<html>
<head>
<style>
P
{
margin:0px;
padding:0px
}
body
{
FONT-SIZE: 10pt;
FONT-FAMILY:Tahoma
}
</style>
</head>
<body><BR>well i tried my wireless Alone and it works Great with wifidog auth server<BR>
but as soon as i plug it on my wired router it dont work (i only get direct internet access, no wifidog server)<BR>
<BR>
heres my setup:<BR>
wired router is 192.168.2.1 (dhcp on)cable modem plugged in wan port<BR>
wireless is 192.168.2.2 (dhcp off and dns and gateway 192.168.2.1 <BR>) pluged on port 1 of wired router <BR>
<BR>
let me know if you have any clues of what i'm doing wrong<BR>
<BR>
thanks<BR>
<BR>
Juan<BR><BR><BR><BR>
<HR id=stopSpelling>
<BR>
> Date: Thu, 18 Jan 2007 13:31:24 -0800<BR>> From: sgrlogs@gmail.com<BR>> To: wifidog@listes.ilesansfil.org<BR>> Subject: Re: [isf-wifidog] problems starting wifidog<BR>> <BR>> How is your Wireless Router connected to wired one? Did you connect<BR>> wired router to WAN port of wireless router or are you using your<BR>> wireless router as a switch by connecting wired router to one of the<BR>> four ports?<BR>> <BR>> V. Patel<BR>> <BR>> On 1/17/07, Docfear Docfear <docfear@hotmail.com> wrote:<BR>> ><BR>> > Hi<BR>> ><BR>> > i think i figured out that i dont need to change much on the wifidog.conf<BR>> > file, i only changed the auth server part<BR>> > but now i have a problem when i start it with wifidog -f -d 7 , it tries to<BR>> > start the web server on my routers IP.<BR>> > the only thing is that my wireless router with wifidog is behind a wired<BR>> > router<BR>> > so my wired is IP 192.168.2.1 and wireless is 192.168.2.2 using the same<BR>> > subnet mask 255.255.255.0<BR>> > so here is my wifidog start log:<BR>> ><BR>> > root@xWRT:~$ wifidog -f -d 7<BR>> > [6][Wed Jan 17 15:22:02 2007][1144](conf.c:575) Reading configuration file<BR>> > '/etc/wifidog.conf'<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token: GatewayID,<BR>> > value: default<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > GatewayInterface, value: br0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token: AuthServer,<BR>> > value: {<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:287) Adding lavalsansfil.com:80<BR>> > (SSL: 443) / to the auth server list<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:309) Auth server added<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > CheckInterval, value: 60<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > ClientTimeout, value: 5<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > FirewallRuleSet, value: global<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set<BR>> > global<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow udp to 69.90.89.192/27]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp to<BR>> > 69.90.89.192/27<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > udp port (null) to 69.90.89.192/27<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow udp to 69.90.85.0/27]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp to<BR>> > 69.90.85.0/27<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > udp port (null) to 69.90.85.0/27<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow tcp port 80 to 69.90.89.205]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow tcp port 80<BR>> > to 69.90.89.205<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > tcp port 80 to 69.90.89.205<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set global<BR>> > added.<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > FirewallRuleSet, value: validating-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set<BR>> > validating-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [block tcp port 25]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: block tcp port 25<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule block<BR>> > tcp port 25 to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow to 0.0.0.0/0]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > (null) port (null) to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set<BR>> > validating-users added.<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > FirewallRuleSet, value: known-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set<BR>> > known-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow to 0.0.0.0/0]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > (null) port (null) to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set<BR>> > known-users added.<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > FirewallRuleSet, value: unknown-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set<BR>> > unknown-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow udp port 53]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp port 53<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > udp port 53 to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow tcp port 53]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow tcp port 53<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > tcp port 53 to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow udp port 67]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp port 67<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > udp port 67 to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [allow tcp port 67]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow tcp port 67<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow<BR>> > tcp port 67 to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set<BR>> > unknown-users added.<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:<BR>> > FirewallRuleSet, value: locked-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set<BR>> > locked-users<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 =<BR>> > [block to 0.0.0.0/0]<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: block to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule block<BR>> > (null) port (null) to 0.0.0.0/0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set<BR>> > locked-users added.<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](gateway.c:314) Initializing signal<BR>> > handlers<BR>> > [6][Wed Jan 17 15:22:02 2007][1144](gateway.c:374) Setting started_time<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](gateway.c:384) Finding IP address of br0<BR>> > [7][Wed Jan 17 15:22:02 2007][1144](gateway.c:389) br0 = 192.168.2.2<BR>> > [5][Wed Jan 17 15:22:02 2007][1144](gateway.c:404) Creating web server on<BR>> > 192.168.2.2:2060<BR>> > [3][Wed Jan 17 15:22:02 2007][1144](gateway.c:406) Could not create web<BR>> > server: Address already in use<BR>> > root@xWRT:~$<BR>> ><BR>> ><BR>> > thanks<BR>> ><BR>> > Juan<BR>> ><BR>> > ________________________________<BR>> > Be one of the first to try Windows Live Mail.<BR>> > _______________________________________________<BR>> > WiFiDog mailing list<BR>> > WiFiDog@listes.ilesansfil.org<BR>> > http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog<BR>> ><BR>> ><BR>> _______________________________________________<BR>> WiFiDog mailing list<BR>> WiFiDog@listes.ilesansfil.org<BR>> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog<BR><BR><br /><hr />Be one of the first to try Windows Live Mail. <a href='http://ideas.live.com/programpage.aspx?versionId=5d21c51a-b161-4314-9b0e-4911fb2b2e6d' target='_new'>Windows Live Mail.</a></body>
</html>