This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
disable_access_to_admin_access_ssh:gui_for_guest_v:wlan [2021/02/09 23:06] – hogwild | disable_access_to_admin_access_ssh:gui_for_guest_v:wlan [2024/03/02 17:01] (current) – hogwild | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Disable | + | ====== Disable |
- | The default settings | + | The default settings |
- | If you don't want communication | + | If you don't want communication on a certain VLAN or WLAN, you can filter out access to its ports using the following script in the //Firewall// field of the [[https:// |
- | < | + | < |
iptables -t filter -I INPUT 1 -p tcp -m multiport -i br1 --dport 22, | iptables -t filter -I INPUT 1 -p tcp -m multiport -i br1 --dport 22, | ||
- | |||
</ | </ | ||
- | Your bridge number | + | \\ |
+ | |||
+ | The bridge number | ||
- | If you're using non-standard port numbers, | + | If you use non-standard port numbers, |
- | To ensure | + | If you have multiple bridges or guest VLANs, you can add additional lines and change the relevant |
- | This will take effect as soon as the firewall script is called next. You can force this manually | + | You can force the command(s) to take effect |