Originally Posted by
sgosnell
I didn't mean to make a cynical remark. My understanding is that you don't actually want to use both wired and wireless connections at the same time, as indicated in the thread title, but just want to connect automatically by wireless when the wired connection is disabled. Is this not correct? The solution is what I posted in the first paragraph.
Your problem may be in the use of iptables. Why are you using this on a desktop machine?
Yes what you have posted in the first paragraph is using network manager in which i already know the solution.What i requested is auto load iptables during the reboot while running wired / wireless.Which mean that i am not using network manager at all.
If you think my iptables has a problem and i am very doubtful about it.
Iptables for IPv4
Code:
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 recent: UPDATE seconds: 86400 name: lastmeasure side: source
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW recent: UPDATE seconds: 60 name: DEFAULT side: source
4 200 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
1155 964K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 1/sec burst 5
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x11/0x01
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x18/0x08
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x30/0x20
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x05/0x05
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x29
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x2B
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x37
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04 limit: avg 2/sec burst 2
10 2253 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 2
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 limit: avg 1/sec burst 5
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 17
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 13
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 0
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -f * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 recent: UPDATE seconds: 660 hit_count: 7 name: DEFAULT side: source
8 2276 DROP all -- * * 0.0.0.0/0 224.0.0.0/24
0 0 DROP all -- * * 0.0.0.0/0 127.0.0.0/8
0 0 DROP all -- * * 0.0.0.0/0 10.0.0.0/8
0 0 DROP all -- * * 0.0.0.0/0 172.16.0.0/12
0 0 DROP all -- * * 0.0.0.0/0 192.168.0.0/16
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/3
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4 200 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
1130 172K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
0 0 DROP all -f * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:631
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:631
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
Iptables for IPv6
Code:
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all * * ::/0 ::/0 recent: UPDATE seconds: 86400 name: lastmeasure side: source
0 0 DROP tcp * * ::/0 ::/0 state NEW recent: UPDATE seconds: 60 name: DEFAULT side: source
4 280 ACCEPT all lo * ::/0 ::/0
0 0 DROP all * * ::/0 ::/0 state INVALID
0 0 ACCEPT all * * ::/0 ::/0 state RELATED,ESTABLISHED
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x17/0x02
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x3F
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x00
0 0 ACCEPT tcp * * ::/0 ::/0 tcp flags:0x17/0x02 limit: avg 1/sec burst 5
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x11/0x01
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x18/0x08
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x30/0x20
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x05/0x05
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x03/0x03
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x06/0x06
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x3F
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x00
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x29
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x2B
0 0 DROP tcp * * ::/0 ::/0 tcp flags:0x3F/0x37
0 0 ACCEPT tcp * * ::/0 ::/0 tcp flags:0x04/0x04 limit: avg 2/sec burst 2
0 0 DROP udp * * ::/0 ::/0 limit: avg 1/sec burst 2
0 0 DROP all * * ::/0 ::/0 frag ids:100:200 first
0 0 DROP udp eth0 * ::/0 ::/0 udp dpt:53 recent: UPDATE seconds: 660 hit_count: 7 name: DEFAULT side: source
0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 128 limit: avg 30/min burst 5
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all * * ::/0 ::/0 state INVALID
Chain OUTPUT (policy DROP 6 packets, 384 bytes)
pkts bytes target prot opt in out source destination
4 280 ACCEPT all * lo ::/0 ::/0
0 0 DROP all * * ::/0 ::/0 state INVALID
0 0 ACCEPT all * * ::/0 ::/0 state NEW,RELATED,ESTABLISHED
0 0 DROP tcp * * ::/0 ::/0 tcp dpt:631
0 0 DROP udp * * ::/0 ::/0 udp dpt:631
0 0 DROP all * * ::/0 ::/0 frag ids:100:200 first
Bookmarks