<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="pt-BR">
	<id>https://wiki.coolab.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adriano</id>
	<title>Wiki Coolab - Contribuições do(a) usuário(a)
 [pt-br]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.coolab.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adriano"/>
	<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php/Especial:Contribui%C3%A7%C3%B5es/Adriano"/>
	<updated>2026-04-27T12:13:33Z</updated>
	<subtitle>Contribuições do(a) usuário(a)
</subtitle>
	<generator>MediaWiki 1.34.1</generator>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=155</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=155"/>
		<updated>2018-03-27T20:28:26Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador. Quando ele voltar, o bloqueio das portas HTTP já devem estar funcionando. &lt;br /&gt;
&lt;br /&gt;
8. Agora, vamos modificar o FIREWALL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/firewall&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comente as seguintes linhas, incluindo jogo da velha antes de cada uma o jogo de velha (#)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
config forwarding&lt;br /&gt;
    option src 'lan'&lt;br /&gt;
    option dest 'wan'&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Depois salve o arquivo e reinicie novamente o roteador. Agora o bloqueio de HTTPS já deve estar funcionado.&lt;br /&gt;
&lt;br /&gt;
== Configurando o voucher ==&lt;br /&gt;
&lt;br /&gt;
1. Conectadoas via SSH no roteador, vamos atualizar os repositórios e instalar o pacote do voucher&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
opkg update &amp;amp;&amp;amp; opkg install http://nuvem.tk/files/vale_0.1-1_mips_24kc.ipk&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos renomear o arquivo HTML do splash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mv /etc/nodogsplash/htdocs/splash-vale.html /etc/nodogsplash/htdocs/splash.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Reinicie o nodogpslash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/nodogpslash restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Traduza ou customize as mensagens de erro que estão no arquivo /www/cgi-bin/vale&lt;br /&gt;
 &lt;br /&gt;
5. Adicione seus códigos de VOUCHER no arquivo /etc/nodogsplash/vale/db.csv (se preferir, use um [http://generator.voucherify.io/# gerador aletório]). &lt;br /&gt;
&lt;br /&gt;
Veja um exemplo do arquivo [https://github.com/coolabnet/lime-packages/blob/develop/packages/vale/files/etc/nodogsplash/vale/db.csv db.csv]&lt;br /&gt;
&lt;br /&gt;
A primeira coluna não é utilizada. Cada linha tem que terminar com as duas vírgulas, sem espaços. As outras colunas serão usadas para anotar a hora e o MAC de cada conexão/voucher. Para gerar automaticamente as duas vírgulas ao fim de cada linha preencha a primeira linha. Exemplo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
code,field1,field2&lt;br /&gt;
6XvMcaLb,,&lt;br /&gt;
cF6m7eXu,,&lt;br /&gt;
nNqsSMCS,,&lt;br /&gt;
GSYJPotH,,&lt;br /&gt;
PecFaM8c,,&lt;br /&gt;
Tx2GgNNX,,&lt;br /&gt;
zEeTmcwu,,&lt;br /&gt;
hBg5858g,,&lt;br /&gt;
rmsgUqR2,,&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
6. Agora, copie o arquivo para o seu roteador&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt; scp db.csv root@thisnode.info:/etc/nodogsplash/vale/&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Customizando o portal captivo ==&lt;br /&gt;
&lt;br /&gt;
1. &lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=154</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=154"/>
		<updated>2018-03-27T20:22:37Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador. Quando ele voltar, o bloqueio das portas HTTP já devem estar funcionando. &lt;br /&gt;
&lt;br /&gt;
8. Agora, vamos modificar o FIREWALL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/firewall&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comente as seguintes linhas, incluindo jogo da velha antes de cada uma o jogo de velha (#)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
config forwarding&lt;br /&gt;
    option src 'lan'&lt;br /&gt;
    option dest 'wan'&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Depois salve o arquivo e reinicie novamente o roteador. Agora o bloqueio de HTTPS já deve estar funcionado.&lt;br /&gt;
&lt;br /&gt;
== Configurando o voucher ==&lt;br /&gt;
&lt;br /&gt;
1. Conectadoas via SSH no roteador, vamos atualizar os repositórios e instalar o pacote do voucher&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
opkg update &amp;amp;&amp;amp; opkg install http://nuvem.tk/files/vale_0.1-1_mips_24kc.ipk&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos renomear o arquivo HTML do splash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mv /etc/nodogsplash/htdocs/splash-vale.html /etc/nodogsplash/htdocs/splash.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Reinicie o nodogpslash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/nodogpslash restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Traduza ou customize as mensagens de erro que estão no arquivo /www/cgi-bin/vale&lt;br /&gt;
 &lt;br /&gt;
5. Adicione seus códigos de VOUCHER no arquivo /etc/nodogsplash/vale/db.csv (se preferir, use um [http://generator.voucherify.io/# gerador aletório]). &lt;br /&gt;
&lt;br /&gt;
Veja um exemplo do arquivo [https://github.com/coolabnet/lime-packages/blob/develop/packages/vale/files/etc/nodogsplash/vale/db.csv db.csv]&lt;br /&gt;
&lt;br /&gt;
A primeira coluna não é utilizada. Cada linha tem que terminar com as duas vírgulas, sem espaços. As outras colunas serão usadas para anotar a hora e o MAC de cada conexão/voucher. Para gerar automaticamente as duas vírgulas ao fim de cada linha preencha a primeira linha. Exemplo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
code,field1,field2&lt;br /&gt;
6XvMcaLb,,&lt;br /&gt;
cF6m7eXu,,&lt;br /&gt;
nNqsSMCS,,&lt;br /&gt;
GSYJPotH,,&lt;br /&gt;
PecFaM8c,,&lt;br /&gt;
Tx2GgNNX,,&lt;br /&gt;
zEeTmcwu,,&lt;br /&gt;
hBg5858g,,&lt;br /&gt;
rmsgUqR2,,&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
6. Agora, copie o arquivo para o seu roteador&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt; scp db.csv root@thisnode.info:/etc/nodogsplash/vale/&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=153</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=153"/>
		<updated>2018-03-27T20:21:11Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador. Quando ele voltar, o bloqueio das portas HTTP já devem estar funcionando. &lt;br /&gt;
&lt;br /&gt;
8. Agora, vamos modificar o FIREWALL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/firewall&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comente as seguintes linhas, incluindo jogo da velha antes de cada uma o jogo de velha (#)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
config forwarding&lt;br /&gt;
    option src 'lan'&lt;br /&gt;
    option dest 'wan'&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Depois salve o arquivo e reinicie novamente o roteador. Agora o bloqueio de HTTPS já deve estar funcionado.&lt;br /&gt;
&lt;br /&gt;
== Configurando o voucher ==&lt;br /&gt;
&lt;br /&gt;
1. Conectadoas via SSH no roteador, vamos atualizar os repositórios e instalar o pacote do voucher&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
opkg update &amp;amp;&amp;amp; opkg install http://nuvem.tk/files/vale_0.1-1_mips_24kc.ipk&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos renomear o arquivo HTML do splash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mv /etc/nodogsplash/htdocs/splash-vale.html /etc/nodogsplash/htdocs/splash.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Reinicie o nodogpslash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/nodogpslash restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Traduza ou customize as mensagens de erro que estão no arquivo /www/cgi-bin/vale&lt;br /&gt;
 &lt;br /&gt;
5. Adicione seus códigos de VOUCHER no arquivo /etc/nodogsplash/vale/db.csv (se preferir, use um [http://generator.voucherify.io/# gerador aletório]). &lt;br /&gt;
&lt;br /&gt;
Veja um exemplo do arquivo [https://github.com/coolabnet/lime-packages/blob/develop/packages/vale/files/etc/nodogsplash/vale/db.csv db.csv]&lt;br /&gt;
&lt;br /&gt;
A primeira coluna não é utilizada. Cada linha tem que terminar com as duas vírgulas, sem espaços. As outras colunas serão usadas para anotar a hora e o MAC de cada conexão/voucher. Para gerar automaticamente as duas vírgulas ao fim de cada linha preencha a primeira linha. Exemplo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
code,field1,field2&lt;br /&gt;
6XvMcaLb,,&lt;br /&gt;
cF6m7eXu,,&lt;br /&gt;
nNqsSMCS,,&lt;br /&gt;
GSYJPotH,,&lt;br /&gt;
PecFaM8c,,&lt;br /&gt;
Tx2GgNNX,,&lt;br /&gt;
zEeTmcwu,,&lt;br /&gt;
hBg5858g,,&lt;br /&gt;
rmsgUqR2,,&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=152</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=152"/>
		<updated>2018-03-27T20:10:29Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador. Quando ele voltar, o bloqueio das portas HTTP já devem estar funcionando. &lt;br /&gt;
&lt;br /&gt;
8. Agora, vamos modificar o FIREWALL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/firewall&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comente as seguintes linhas, incluindo jogo da velha antes de cada uma o jogo de velha (#)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
config forwarding&lt;br /&gt;
    option src 'lan'&lt;br /&gt;
    option dest 'wan'&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Depois salve o arquivo e reinicie novamente o roteador. Agora o bloqueio de HTTPS já deve estar funcionado.&lt;br /&gt;
&lt;br /&gt;
== Configurando o voucher ==&lt;br /&gt;
&lt;br /&gt;
1. Conectadoas via SSH no roteador, vamos atualizar os repositórios e instalar o pacote do voucher&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
opkg update &amp;amp;&amp;amp; opkg install http://nuvem.tk/files/vale_0.1-1_mips_24kc.ipk&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos renomear o arquivo HTML do splash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mv /etc/nodogsplash/htdocs/splash-vale.html /etc/nodogsplash/htdocs/splash.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Reinicie o nodogpslash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/nodogpslash restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Traduza ou customize as mensagens de erro que estão no arquivo /www/cgi-bin/vale&lt;br /&gt;
 &lt;br /&gt;
5. Adicione seus códigos de VOUCHER no arquivo /etc/nodogsplash/vale/db.csv (se preferir, use um [http://generator.voucherify.io/# gerador aletório]). &lt;br /&gt;
&lt;br /&gt;
Veja um exemplo do arquivo [https://github.com/coolabnet/lime-packages/blob/develop/packages/vale/files/etc/nodogsplash/vale/db.csv db.csv]&lt;br /&gt;
&lt;br /&gt;
A primeira coluna não é utilizada. Cada linha tem que terminar com as duas vírgulas, sem espaços.&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=151</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=151"/>
		<updated>2018-03-27T20:06:43Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador. Quando ele voltar, o bloqueio das portas HTTP já devem estar funcionando. &lt;br /&gt;
&lt;br /&gt;
8. Agora, vamos modificar o FIREWALL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/firewall&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comente as seguintes linhas, incluindo jogo da velha antes de cada uma o jogo de velha (#)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
config forwarding&lt;br /&gt;
    option src 'lan'&lt;br /&gt;
    option dest 'wan'&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Depois salve o arquivo e reinicie novamente o roteador. Agora o bloqueio de HTTPS já deve estar funcionado.&lt;br /&gt;
&lt;br /&gt;
== Configurando o voucher ==&lt;br /&gt;
&lt;br /&gt;
1. Conectadoas via SSH no roteador, vamos atualizar os repositórios e instalar o pacote do voucher&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
opkg update &amp;amp;&amp;amp; opkg install http://nuvem.tk/files/vale_0.1-1_mips_24kc.ipk&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos renomear o arquivo HTML do splash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mv /etc/nodogsplash/htdocs/splash-vale.html /etc/nodogsplash/htdocs/splash.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Reinicie o nodogpslash&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/nodogpslash restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Traduza ou customize as mensagens de erro que estão no arquivo /www/cgi-bin/vale&lt;br /&gt;
 &lt;br /&gt;
5. Adicione seus códigos de VOUCHER no arquivo /etc/nodogsplash/vale/db.csv (se preferir, use um gerador aleatório como www.randomcodegenerator.com). &lt;br /&gt;
&lt;br /&gt;
Veja um exemplo do arquivo [https://github.com/coolabnet/lime-packages/blob/develop/packages/vale/files/etc/nodogsplash/vale/db.csv db.csv]&lt;br /&gt;
&lt;br /&gt;
A primeira coluna não é utilizada. Cada linha tem que terminar com as duas vírgulas, sem espaços.&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=150</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=150"/>
		<updated>2018-03-27T19:40:12Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador. Quando ele voltar, o bloqueio das portas HTTP já devem estar funcionando. &lt;br /&gt;
&lt;br /&gt;
8. Agora, vamos modificar o FIREWALL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/firewall&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comente as seguintes linhas, incluindo jogo da velha antes de cada uma o jogo de velha (#)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
config forwarding&lt;br /&gt;
    option src 'lan'&lt;br /&gt;
    option dest 'wan'&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Depois salve o arquivo e reinicie novamente o roteador.&lt;br /&gt;
&lt;br /&gt;
9. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=149</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=149"/>
		<updated>2018-03-27T19:19:22Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
# BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
# EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
6. Vá no menu system -&amp;gt; startup e confira se o nodogsplash está como ENABLED&lt;br /&gt;
&lt;br /&gt;
7. Reinicie o roteador&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=148</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=148"/>
		<updated>2018-03-27T19:16:49Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NÃO ESQUEÇA DE TROCAR OS IPs no arquivo acima!&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=147</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=147"/>
		<updated>2018-03-27T19:15:35Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=146</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=146"/>
		<updated>2018-03-27T19:15:07Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
* Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
* Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
== Para versão DaybootRely da LibreMesh (1706) ==&lt;br /&gt;
&lt;br /&gt;
1. Faça o login na linha de comando via SSH e atualize os repositórios do roteador que receberá o portal captivo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vamos agora instalar o [http://nodogsplash.readthedocs.io/en/latest/ nodogsplash].&lt;br /&gt;
Esté um pacote com as mudanças necessárias para instalar o captivo na versão 17.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;opkg install http://nuvem.tk/files/nodogsplash_0.9.2-1_mips_24kc.ipk&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Agora vamos editar o arquivo de configuração&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;vi /etc/config/nodogsplash&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Neste arquivo, altere o arquivo nas seguintes linhas, de modo que se registre os seguintes parâmetros:&lt;br /&gt;
&lt;br /&gt;
Altere o valor do &amp;quot;option enable&amp;quot; de 0 para 1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option enable 1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Descomentar (apagar o jogo da velha do início da linha) a linha a seguir:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;option config '/etc/nodogsplash/nodogsplash.conf'&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Agora salve o arquivo e saia do editor de texto.&lt;br /&gt;
&lt;br /&gt;
5. Crie o arquivo /etc/nodogsplash/nodogsplash.conf pelo listado abaixo (fazendo as devidas modificações nos IP e página de redirecionamento). O IP a ser usado é o do menu network -&amp;gt; interfaces, interface LAN (IPV4) (sem o /16). O range são os dois primeiros números, seguidos de .0.0/16. (ex se o ip é 10.7.255.50, o range é 10.7.0.0/16.&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GatewayInterface br-lan&lt;br /&gt;
GatewayInterfaceExtra bmx+&lt;br /&gt;
GatewayInterfaceExtra2 anygw&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet authenticated-users {&lt;br /&gt;
     FirewallRule allow to 0.0.0.0/0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet users-to-router {                                                                           &lt;br /&gt;
 # Nodogsplash automatically allows tcp to GatewayPort,                                                     &lt;br /&gt;
 # at GatewayAddress, to serve the splash page.                                                             &lt;br /&gt;
 # However you may want to open up other ports, e.g.                                                        &lt;br /&gt;
 # 53 for DNS and 67 for DHCP if the router itself is                                                       &lt;br /&gt;
 # providing these services.                                                                                &lt;br /&gt;
    FirewallRule allow udp port 53                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 53                                                                          &lt;br /&gt;
    FirewallRule allow udp port 67                                                                          &lt;br /&gt;
 # You may want to allow ssh, http, and https to the router                                                 &lt;br /&gt;
 # for administration from the GatewayInterface.  If not,                                                   &lt;br /&gt;
 # comment these out.                                                                                       &lt;br /&gt;
    FirewallRule allow tcp port 22                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 80                                                                          &lt;br /&gt;
    FirewallRule allow tcp port 443                                                                         &lt;br /&gt;
}                                                                                                           &lt;br /&gt;
# end FirewallRuleSet users-to-router                                                                       &lt;br /&gt;
&lt;br /&gt;
FirewallRuleSet preauthenticated-users {&lt;br /&gt;
 # For preauthenticated users to resolve IP addresses in their initial&lt;br /&gt;
 # request not using the router itself as a DNS server,&lt;br /&gt;
 # you probably want to allow port 53 udp and tcp for DNS.&lt;br /&gt;
    FirewallRule allow tcp port 53	&lt;br /&gt;
    FirewallRule allow udp port 53&lt;br /&gt;
 # For splash page content not hosted on the router, you&lt;br /&gt;
 # will want to allow port 80 tcp to the remote host here.&lt;br /&gt;
 # Doing so circumvents the usual capture and redirect of&lt;br /&gt;
 # any port 80 request to this remote host.&lt;br /&gt;
 # Note that the remote host's numerical IP address must be known&lt;br /&gt;
 # and used here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #change the IP for the address of the gateway router&lt;br /&gt;
     FirewallRule allow tcp port 80 to 10.7.122.55&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
# end FirewallRuleSet preauthenticated-users&lt;br /&gt;
 	  &lt;br /&gt;
 	  				 	 	 	    		  	&lt;br /&gt;
&lt;br /&gt;
EmptyRuleSetPolicy preauthenticated-users passthrough&lt;br /&gt;
EmptyRuleSetPolicy users-to-router passthrough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the IP for the address of the gateway router&lt;br /&gt;
GatewayName 10.7.122.55:80&lt;br /&gt;
&lt;br /&gt;
#GatewayPort 80&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MaxClients 500&lt;br /&gt;
&lt;br /&gt;
ClientIdleTimeout 720&lt;br /&gt;
&lt;br /&gt;
ClientForceTimeout 14400&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#change the range for the ip range of your mesh network&lt;br /&gt;
GatewayIPRange 10.7.0.0/16&lt;br /&gt;
&lt;br /&gt;
BinVoucher &amp;quot;vale.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ForceVoucher yes&lt;br /&gt;
&lt;br /&gt;
EnablePreAuth yes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
&lt;br /&gt;
* [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso Tutorial da Nuvem]&lt;br /&gt;
* [http://nodogsplash.readthedocs.io/en/latest/ Nodogsplash - Documentação]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=145</id>
		<title>Como criar o portal cativo de controle de acesso</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_criar_o_portal_cativo_de_controle_de_acesso&amp;diff=145"/>
		<updated>2018-03-27T19:03:35Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
'''Informações preliminares'''&lt;br /&gt;
- Essas instruções são para o roteador que está conectado à internet, fornecendo para o resto da rede. Não foi testado com mais de um gateway&lt;br /&gt;
- Esse sistema de validação e portal cativo não funciona quando não há acesso internet, ou quando o acesso cai. Para isso, tem uma gambiarra descrita no fim da página&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Referências'''&lt;br /&gt;
- Tutorial da Nuvem  [http://nuvem.tk/wiki/index.php/Fuma%C3%A7a_Data_Springs/Anexo_t%C3%A9cnico#Instala.C3.A7.C3.A3o_do_portal_de_controle_de_acesso aqui]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Wiki_Coolab&amp;diff=116</id>
		<title>Wiki Coolab</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Wiki_Coolab&amp;diff=116"/>
		<updated>2018-03-10T22:38:15Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Essa é a wiki de documentação da [//www.coolab.org Coolab]&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Atividades=&lt;br /&gt;
* [[CoolabCamp 2018]]&lt;br /&gt;
&lt;br /&gt;
=Tutoriais=&lt;br /&gt;
* [[Como criar uma rede mesh]] baseada em [//www.libremesh.org LibreMesh] usando o chef.&lt;br /&gt;
* [http://www.libremesh.org/docs/en_troubleshooting.html Guia] de resolução de problemas da LibreMesh. Excelente!&lt;br /&gt;
* [http://www.brunovianna.net/documenta/?p=93 Como usar uma raspberry pi como VPN para a rede local].&lt;br /&gt;
* Novo cozinheiro de firmwares online: [https://imagebuilder.libremesh.org/] (versão 17 da LibreMesh)&lt;br /&gt;
* [[Como usar túneis ssh]] para administrar uma rede à distância usando OpenWrt ou LibreMesh&lt;br /&gt;
* [[Como criar o portal cativo de controle de acesso]] na LibreMesh para pedir contribuições ou divulgar o portal local&lt;br /&gt;
* [http://artigo19.org/blog/2017/01/17/novo-guia-ensina-a-montar-e-regularizar-provedor-comunitario-de-internet/ Guia] para criação de provedores comunitários&lt;br /&gt;
* Curso de provedores comunitários 2016 em  [http://www.youtube.com/playlist?list=PLEemgwbIqkEXWSIRcBuGq-I0A_TybhMWW vídeo].&lt;br /&gt;
* Instalando LibreMesh no roteador [[Xiaomi MiWiFi 3]]&lt;br /&gt;
* Instalando Nginx e PHP7 no armbian [[Instalar Nginx PHP Armbian]]&lt;br /&gt;
* [[Como instalar um CMS na Raspberry]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Servidor local com raspberryPi Nginx e PhP7 [[Servidor Local Raspberry + Nginx + PhP7]]&lt;br /&gt;
&lt;br /&gt;
=Legislação=&lt;br /&gt;
* [http://www.anatel.gov.br/Portal/documentos/midias_teia/1897.pdf Resolução] da Anatel dispensando de licença os provedores comerciais com até 5 mil clientes.&lt;br /&gt;
* [http://www.anatel.gov.br/legislacao/resolucoes/23-2008/104-resolucao-506 Resolução] ainda sem a alteração.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Conexão ao Backhaul=&lt;br /&gt;
* [[Opções de conexão]] de um [[Provedor comunitário]] ao Backhaul&lt;br /&gt;
* [http://ix.br/doc/nic.br-ceptro.br-pttmetro.apresentacao.pdf Cartilha] sobre conexão PTTMetro.&lt;br /&gt;
* [http://ix.br/intro Projeto] de intercambio de internet.&lt;br /&gt;
* [https://www.rnp.br/servicos/conectividade/redecomep Redecomep] - Redes Comunitárias de Educação e Pesquisa.&lt;br /&gt;
&lt;br /&gt;
=Redes mesh/comunitárias no Brasil=&lt;br /&gt;
* Acesse  (e adicione) a [[Lista de Redes|lista de redes comunitárias e/ou mesh no Brasil]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Começando ===&lt;br /&gt;
* [//meta.wikimedia.org/wiki/Help:Contents Manual de Usuário] para informações de como usar o software wiki.&lt;br /&gt;
* [//www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Lista de opções de configuração]&lt;br /&gt;
* [//www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ FAQ do MediaWiki]&lt;br /&gt;
* [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce Lista de discussão com avisos de novas versões do MediaWiki]&lt;br /&gt;
* [//www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Traduza o MediaWiki para seu idioma]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Wiki_Coolab&amp;diff=115</id>
		<title>Wiki Coolab</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Wiki_Coolab&amp;diff=115"/>
		<updated>2018-03-10T22:38:02Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Essa é a wiki de documentação da [//www.coolab.org Coolab]&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Atividades=&lt;br /&gt;
* [[CoolabCamp 2018]]&lt;br /&gt;
&lt;br /&gt;
=Tutoriais=&lt;br /&gt;
* [[Como criar uma rede mesh]] baseada em [//www.libremesh.org LibreMesh] usando o chef.&lt;br /&gt;
* [http://www.libremesh.org/docs/en_troubleshooting.html Guia] de resolução de problemas da LibreMesh. Excelente!&lt;br /&gt;
* [http://www.brunovianna.net/documenta/?p=93 Como usar uma raspberry pi como VPN para a rede local].&lt;br /&gt;
* Novo cozinheiro de firmwares online: [https://imagebuilder.libremesh.org/] (versão 17 da LibreMesh)&lt;br /&gt;
* [[Como usar túneis ssh]] para administrar uma rede à distância usando OpenWrt ou LibreMesh&lt;br /&gt;
* [[Como criar o portal cativo de controle de acesso]] na LibreMesh para pedir contribuições ou divulgar o portal local&lt;br /&gt;
* [http://artigo19.org/blog/2017/01/17/novo-guia-ensina-a-montar-e-regularizar-provedor-comunitario-de-internet/ Guia] para criação de provedores comunitários&lt;br /&gt;
* Curso de provedores comunitários 2016 em  [http://www.youtube.com/playlist?list=PLEemgwbIqkEXWSIRcBuGq-I0A_TybhMWW vídeo].&lt;br /&gt;
* Instalando LibreMesh no roteador [[Xiaomi MiWiFi 3]]&lt;br /&gt;
* Instalando Nginx e PHP7 no armbian [[Instalar Nginx PHP Armbian]]&lt;br /&gt;
** [[Como instalar um CMS na Raspberry]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Servidor local com raspberryPi Nginx e PhP7 [[Servidor Local Raspberry + Nginx + PhP7]]&lt;br /&gt;
&lt;br /&gt;
=Legislação=&lt;br /&gt;
* [http://www.anatel.gov.br/Portal/documentos/midias_teia/1897.pdf Resolução] da Anatel dispensando de licença os provedores comerciais com até 5 mil clientes.&lt;br /&gt;
* [http://www.anatel.gov.br/legislacao/resolucoes/23-2008/104-resolucao-506 Resolução] ainda sem a alteração.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Conexão ao Backhaul=&lt;br /&gt;
* [[Opções de conexão]] de um [[Provedor comunitário]] ao Backhaul&lt;br /&gt;
* [http://ix.br/doc/nic.br-ceptro.br-pttmetro.apresentacao.pdf Cartilha] sobre conexão PTTMetro.&lt;br /&gt;
* [http://ix.br/intro Projeto] de intercambio de internet.&lt;br /&gt;
* [https://www.rnp.br/servicos/conectividade/redecomep Redecomep] - Redes Comunitárias de Educação e Pesquisa.&lt;br /&gt;
&lt;br /&gt;
=Redes mesh/comunitárias no Brasil=&lt;br /&gt;
* Acesse  (e adicione) a [[Lista de Redes|lista de redes comunitárias e/ou mesh no Brasil]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Começando ===&lt;br /&gt;
* [//meta.wikimedia.org/wiki/Help:Contents Manual de Usuário] para informações de como usar o software wiki.&lt;br /&gt;
* [//www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Lista de opções de configuração]&lt;br /&gt;
* [//www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ FAQ do MediaWiki]&lt;br /&gt;
* [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce Lista de discussão com avisos de novas versões do MediaWiki]&lt;br /&gt;
* [//www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Traduza o MediaWiki para seu idioma]&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_instalar_um_CMS_na_Raspberry&amp;diff=114</id>
		<title>Como instalar um CMS na Raspberry</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_instalar_um_CMS_na_Raspberry&amp;diff=114"/>
		<updated>2018-03-10T22:37:25Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Tutorial para instalar GetSimple (CMS sem banco de dados) na Raspbian&lt;br /&gt;
&lt;br /&gt;
1. Vá para a pasta onde estão os arquivos do servidor http&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /var/www&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vire administrador, se necessario, depois baixe e descompacte o GetSimple&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo su&lt;br /&gt;
wget http://get-simple.info/latest &amp;amp;&amp;amp; unzip latest &amp;amp;&amp;amp; rm latest&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Dê as permissões corretas&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
chown -R www-data:www-data . &amp;amp;&amp;amp; chmod -R 755 data/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
4. Configure o nginx (exemplos abaixo) e entre no seuendereco.com/admin para fazer a instalação do GetSimples&lt;br /&gt;
&lt;br /&gt;
4.1 arquivo nginx.conf&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
user www-data;&lt;br /&gt;
worker_processes auto;&lt;br /&gt;
pid /run/nginx.pid;&lt;br /&gt;
include /etc/nginx/modules-enabled/*.conf;&lt;br /&gt;
&lt;br /&gt;
events {&lt;br /&gt;
    worker_connections 768;&lt;br /&gt;
    # multi_accept on;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
http {&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Basic Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    sendfile on;&lt;br /&gt;
    tcp_nopush on;&lt;br /&gt;
    tcp_nodelay on;&lt;br /&gt;
    keepalive_timeout 65;&lt;br /&gt;
    types_hash_max_size 2048;&lt;br /&gt;
    # server_tokens off;&lt;br /&gt;
&lt;br /&gt;
    # server_names_hash_bucket_size 64;&lt;br /&gt;
    # server_name_in_redirect off;&lt;br /&gt;
&lt;br /&gt;
    include /etc/nginx/mime.types;&lt;br /&gt;
    default_type application/octet-stream;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # SSL Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3, ref: POODLE&lt;br /&gt;
    ssl_prefer_server_ciphers on;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Logging Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    access_log /var/log/nginx/access.log;&lt;br /&gt;
    error_log /var/log/nginx/error.log;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Gzip Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    gzip on;&lt;br /&gt;
    gzip_disable &amp;quot;msie6&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
    # gzip_vary on;&lt;br /&gt;
    # gzip_proxied any;&lt;br /&gt;
    # gzip_comp_level 6;&lt;br /&gt;
    # gzip_buffers 16 8k;&lt;br /&gt;
    # gzip_http_version 1.1;&lt;br /&gt;
    # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Virtual Host Configs&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    include /etc/nginx/conf.d/*.conf;&lt;br /&gt;
    include /etc/nginx/sites-enabled/*;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.2 arquivo sites-avaiable/default&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
server {&lt;br /&gt;
    listen 80 default_server;&lt;br /&gt;
    listen [::]:80 default_server;&lt;br /&gt;
&lt;br /&gt;
# set client body size to 2M #&lt;br /&gt;
client_max_body_size 2M;&lt;br /&gt;
&lt;br /&gt;
    # SSL configuration&lt;br /&gt;
    #&lt;br /&gt;
    # listen 443 ssl default_server;&lt;br /&gt;
    # listen [::]:443 ssl default_server;&lt;br /&gt;
    #&lt;br /&gt;
    # Note: You should disable gzip for SSL traffic.&lt;br /&gt;
    # See: https://bugs.debian.org/773332&lt;br /&gt;
    #&lt;br /&gt;
    # Read up on ssl_ciphers to ensure a secure configuration.&lt;br /&gt;
    # See: https://bugs.debian.org/765782&lt;br /&gt;
    #&lt;br /&gt;
    # Self signed certs generated by the ssl-cert package&lt;br /&gt;
    # Don't use them in a production server!&lt;br /&gt;
    #&lt;br /&gt;
    # include snippets/snakeoil.conf;&lt;br /&gt;
&lt;br /&gt;
    root /var/www;&lt;br /&gt;
&lt;br /&gt;
    # Add index.php to the list if you are using PHP&lt;br /&gt;
    index index.html index.htm index.nginx-debian.html index.php;&lt;br /&gt;
&lt;br /&gt;
    server_name aldeiateca.lan;&lt;br /&gt;
&lt;br /&gt;
    location / {&lt;br /&gt;
        # First attempt to serve request as file, then&lt;br /&gt;
        # as directory, then fall back to displaying a 404.&lt;br /&gt;
        try_files $uri $uri/ =404;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    # pass PHP scripts to FastCGI server&lt;br /&gt;
    #&lt;br /&gt;
    location ~ \.php$ {&lt;br /&gt;
        include snippets/fastcgi-php.conf;&lt;br /&gt;
    #&lt;br /&gt;
    #    # With php-fpm (or other unix sockets):&lt;br /&gt;
        fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;&lt;br /&gt;
    #    # With php-cgi (or other tcp sockets):&lt;br /&gt;
    #    fastcgi_pass 127.0.0.1:9000;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    # deny access to .htaccess files, if Apache's document root&lt;br /&gt;
    # concurs with nginx's one&lt;br /&gt;
    #&lt;br /&gt;
    location ~ /\.ht {&lt;br /&gt;
        deny all;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Virtual Host configuration for example.com&lt;br /&gt;
#&lt;br /&gt;
# You can move that to a different file under sites-available/ and symlink that&lt;br /&gt;
# to sites-enabled/ to enable it.&lt;br /&gt;
#&lt;br /&gt;
#server {&lt;br /&gt;
#    listen 80;&lt;br /&gt;
#    listen [::]:80;&lt;br /&gt;
#&lt;br /&gt;
#    server_name example.com;&lt;br /&gt;
#&lt;br /&gt;
#    root /var/www/example.com;&lt;br /&gt;
#    index index.html;&lt;br /&gt;
#&lt;br /&gt;
#    location / {&lt;br /&gt;
#        try_files $uri $uri/ =404;&lt;br /&gt;
#    }&lt;br /&gt;
#}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_instalar_um_CMS_na_Raspberry&amp;diff=113</id>
		<title>Como instalar um CMS na Raspberry</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_instalar_um_CMS_na_Raspberry&amp;diff=113"/>
		<updated>2018-03-10T22:37:00Z</updated>

		<summary type="html">&lt;p&gt;Adriano: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
1. Vá para a pasta onde estão os arquivos do servidor http&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /var/www&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Vire administrador, se necessario, depois baixe e descompacte o GetSimple&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo su&lt;br /&gt;
wget http://get-simple.info/latest &amp;amp;&amp;amp; unzip latest &amp;amp;&amp;amp; rm latest&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3. Dê as permissões corretas&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
chown -R www-data:www-data . &amp;amp;&amp;amp; chmod -R 755 data/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
4. Configure o nginx (exemplos abaixo) e entre no seuendereco.com/admin para fazer a instalação do GetSimples&lt;br /&gt;
&lt;br /&gt;
4.1 arquivo nginx.conf&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
user www-data;&lt;br /&gt;
worker_processes auto;&lt;br /&gt;
pid /run/nginx.pid;&lt;br /&gt;
include /etc/nginx/modules-enabled/*.conf;&lt;br /&gt;
&lt;br /&gt;
events {&lt;br /&gt;
    worker_connections 768;&lt;br /&gt;
    # multi_accept on;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
http {&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Basic Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    sendfile on;&lt;br /&gt;
    tcp_nopush on;&lt;br /&gt;
    tcp_nodelay on;&lt;br /&gt;
    keepalive_timeout 65;&lt;br /&gt;
    types_hash_max_size 2048;&lt;br /&gt;
    # server_tokens off;&lt;br /&gt;
&lt;br /&gt;
    # server_names_hash_bucket_size 64;&lt;br /&gt;
    # server_name_in_redirect off;&lt;br /&gt;
&lt;br /&gt;
    include /etc/nginx/mime.types;&lt;br /&gt;
    default_type application/octet-stream;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # SSL Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3, ref: POODLE&lt;br /&gt;
    ssl_prefer_server_ciphers on;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Logging Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    access_log /var/log/nginx/access.log;&lt;br /&gt;
    error_log /var/log/nginx/error.log;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Gzip Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    gzip on;&lt;br /&gt;
    gzip_disable &amp;quot;msie6&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
    # gzip_vary on;&lt;br /&gt;
    # gzip_proxied any;&lt;br /&gt;
    # gzip_comp_level 6;&lt;br /&gt;
    # gzip_buffers 16 8k;&lt;br /&gt;
    # gzip_http_version 1.1;&lt;br /&gt;
    # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Virtual Host Configs&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    include /etc/nginx/conf.d/*.conf;&lt;br /&gt;
    include /etc/nginx/sites-enabled/*;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.2 arquivo sites-avaiable/default&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
server {&lt;br /&gt;
    listen 80 default_server;&lt;br /&gt;
    listen [::]:80 default_server;&lt;br /&gt;
&lt;br /&gt;
# set client body size to 2M #&lt;br /&gt;
client_max_body_size 2M;&lt;br /&gt;
&lt;br /&gt;
    # SSL configuration&lt;br /&gt;
    #&lt;br /&gt;
    # listen 443 ssl default_server;&lt;br /&gt;
    # listen [::]:443 ssl default_server;&lt;br /&gt;
    #&lt;br /&gt;
    # Note: You should disable gzip for SSL traffic.&lt;br /&gt;
    # See: https://bugs.debian.org/773332&lt;br /&gt;
    #&lt;br /&gt;
    # Read up on ssl_ciphers to ensure a secure configuration.&lt;br /&gt;
    # See: https://bugs.debian.org/765782&lt;br /&gt;
    #&lt;br /&gt;
    # Self signed certs generated by the ssl-cert package&lt;br /&gt;
    # Don't use them in a production server!&lt;br /&gt;
    #&lt;br /&gt;
    # include snippets/snakeoil.conf;&lt;br /&gt;
&lt;br /&gt;
    root /var/www;&lt;br /&gt;
&lt;br /&gt;
    # Add index.php to the list if you are using PHP&lt;br /&gt;
    index index.html index.htm index.nginx-debian.html index.php;&lt;br /&gt;
&lt;br /&gt;
    server_name aldeiateca.lan;&lt;br /&gt;
&lt;br /&gt;
    location / {&lt;br /&gt;
        # First attempt to serve request as file, then&lt;br /&gt;
        # as directory, then fall back to displaying a 404.&lt;br /&gt;
        try_files $uri $uri/ =404;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    # pass PHP scripts to FastCGI server&lt;br /&gt;
    #&lt;br /&gt;
    location ~ \.php$ {&lt;br /&gt;
        include snippets/fastcgi-php.conf;&lt;br /&gt;
    #&lt;br /&gt;
    #    # With php-fpm (or other unix sockets):&lt;br /&gt;
        fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;&lt;br /&gt;
    #    # With php-cgi (or other tcp sockets):&lt;br /&gt;
    #    fastcgi_pass 127.0.0.1:9000;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    # deny access to .htaccess files, if Apache's document root&lt;br /&gt;
    # concurs with nginx's one&lt;br /&gt;
    #&lt;br /&gt;
    location ~ /\.ht {&lt;br /&gt;
        deny all;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Virtual Host configuration for example.com&lt;br /&gt;
#&lt;br /&gt;
# You can move that to a different file under sites-available/ and symlink that&lt;br /&gt;
# to sites-enabled/ to enable it.&lt;br /&gt;
#&lt;br /&gt;
#server {&lt;br /&gt;
#    listen 80;&lt;br /&gt;
#    listen [::]:80;&lt;br /&gt;
#&lt;br /&gt;
#    server_name example.com;&lt;br /&gt;
#&lt;br /&gt;
#    root /var/www/example.com;&lt;br /&gt;
#    index index.html;&lt;br /&gt;
#&lt;br /&gt;
#    location / {&lt;br /&gt;
#        try_files $uri $uri/ =404;&lt;br /&gt;
#    }&lt;br /&gt;
#}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.coolab.org/index.php?title=Como_instalar_um_CMS_na_Raspberry&amp;diff=112</id>
		<title>Como instalar um CMS na Raspberry</title>
		<link rel="alternate" type="text/html" href="https://wiki.coolab.org/index.php?title=Como_instalar_um_CMS_na_Raspberry&amp;diff=112"/>
		<updated>2018-03-10T22:35:56Z</updated>

		<summary type="html">&lt;p&gt;Adriano: Criou página com '  1. Vá para a pasta onde estão os arquivos do servidor http  cd /var/www   2. Vire administrador, se necessario, depois baixe e descompacte o GetSimple sudo su wget http://...'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
1. Vá para a pasta onde estão os arquivos do servidor http&lt;br /&gt;
&lt;br /&gt;
cd /var/www&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Vire administrador, se necessario, depois baixe e descompacte o GetSimple&lt;br /&gt;
sudo su&lt;br /&gt;
wget http://get-simple.info/latest &amp;amp;&amp;amp; unzip latest &amp;amp;&amp;amp; rm latest&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Dê as permissões corretas&lt;br /&gt;
&lt;br /&gt;
chown -R www-data:www-data . &amp;amp;&amp;amp; chmod -R 755 data/&lt;br /&gt;
&lt;br /&gt;
4. Configure o nginx (exemplos abaixo) e entre no seuendereco.com/admin para fazer a instalação do GetSimples&lt;br /&gt;
&lt;br /&gt;
4.1 arquivo nginx.conf&lt;br /&gt;
&lt;br /&gt;
user www-data;&lt;br /&gt;
worker_processes auto;&lt;br /&gt;
pid /run/nginx.pid;&lt;br /&gt;
include /etc/nginx/modules-enabled/*.conf;&lt;br /&gt;
&lt;br /&gt;
events {&lt;br /&gt;
    worker_connections 768;&lt;br /&gt;
    # multi_accept on;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
http {&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Basic Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    sendfile on;&lt;br /&gt;
    tcp_nopush on;&lt;br /&gt;
    tcp_nodelay on;&lt;br /&gt;
    keepalive_timeout 65;&lt;br /&gt;
    types_hash_max_size 2048;&lt;br /&gt;
    # server_tokens off;&lt;br /&gt;
&lt;br /&gt;
    # server_names_hash_bucket_size 64;&lt;br /&gt;
    # server_name_in_redirect off;&lt;br /&gt;
&lt;br /&gt;
    include /etc/nginx/mime.types;&lt;br /&gt;
    default_type application/octet-stream;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # SSL Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3, ref: POODLE&lt;br /&gt;
    ssl_prefer_server_ciphers on;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Logging Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    access_log /var/log/nginx/access.log;&lt;br /&gt;
    error_log /var/log/nginx/error.log;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Gzip Settings&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    gzip on;&lt;br /&gt;
    gzip_disable &amp;quot;msie6&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
    # gzip_vary on;&lt;br /&gt;
    # gzip_proxied any;&lt;br /&gt;
    # gzip_comp_level 6;&lt;br /&gt;
    # gzip_buffers 16 8k;&lt;br /&gt;
    # gzip_http_version 1.1;&lt;br /&gt;
    # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;&lt;br /&gt;
&lt;br /&gt;
    ##&lt;br /&gt;
    # Virtual Host Configs&lt;br /&gt;
    ##&lt;br /&gt;
&lt;br /&gt;
    include /etc/nginx/conf.d/*.conf;&lt;br /&gt;
    include /etc/nginx/sites-enabled/*;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.2 arquivo sites-avaiable/default&lt;br /&gt;
&lt;br /&gt;
server {&lt;br /&gt;
    listen 80 default_server;&lt;br /&gt;
    listen [::]:80 default_server;&lt;br /&gt;
&lt;br /&gt;
# set client body size to 2M #&lt;br /&gt;
client_max_body_size 2M;&lt;br /&gt;
&lt;br /&gt;
    # SSL configuration&lt;br /&gt;
    #&lt;br /&gt;
    # listen 443 ssl default_server;&lt;br /&gt;
    # listen [::]:443 ssl default_server;&lt;br /&gt;
    #&lt;br /&gt;
    # Note: You should disable gzip for SSL traffic.&lt;br /&gt;
    # See: https://bugs.debian.org/773332&lt;br /&gt;
    #&lt;br /&gt;
    # Read up on ssl_ciphers to ensure a secure configuration.&lt;br /&gt;
    # See: https://bugs.debian.org/765782&lt;br /&gt;
    #&lt;br /&gt;
    # Self signed certs generated by the ssl-cert package&lt;br /&gt;
    # Don't use them in a production server!&lt;br /&gt;
    #&lt;br /&gt;
    # include snippets/snakeoil.conf;&lt;br /&gt;
&lt;br /&gt;
    root /var/www;&lt;br /&gt;
&lt;br /&gt;
    # Add index.php to the list if you are using PHP&lt;br /&gt;
    index index.html index.htm index.nginx-debian.html index.php;&lt;br /&gt;
&lt;br /&gt;
    server_name aldeiateca.lan;&lt;br /&gt;
&lt;br /&gt;
    location / {&lt;br /&gt;
        # First attempt to serve request as file, then&lt;br /&gt;
        # as directory, then fall back to displaying a 404.&lt;br /&gt;
        try_files $uri $uri/ =404;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    # pass PHP scripts to FastCGI server&lt;br /&gt;
    #&lt;br /&gt;
    location ~ \.php$ {&lt;br /&gt;
        include snippets/fastcgi-php.conf;&lt;br /&gt;
    #&lt;br /&gt;
    #    # With php-fpm (or other unix sockets):&lt;br /&gt;
        fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;&lt;br /&gt;
    #    # With php-cgi (or other tcp sockets):&lt;br /&gt;
    #    fastcgi_pass 127.0.0.1:9000;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    # deny access to .htaccess files, if Apache's document root&lt;br /&gt;
    # concurs with nginx's one&lt;br /&gt;
    #&lt;br /&gt;
    location ~ /\.ht {&lt;br /&gt;
        deny all;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Virtual Host configuration for example.com&lt;br /&gt;
#&lt;br /&gt;
# You can move that to a different file under sites-available/ and symlink that&lt;br /&gt;
# to sites-enabled/ to enable it.&lt;br /&gt;
#&lt;br /&gt;
#server {&lt;br /&gt;
#    listen 80;&lt;br /&gt;
#    listen [::]:80;&lt;br /&gt;
#&lt;br /&gt;
#    server_name example.com;&lt;br /&gt;
#&lt;br /&gt;
#    root /var/www/example.com;&lt;br /&gt;
#    index index.html;&lt;br /&gt;
#&lt;br /&gt;
#    location / {&lt;br /&gt;
#        try_files $uri $uri/ =404;&lt;br /&gt;
#    }&lt;br /&gt;
#}&lt;/div&gt;</summary>
		<author><name>Adriano</name></author>
		
	</entry>
</feed>