fail2ban not correctly modifying the iptables effectively?Debugger for Iptablesiptables port forward forwardingFirewall still blocking port 53 despite listing otherwise?iptables allow http incoming connections, state NEW, ESTABLISHEDForward http traffic to another ip address with iptablesTrying to make iptables stateless is causing unforeseen filteringIptables port forwarding for specific host dd-wrt/tomatoTunnel windows VPN through SSHfail2ban running on CentOS 7 & getting “ssh connection refused”iptables outgoing default policy is accept, but some ports appear blockedLinux firewalld - I can hit port 4506, but my configuration shouldn't let me

simple conditions equation

How exactly does Hawking radiation decrease the mass of black holes?

What does the "ep" capability mean?

Critique of timeline aesthetic

A Strange Latex Symbol

How to have a sharp product image?

Why does nature favour the Laplacian?

Please, smoke with good manners

What is the strongest case that can be made in favour of the UK regaining some control over fishing policy after Brexit?

Pulling the rope with one hand is as heavy as with two hands?

Will a top journal at least read my introduction?

Why isn't the definition of absolute value applied when squaring a radical containing a variable?

Why was Germany not as successful as other Europeans in establishing overseas colonies?

Does this extra sentence in the description of the warlock's Eyes of the Rune Keeper eldritch invocation appear in any official reference?

Unexpected email from Yorkshire Bank

How to get a plain text file version of a CP/M .BAS (M-BASIC) program?

Sci-fi book: portals appear in London and send a failed artist towards a designated path where he operate a giant superweapon

Pass By Reference VS Pass by Value

How would one muzzle a full grown polar bear in the 13th century?

Binary Numbers Magic Trick

What's the polite way to say "I need to urinate"?

How do Bards prepare spells?

How can I change the color of a part of a line?

What is the incentive for curl to release the library for free?



fail2ban not correctly modifying the iptables effectively?


Debugger for Iptablesiptables port forward forwardingFirewall still blocking port 53 despite listing otherwise?iptables allow http incoming connections, state NEW, ESTABLISHEDForward http traffic to another ip address with iptablesTrying to make iptables stateless is causing unforeseen filteringIptables port forwarding for specific host dd-wrt/tomatoTunnel windows VPN through SSHfail2ban running on CentOS 7 & getting “ssh connection refused”iptables outgoing default policy is accept, but some ports appear blockedLinux firewalld - I can hit port 4506, but my configuration shouldn't let me






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I just installed fail2ban in NetinVM (a constellation of virtual machines inside a VM)



so far so good,
I install in a specific machine (10.5.1.13) where ssh is on 2222 (all on root)



From other machine (10.5.1.11) I repetitively ssh to that first one with wrong password.



fail2ban recognise the "attack" and said to ban the ip



fail2ban> status sshd
Status for the jail: sshd
|- Filter
| |- Currently failed: 1
| |- Total failed: 20
| `- File list: /var/log/auth.log
`- Actions
|- Currently banned: 2
|- Total banned: 2
`- Banned IP list: 10.5.1.11


as I take a look into iptables:



# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- anywhere anywhere multiport dports ssh

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- dmzb.example.net anywhere reject-with icmp-port-unreachable
RETURN all -- anywhere anywhere


this REJECT rule is added, and resolution of dmzb.emaple.net seems proper:



$ ping dmzb.example.net
PING dmzb.example.net (10.5.1.11) 56(84) bytes of data.
64 bytes from dmzb.example.net (10.5.1.11): icmp_seq=1 ttl=64 time=0.940 ms


and resolve the domain added into the iptables correctly to the "attacker" IP



nevertheless, I can still proceed with ssh trials from the "attacker" machine, getting the password request, and even entering if I put correct password.



update:
as suggested, tried



$ iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- 10.5.1.11 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0


ip seems the correct one, still, banning is not being applied.










share|improve this question
























  • I'll bet rDNS doesn't round-trip correctly. This is why you should always run iptables -L -n.

    – womble
    Apr 20 at 23:02











  • it seems to be not the case. 'iptables -L -n' shows the right IP to be banned, but it does not banned it in deed

    – pGrnd2
    Apr 20 at 23:58











  • Trace the packets through netfilter, that'll show what's going wrong.

    – womble
    Apr 21 at 1:29











  • Better look at ipset storage of fail2ban block list. In this case the iptables rule set won't be changed and all blocked ip addresses will be stored inside ipset list.

    – Anton Danilov
    Apr 21 at 8:51











  • thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:32

















0















I just installed fail2ban in NetinVM (a constellation of virtual machines inside a VM)



so far so good,
I install in a specific machine (10.5.1.13) where ssh is on 2222 (all on root)



From other machine (10.5.1.11) I repetitively ssh to that first one with wrong password.



fail2ban recognise the "attack" and said to ban the ip



fail2ban> status sshd
Status for the jail: sshd
|- Filter
| |- Currently failed: 1
| |- Total failed: 20
| `- File list: /var/log/auth.log
`- Actions
|- Currently banned: 2
|- Total banned: 2
`- Banned IP list: 10.5.1.11


as I take a look into iptables:



# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- anywhere anywhere multiport dports ssh

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- dmzb.example.net anywhere reject-with icmp-port-unreachable
RETURN all -- anywhere anywhere


this REJECT rule is added, and resolution of dmzb.emaple.net seems proper:



$ ping dmzb.example.net
PING dmzb.example.net (10.5.1.11) 56(84) bytes of data.
64 bytes from dmzb.example.net (10.5.1.11): icmp_seq=1 ttl=64 time=0.940 ms


and resolve the domain added into the iptables correctly to the "attacker" IP



nevertheless, I can still proceed with ssh trials from the "attacker" machine, getting the password request, and even entering if I put correct password.



update:
as suggested, tried



$ iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- 10.5.1.11 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0


ip seems the correct one, still, banning is not being applied.










share|improve this question
























  • I'll bet rDNS doesn't round-trip correctly. This is why you should always run iptables -L -n.

    – womble
    Apr 20 at 23:02











  • it seems to be not the case. 'iptables -L -n' shows the right IP to be banned, but it does not banned it in deed

    – pGrnd2
    Apr 20 at 23:58











  • Trace the packets through netfilter, that'll show what's going wrong.

    – womble
    Apr 21 at 1:29











  • Better look at ipset storage of fail2ban block list. In this case the iptables rule set won't be changed and all blocked ip addresses will be stored inside ipset list.

    – Anton Danilov
    Apr 21 at 8:51











  • thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:32













0












0








0








I just installed fail2ban in NetinVM (a constellation of virtual machines inside a VM)



so far so good,
I install in a specific machine (10.5.1.13) where ssh is on 2222 (all on root)



From other machine (10.5.1.11) I repetitively ssh to that first one with wrong password.



fail2ban recognise the "attack" and said to ban the ip



fail2ban> status sshd
Status for the jail: sshd
|- Filter
| |- Currently failed: 1
| |- Total failed: 20
| `- File list: /var/log/auth.log
`- Actions
|- Currently banned: 2
|- Total banned: 2
`- Banned IP list: 10.5.1.11


as I take a look into iptables:



# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- anywhere anywhere multiport dports ssh

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- dmzb.example.net anywhere reject-with icmp-port-unreachable
RETURN all -- anywhere anywhere


this REJECT rule is added, and resolution of dmzb.emaple.net seems proper:



$ ping dmzb.example.net
PING dmzb.example.net (10.5.1.11) 56(84) bytes of data.
64 bytes from dmzb.example.net (10.5.1.11): icmp_seq=1 ttl=64 time=0.940 ms


and resolve the domain added into the iptables correctly to the "attacker" IP



nevertheless, I can still proceed with ssh trials from the "attacker" machine, getting the password request, and even entering if I put correct password.



update:
as suggested, tried



$ iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- 10.5.1.11 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0


ip seems the correct one, still, banning is not being applied.










share|improve this question
















I just installed fail2ban in NetinVM (a constellation of virtual machines inside a VM)



so far so good,
I install in a specific machine (10.5.1.13) where ssh is on 2222 (all on root)



From other machine (10.5.1.11) I repetitively ssh to that first one with wrong password.



fail2ban recognise the "attack" and said to ban the ip



fail2ban> status sshd
Status for the jail: sshd
|- Filter
| |- Currently failed: 1
| |- Total failed: 20
| `- File list: /var/log/auth.log
`- Actions
|- Currently banned: 2
|- Total banned: 2
`- Banned IP list: 10.5.1.11


as I take a look into iptables:



# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- anywhere anywhere multiport dports ssh

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- dmzb.example.net anywhere reject-with icmp-port-unreachable
RETURN all -- anywhere anywhere


this REJECT rule is added, and resolution of dmzb.emaple.net seems proper:



$ ping dmzb.example.net
PING dmzb.example.net (10.5.1.11) 56(84) bytes of data.
64 bytes from dmzb.example.net (10.5.1.11): icmp_seq=1 ttl=64 time=0.940 ms


and resolve the domain added into the iptables correctly to the "attacker" IP



nevertheless, I can still proceed with ssh trials from the "attacker" machine, getting the password request, and even entering if I put correct password.



update:
as suggested, tried



$ iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- 10.5.1.11 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0


ip seems the correct one, still, banning is not being applied.







linux ssh iptables linux-networking fail2ban






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Apr 21 at 0:00







pGrnd2

















asked Apr 20 at 20:22









pGrnd2pGrnd2

52




52












  • I'll bet rDNS doesn't round-trip correctly. This is why you should always run iptables -L -n.

    – womble
    Apr 20 at 23:02











  • it seems to be not the case. 'iptables -L -n' shows the right IP to be banned, but it does not banned it in deed

    – pGrnd2
    Apr 20 at 23:58











  • Trace the packets through netfilter, that'll show what's going wrong.

    – womble
    Apr 21 at 1:29











  • Better look at ipset storage of fail2ban block list. In this case the iptables rule set won't be changed and all blocked ip addresses will be stored inside ipset list.

    – Anton Danilov
    Apr 21 at 8:51











  • thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:32

















  • I'll bet rDNS doesn't round-trip correctly. This is why you should always run iptables -L -n.

    – womble
    Apr 20 at 23:02











  • it seems to be not the case. 'iptables -L -n' shows the right IP to be banned, but it does not banned it in deed

    – pGrnd2
    Apr 20 at 23:58











  • Trace the packets through netfilter, that'll show what's going wrong.

    – womble
    Apr 21 at 1:29











  • Better look at ipset storage of fail2ban block list. In this case the iptables rule set won't be changed and all blocked ip addresses will be stored inside ipset list.

    – Anton Danilov
    Apr 21 at 8:51











  • thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:32
















I'll bet rDNS doesn't round-trip correctly. This is why you should always run iptables -L -n.

– womble
Apr 20 at 23:02





I'll bet rDNS doesn't round-trip correctly. This is why you should always run iptables -L -n.

– womble
Apr 20 at 23:02













it seems to be not the case. 'iptables -L -n' shows the right IP to be banned, but it does not banned it in deed

– pGrnd2
Apr 20 at 23:58





it seems to be not the case. 'iptables -L -n' shows the right IP to be banned, but it does not banned it in deed

– pGrnd2
Apr 20 at 23:58













Trace the packets through netfilter, that'll show what's going wrong.

– womble
Apr 21 at 1:29





Trace the packets through netfilter, that'll show what's going wrong.

– womble
Apr 21 at 1:29













Better look at ipset storage of fail2ban block list. In this case the iptables rule set won't be changed and all blocked ip addresses will be stored inside ipset list.

– Anton Danilov
Apr 21 at 8:51





Better look at ipset storage of fail2ban block list. In this case the iptables rule set won't be changed and all blocked ip addresses will be stored inside ipset list.

– Anton Danilov
Apr 21 at 8:51













thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

– pGrnd2
Apr 21 at 9:32





thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

– pGrnd2
Apr 21 at 9:32










1 Answer
1






active

oldest

votes


















1














Inside your rule set you bind the fail2ban checking with port 22, but in the description you have written, that your ssh actually listens the port 2222. To check it start from iptables-save -c or iptables -L -n -v. Check the counters of the corresponded rules. Also, the tcpdump is also very helpful tool in your case.






share|improve this answer


















  • 1





    thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:33











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f963923%2ffail2ban-not-correctly-modifying-the-iptables-effectively%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









1














Inside your rule set you bind the fail2ban checking with port 22, but in the description you have written, that your ssh actually listens the port 2222. To check it start from iptables-save -c or iptables -L -n -v. Check the counters of the corresponded rules. Also, the tcpdump is also very helpful tool in your case.






share|improve this answer


















  • 1





    thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:33















1














Inside your rule set you bind the fail2ban checking with port 22, but in the description you have written, that your ssh actually listens the port 2222. To check it start from iptables-save -c or iptables -L -n -v. Check the counters of the corresponded rules. Also, the tcpdump is also very helpful tool in your case.






share|improve this answer


















  • 1





    thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:33













1












1








1







Inside your rule set you bind the fail2ban checking with port 22, but in the description you have written, that your ssh actually listens the port 2222. To check it start from iptables-save -c or iptables -L -n -v. Check the counters of the corresponded rules. Also, the tcpdump is also very helpful tool in your case.






share|improve this answer













Inside your rule set you bind the fail2ban checking with port 22, but in the description you have written, that your ssh actually listens the port 2222. To check it start from iptables-save -c or iptables -L -n -v. Check the counters of the corresponded rules. Also, the tcpdump is also very helpful tool in your case.







share|improve this answer












share|improve this answer



share|improve this answer










answered Apr 21 at 8:59









Anton DanilovAnton Danilov

56125




56125







  • 1





    thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:33












  • 1





    thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

    – pGrnd2
    Apr 21 at 9:33







1




1





thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

– pGrnd2
Apr 21 at 9:33





thats the trick , as ssh port is manully setup to 2222, fail2ban does not recognize the port properly and it needs to be added manually on the jail.local file under the proper rule

– pGrnd2
Apr 21 at 9:33

















draft saved

draft discarded
















































Thanks for contributing an answer to Server Fault!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f963923%2ffail2ban-not-correctly-modifying-the-iptables-effectively%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020