This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
disable_access_to_admin_access_ssh:gui_for_guest_v:wlan [2021/02/09 23:00] – hogwild | disable_access_to_admin_access_ssh:gui_for_guest_v:wlan [2024/03/02 17:01] (current) – hogwild | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Disable | + | ====== Disable |
- | The default settings | + | The default settings |
- | If you don' | + | If you don' |
- | < | + | < |
iptables -t filter -I INPUT 1 -p tcp -m multiport -i br1 --dport 22, | iptables -t filter -I INPUT 1 -p tcp -m multiport -i br1 --dport 22, | ||
- | |||
</ | </ | ||
- | If you're using non-standard port numbers, | + | \\ |
+ | |||
+ | The bridge number (" | ||
+ | |||
+ | If you use non-standard port numbers, | ||
- | NOTE: mind not locking yourself out, you would most likely not want to filter on br0 | + | If you have multiple bridges or guest VLANs, you can add additional lines and change the relevant bridge interface names. The command will take effect as soon as the next run of the firewall script. |
- | NOTE2: This will take effect as soon as the firewall script is called next. You can force this manually | + | You can force the command(s) to take effect |