Julien DEV
Forum Replies Created
-
AuthorPosts
-
Julien DEV
ParticipantI have found the solution :
msg.payload = msg.payload.toString('hex');
Thanks 😉
Julien DEV
ParticipantSteve,
Finally your are right.A new Support Specialist of my cellular carrier confirm me that the used APN is not compatible with distant access.
We have to increase our plan for that it works.Thank you very much Steve and Jeff.
Julien DEV
ParticipantHi Steve,
I will recontact the cellular carrier because he told me that the ip had to be accessible.
I’ll keep you informedThanks.
Julien DEV
Participantiptables -L give me :
admin@mtcdt:~# iptables -L Chain INPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere ICMP_LIMIT all -- anywhere anywhere KEEP_STATE_INPUT all -- anywhere anywhere BLACKLIST all -- anywhere anywhere DOS_PREVENTION all -- anywhere anywhere DNS_SERVER_INPUT all -- anywhere anywhere DHCP_SERVER_INPUT all -- anywhere anywhere DHCP_CLIENT_INPUT all -- anywhere anywhere HTTP_LAN_INPUT all -- anywhere anywhere HTTP_WAN_INPUT all -- anywhere anywhere HTTPS_LAN_INPUT all -- anywhere anywhere HTTPS_WAN_INPUT all -- anywhere anywhere NODERED_LAN_INPUT all -- anywhere anywhere NODERED_WAN_INPUT all -- anywhere anywhere SSH_LAN_INPUT all -- anywhere anywhere SSH_WAN_INPUT all -- anywhere anywhere ICMP_WAN_INPUT all -- anywhere anywhere ICMP_LAN_INPUT all -- anywhere anywhere USER_INPUT all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination KEEP_STATE_FORWARD all -- anywhere anywhere TUNNEL_FORWARD all -- anywhere anywhere USER_FORWARD all -- anywhere anywhere LAN_FORWARD all -- anywhere anywhere Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere KEEP_STATE_OUTPUT all -- anywhere anywhere BLACKLIST all -- anywhere anywhere DNS_OUTPUT all -- anywhere anywhere DHCP_SERVER_OUTPUT all -- anywhere anywhere DHCP_CLIENT_OUTPUT all -- anywhere anywhere WAN_MANAGEMENT_OUTPUT all -- anywhere anywhere ICMP_OUTPUT all -- anywhere anywhere USER_OUTPUT all -- anywhere anywhere Chain BLACKLIST (2 references) target prot opt source destination Chain DDNS_OUTPUT (0 references) target prot opt source destination Chain DHCP_CLIENT_INPUT (1 references) target prot opt source destination ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc Chain DHCP_CLIENT_OUTPUT (1 references) target prot opt source destination ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc Chain DHCP_SERVER_INPUT (1 references) target prot opt source destination ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc Chain DHCP_SERVER_OUTPUT (1 references) target prot opt source destination ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc Chain DNS_OUTPUT (1 references) target prot opt source destination ACCEPT udp -- anywhere anywhere udp spts:1024:65535 dpt:domain Chain DNS_SERVER_INPUT (1 references) target prot opt source destination ACCEPT udp -- anywhere anywhere udp spts:1024:65535 dpt:domain Chain DOS_PREVENTION (1 references) target prot opt source destination RETURN tcp -- anywhere anywhere state NEW limit: avg 1/sec burst 100 LOG tcp -- anywhere anywhere state NEW limit: avg 1/sec burst 100 LOG level warning prefix "iptables: [DoS DROP] " DROP tcp -- anywhere anywhere state NEW Chain GPS_CLIENT_OUTPUT (0 references) target prot opt source destination Chain GPS_SERVER_INPUT (0 references) target prot opt source destination Chain HTTPS_LAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:https Chain HTTPS_WAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:https Chain HTTP_LAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:http Chain HTTP_WAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:http Chain ICMP_LAN_INPUT (1 references) target prot opt source destination ACCEPT icmp -- anywhere anywhere Chain ICMP_LIMIT (1 references) target prot opt source destination RETURN icmp -- anywhere anywhere limit: avg 10/sec burst 30 LOG icmp -- anywhere anywhere limit: avg 10/sec burst 30 LOG level warning prefix "iptables: [ICMP DROP] " DROP icmp -- anywhere anywhere Chain ICMP_OUTPUT (1 references) target prot opt source destination ACCEPT icmp -- anywhere anywhere Chain ICMP_WAN_INPUT (1 references) target prot opt source destination ACCEPT icmp -- anywhere anywhere Chain IPSEC_INPUT (0 references) target prot opt source destination Chain IPSEC_OUTPUT (0 references) target prot opt source destination Chain IP_PIPES_INPUT (0 references) target prot opt source destination Chain IP_PIPES_OUTPUT (0 references) target prot opt source destination Chain KEEP_STATE_FORWARD (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED Chain KEEP_STATE_INPUT (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED Chain KEEP_STATE_OUTPUT (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED Chain LAN_FORWARD (1 references) target prot opt source destination ACCEPT all -- 192.168.2.0/24 anywhere Chain LOG_FORWARD (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 2/min burst 5 LOG level warning prefix "iptables: [FWD DROP] " DROP all -- anywhere anywhere Chain LOG_INPUT (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 2/min burst 5 LOG level warning prefix "iptables: [IN DROP] " DROP all -- anywhere anywhere Chain LOG_OUTPUT (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 2/min burst 5 LOG level warning prefix "iptables: [OUT DROP] " DROP all -- anywhere anywhere Chain NETBIOS_INPUT (0 references) target prot opt source destination Chain NETBIOS_OUTPUT (0 references) target prot opt source destination Chain NODERED_LAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:1880 Chain NODERED_WAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:1880 Chain PPP_KEEP_ALIVE_OUTPUT (0 references) target prot opt source destination Chain REMOTE_MNGT_OUTPUT (0 references) target prot opt source destination Chain SMTP_OUTPUT (0 references) target prot opt source destination Chain SNTP (0 references) target prot opt source destination Chain SSH_LAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:ssh Chain SSH_WAN_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:ssh Chain SYSLOG_OUTPUT (0 references) target prot opt source destination Chain TELAUTO_OUTPUT (0 references) target prot opt source destination Chain TUNNELING (0 references) target prot opt source destination Chain TUNNEL_FORWARD (1 references) target prot opt source destination Chain USER_FORWARD (1 references) target prot opt source destination ACCEPT tcp -- anywhere 192.168.2.1 tcp dpt:http ACCEPT udp -- anywhere 192.168.2.1 udp dpt:http ACCEPT tcp -- anywhere 192.168.2.1 tcp dpt:https ACCEPT udp -- anywhere 192.168.2.1 udp dpt:https Chain USER_INPUT (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpts:1024:65535 ACCEPT udp -- anywhere anywhere udp dpts:1024:65535 Chain USER_OUTPUT (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere Chain WAN_MANAGEMENT_OUTPUT (1 references) target prot opt source destination ACCEPT icmp -- anywhere anywhere ACCEPT icmp -- anywhere anywhere
and iptables -t nat -L :
admin@mtcdt:~# iptables -t nat -L Chain PREROUTING (policy ACCEPT) target prot opt source destination USER_PREROUTE all -- anywhere anywhere LOOPBACK_PREROUTE all -- anywhere anywhere Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination USER_POSTROUTE all -- anywhere anywhere LOOPBACK_POSTROUTE all -- anywhere anywhere MTR_POSTROUTE all -- anywhere anywhere WAN_MASQ_POSTROUTE all -- anywhere anywhere Chain LOG_DNAT (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 2/min burst 5 LOG level warning prefix "iptables: [PRE ACCEPT] " Chain LOG_SNAT (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 2/min burst 5 LOG level warning prefix "iptables: [POST ACCEPT] " Chain LOOPBACK_POSTROUTE (1 references) target prot opt source destination Chain LOOPBACK_PREROUTE (1 references) target prot opt source destination Chain MTR_POSTROUTE (1 references) target prot opt source destination Chain USER_POSTROUTE (1 references) target prot opt source destination Chain USER_PREROUTE (1 references) target prot opt source destination Chain WAN_MASQ_POSTROUTE (1 references) target prot opt source destination MASQUERADE all -- anywhere anywhere
Julien DEV
ParticipantCould you telle me if you see any problèmes in my configuration plz ?
Julien DEV
ParticipantJeff,
My French Operator (Orange) confirmed that the IP is public.
ThxJulien DEV
ParticipantHi Jeff,
Yes I save and Restart after all config test.
In Setup/WAN, Eth0 is disabled and PPP is first priority and enabled.
I dont have static public IP but I test with the new IP after restart.Julien DEV
ParticipantFor information I do this and it’s ok.
Thanksnano /etc/init.d/mystart.sh
—————-
#!/bin/sh
mts-io-sysfs store mfser/serial-mode rs232
exit 0
—————-
chmod a+x /etc/init.d/mystart.sh
ln -s /etc/init.d/mystart.sh /etc/rc3.d/S99mystart.sh
ln -s /etc/init.d/mystart.sh /etc/rc5.d/S99mystart.shJulien DEV
ParticipantHi,
Thank you very much for your reply and sorry for my reaction time.
(I did not receive notification of response)Could you explain me where are the later init scripts plz ?
-
This reply was modified 8 years, 2 months ago by
Julien DEV.
Julien DEV
ParticipantThank you for your help.
You were right, I had unchecked “Output Filter rules” by mistake.
I wish you a very good year 2017Julien DEV
ParticipantHi,
Sorry for my late response.
You can see my configuration here :
Thanks
-
This reply was modified 8 years, 2 months ago by
-
AuthorPosts