iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination 1.1.1.1:80
iptables -t nat -A POSTROUTING -o eth0 -p tcp -d 1.1.1.1 --dport 80 -j MASQUERADE
# Включить форвард
echo 1 > /proc/sys/net/ipv4/ip_forward
сертификата компьютера выданный CA ,после ответ клиенту на запрос учетных данных.
[from-internal-disa]
exten => 1000,1,HangUp() ;; Или любое другое действие, например Playback(privacy-blocked)
exten => _XXXX,1,Goto(${EXTEN}@from-internal)
/interface wireless access-list
add comment=Jayden mac-address=5C:1D:D9:C3:C6:15 private-pre-shared-key=supersecretpasswordexample vlan-mode=no-tag
https://apple.stackexchange.com/questions/180281/w.... Отсюда выходит, что личный VPN безопаснее?
есть в локалке некоторое количество айпишников
/ip firewall address-list
add list=allowed_ips address=192.168.1.100
add list=allowed_ips address=192.168.1.101
# Allow access to 1.1.1.1 for addresses in the 'allowed_ips' list
/ip firewall filter
add action=accept chain=forward src-address-list=allowed_ips dst-address=1.1.1.1 protocol=tcp comment="Allow access to 1.1.1.1"
# Block all other internet access for addresses in the 'allowed_ips' list
add action=drop chain=forward src-address-list=allowed_ips comment="Block all other access"
host=<Asterisk_IP_ADDRESS>
port=<PORT>
type=peer
qualify=yes
disallow=all
allow=alaw
dtmfmode=rfc2833
insecure=port,invite
context=from-freepbx
[freepbx_trunk]
type=peer
host=<FreePBX_IP_ADDRESS>
port=<PORT>
qualify=yes
disallow=all
allow=alaw
dtmfmode=rfc2833
insecure=port,invite
context=from-freepbx