Remove the ‘xxx’ bits and put in the real network address from your
network. Perhaps you meant to hide something, but there’s no point since
you’re on a private network anyway and most of us probably use the same IP
ranges, and none of us could reach eachother no matter which private
networking is used.
Also note that in that article you cited:
Code:
Note that FW_TRUSTED_NETS does not allow incomming UDP broadcast packages.
To accept also UDP broadcast packages specify the matching UDP port(s)
where UDP broadcast packages should be accepted via
FW_ALLOW_FW_BROADCAST_EXT in the firewall configuration.
Perhaps you need to add the FW_ALLOW_FW_BROADCAST_EXT parameter as mentioned.
–
Good luck.
If you find this post helpful and are logged into the web interface,
show your appreciation and click on the star below…
Here TCPDUMP with Firewall off → scanner configuration possible ( in the following 192.168.130.104 is a samsung laser color printer which is offline ) : http://paste.opensuse.org/74504517
Here TCPDUMP with Firewall ON → scanner configuration not possible ( in the following 192.168.130.104 is a samsung laser color printer which is offline ) : SUSE Paste
Notice that the source port from the unsolicited packet from
192.168.130.80 (presumably the other system) is up in the 50k range, not
the 30k range that you have allowed. Fix it.
–
Good luck.
If you find this post helpful and are logged into the web interface,
show your appreciation and click on the star below…
I can’t fix port of the caller (192.168.130.80).
It is always upper 50000
192.168.130.80.60045 > LINUX-TEST-123.hathor-nwk.sane-port:
On the server side :
Firewall is configured as :==================
FW_SERVICES_ACCEPT_RELATED_EXT="192.168.130.0/24,tcp,30000:30100 "
FW_TRUSTED_NETS="192.168.130.0/24,tcp,30000:30100 "
FW_ALLOW_FW_BROADCAST_EXT=“yes”
FW_SERVICES_EXT_TCP=“14245” (for ssh )
** should I add 30000:30100** ?
What about : FW_SERVICES_ACCEPT_EXT=""
Network scan stuff is configured as
1°) Server settings :
Permitted client and port range is set (port 30000-30100; client ip adress 192.168.130.0/24)
2°) Client settings
connect_timeout=60,localhost
On the client side (192.168.130.80) :
Options of yast2/scanner/scan_via_network
1°) Client settings
192.168.130.100,connect_timeout=60,data_portrange=30000-30100,
IMO the referenced SDB article might have been a bit mis-leading.
By including excerpts in the article from the firewall config file, it suggests those are the settings that should be manually configured.
But, if you <read> the article in its entirety, it does describe the steps that should be configured <using the YAST FW applet> and IMO should be followed accordingly. The fw configs should be referenced <only> if you want to verify but isn’t likely necessary.
The bottom line is that if you use the YAST FW applet, it’s easy to visualize what you’re doing in each of the fw zones. You might be able to do the same editing the config files manually, but could also make a serious error that would have been apparent using the applet.
OK but there is still one problem :
In the following :
192.168.130.104 is a laser printer which is offline
60:a4:4c:7d:b9:28 ( 192.168.130.80 ) is the client
00:24:1d:c1:99:ba ( 192.168.130.100 LINUX-TEST-123 ) is the server where the scanner is attached to.
>
> As you can see the client is calling the server with an unauthorized
> port (58579).
> On the server side, authorized port are 30000-31000
Authorized because you set them that way in the firewall configuration,
right? If the ports in the documentation do not match your needs, fix it
(as mentioned before).
> How to fix that.
The same steps you took to open ports 30000-31000, except change out the
‘30’ for ‘50’ and the ‘31’ for ‘60’, or whatever is right per these printers.
–
Good luck.
If you find this post helpful and are logged into the web interface,
show your appreciation and click on the star below…