Julien DEV

Forum Replies Created

Viewing 11 posts - 1 through 11 (of 11 total)
  • Author
    Posts
  • in reply to: Node-red LORA payload format #20577
    Julien DEV
    Participant

    I have found the solution :
    msg.payload = msg.payload.toString('hex');

    Thanks 😉

    in reply to: Distant access through cellular connection #17314
    Julien DEV
    Participant

    Steve,
    Finally your are right.

    A new Support Specialist of my cellular carrier confirm me that the used APN is not compatible with distant access.
    We have to increase our plan for that it works.

    Thank you very much Steve and Jeff.

    in reply to: Distant access through cellular connection #17294
    Julien DEV
    Participant

    Hi Steve,

    I will recontact the cellular carrier because he told me that the ip had to be accessible.
    I’ll keep you informed

    Thanks.

    in reply to: Distant access through cellular connection #17293
    Julien DEV
    Participant

    iptables -L give me :

    admin@mtcdt:~# iptables -L
    Chain INPUT (policy DROP)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere
    ICMP_LIMIT  all  --  anywhere             anywhere
    KEEP_STATE_INPUT  all  --  anywhere             anywhere
    BLACKLIST  all  --  anywhere             anywhere
    DOS_PREVENTION  all  --  anywhere             anywhere
    DNS_SERVER_INPUT  all  --  anywhere             anywhere
    DHCP_SERVER_INPUT  all  --  anywhere             anywhere
    DHCP_CLIENT_INPUT  all  --  anywhere             anywhere
    HTTP_LAN_INPUT  all  --  anywhere             anywhere
    HTTP_WAN_INPUT  all  --  anywhere             anywhere
    HTTPS_LAN_INPUT  all  --  anywhere             anywhere
    HTTPS_WAN_INPUT  all  --  anywhere             anywhere
    NODERED_LAN_INPUT  all  --  anywhere             anywhere
    NODERED_WAN_INPUT  all  --  anywhere             anywhere
    SSH_LAN_INPUT  all  --  anywhere             anywhere
    SSH_WAN_INPUT  all  --  anywhere             anywhere
    ICMP_WAN_INPUT  all  --  anywhere             anywhere
    ICMP_LAN_INPUT  all  --  anywhere             anywhere
    USER_INPUT  all  --  anywhere             anywhere
    
    Chain FORWARD (policy DROP)
    target     prot opt source               destination
    KEEP_STATE_FORWARD  all  --  anywhere             anywhere
    TUNNEL_FORWARD  all  --  anywhere             anywhere
    USER_FORWARD  all  --  anywhere             anywhere
    LAN_FORWARD  all  --  anywhere             anywhere
    
    Chain OUTPUT (policy DROP)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere
    KEEP_STATE_OUTPUT  all  --  anywhere             anywhere
    BLACKLIST  all  --  anywhere             anywhere
    DNS_OUTPUT  all  --  anywhere             anywhere
    DHCP_SERVER_OUTPUT  all  --  anywhere             anywhere
    DHCP_CLIENT_OUTPUT  all  --  anywhere             anywhere
    WAN_MANAGEMENT_OUTPUT  all  --  anywhere             anywhere
    ICMP_OUTPUT  all  --  anywhere             anywhere
    USER_OUTPUT  all  --  anywhere             anywhere
    
    Chain BLACKLIST (2 references)
    target     prot opt source               destination
    
    Chain DDNS_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain DHCP_CLIENT_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     udp  --  anywhere             anywhere             udp spts:bootps:bootpc dpts:bootps:bootpc
    
    Chain DHCP_CLIENT_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     udp  --  anywhere             anywhere             udp spts:bootps:bootpc dpts:bootps:bootpc
    
    Chain DHCP_SERVER_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     udp  --  anywhere             anywhere             udp spts:bootps:bootpc dpts:bootps:bootpc
    
    Chain DHCP_SERVER_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     udp  --  anywhere             anywhere             udp spts:bootps:bootpc dpts:bootps:bootpc
    
    Chain DNS_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     udp  --  anywhere             anywhere             udp spts:1024:65535 dpt:domain
    
    Chain DNS_SERVER_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     udp  --  anywhere             anywhere             udp spts:1024:65535 dpt:domain
    
    Chain DOS_PREVENTION (1 references)
    target     prot opt source               destination
    RETURN     tcp  --  anywhere             anywhere             state NEW limit: avg 1/sec burst 100
    LOG        tcp  --  anywhere             anywhere             state NEW limit: avg 1/sec burst 100 LOG level warning prefix "iptables: [DoS DROP] "
    DROP       tcp  --  anywhere             anywhere             state NEW
    
    Chain GPS_CLIENT_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain GPS_SERVER_INPUT (0 references)
    target     prot opt source               destination
    
    Chain HTTPS_LAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:https
    
    Chain HTTPS_WAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:https
    
    Chain HTTP_LAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:http
    
    Chain HTTP_WAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:http
    
    Chain ICMP_LAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     icmp --  anywhere             anywhere
    
    Chain ICMP_LIMIT (1 references)
    target     prot opt source               destination
    RETURN     icmp --  anywhere             anywhere             limit: avg 10/sec burst 30
    LOG        icmp --  anywhere             anywhere             limit: avg 10/sec burst 30 LOG level warning prefix "iptables: [ICMP DROP] "
    DROP       icmp --  anywhere             anywhere
    
    Chain ICMP_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     icmp --  anywhere             anywhere
    
    Chain ICMP_WAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     icmp --  anywhere             anywhere
    
    Chain IPSEC_INPUT (0 references)
    target     prot opt source               destination
    
    Chain IPSEC_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain IP_PIPES_INPUT (0 references)
    target     prot opt source               destination
    
    Chain IP_PIPES_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain KEEP_STATE_FORWARD (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere             state RELATED,ESTABLISHED
    
    Chain KEEP_STATE_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere             state RELATED,ESTABLISHED
    
    Chain KEEP_STATE_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere             state RELATED,ESTABLISHED
    
    Chain LAN_FORWARD (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  192.168.2.0/24       anywhere
    
    Chain LOG_FORWARD (0 references)
    target     prot opt source               destination
    LOG        all  --  anywhere             anywhere             limit: avg 2/min burst 5 LOG level warning prefix "iptables: [FWD DROP] "
    DROP       all  --  anywhere             anywhere
    
    Chain LOG_INPUT (0 references)
    target     prot opt source               destination
    LOG        all  --  anywhere             anywhere             limit: avg 2/min burst 5 LOG level warning prefix "iptables: [IN DROP] "
    DROP       all  --  anywhere             anywhere
    
    Chain LOG_OUTPUT (0 references)
    target     prot opt source               destination
    LOG        all  --  anywhere             anywhere             limit: avg 2/min burst 5 LOG level warning prefix "iptables: [OUT DROP] "
    DROP       all  --  anywhere             anywhere
    
    Chain NETBIOS_INPUT (0 references)
    target     prot opt source               destination
    
    Chain NETBIOS_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain NODERED_LAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:1880
    
    Chain NODERED_WAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:1880
    
    Chain PPP_KEEP_ALIVE_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain REMOTE_MNGT_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain SMTP_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain SNTP (0 references)
    target     prot opt source               destination
    
    Chain SSH_LAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:ssh
    
    Chain SSH_WAN_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:ssh
    
    Chain SYSLOG_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain TELAUTO_OUTPUT (0 references)
    target     prot opt source               destination
    
    Chain TUNNELING (0 references)
    target     prot opt source               destination
    
    Chain TUNNEL_FORWARD (1 references)
    target     prot opt source               destination
    
    Chain USER_FORWARD (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             192.168.2.1          tcp dpt:http
    ACCEPT     udp  --  anywhere             192.168.2.1          udp dpt:http
    ACCEPT     tcp  --  anywhere             192.168.2.1          tcp dpt:https
    ACCEPT     udp  --  anywhere             192.168.2.1          udp dpt:https
    
    Chain USER_INPUT (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  anywhere             anywhere             tcp dpts:1024:65535
    ACCEPT     udp  --  anywhere             anywhere             udp dpts:1024:65535
    
    Chain USER_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere
    
    Chain WAN_MANAGEMENT_OUTPUT (1 references)
    target     prot opt source               destination
    ACCEPT     icmp --  anywhere             anywhere
    ACCEPT     icmp --  anywhere             anywhere

    and iptables -t nat -L :

    admin@mtcdt:~# iptables -t nat -L
    Chain PREROUTING (policy ACCEPT)
    target     prot opt source               destination
    USER_PREROUTE  all  --  anywhere             anywhere
    LOOPBACK_PREROUTE  all  --  anywhere             anywhere
    
    Chain INPUT (policy ACCEPT)
    target     prot opt source               destination
    
    Chain OUTPUT (policy ACCEPT)
    target     prot opt source               destination
    
    Chain POSTROUTING (policy ACCEPT)
    target     prot opt source               destination
    USER_POSTROUTE  all  --  anywhere             anywhere
    LOOPBACK_POSTROUTE  all  --  anywhere             anywhere
    MTR_POSTROUTE  all  --  anywhere             anywhere
    WAN_MASQ_POSTROUTE  all  --  anywhere             anywhere
    
    Chain LOG_DNAT (0 references)
    target     prot opt source               destination
    LOG        all  --  anywhere             anywhere             limit: avg 2/min burst 5 LOG level warning prefix "iptables: [PRE ACCEPT] "
    
    Chain LOG_SNAT (0 references)
    target     prot opt source               destination
    LOG        all  --  anywhere             anywhere             limit: avg 2/min burst 5 LOG level warning prefix "iptables: [POST ACCEPT] "
    
    Chain LOOPBACK_POSTROUTE (1 references)
    target     prot opt source               destination
    
    Chain LOOPBACK_PREROUTE (1 references)
    target     prot opt source               destination
    
    Chain MTR_POSTROUTE (1 references)
    target     prot opt source               destination
    
    Chain USER_POSTROUTE (1 references)
    target     prot opt source               destination
    
    Chain USER_PREROUTE (1 references)
    target     prot opt source               destination
    
    Chain WAN_MASQ_POSTROUTE (1 references)
    target     prot opt source               destination
    MASQUERADE  all  --  anywhere             anywhere
    in reply to: Distant access through cellular connection #17283
    Julien DEV
    Participant

    Could you telle me if you see any problèmes in my configuration plz ?

    in reply to: Distant access through cellular connection #17282
    Julien DEV
    Participant

    Jeff,
    My French Operator (Orange) confirmed that the IP is public.
    Thx

    in reply to: Distant access through cellular connection #17250
    Julien DEV
    Participant

    Hi Jeff,
    Yes I save and Restart after all config test.
    In Setup/WAN, Eth0 is disabled and PPP is first priority and enabled.
    I dont have static public IP but I test with the new IP after restart.

    in reply to: Automate mfser interface RS-232 mode #16747
    Julien DEV
    Participant

    For information I do this and it’s ok.
    Thanks

    nano /etc/init.d/mystart.sh
    —————-
    #!/bin/sh
    mts-io-sysfs store mfser/serial-mode rs232
    exit 0
    —————-
    chmod a+x /etc/init.d/mystart.sh
    ln -s /etc/init.d/mystart.sh /etc/rc3.d/S99mystart.sh
    ln -s /etc/init.d/mystart.sh /etc/rc5.d/S99mystart.sh

    in reply to: Automate mfser interface RS-232 mode #16745
    Julien DEV
    Participant

    Hi,

    Thank you very much for your reply and sorry for my reaction time.
    (I did not receive notification of response)

    Could you explain me where are the later init scripts plz ?

    • This reply was modified 7 years, 3 months ago by Julien DEV.
    in reply to: Cellular connection timed out on HTTP Request #16197
    Julien DEV
    Participant

    Thank you for your help.
    You were right, I had unchecked “Output Filter rules” by mistake.
    I wish you a very good year 2017

    in reply to: Cellular connection timed out on HTTP Request #16136
    Julien DEV
    Participant

    Hi,
    Sorry for my late response.
    You can see my configuration here :
    Access Config
    Firwall

    Thanks

Viewing 11 posts - 1 through 11 (of 11 total)