Cookies op Tweakers

Tweakers maakt gebruik van cookies, onder andere om de website te analyseren, het gebruiksgemak te vergroten en advertenties te tonen. Door gebruik te maken van deze website, of door op 'Ga verder' te klikken, geef je toestemming voor het gebruik van cookies. Wil je meer informatie over cookies en hoe ze worden gebruikt, bekijk dan ons cookiebeleid.

Meer informatie

Software-update: m0n0wall 1.21

Het pakket m0n0wall is een kant en klare firewall oplossing met een uitgebreide feature set. Het maakt in de basis gebruik van het besturingssysteem FreeBSD en is volledig in te stellen via een webbased interface. Het heeft onder andere ondersteuning aan boord voor wireless opstellingen, 802.1Q VLAN, NAT/PAT, IPsec VPN tunnels en PPTP VPN. Daarnaast kan het ook packet filtering toepassen en beschikt het over een traffic shaper. De ontwikkelaars hebben ons verwend met een nieuwe versie in het nieuwe jaar met 1.21 als het versienummer. De lijst met veranderingen ziet er als volgt uit:

Version 1.21:
  • the captive portal has been modified to always issue a redirect to m0n0wall's own IP address first (even in HTTP mode). This means that all login forms MUST contain the "redirurl" hidden field now, otherwise they won't work anymore!
  • mini_httpd has been improved to increase stability of the captive portal and webGUI
    • when the maximum number of connections has been reached, it no longer attempts to send a 503 message to the client, as that itself could have caused the parent process to block (and, due to a bug in SIGALRM handling, even exit) if the client fails to acknowledge the data. Instead, the connection is simply closed.
    • new feature: the number of connections per client IP address can now be limited to prevent one misbehaved user from tying up the server. The default limit for the captive portal is now 4 connections per client, and 16 in total (can be adjusted on captive portal setup page)
  • captive portal file manager (If you already have element files from inofficial builds, it isn't enough to simply delete all the files that were uploaded to the system. Before upgrading, you manually have to delete the whole "<element>...</element>" part in your config and restore that changed config.)
  • imported Jonathan de Graeve's captive portal RADIUS improvements
    • improved RADIUS authentication using PHP's built-in PECL RADIUS support
    • secondary RADIUS server support
    • RADIUS MAC authentication
    • RADIUS URL redirection attribute support
    • RADIUS Session-Timeout support
    • disable concurrent user login option
    • RADIUS Idle-Timeout support
    • RADIUS Acct-Terminate-Cause support
    • WISPr RADIUS attributes are now supported as well as Nomadix attributes (Redirection-URL, Session-Terminate-Time)
    • on idle timeout, the time of last activity is used in calculating the Session-Time
  • notes field on index page
  • new option for SNMP agent: bind to LAN interface only (avoids problem with VPN tunnel to LAN subnet terminated on WAN; see
  • fixed CPU and traffic graph SVG for Firefox 1.5
  • captive portal RADIUS accounting stop packets are now sent before rebooting after a firmware upgrade
  • when restoring config.xml via the webGUI, XML validation is done on the file before it is installed
  • updated base system to FreeBSD 4.11-RELEASE-p13
  • updated PHP to 4.4.1
  • updated Dnsmasq to 2.23
  • updated racoon to the ipsec-tools 0.6.4 version
  • added device nodes for /dev/ad4-7
  • fixed stopping/restarting racoon
  • fixed typo in services_captiveportal.php
  • increased CF partition size to 7 MB
Version 1.2:
  • fixed HD standby to use minutes, not seconds
  • fixed DNS forwarder domain override feature
  • Diagnostics: ARP page now allows entries to be deleted
  • made Ping/Traceroute pages tabbed
  • captive portal RADIUS accounting now sends Gigawords
  • fixed PPPoE dial-on-demand to not use internally
  • removed OpenVPN. If you've been using OpenVPN in earlier 1.2b versions, make very sure after upgrading that all your rules still point to the right interfaces (the OpenVPN pseudo-interfaces will be removed). Better yet, restore the configuration backup you made before you enabled OpenVPN (as per the suggestion in the webGUI) prior to upgrading.
  • RFC 1918 block rule is now listed on the Firewall: Rules page for WAN as an uneditable rule (gray background)
Versienummer 1.21
Besturingssystemen BSD
Website m0n0wall
Licentietype Voorwaarden (GNU/BSD/etc.)

Door Japke Rosink


03-01-2006 • 09:47

7 Linkedin Google+

Bron: m0n0wall


Meer historie

Reacties (7)

Wijzig sortering

Apple iPhone XS Red Dead Redemption 2 LG W7 Google Pixel 3 XL OnePlus 6T (6GB ram) FIFA 19 Samsung Galaxy S10 Google Pixel 3

Tweakers vormt samen met Tweakers Elect, Hardware.Info, Autotrack, Nationale Vacaturebank, Intermediair en Independer de Persgroep Online Services B.V.
Alle rechten voorbehouden © 1998 - 2019 Hosting door True