the GPU? I want to switch all those off not really for consumption but to reduce the overall heating of the board
  7. Hello guys, soon I will receive this nice toy (512MB) and I want to be prepared for my project: a domestic vpn server (using pptp) serving 1 o 2 guests at most. For this project I just need the RJ45 socket thus I would like to switch off as much as possible (e.g. GPU, on board wifi and others if there). Someone can point me to some resources or list what I can do to accomplish this? P.S. I know that pptp is not as secure as IPSec (and maybe IPSec is heavier for such device) but for the purpose of my project it is enough. Thanks a lot Gianni
  8. AlterX

    NetworkManger dispatcher problem

    I have checked already the other scripts but they are really different from what I have...I have seen many example, who is using the single = who == anyway I tried all combinations...it also has the first line #!/bin/bash that I have just skipped. The strange thing is that not even the first line of code is executed, only when I restart NetworkManager! Thanks for the reply Gianni
  9. Hi all, I am trying to have a script running when eth0 i s up, but it seems that I don't get it. Although I followed a guide and set anything, NM is not triggering my script. So I have created my script without sh extension and called it 90-start-script in /etc/NetworkManager/dispatcher.d: logger -s "I DON'T SEE THIS" if [ "$1" == "eth0" ]; then case "$2" in up) ~/scripts/start_check.sh ;; esac fi; I gave it root ownership, execution flag, but it seems to be not working... I followed this guide: https://wiki.archlinux.org/index.php/NetworkManager#Network_services_with_NetworkManager_dispatcher I am running armbian 5.60 (strech) Thanks
  10. AlterX

    Start a script when an interface is up

    No one has ever tried this?!
  11. AlterX

    Guide: Orage Pi Zero WiFi AP hotspot

    Which version of orange Pi has a better chip suitable for being used as stable AP?
  12. AlterX

    Start a script when an interface is up

    Or I am using it in a wrong way or this is really a bug in the system since just putting in the script: logger -s "I DON'T SEE THIS" and switching off interfaces around I don't see it in syslog file. The only time I see that phrase is when I do restart of NetworkManager service.
  13. AlterX

    Start a script when an interface is up

    Thank you so much, although it doesn't seem to trigger my script. This is my script with +x located in dispatcher.d: if [ "$1" == "eth0" ]; then case "$2" in up) ~/scripts/start_check.sh ;; esac fi;
  14. Hello, I wonder how I can perfom this task in armbian in a standard way. Thanks Gianni
  15. Hello there, I finally solved the issue! For sake of information I explain how I solved it: First the required iptables' rules are (these give access to the remote VPN's machines): * -A FORWARD -i wlan0 -o ppp0 -j ACCEPT * -A POSTROUTING -o ppp0 -j MASQUERADE Then to indicate which IP or range of IPs have to have a different route it is required the usage of policy rules: * open /etc/iproute2/rt_tables and put your entry (ID tablename): 100 my_custom_table * ip rule add from 172.24.1.114/32 table my_custom_table (tells to go to another table other than the main one for the source IP 172.x.x.x) * ip route add 172.24.1.0/24 dev wlan0 table my_custom_table (required to receive packets back from ppp0) * ip route add default via 10.10.10.1 dev ppp0 table my_custom_table (routes packet to the VPN's gateway) Make sure Firewall on the VPN server allows incoming traffic from VPN IPs Tha's all!