Because in my case TL-MR3420 with 4G/LTE is used only for WAN backup and I can't have open ports on 4G/LTE or a true Public IP with my operator I have no problems with dual NAT, Primary WAN - fiber optic is not used via TL-MR3420.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menu#!/bin/sh
# delete cd0 prepare USB E3372 modem
# LLC script v0.1
# test if USB dongle exist
usbdata=`usbconfig | grep HUAWEIMOBILE`
if [ -z "$usbdata" ]
then
echo "INSERT USB E3372 !"
exit
fi
cdata1=`/sbin/camcontrol devlist | grep cd0`
# test if no exist cd0 -> NO cd0
#echo "$cdata1"
if [ -n "$cdata1" ]
then
# exec commands to eject cd0 and activate network modem
echo "EJECT cd0"
/sbin/camcontrol eject cd0
/usr/local/sbin/usb_modeswitch --default-vendor 0x12d1 --default-product 0x1f01 -J
fi
#echo "EXIT USB-E3372 CD"
#exit 0
ue0inet=`/sbin/ifconfig ue0 | grep inet`
# test if exist ue0inet
while [ -z "$ue0inet" ]
do
echo "working to ue0 IP..."
/sbin/ifconfig ue0 up
/bin/sleep 1
/sbin/ifconfig ue0 inet 192.168.10.10 netmask 255.255.255.0
ue0inet=`/sbin/ifconfig ue0 | grep inet`
done
#/sbin/ifconfig ue0
echo "EXIT USB-E3372"
exit
$ntpcfg .= 'restrict default'; in -> $ntpcfg .= 'restrict -4 default';
...
$ntpcfg .= "interface ignore all\n"; in -> $ntpcfg .= "interface ignore wildcard\n";
# $ntpcfg .= "\nrestrict -6 default";
# if (empty($config['ntpd']['kod'])) { /*note: this one works backwards */
# $ntpcfg .= ' kod limited';
# }
# if (empty($config['ntpd']['nomodify'])) { /*note: this one works backwards */
# $ntpcfg .= ' nomodify';
# }
# if (!empty($config['ntpd']['noquery'])) {
# $ntpcfg .= ' noquery';
# }
# if (empty($config['ntpd']['nopeer'])) { /*note: this one works backwards */
# $ntpcfg .= ' nopeer';
# }
# if (!empty($config['ntpd']['noserve'])) {
# $ntpcfg .= ' noserve';
# }
# if (empty($config['ntpd']['notrap'])) { /*note: this one works backwards */
# $ntpcfg .= ' notrap';
# }
first find your IPv6 interfaces addresses with:
/sbin/ifconfig | grep inet6
then delete the IPv6 address from interfaces with
ifconfig lo0 inet6 ::1 delete
#!/bin/sh
# delete IPV6 from interfaces
ifconfig lo0 inet6 ::1 delete
ifconfig lo0 inet6 fe80::1 delete
# here you add your IPv6 interfaces address...
ifconfig em0 inet6 fe80::64a3:27ff:fe0a:f59 delete
ifconfig em1 inet6 fe80::230:18ff:fec4:45c6 delete
https://github.com/curl/curl/wiki/DNS-over-HTTPS#publicly-available-servers
https://en.wikipedia.org/wiki/Public_recursive_name_server
# Public resolvers list with DoH 10-04-2019 v0.0.1 LLC
dns-gcp.aaflalo.me
35.231.69.77
dns.aaflalo.me
176.56.236.175
176.103.130.132
176.103.130.130
dns-family.adguard.com
176.103.130.132
dns.adguard.com
176.103.130.130
139.59.16.130
178.128.255.28
dns.dnscrypt-tupi.org
191.252.100.35
139.59.48.222
51.15.106.176
208.67.220.220
208.67.220.123
185.228.168.10
185.228.168.168
185.228.168.9
dns.cloudflare.com
1.1.1.1
1.0.0.1
commons.host
8.20.247.2
77.51.181.209
81.17.31.34
128.127.104.108
213.163.64.208
185.107.80.84
185.117.118.20
5.133.8.187
185.212.169.139
185.94.193.234
212.129.46.32
195.154.40.48
109.71.42.228
103.16.27.53
5.254.96.195
178.175.139.211
109.248.149.133
82.163.72.123
84.16.240.43
89.163.214.174
162.221.207.228
167.114.84.132
173.234.159.235
173.234.56.115
104.238.195.139
64.120.5.251
198.7.58.227
209.58.147.36
64.42.181.227
155.254.29.113
23.19.67.116
104.255.175.2
93.95.226.165
41.79.69.13
209.250.235.170
199.167.130.118
199.167.128.112
77.66.84.233
176.56.237.171
167.86.90.103
45.76.35.212
doh.dnscrypt.nl
108.61.199.170
139.59.200.116
108.61.201.119
159.69.198.101
doh2.dnswarden.com
159.69.16.58
doh1.dnswarden.com
94.130.183.18
doh-de.blahdns.com
159.69.198.101
doh-jp.blahdns.com
108.61.201.119
doh.cleanbrowsing.org
doh.crypto.sx
104.28.0.106
ibksturm.synology.me
178.82.103.5
23.111.74.216
23.111.69.126
205.185.116.116
edns.233py.com
47.101.136.37
wdns.233py.com
118.24.208.197
sdns.233py.com
119.29.107.85
ndns.233py.com
114.115.240.175
dns.google.com
216.58.215.110
jp.gridns.xyz
172.105.241.93
sg.gridns.xyz
139.162.3.123
178.82.103.5
149.28.152.81
doh.tiar.app
45.32.105.4
194.132.32.32
180.131.144.144
195.10.195.195
142.4.204.111
142.4.205.47
doh.powerdns.org
136.144.215.158
doh.seby.io
45.76.113.31
106.51.128.78
dns.quad9.net
149.112.112.112
dns9.quad9.net
9.9.9.9
9.9.9.10
149.112.112.9
149.112.112.10
173.82.232.232
dns.rubyfish.cn
118.89.110.78
ea-dns.rubyfish.cn
uw-dns.rubyfish.cn
212.47.228.136
146.185.167.43
doh.securedns.eu
146.185.167.43
163.172.180.125
178.216.201.222
51.158.106.42
37.221.195.181
107.170.57.34
77.88.8.78
5.189.170.196
151.80.222.79
78.47.64.161
mozilla.cloudflare-dns.com
104.16.249.249
cloudflare-dns.com
104.16.111.25
doh.dns.sb
185.222.222.222
185.184.222.222
dns.dnsoverhttps.net
104.236.178.232
dns.dns-over-https.com
45.77.124.64
doh.appliedprivacy.net
37.252.185.229
https://blog.nightly.mozilla.org/2018/06/01/improving-dns-privacy-in-firefox/
https://download.dnscrypt.info/resolvers-list/json/public-resolvers.json