This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
disable_access_to_admin_access_ssh:gui_for_guest_v:wlan [2021/02/09 23:00] – hogwild | disable_access_to_admin_access_ssh:gui_for_guest_v:wlan [2023/06/14 19:58] – -fix Network link hogwild | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Disable | + | ====== Disable |
- | The default settings | + | The default settings |
- | If you don' | + | If you don' |
- | < | + | < |
iptables -t filter -I INPUT 1 -p tcp -m multiport -i br1 --dport 22, | iptables -t filter -I INPUT 1 -p tcp -m multiport -i br1 --dport 22, | ||
- | |||
</ | </ | ||
- | If you're using non-standard port numbers, | + | \\ |
+ | |||
+ | The bridge number (" | ||
+ | |||
+ | If you use non-standard port numbers, | ||
- | NOTE: mind not locking yourself out, you would most likely not want to filter on br0 | + | If you have multiple bridges or guest VLANs, you can add additional lines and change the relevant bridge interface names. The command will take effect as soon as the firewall script next runs. |
- | NOTE2: This will take effect as soon as the firewall script is called next. You can force this manually | + | You can force the command(s) to take effect |