当前时区为 UTC + 8 小时



发表新帖 回复这个主题  [ 9 篇帖子 ] 
作者 内容
1 楼 
 文章标题 : Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-26 11:51 

注册: 2016-01-21 2:30
帖子: 22
系统: Ubuntu Server 14.04
送出感谢: 0 次
接收感谢: 0 次
有2张无线网卡,

一张BCM4312
一张R8188EU

BCM4312 wlan0 连接ssid A ,IP 192.168.1.60
R8188EU wlan1 连接ssid B ,IP 192.168.100.152

一台windows电脑在ssid B,,成功连接,而在ssid A的时候,连接不上.

ssid B的路由器中继在ssid A的上.,不知道是否和这有关.


页首
 用户资料  
 
2 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-26 11:55 

注册: 2016-01-21 2:30
帖子: 22
系统: Ubuntu Server 14.04
送出感谢: 0 次
接收感谢: 0 次
login as: lin
lin@192.168.100.152's password:
Welcome to Ubuntu 14.04.3 LTS (GNU/Linux 3.19.0-25-generic i686)

* Documentation: https://help.ubuntu.com/

System information as of Mon Jan 25 19:47:36 EST 2016

System load: 0.0 Users logged in: 1
Usage of /: 6.0% of 107.71GB IP address for wlan0: 192.168.1.60
Memory usage: 7% IP address for wlan1: 192.168.100.152
Swap usage: 0% IP address for virbr0: 192.168.122.1
Processes: 136

Graph this data and manage this system at:
https://landscape.canonical.com/

Last login: Mon Jan 25 19:47:37 2016 from 192.168.100.106
lin@lin:~$ route -nv
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
0.0.0.0 0.0.0.0 0.0.0.0 U 1002 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
192.168.1.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0
192.168.100.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan1
192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0
lin@lin:~$ iptables -L -nv
iptables v1.4.21: can't initialize iptables table `filter': Permission denied (you must be root)
Perhaps iptables or your kernel needs to be upgraded.
lin@lin:~$ sudo iptables -L -nv
[sudo] password for lin:
Chain INPUT (policy DROP 149 packets, 5248 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- virbr0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT tcp -- virbr0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- virbr0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:67
0 0 ACCEPT tcp -- virbr0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:67
25356 2244K ufw-before-logging-input all -- * * 0.0.0.0/0 0.0.0.0/0
25356 2244K ufw-before-input all -- * * 0.0.0.0/0 0.0.0.0/0
18615 1605K ufw-after-input all -- * * 0.0.0.0/0 0.0.0.0/0
149 5248 ufw-after-logging-input all -- * * 0.0.0.0/0 0.0.0.0/0
149 5248 ufw-reject-input all -- * * 0.0.0.0/0 0.0.0.0/0
149 5248 ufw-track-input all -- * * 0.0.0.0/0 0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * virbr0 0.0.0.0/0 192.168.122.0/24 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- virbr0 * 192.168.122.0/24 0.0.0.0/0
0 0 ACCEPT all -- virbr0 virbr0 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * virbr0 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- virbr0 * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 ufw-before-logging-forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ufw-before-forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ufw-after-forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ufw-after-logging-forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ufw-reject-forward all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ufw-track-forward all -- * * 0.0.0.0/0 0.0.0.0/0

Chain OUTPUT (policy ACCEPT 16 packets, 640 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * virbr0 0.0.0.0/0 0.0.0.0/0 udp dpt:68
6689 755K ufw-before-logging-output all -- * * 0.0.0.0/0 0.0.0.0/0
6689 755K ufw-before-output all -- * * 0.0.0.0/0 0.0.0.0/0
439 39996 ufw-after-output all -- * * 0.0.0.0/0 0.0.0.0/0
439 39996 ufw-after-logging-output all -- * * 0.0.0.0/0 0.0.0.0/0
439 39996 ufw-reject-output all -- * * 0.0.0.0/0 0.0.0.0/0
439 39996 ufw-track-output all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-after-forward (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-after-input (1 references)
pkts bytes target prot opt in out source destination
17815 1391K ufw-skip-to-policy-input udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:137
56 12607 ufw-skip-to-policy-input udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:138
0 0 ufw-skip-to-policy-input tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
0 0 ufw-skip-to-policy-input tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
595 196K ufw-skip-to-policy-input udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:67
0 0 ufw-skip-to-policy-input udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
0 0 ufw-skip-to-policy-input all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST

Chain ufw-after-logging-forward (1 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-after-logging-input (1 references)
pkts bytes target prot opt in out source destination
149 5248 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-after-logging-output (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-after-output (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-before-forward (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 3
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 11
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 12
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
0 0 ufw-user-forward all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-before-input (1 references)
pkts bytes target prot opt in out source destination
2481 200K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
2962 256K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
1 78 ufw-logging-deny all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
1 78 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 3
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 11
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 12
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8
14 4592 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
19898 1784K ufw-not-local all -- * * 0.0.0.0/0 0.0.0.0/0
1196 174K ACCEPT udp -- * * 0.0.0.0/0 224.0.0.251 udp dpt:5353
0 0 ACCEPT udp -- * * 0.0.0.0/0 239.255.255.250 udp dpt:1900
18702 1610K ufw-user-input all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-before-logging-forward (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-before-logging-input (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-before-logging-output (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-before-output (1 references)
pkts bytes target prot opt in out source destination
2481 200K ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
3769 516K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
439 39996 ufw-user-output all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-logging-allow (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "

Chain ufw-logging-deny (2 references)
pkts bytes target prot opt in out source destination
1 78 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID limit: avg 3/min burst 10
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-not-local (1 references)
pkts bytes target prot opt in out source destination
87 4908 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
1345 179K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
18466 1600K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
0 0 ufw-logging-deny all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-reject-forward (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-reject-input (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-reject-output (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-skip-to-policy-forward (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-skip-to-policy-input (7 references)
pkts bytes target prot opt in out source destination
18466 1600K DROP all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-skip-to-policy-output (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-track-forward (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-track-input (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-track-output (1 references)
pkts bytes target prot opt in out source destination
3 180 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 ctstate NEW
420 39176 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 ctstate NEW

Chain ufw-user-forward (1 references)
pkts bytes target prot opt in out source destination

Chain ufw-user-input (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21
87 4908 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:443

Chain ufw-user-limit (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable

Chain ufw-user-limit-accept (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0

Chain ufw-user-logging-forward (0 references)
pkts bytes target prot opt in out source destination

Chain ufw-user-logging-input (0 references)
pkts bytes target prot opt in out source destination

Chain ufw-user-logging-output (0 references)
pkts bytes target prot opt in out source destination

Chain ufw-user-output (1 references)
pkts bytes target prot opt in out source destination
lin@lin:~$


页首
 用户资料  
 
3 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-26 16:16 

注册: 2009-08-04 16:33
帖子: 16891
送出感谢: 21
接收感谢: 1826
引用:
ssid B的路由器中继在ssid A的上

1. 這一句話 不明白 能否補充
1-1. 如果你是參考網路文章 如此設定
請提供參考文章網址
引用:
route -nv
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
0.0.0.0 0.0.0.0 0.0.0.0 U 1002 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
192.168.1.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0
192.168.100.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan1
192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0

2. 請補充
sudo ifconfig -a

3. 請補充 virbr0 eth0 wlan0 wlan1 的網路線流程關係
如果你是參考網路文章 請提供網路網址


页首
 用户资料  
 
4 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-26 23:36 

注册: 2016-01-21 2:30
帖子: 22
系统: Ubuntu Server 14.04
送出感谢: 0 次
接收感谢: 0 次
poloshiao 写道:
引用:
ssid B的路由器中继在ssid A的上

1. 這一句話 不明白 能否補充
1-1. 如果你是參考網路文章 如此設定
請提供參考文章網址
引用:
route -nv
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
0.0.0.0 0.0.0.0 0.0.0.0 U 1002 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
192.168.1.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0
192.168.100.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan1
192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0

2. 請補充
sudo ifconfig -a

3. 請補充 virbr0 eth0 wlan0 wlan1 的網路線流程關係
如果你是參考網路文章 請提供網路網址


1. ssid A 路由发射A, ssid B路由通过无线中继[可以理解为路由B wan口插入路由A lan口]方式连接ssid A获取wan 得到ip是192.168.1.50,独立成为路由器网关192.168.100.1,,单独再发射一个ssid B出去给人联网.

2.
引用:
lin@lin:~$ sudo ifconfig -a
[sudo] password for lin:
eth0 Link encap:Ethernet HWaddr 00:1d:09:52:01:37
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Interrupt:16

eth0:avahi Link encap:Ethernet HWaddr 00:1d:09:52:01:37
inet addr:169.254.3.61 Bcast:169.254.255.255 Mask:255.255.0.0
UP BROADCAST MULTICAST MTU:1500 Metric:1
Interrupt:16

lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:9972 errors:0 dropped:0 overruns:0 frame:0
TX packets:9972 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:956971 (956.9 KB) TX bytes:956971 (956.9 KB)

virbr0 Link encap:Ethernet HWaddr 7a:94:ff:44:96:15
inet addr:192.168.122.1 Bcast:192.168.122.255 Mask:255.255.255.0
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)

wlan0 Link encap:Ethernet HWaddr 00:1f:e1:2b:99:be
inet addr:192.168.1.60 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::21f:e1ff:fe2b:99be/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:56329 errors:0 dropped:0 overruns:0 frame:0
TX packets:45347 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:7058161 (7.0 MB) TX bytes:8352616 (8.3 MB)

wlan1 Link encap:Ethernet HWaddr c4:6e:1f:1b:7d:86
inet addr:192.168.100.152 Bcast:192.168.100.255 Mask:255.255.255.0
inet6 addr: fe80::c66e:1fff:fe1b:7d86/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:33556 errors:0 dropped:4955 overruns:0 frame:0
TX packets:5147 errors:0 dropped:1 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:7482526 (7.4 MB) TX bytes:1061837 (1.0 MB)

lin@lin:~$


3. virbr0 无连接 ,eth0 无连接 ,wlan0 连接路由A的ssid A,wlan1连接路由B的ssid B

路由A是 wan 公网,lan 192.168.1.1.
路由B是 wan 192.168.1.50. lan 为192.168.100.1

所有操作均自行,无任何网络文献.


页首
 用户资料  
 
5 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-27 9:39 

注册: 2009-08-04 16:33
帖子: 16891
送出感谢: 21
接收感谢: 1826
引用:
路由A是 wan 公网,lan 192.168.1.1.
路由B是 wan 192.168.1.50. lan 为192.168.100.1

看看這一篇能否幫你
http://wiki.qno.tw/m/index.php?title=WA ... nt=zh-hans
WAN IP Alias + G2G


页首
 用户资料  
 
6 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-27 10:03 

注册: 2016-01-21 2:30
帖子: 22
系统: Ubuntu Server 14.04
送出感谢: 0 次
接收感谢: 0 次
poloshiao 写道:
引用:
路由A是 wan 公网,lan 192.168.1.1.
路由B是 wan 192.168.1.50. lan 为192.168.100.1

看看這一篇能否幫你
http://wiki.qno.tw/m/index.php?title=WA ... nt=zh-hans
WAN IP Alias + G2G


谢谢你的回复,你的文章不适合我.

可能我要画个网络拓扑才能描述清楚.

而且问题好像是在ubuntu上,并不在我网络设置上,因为我网络上网一切正常.就算 停用/拔掉 USB无线网卡,wlan0照样上网等.


页首
 用户资料  
 
7 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-01-27 18:23 

注册: 2009-08-04 16:33
帖子: 16891
送出感谢: 21
接收感谢: 1826
引用:
wlan0 连接路由A的ssid A,wlan1连接路由B的ssid B

1. 如果你的 wlan0 wlan1 是連接在同一台電腦
可能迴路會有問題
引用:
可能我要画个网络拓扑才能描述清楚.

2. 等你的网络拓扑


页首
 用户资料  
 
8 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-02-24 10:45 

注册: 2016-01-21 2:30
帖子: 22
系统: Ubuntu Server 14.04
送出感谢: 0 次
接收感谢: 0 次
poloshiao 写道:
引用:
wlan0 连接路由A的ssid A,wlan1连接路由B的ssid B

1. 如果你的 wlan0 wlan1 是連接在同一台電腦
可能迴路會有問題
引用:
可能我要画个网络拓扑才能描述清楚.

2. 等你的网络拓扑


不好意思来晚了


附件:
Network.png
Network.png [ 18.69 KiB | 被浏览 1307 次 ]

页首
 用户资料  
 
9 楼 
 文章标题 : Re: Ubuntu 14.04 双网卡登录ssh的问题.
帖子发表于 : 2016-02-25 17:56 

注册: 2009-08-04 16:33
帖子: 16891
送出感谢: 21
接收感谢: 1826
引用:
路由A是 wan 公网,lan 192.168.1.1.
路由B是 wan 192.168.1.50. lan 为192.168.100.1

引用:
BCM4312 wlan0 连接ssid A ,IP 192.168.1.60
R8188EU wlan1 连接ssid B ,IP 192.168.100.152

引用:
wlan0 Link encap:Ethernet HWaddr 00:1f:e1:2b:99:be
inet addr:192.168.1.60 Bcast:192.168.1.255 Mask:255.255.255.0

wlan1 Link encap:Ethernet HWaddr c4:6e:1f:1b:7d:86
inet addr:192.168.100.152 Bcast:192.168.100.255 Mask:255.255.255.0

引用:
Network.png

Network.png 看不到 192.168.100.152


页首
 用户资料  
 
显示帖子 :  排序  
发表新帖 回复这个主题  [ 9 篇帖子 ] 

当前时区为 UTC + 8 小时


在线用户

正在浏览此版面的用户:没有注册用户 和 2 位游客


不能 在这个版面发表主题
不能 在这个版面回复主题
不能 在这个版面编辑帖子
不能 在这个版面删除帖子
不能 在这个版面提交附件

前往 :  
本站点为公益性站点,用于推广开源自由软件,由 DiaHosting VPSBudgetVM VPS 提供服务。
我们认为:软件应可免费取得,软件工具在各种语言环境下皆可使用,且不会有任何功能上的差异;
人们应有定制和修改软件的自由,且方式不受限制,只要他们自认为合适。

Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
简体中文语系由 王笑宇 翻译