Setting Up Access in Bridge Mode for Optical Modems with OpenWrt

Setting Up Access in Bridge Mode for Optical Modems with OpenWrt

By default, if you use a router with an OpenWrt-like system to dial into an optical modem in bridge mode, you will not be able to access the modem’s management page, which can be quite inconvenient. There are many ways to fix this, and here we document a method that only requires a web browser. … Read more

In-Depth Guide to Linux Network Management: Practical Networking from Basics to Advanced Techniques

In-Depth Guide to Linux Network Management: Practical Networking from Basics to Advanced Techniques

Start of the Main Content Every encounter is a fate, follow ⭐ to not miss out – sharing practical tutorials and tips every day. 1. Network Interface Management: The Foundation of Network Connectivity 1.1 Analysis of Modern Network Toolchains In contemporary Linux systems, the <span>iproute2</span> suite has completely replaced the traditional <span>net-tools</span>, with advantages including: … Read more

OpenWRT IPv6 Firewall Configuration

OpenWRT IPv6 Firewall Configuration

By default, OpenWRT does not allow IPv6 outbound traffic. This article will guide you through configuring the firewall to permit IPv6 outbound traffic. Testing First, ensure that your ISP is not blocking your IPv6 traffic. The testing method is quite simple; generally, OpenWRT does not block ICMP traffic. You can obtain your local IPv6 address … Read more

How to Network Community Networks? Distribution of Switches?

How to Network Community Networks? Distribution of Switches?

Some friends have commented on how to distribute and network community switches?This topic has also been discussed in our weak current VIP technical group.In this issue, let’s understand about how to network community networks? Distribution of switches? Analysis of the community switch networking structure 1. The access layer switches use a hundred megabit to the … Read more

How to Log Dropped Packets from the Linux IPTables Firewall to a Log File

How to Log Dropped Packets from the Linux IPTables Firewall to a Log File

Abstract: This article explains how to log incoming and outgoing dropped firewall packets. When your IPTables rules are not working as expected, you may need to log the dropped packets for troubleshooting. This article describes how to log incoming and outgoing dropped firewall packets. Logging All Dropped Incoming Packets First, we need to understand how … Read more

Setting Up a Linux Firewall for Uncompromised Security

Setting Up a Linux Firewall for Uncompromised Security

In the battlefield of network security, firewalls act as vigilant sentinels, weaving rules with code to protect the borders of the digital world. When you hold a Linux system in your hands, this operating system, inherently equipped with “security genes,” has already prepared various firewall tools for you. Let us break down the core value … Read more

MQTT Protocol Analysis of Himqtt Source Code

MQTT Protocol Analysis of Himqtt Source Code

This article is an excellent piece from the KX Forum Author ID on KX Forum: xiaoduoduo himqtt is the first complete source high-performance MQTT IoT firewall – MQTT Application FireWall, written in C language, using epoll mode to support hundreds of thousands of high concurrent connections for IoT, and is compatible with some ModSecurity rules. … Read more

Comprehensive Analysis of Linux Firewall! Securing the Operating System (Part 2)

Comprehensive Analysis of Linux Firewall! Securing the Operating System (Part 2)

Linux | Red Hat Certification | IT Technology | Operations Engineer 👇 1000-person technical exchange QQ group Note [Public Account] for faster access 1. Firewall Service Management View current active services firewall-cmd –list-service[root@localhost ~]# firewall-cmd –set-default-zone=publicsuccess[root@localhost ~]# firewall-cmd –list-servicessh dhcpv6-client[root@localhost ~]# firewall-cmd –set-default-zone=homesuccess[root@localhost ~]# firewall-cmd –list-servicessh mdns samba-client dhcpv6-client# This allows for a more intuitive … Read more

In-Depth Defense Strategies for Industrial Control Systems

In-Depth Defense Strategies for Industrial Control Systems

1. Introduction As Industrial Control Systems (ICS) face potential threats from remote maintenance, unauthorized operations, malware intrusions, illegal access, and internet connectivity, there are certain vulnerabilities in network boundaries, access control, communication protection, malicious operation control, and malware protection. Therefore, a single protective measure is no longer effective. ICS, as the core of industrial infrastructure, … Read more