Mit Linux-Client auf Windows-Freigaben zugreifen

NavyNeidi

NavyNeidi

Einen schönen Tag in See
Hallo, ich habe folgendes Problem.
Ich versuche mit meiner Linux-Kiste (Suse 9.2, KDE 3.4) auf freigegebene Laufwerke von Windows-Rechnern (WinXP Home SP2 und Win98) zuzugreifen. Mit einem FC3 oder Simply Mepis war das kein Problem.
Schalte ich die Suse Firewall2 ab, geht es auch, die Fehlermeldung im konqueror sagt auch etwas von Firewall. Sämtliche Hilfen, die ich gefunden haben, hatten keine Wirkung.
Frage: Wie muss die Firewall konfiguriert werden, damit es klappt?

Danke
 
es gibt ein yast modul für die firewall. in diesem kannst du einstellen welche protokolle die firewall nicht filtern soll. in diesem fall ist es das smb protokoll.
 
Du musst eingehende Verbindungen zu Port 137/udp und 139/tcp zulassen.
 
@peddy76: Hab da ein Problem: In meinem Yast-Module, kann ich nur die Server anhaken, welche laufen. Und da ist der Samba-Server "angestellt", aber ...

@monarch: Hab unter den Experteneinstellung die Ports freigegeben, aber...

Mit beiden Tips hab ich keinen Erfolg.
Noch ein paar Tips vielleicht?

Danke
 
Basiert die SuSE Firewall2 auf iptables? Dann könntest du mal bitte den Output von "iptables -L" posten? Bitte in einer Code umgebung (Funktion hier im Forum [ code ] usw...) wenn es etwas länger wird.
 
Besorg dir auf einem von den Windowsrechnern nen Portscanner und zeig uns das Scan-Ergebnis. Oder nimm nmap von Knoppix aus.
 
Firewall direkt konfig

Hallo,

du kannst die Firewall (packet filter) auch direkt über das File

/etc/sysconfig/susefirewall2

konfigurieren. Hier gibt es alle Einstellungen, die du
machen kannst (auch mit Erklärungen).

Wichtig für dich ist u.a. der Eintrag

FW_SERVICES_EXT_TCP = "139"

das gleiche gilt für EXT_UDP.

hier kannst du die Ports eintragen, die von aussen
erreichbar sein sollen.

Wenn du alles eingestellt hast, kannst du die fw über

/etc/init.d/Susefirewall2_final stop/start

wieder anwerfen.

Gruss

Micha
 
vielleicht klappt das hier - vergleiche mal folgendes:
/etc/sysconfig/SuSEfirewall2 :

FW_DEV_EXT="eth-id-xx:xx:xx:xx" #karte für das externe netz
FW_DEV_INT="eth-id-yy:yy:yy:yy" #karte für das interne netz
FW_ROUTE="yes"
FW_MASQUERADE="yes"
FW_MASQ_DEV="$FW_DEV_EXT"
FW_PROTECT_FROM_INTERNAL="no"
FW_TRUSTED_NETS="192.168.0.2"
FW_SERVICE_DNS="yes"
FW_SERVICE_SAMBA="yes"
 
@Havoc][
Also hier mal die iptables. Leider sagt mir das alles nichts. Gibt es irgendwo ein gutes HowTo für die iptables (Ich gebe zu, habe jetzt nicht im Board oder Google gesucht ;-) ):
Code:
Chain INPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
input_ext  all  --  anywhere             anywhere            
input_int  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-IN-ILL-TARGET ' 
DROP       all  --  anywhere             anywhere            

Chain FORWARD (policy DROP)
target     prot opt source               destination         
TCPMSS     tcp  --  anywhere             anywhere            tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
TCPMSS     tcp  --  anywhere             anywhere            tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
forward_ext  all  --  anywhere             anywhere            
forward_int  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWD-ILL-ROUTING ' 
DROP       all  --  anywhere             anywhere            

Chain OUTPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp time-exceeded LOG level warning tcp-options ip-options prefix `SFW2-OUT-TRACERT-ATTEMPT ' 
ACCEPT     icmp --  anywhere             anywhere            icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            icmp port-unreachable 
ACCEPT     icmp --  anywhere             anywhere            icmp fragmentation-needed 
ACCEPT     icmp --  anywhere             anywhere            icmp network-prohibited 
ACCEPT     icmp --  anywhere             anywhere            icmp host-prohibited 
ACCEPT     icmp --  anywhere             anywhere            icmp communication-prohibited 
DROP       icmp --  anywhere             anywhere            icmp destination-unreachable 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-OUT-ERROR ' 

Chain forward_dmz (0 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     icmp --  anywhere             anywhere            state RELATED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp source-quench LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp redirect LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp echo-request LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp timestamp-request LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp address-mask-request LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp type 2 LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-ICMP-CRIT ' 
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain forward_ext (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     icmp --  anywhere             anywhere            state RELATED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp source-quench LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp redirect LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp echo-request LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp timestamp-request LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp address-mask-request LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp type 2 LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-ICMP-CRIT ' 
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain forward_int (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     icmp --  anywhere             anywhere            state RELATED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp source-quench LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp redirect LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp echo-request LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp timestamp-request LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp address-mask-request LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp type 2 LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-ICMP-CRIT ' 
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain input_dmz (0 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast 
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench 
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp source-quench LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp redirect LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp echo-request LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp timestamp-request LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp address-mask-request LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp type 2 LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-ICMP-CRIT ' 
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain input_ext (1 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast 
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench 
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:netbios-ssn flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-ACC-TCP ' 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:netbios-ssn 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:microsoft-ds flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-ACC-TCP ' 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:microsoft-ds 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:netbios-dgm flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-ACC-TCP ' 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:netbios-dgm 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:netbios-ns flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-ACC-TCP ' 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:netbios-ns 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:netbios-ssn flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-ACC-TCP ' 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:netbios-ssn 
reject_func  tcp  --  anywhere             anywhere            tcp dpt:ident state NEW 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:netbios-ns 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp source-quench LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp redirect LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp echo-request LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp timestamp-request LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp address-mask-request LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp type 2 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-ICMP-CRIT ' 
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain input_int (1 references)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench 
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp source-quench LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp redirect LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp echo-request LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp timestamp-request LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp address-mask-request LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-ICMP-CRIT ' 
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp type 2 LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-ICMP-CRIT ' 
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain reject_func (1 references)
target     prot opt source               destination         
REJECT     tcp  --  anywhere             anywhere            reject-with tcp-reset 
REJECT     udp  --  anywhere             anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  anywhere             anywhere            reject-with icmp-proto-unreachable
Ich hoffe, du kannst etwas damit anfangen.

@tybo2000,
FW_SERVICES_EXT_TCP = "139" hat er so "geschluckt"
das gleiche für UDP kennt er nicht

@dramen
Hab das so gemacht, aber die Trusted_Nets ging so nicht. Es fehlten die Ports dazu, hab das versucht, auch ohne erfolg

Allerdings habe ich auch festgestellt, dass das /etc/init.d/./SuSEfirewall2_final stop keine Wirkung zeigt. Ich kann dann auch nicht auf das Netz zugreifen. Schalte ich sie über Yast aus, kann ich zugreifen.
b dann das restart / start funktioniert?

Danke für die Hilfe.

NavyNeidi
 

Ähnliche Themen

Von Windows Vista / 7 auf einfache Fedora 14 Samba Freigabe zugreifen - keine Domain

Netzlaufwerk für Win XP Netzwerk

Samba - Windows Client darf nicht zugreifen

Ping Linux - Windows PC

Windows und Linux Internet

Zurück
Oben