Advolex - Kein schöner Leben
Ein privates Blog, völlig ohne Allgemeininteresse.
Sunday, September 20, 2009
Wednesday, March 4, 2009
Custom firmware w. Asus WL-500W
I bought the router Asus WL-500W in order to have it run OpenWRT Kamikaze 7.09 as a replacement for my previous Linksys WRT54G3G, which is still used in another location. The WRT54G3G has no USB ports but a CardBus slot, which contains a Huawei E600 UMTS (no HSDPA) adapter. The E600 serves the WAN port of the WRT54G3G running the Kamikaze 7.09 brcm-2.4 port since I was unable to get the WRT54G3G WLAN to work with the 2.6 kernel (brcm47xx port). This is a wellknown problem which is due to the chipset manufacturer Broadcom not releasing the source code for their proprietary WLAN driver for the Linux 2.6 kernel. (Actually, I believe it's the driver's Hardware Abstraction Layer - HAL- which is needed. Work is currently in progress in the open source community on alternative drivers, i.e. b43. The alternative drivers as of today, March 2009, are reported to work with some brcm chipsets, but according to my findings they do not yet work satisfactorily with the Broadcom WLAN chipsets in WRT54G3G (BCM4712 - 802.11g) and WL500W (BCM4321 - 802.11N-draft).
So, the new WL500W, which has two USB ports, is supposed to make use of a Huawei E220 UMTS (HSDPA) Modem, a dongle for WAN. This may not be altogether unproblematic, since the Linux 2.4 kernel has no built in support for USB modems. This was introduced in the 2.6 kernel with version 2.6.19 I believe. (http://wiki.debian.org/Huawei/E220: "E220 is supported natively in Linux kernels 2.6.20 and later, using the usbserial.ko (usbserial-generic interface) module. - Also usb_storage.ko is aware of HUAWEI E220 modem and no further action needs to be taken.")
I have experimented with a few of the open source firmwares for the WL-500W, but all seem to have their own shortcomings:
1. Koppel: www.koppel.cz/cdmawifi, versions 1.69 and 1,71. Based on the wellrespected Oleg firmwares (latest stable subversion "10") for the Asus WL-500 series of routers, which are based on stock Asus firmware and extensively modified with bugfixes. The Koppel modifications are done to get the WAN port use UMTS adapters and are developed by a czech gentleman by the name of Jiri Engelthaler. Based on the 2.4 kernel.
Koppel works very well on the WL-500W, both WAN (UMTS) and WLAN (brcm). The only caveat I have found are firewall issues, which remain from the Oleg firmware. It seems that the "A" directive in iptables is not working. I am unaware of any firewall rules with port-forwarding of SIP ports, which my setup requires, based on other than the "A" directive so the firewall doesn't work for med. The firewall is iptables with a web interface aswell as a post-firewall script. I was unable to configure the router for good and efficient use including asterisk (SIP) behind the NAT firewall.
2. Alpha versions of the Oleg firmwares can be found on Google Gode. It seems that someone has continued the development of Oleg's firmware, which has not progressed for more than a year. It runs fine, at least the subversion "d" I tried, but I could not get WAN to work with E220. No reference to the firewall issue in the list of changes.
3. Asus has brought out a new firmware for the WL-500W, version 2.0.0.6. I heard that the issues of the previous versions, corrected by Oleg, remain, so I did not work very long to check whether the E220 could be made to work. Certainly, it does not work out of the box.
4. X-WRT is a version of OpenWRT which is not a fork. It adds an improved webif configuration interface. This web interface uses some Flash memory, which is particularly limited in the WRT54G3G, only 4MB. So, only the WL-500W benefits from X-WRT if you need to install additional drivers to get E600 UMTS adapter to work. The Kamikaze 8.09 has recently been relesed, also by X-WRT, and looked fine in the brcm47xx port I tried. But i could not get the b43 driver which was installed automatically to control WLAN of the WL-500W. The mini-PCI card was not recognised.
5. DD-WRT is currently under heavy development. It looks very promising, so I installed the latest V.24 pre-SP2 mega build. It seems the WL-500W can handle it with its 8MB flash, but JFFS has only 320 kb available after enableing it. So, USB storage is required. Unfortunately I could not get E220 to work and it seems difficult to get IPKG packages to work without a functional WAN port for Internet access. It's kernel 2.4.37, so USB modems need special attention.
I'm currently investigating the possiblity to install Debian on the WL-500W. This can be done, according to http://wpkg.org/Running_Debian_on_ASUS_WL-500W, but I doubt that it will be beneficial to a router. It works very well on a NSLU2 running asterisk however. If m0n0wall is lightweight enough, I guess that could be possible. But with only 32MB of RAM available, the same with NSLU2 by the way, you must be very selective with what to install. I do need iptables, vlan, dnsmasq and a sip proxy such as milkfish, which is included in DD-WRT mega and voip builds.

Sunday, March 16, 2008
Installing OpenWRT with UMTS support
Step by step; In simplified English, by mnordlin
Install OpenWRT Kamikaze 7.09
1. Download firmware image from http://downloads.openwrt.org/kamikaze/7.09/brcm-2.4/openwrt-brcm-2.4-squashfs.trx (provided you already have kamikaze installed - install the corresponding bin file otherwise)
2. Copy firmware to /tmp folder on device.
3. Execute
root@OpenWrt:~# mtd -r write openwrt-brcm-2.4-squashfs.trx linux
4. Wait until connection breaks, which happens when installation reboots
5. Open a command window, start -> run -> cmd.
6. Attach an ethernet cable between your PC and device (you won't have access to WLAN until later on).
7. C:\Documents and Settings\Mikael>telnet 192.168.1.1 [enter]
8. Get your personal public key or create a key pair. You will probably find PUTTYgen (included with WinSCP) useful for generating your RSA key pair and pasting your public key to device in next step. The secret key will be required later on for logging in to the device.
9. Execute in telnet window, using copy and paste,
root@OpenWrt:~# echo 'ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAtQl8uscy3rjAbNBdL2ATUKfHCJHB+Zh7V5aTjBLoJ7F
AOw1fnCCpzWi2yUsqbjrzVIO6tFsPODS3PRc0my9ghSxO9itmwOe0kKLYc8blNf9kcQ27upSyf
Ff5jhE5AwyqEpzmc26FPwj4Zhip+aWg1ZLaEUn/WLHLEuXHPA9lRRgtlYHqgT7Ap3D/lZ/9Rd
4zCxTKAshzjO5fEBAXyOMADYJ1G9IIaKDHkHGtb981Sraxk9f+wMbOBuyvOGJKKXHuX04X
V7dmY87AhmAaRwEPeS0gGqoEkDMeALqyt1dYKqZ+Tv58UAPakS6nM9YhOGMMY5sCWM
m/bS3XQFbrv+2qWQ== rsa-key-20080313' > /etc/dropbear/authorized_keys
(be sure to use your own public key - the one in the example is a 2048 bits RSA key in PUTTY format for SSH-2, created by mnordlin)
10. Execute
root@OpenWrt:~# cat /etc/config/dropbear | sed -e "s/'on'/'off'/" > /etc/config/dropbear
(or simply change the line to "option PasswordAuth 'off'", replacing 'on' to 'off')
11. Execute
root@OpenWrt:~# rm /etc/rc.d/S50telnet
12. Check your public key was entered correctly by displaying it, execute
root@OpenWrt:~# dropbearkey -y -f /etc/dropbear/dropbear_rsa_host_key
13. Check that ssh works (dropbear on device), and reboot. Telnet access is now disabled. The only means of accessing device is with ssh (SCP as in WinSCP), using your private key.
14. Enable WiFi/WLAN by adding '#' in front of the line 'option disabled 1', or simply removing the whole line, in /etc/config/wireless
15. Add credentials for WiFi security.
Use WPA-PSK by changing 'option encryption' from 'none' to 'psk' and adding "option key '12345678'".
Change 'OpenWrt' to 'WRT54G3G' while you're at it, should you ever get a second router.
16. Your next router won't be a WRT54G3G.
Change the hostname of the device in /etc/config/system from OpenWRT to WRT54G3G.
The command line will remain as OpenWRT until next reboot, however.
Enabling 3G/UMTS
17. Install the PCMCIA drivers; kmod-pcmcia-core and pcmcia-cs:
Copy the drivers from openwrt.org to device /tmp, then execute the ipkg install commands:
root@OpenWrt:~# ipkg install pcmcia-cs_3.2.8-1_mipsel.ipk
root@OpenWrt:~# ipkg install kmod-pcmcia-core_2.4.34-brcm-1_mipsel.ipk
18. Reboot the device without the Huawei E600.
19. Check that CardBus Controller installed fine
root@OpenWrt:~# cardctl status
Output should look like:
Socket 0:
no card
20. Insert the Huawei E600 into device and check CardBus Controller status again. Output now should look like:
Socket 0:
3.3V CardBus card
function 0: [ready]
function 1: [ready]
21. Install USB support: kmod-usb-core, kmod-usb-serial, kmod-usb-ohci (for SlugOS, use 'kernel-module-usbserial').
root@OpenWrt:~# ipkg install kmod-usb-core_2.4.34-brcm-1_mipsel.ipk
root@OpenWrt:~# ipkg install kmod-usb-serial_2.4.34-brcm-1_mipsel.ipk
root@OpenWrt:~# ipkg install kmod-usb-ohci_2.4.34-brcm-1_mipsel.ipk
22. Install 3G/UMTS support (for dialup PPP): chat, comgt.
root@OpenWrt:~# ipkg install chat_2.4.3-8_mipsel.ipk
root@OpenWrt:~# ipkg install comgt_0.32-1_mipsel.ipk
23. Modífy the WAN section of “/etc/config/network” to read:
#### WAN configuration
config interface wan
option ifname 'ppp0'
option proto '3g'
option device '/dev/usb/tts/0'
option apn 'internet.tele2.se'
option pincode '1234' (or what you have here)
option dns "130.244.127.161 130.244.127.169"
24. Modify the LAN section by adding the following both lines.
option gateway 192.168.1.1
25. Start (and optionally time) the wan interface:
root@OpenWrt:~# time ifup wan
Wireless WAN (WWAN as it was called in whiterussian) is now started. Output should look like:
ifconfig: SIOCGIFFLAGS: No such device
Trying to set PIN
PIN set successfully
Trying to set mode
Error setting WWAN mode!
real 0m 7.22s
user 0m 0.69s
sys 0m 1.17s
Update wget
26. Update wget (to avoid the segmentation fault bug)
root@OpenWrt:~# ipkg update
root@OpenWrt:~# ipkg -force-overwrite install wget
Setup DDNS
27. Create the file /etc/ppp/ip-up.d/S01dyndns (and don't forget to chmod it executable; i e 0x0755) with the following content:
#!/bin/sh
USER="user"
PASS="pass"
DOMAIN="domain.ath.cx"
registered=$(nslookup $DOMAIN|sed 's/[^0-9. ]//g'|tail -n1|sed -e's/ [0-9.]*//2' -e's/ *//')
current=$(wget -O - http://checkip.dyndns.org|sed 's/[^0-9.]//g')
[ "$current" != "$registered" ] && {
wget -O /dev/null http://$USER:$PASS@members.dyndns.org/nic/update?hostname=$DOMAIN &&
registered=$current
}
sleep 3
newip=$(wget -O - http://checkip.dyndns.org|sed s/[^0-9.]//g)
newdns=$(nslookup $DOMAIN|sed 's/[^0-9. ]//g'|tail -n1|sed -e's/ [0-9.]*//2' -e's/ *//')
echo "Set ${newip} (DNS: ${newdns}), had ${current} (DNS: ${registered})" \
| /usr/bin/logger -t ddupd
28. After a reboot, check DynDNS by running
root@OpenWrt:~#nslookup gashaga.ath.cx (<- your domain goes here)
29. Compare the ip address with the ip for ppp0 by running
root@OpenWrt:~#ifconfig
If the numbers are equal, all is fine.
Open iptables for incoming ssh
30. To open up the firewall to allow incoming connections on port 22 (the ssh port), add the following line to “/etc/config/firewall”:
accept:proto=tcp dport=22
A Masquerading SIP Proxy: siproxd
31. Install siproxd according to Hias in http://forum.openwrt.org/viewtopic.php?id=9397
Since you're running OpenWrt 7.09 (aka Kamikaze) your bridged LAN is named br-lan (br0 was whiterussian). ppp0 remains, though, even if you start your Internet interface by 'ifup wan'. You can check the names with 'ifconfig', which you used in step 29 above.
32. Change settings from 'transparent SIP proxy' to 'GS BT-100 behind NAT router running siproxd' from
http://apocalyptech.com/linux/sipnat/siproxd-pdf.htm.
QoS: L7/SIP
33. Install ipkg install qos-scripts
34. Setup QoS according to http://www.voip-forum.se/forum/showthread.php?t=601 and install sip.pat level7-filter from
http://l7-filter.sourceforge.net/layer7-protocols/protocols/sip.pat
References:
A. http://josefsson.org/grisslan/internet.html
B. http://wiki.openwrt.org/OpenWrtDocs/KamikazeConfiguration
C. http://wiki.openwrt.org/DDNSHowTo
D. http://forum.openwrt.org/viewtopic.php?pid=57925
E. http://forum.openwrt.org/viewtopic.php?id=9397
F. http://apocalyptech.com/linux/sipnat/siproxd-pdf.html
G. http://www.voip-forum.se/forum/showthread.php?t=601
H. http://l7-filter.sourceforge.net/layer7-protocols/protocols/sip.pat
Thursday, May 10, 2007
WRT54GL+asterisk - VoIP-Forum.se
1. Följ guiden här: http://wiki.openwrt.org/Faq#head-a1d...83d1dfb4b761ff
2. Ladda hem http://l7-filter.sourceforge.net/lay...tocols/sip.pat till /etc/l7-protocols
3. Det står sen (i guiden från punkt 1) att man ska editera '/etc/config/qos-wan', jag hittar bara '/etc/config/qos' hos mig. Jag antar att det ändå är i den jag ska pilla..
4. Lägg till direkt under # RULES:
# RULES:
config classify
option target 'Priority'
option layer7 'sip'
5. Starta om routern eller kör 'ifdown wan && ifup wan'
Monday, April 30, 2007
OpenWrt / Cardbus Support on WRT54G3G
OpenWrt / Cardbus Support on WRT54G3G: "(RC6) In order to setup firewall correctly (instead forwarding fails), set this nvram values:
Code:
nvram set wan_device='ppp0'
nvram set wan_ifname='ppp0'"
Tuesday, April 24, 2007
OpenWrtDocs/Configuration - OpenWrt
OpenWrtDocs/Configuration - OpenWrt: "
5.5. iptables - Firewall
The rules and some small samples for your firewall can be found in /etc/firewall.user. For RC5 and earlier if you want to make changes to this file you have to remove it first since it is actually a symlink to /rom/etc/firewall.user, see the section Editing files in OpenWrtDocs/Using.
Be sure to read the notes about the firewall rules before changing anything. The important thing to note is that if you setup port forwarding, you won't be able to see the changes inside the router's LAN. You will have to access the router from outside to verify the setup.
As of RC9 the file /etc/firewall.user reads#!/bin/sh
# Copyright (C) 2006 OpenWrt.org
iptables -F input_rule
iptables -F output_rule
iptables -F forwarding_rule
iptables -t nat -F prerouting_rule
iptables -t nat -F postrouting_rule
# The following chains are for traffic directed at the IP of the
# WAN interface
iptables -F input_wan
iptables -F forwarding_wan
iptables -t nat -F prerouting_wan
### Open port to WAN
## -- This allows port 22 to be answered by (dropbear on) the router
# iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
# iptables -A input_wan -p tcp --dport 22 -j ACCEPT
### Port forwarding ## -- This forwards port 8080 on the WAN to port 80 on 192.168.1.2
# iptables -t nat -A prerouting_wan -p tcp --dport 8080 -j DNAT --to 192.168.1.2:80
# iptables -A forwarding_wan -p tcp --dport 80 -d 192.168.1.2 -j ACCEPT
###DMZ ## -- Connections to ports not handled above will be forwarded to 192.168.1.2
# iptables -t nat -A prerouting_wan -j DNAT --to 192.168.1.2
# iptables -A forwarding_wan -d 192.168.1.2 -j ACCEPT
The first section, Open port to WAN shows an example of opening a port for your router running OpenWRT to listen to and accept. In the case given, it will open up port 22 and accept connections using dropbear (the SSH server). Just delete the # sign in front of the two rules to enable access.
If you wanted to open up any other ports for the router to listen to, just copy those two lines and change just the port number from 22 to something else.
The second section, Port forwarding is for accepting incoming connections from the WAN (outside the router) and sending the requests to a networked device on your LAN (inside your router).
Before setting up any port forwarding, you'll have to install some OpenWRT packages first, such as iptables-nat and ip (any others?).
In the example provided, if someone on the Internet were to connect to your router on port 8080, it would forward them to port 80 on whatever computer / device had the IP address of 192.168.1.2.
If you are running a webserver on that address, and want to listen on port 80 instead, change the 8080 on the first line.
The same is true for any other ports you'd want to forward to your LAN. Just follow the example as a guide.
The last section, DMZ is sending all connections to a port not specified in the rules above to a certain IP address. If you do decide to use this, it would be a good idea to have a firewall managing the ports on the destination. The DMZ can be considered a simple way to let another computer handle the firewall rules, if you don't want to configure them on OpenWRT and at the same time you want to send all connections to one device.
Once you're finished making changes to your firewall, restart it by running the init script:/etc/init.d/S45firewall restartRemember to test the changes outside your LAN! Finally, if you wish to dig deeper into how iptables work under the rule/chain structure of OpenWRT, see OpenWrtDocs/IPTables
"
WRT54GL+asterisk - VoIP-Forum.se
Jag har lagt in följande i /etc/firewall.user (förutom det som redan står där):
iptables -t nat -A prerouting_rule -i $WAN -p tcp --dport 80 -j ACCEPT
iptables -A input_rule -i $WAN -p tcp --dport 80 -j ACCEPT
iptables -t nat -A prerouting_rule -i $WAN -p tcp --dport 22 -j ACCEPT
iptables -A input_rule -i $WAN -p tcp --dport 22 -j ACCEPT
iptables -t nat -A prerouting_rule -i $WAN -p udp --dport 5060 -j ACCEPT
iptables -A input_rule -i $WAN -p udp --dport 5060 -j ACCEPT
iptables -t nat -A prerouting_rule -i $WAN -p udp --dport 10000:20000 -j ACCEPT
iptables -A input_rule -i $WAN -p udp --dport 10000:20000 -j ACCEPT
iptables -t nat -A prerouting_rule -i $WAN -p udp --dport 4569 -j ACCEPT
iptables -A input_rule -i $WAN -p udp --dport 4569 -j ACCEPT
iptables -t nat -A prerouting_rule -i $WAN -p udp --dport 5036 -j ACCEPT
iptables -A input_rule -i $WAN -p udp --dport 5036 -j ACCEPT
iptables -t nat -A prerouting_rule -i $WAN -p udp --dport 2727 -j ACCEPT
iptables -A input_rule -i $WAN -p udp --dport 2727 -j ACCEPT
Använd ett ordentligt password för det här öppnar väl lite för mycket egentligen.. (port 22 och 80 behövs inte för telefonin)
Det fungerar att koppla upp utifrån. Däremot måste jag använda intern ip-adress 192.168.1.1 för att koppla upp inifrån till IAX2. Och extern för att koppla upp utifrån. Med SIP har jag inte det problemet och annars är jag nöjd. Transcoding är iofs lite långsam på routern...
Quality of service vill du säkert också ha, så här gjorde jag med det:
Så här har jag försökt:
1. Följ guiden här: http://wiki.openwrt.org/Faq#head-a1d...83d1dfb4b761ff
2. Ladda hem http://l7-filter.sourceforge.net/lay...tocols/sip.pat till /etc/l7-protocols
3. Det står sen (i guiden från punkt 1) att man ska editera '/etc/config/qos-wan', jag hittar bara '/etc/config/qos' hos mig. Jag antar att det ändå är i den jag ska pilla..
4. Lägg till direkt under # RULES:
# RULES:
config classify
option target 'Priority'
option layer7 'sip'
5. Starta om routern eller kör 'ifdown wan && ifup wan'
Man skulle nästan göra en liten wiki-guide någonstans med detta... Det är ju skitbra! :-)"
Thursday, April 19, 2007
OpenWrt / WRTSL54GS
If someone has a working config for RC5 for this router, could you please post your NVRAM values for lan and wan settings?
Code:
et0mdcport=0
et0phyaddr=30
et1mdcport=1
et1phyaddr=5
lan_ifname=eth0
lan_ifnames=vlan0 eth1 eth2
lan_ipaddr=192.168.1.1
lan_netmask=255.255.255.0
lan_proto=static
old_ifname=eth1
old_ipaddr=192.168.33.99
old_netmask=255.255.255.0
old_proto=static
vlan0hwname=et0
vlan0ports=0 1 2 3 5u
vlan1hwname=et0
vlan1ports=4 5
wan_device=vlan1
wan_hostname=sl
wan_ifname=eth2
wan_proto=dhcp
wl0_akm=none
wl0_channel=1
wl0_closed=0
wl0_ifname=eth2
wl0_infra=1
wl0_mode=sta
wl0_radio=1
wl0_ssid=XXXXX
wl0_wep=disabled
wl0gpio2=0
wl0gpio3=0
wl0id=0x4320
I run my 'SL' in wireless client mode. I have the switch set up to DHCP clients and the 'OLD WAN' port set up as a static ip extra door.
Mike (mrdvt92)"
OpenWrt / Cardbus Support on WRT54G3G
OpenWrt / Cardbus Support on WRT54G3G: "To RUok:
I am interested, but took a different path. I used a WRTSL54GS unit. The SL has a USB port so I simply attached my cellphone via USB. From there it's just a matter of some PPP chat scripts. Not as elegant and self-contained as a card in the router. But it works.
To mikino:
Search for 'web proxy' on the forums. There are several programs if all you want is basic proxy functions without caching of content."
Saturday, April 7, 2007
OpenWrt / Cardbus Support on WRT54G3G
OpenWrt / Cardbus Support on WRT54G3G: "after uplading x-wrt image , the following packages must be installes in router (for nozomi):
kmod-pcmcia_2.4.30-brcm-5_mipsel.ipk
kmod-pcmcia-serial_2.4.30-brcm-5_mipsel.ipk
pcmcia-utils_3.2.8-1_mipsel.ipk
kmod-nozomi_2.4.30-brcm-1_mipsel.ipk
chat_2.4.3-7_mipsel.ipk
comgt_0.3-1_mipsel.ipk
"
Tuesday, April 3, 2007
OpenWrt / Cardbus Support on WRT54G3G
OpenWrt / Cardbus Support on WRT54G3G:
"Hi all,
I have been using RC6 with Option GTmax / T-Mobile Germany (butterfly antenna).
This is what to do:
Code:
# 1. Flash your router with supplied firmware image (RC6)
# 2. Update ipkg and install required packages
ipkg update
ipkg install http://ftp.berlios.de/pub/xwrt/webif_latest_stable.ipk
ipkg install kmod-pcmcia kmod-pcmcia-serial pcmcia-utils kmod-nozomi chat comgt
reboot
# 3. Set your UMTS settings (Example: T-Mobile Germany)
# These values could also set by using x-wrt webif!!!
nvram set wan_proto="wwan"
nvram set wwan_service="umts_first"
nvram set wwan_country="de"
nvram set wwan_apn="internet.t-mobile"
nvram set wwan_username="tm"
nvram set wwan_passwd="tm"
nvram set wan_ifname="ppp0"
nvram set wwan_pincode="****"
# forwarding (see later in thread)
nvram set wan_device='ppp0'
nvram set wan_ifname='ppp0'
nvram commit
# add "noipdefault" to /etc/ppp/options !!"
I have been googling but could not solve th issue, so I let this post here. Maybe someone may help...
I do own a novatel merlin u740, and I have installed the RC6 on my WRT54G3G.
Everything went right.
I installed these packages:
kmod-pcmcia_2.4.30-brcm-5_mipsel.ipk
kmod-pcmcia-serial_2.4.30-brcm-5_mipsel.ipk
pcmcia-utils_3.2.8-1_mipsel.ipk
chat_2.4.3-7_mipsel.ipk
comgt_0.3-1_mipsel.ipk
kmod-ohci*.ipk and kmod_usb* (not all)
I have updated the file with
card 'Novatel bla bla u740'
manfid 0x1440, 0x1400
bind 'serial_cs', etc, etc
I can see at the usb 'log' that the card is detected, (and also when i plug for example an usb pen, the pen is detected).
I know some AT commands to 'start' the u740 with, for example hyperterminal from windows.
My (maybe stupid) question, from a noobie is, how do I setup OpenWrt in order to 'allow' connections, since i must use is as a normal serial modem?
thanks in advance"
Friday, March 30, 2007
Bl a en WRT-router har jag nu beställt, såsom ersättare för den fallerande Dovadon.
Beställda produkter
Artnr. | Benämning | Antal | Leverans | Pris | Summa inkl. moms | |||||||
e1008419 | Linksys 3G/UMTS Wireless Router (Vodafon | 1 | 2007-03-31 | 1.619:- | 1.619:- | |||||||
e1156720 | TViX M-4000U/TViX M-4000P | 1 | 2007-04-02 | 2.190:- | 2.190:- |
Moms (25%) ingår med 762:- |
|
Labels: computers, embedded, linux, multimedia, OpenWRT, routers, TViX
Friday, February 9, 2007
3G/GPRS connection on Ubuntu with a HUAWEI E600 vs 1.5 « ergonomica
3G/GPRS connection on Ubuntu with a HUAWEI E600 vs 1.5 « ergonomica: "What was used:
* Computer with Linux Ubuntu. (Linux 2.6.12-10-386 #1 Sat Mar 11 16:13:17 UTC 2006 i686 GNU/Linux)
* pcmcia_cs installed (Ubuntu Brezzy Bager and Dapper Drake as it installed as default)
* pppconfig intalled (Ubuntu Brezzy Bager and Dapper Drake as it installed as default)
* 3G/GPRS PCMCIA card (mine is a HUAWEI E600 from Optimus - Kanguru)
"