How to Enable IPtables TRACE Target on Debian Squeeze (6)Debugger for Iptablesiptables logging not working?Iptables QUEUE Target and Snortiptables - Target to route packet to specific interface?packets sent on virtual IP don't hit iptables ruleLog all forwarded traffic to new server with iptablesIptables : forwarding SSH traffic according destination IPRedirecting log from /var/log/kern.log to a separate log file for iptables logiptables TRACE No chain/target/match by that nameiptables traversal when connecting to docker clientDNAT using iptables only works for traffic incoming on eth0

SOQL Not Recognizing Field?

Mobile App Appraisal

An average heaven where everyone has sexless golden bodies and is bored

Is the term 'open source' a trademark?

Why is one of Madera Municipal's runways labelled with only "R" on both sides?

How to signal to my players that the following part is supposed to be played on fast forward?

Arriving at the same result with the opposite hypotheses

How to hide an urban landmark?

Is counterpoint still used today?

Overlapping String-Blocks

Is using haveibeenpwned to validate password strength rational?

Impedance ratio vs. SWR

What makes an item an artifact?

What is the `some` keyword in SwiftUI?

How do governments keep track of their issued currency?

Does Disney no longer produce hand-drawn cartoon films?

What ways have you found to get edits from non-LaTeX users?

Why was the Sega Genesis marketed as a 16-bit console?

How can this tool find out registered domains from an IP?

bash script: "*.jpg" expansion not working as expected inside $(...), for picking a random file

SQL counting distinct over partition

Compiling C files on Ubuntu and using the executable on Windows

How is water heavier than petrol, even though its molecular weight is less than petrol?

What is the highest possible permanent AC at character creation?



How to Enable IPtables TRACE Target on Debian Squeeze (6)


Debugger for Iptablesiptables logging not working?Iptables QUEUE Target and Snortiptables - Target to route packet to specific interface?packets sent on virtual IP don't hit iptables ruleLog all forwarded traffic to new server with iptablesIptables : forwarding SSH traffic according destination IPRedirecting log from /var/log/kern.log to a separate log file for iptables logiptables TRACE No chain/target/match by that nameiptables traversal when connecting to docker clientDNAT using iptables only works for traffic incoming on eth0






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








11















I am trying to use the TRACE target of IPtables but I can't seem to get any trace information logged. I want to use what is described here:
Debugger for Iptables.



From the iptables man for TRACE:




 This target marks packes so that the kernel will log every rule which
match the packets as those traverse the tables, chains, rules. (The
ipt_LOG or ip6t_LOG module is required for the logging.) The packets
are logged with the string prefix: "TRACE: tablename:chain-
name:type:rulenum " where type can be "rule" for plain rule, "return"
for implicit rule at the end of a user defined chain and "policy" for
the policy of the built in chains.
It can only be used in the raw table.



I use the following rule: iptables -A PREROUTING -t raw -p tcp -j TRACE but nothing is appended either in /var/log/syslog or /var/log/kern.log!



Is there another step missing? Am I looking in the wrong place?



edit



Even though I can't find log entries, the TRACE target seems to be set up correctly since the packet counters get incremented:



# iptables -L -v -t raw
Chain PREROUTING (policy ACCEPT 193 packets, 63701 bytes)
pkts bytes target prot opt in out source destination
193 63701 TRACE tcp -- any any anywhere anywhere

Chain OUTPUT (policy ACCEPT 178 packets, 65277 bytes)
pkts bytes target prot opt in out source destination


edit 2



The rule iptables -A PREROUTING -t raw -p tcp -j LOG does print packet information to /var/log/syslog... Why doesn't TRACE work?










share|improve this question



















  • 1





    just stumpled upon a python program (which is also called iptables-trace :). When started it adds a TRACE rule with specified conditions into running iptables, parses and display formatted output for resulting TRACE output until the program is stopped (which removes the TRACE rule from iptables). Will try this soon...

    – chris
    May 31 '16 at 19:31

















11















I am trying to use the TRACE target of IPtables but I can't seem to get any trace information logged. I want to use what is described here:
Debugger for Iptables.



From the iptables man for TRACE:




 This target marks packes so that the kernel will log every rule which
match the packets as those traverse the tables, chains, rules. (The
ipt_LOG or ip6t_LOG module is required for the logging.) The packets
are logged with the string prefix: "TRACE: tablename:chain-
name:type:rulenum " where type can be "rule" for plain rule, "return"
for implicit rule at the end of a user defined chain and "policy" for
the policy of the built in chains.
It can only be used in the raw table.



I use the following rule: iptables -A PREROUTING -t raw -p tcp -j TRACE but nothing is appended either in /var/log/syslog or /var/log/kern.log!



Is there another step missing? Am I looking in the wrong place?



edit



Even though I can't find log entries, the TRACE target seems to be set up correctly since the packet counters get incremented:



# iptables -L -v -t raw
Chain PREROUTING (policy ACCEPT 193 packets, 63701 bytes)
pkts bytes target prot opt in out source destination
193 63701 TRACE tcp -- any any anywhere anywhere

Chain OUTPUT (policy ACCEPT 178 packets, 65277 bytes)
pkts bytes target prot opt in out source destination


edit 2



The rule iptables -A PREROUTING -t raw -p tcp -j LOG does print packet information to /var/log/syslog... Why doesn't TRACE work?










share|improve this question



















  • 1





    just stumpled upon a python program (which is also called iptables-trace :). When started it adds a TRACE rule with specified conditions into running iptables, parses and display formatted output for resulting TRACE output until the program is stopped (which removes the TRACE rule from iptables). Will try this soon...

    – chris
    May 31 '16 at 19:31













11












11








11


5






I am trying to use the TRACE target of IPtables but I can't seem to get any trace information logged. I want to use what is described here:
Debugger for Iptables.



From the iptables man for TRACE:




 This target marks packes so that the kernel will log every rule which
match the packets as those traverse the tables, chains, rules. (The
ipt_LOG or ip6t_LOG module is required for the logging.) The packets
are logged with the string prefix: "TRACE: tablename:chain-
name:type:rulenum " where type can be "rule" for plain rule, "return"
for implicit rule at the end of a user defined chain and "policy" for
the policy of the built in chains.
It can only be used in the raw table.



I use the following rule: iptables -A PREROUTING -t raw -p tcp -j TRACE but nothing is appended either in /var/log/syslog or /var/log/kern.log!



Is there another step missing? Am I looking in the wrong place?



edit



Even though I can't find log entries, the TRACE target seems to be set up correctly since the packet counters get incremented:



# iptables -L -v -t raw
Chain PREROUTING (policy ACCEPT 193 packets, 63701 bytes)
pkts bytes target prot opt in out source destination
193 63701 TRACE tcp -- any any anywhere anywhere

Chain OUTPUT (policy ACCEPT 178 packets, 65277 bytes)
pkts bytes target prot opt in out source destination


edit 2



The rule iptables -A PREROUTING -t raw -p tcp -j LOG does print packet information to /var/log/syslog... Why doesn't TRACE work?










share|improve this question
















I am trying to use the TRACE target of IPtables but I can't seem to get any trace information logged. I want to use what is described here:
Debugger for Iptables.



From the iptables man for TRACE:




 This target marks packes so that the kernel will log every rule which
match the packets as those traverse the tables, chains, rules. (The
ipt_LOG or ip6t_LOG module is required for the logging.) The packets
are logged with the string prefix: "TRACE: tablename:chain-
name:type:rulenum " where type can be "rule" for plain rule, "return"
for implicit rule at the end of a user defined chain and "policy" for
the policy of the built in chains.
It can only be used in the raw table.



I use the following rule: iptables -A PREROUTING -t raw -p tcp -j TRACE but nothing is appended either in /var/log/syslog or /var/log/kern.log!



Is there another step missing? Am I looking in the wrong place?



edit



Even though I can't find log entries, the TRACE target seems to be set up correctly since the packet counters get incremented:



# iptables -L -v -t raw
Chain PREROUTING (policy ACCEPT 193 packets, 63701 bytes)
pkts bytes target prot opt in out source destination
193 63701 TRACE tcp -- any any anywhere anywhere

Chain OUTPUT (policy ACCEPT 178 packets, 65277 bytes)
pkts bytes target prot opt in out source destination


edit 2



The rule iptables -A PREROUTING -t raw -p tcp -j LOG does print packet information to /var/log/syslog... Why doesn't TRACE work?







linux debian iptables logging log-files






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Apr 13 '17 at 12:14









Community

1




1










asked May 4 '12 at 4:37









berniebernie

2151311




2151311







  • 1





    just stumpled upon a python program (which is also called iptables-trace :). When started it adds a TRACE rule with specified conditions into running iptables, parses and display formatted output for resulting TRACE output until the program is stopped (which removes the TRACE rule from iptables). Will try this soon...

    – chris
    May 31 '16 at 19:31












  • 1





    just stumpled upon a python program (which is also called iptables-trace :). When started it adds a TRACE rule with specified conditions into running iptables, parses and display formatted output for resulting TRACE output until the program is stopped (which removes the TRACE rule from iptables). Will try this soon...

    – chris
    May 31 '16 at 19:31







1




1





just stumpled upon a python program (which is also called iptables-trace :). When started it adds a TRACE rule with specified conditions into running iptables, parses and display formatted output for resulting TRACE output until the program is stopped (which removes the TRACE rule from iptables). Will try this soon...

– chris
May 31 '16 at 19:31





just stumpled upon a python program (which is also called iptables-trace :). When started it adds a TRACE rule with specified conditions into running iptables, parses and display formatted output for resulting TRACE output until the program is stopped (which removes the TRACE rule from iptables). Will try this soon...

– chris
May 31 '16 at 19:31










4 Answers
4






active

oldest

votes


















8














Run:



modprobe ipt_LOG


That fixed it for me.






share|improve this answer

























  • Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

    – bernie
    Sep 24 '12 at 18:55



















14














Seems like (i.e. works for me) with new kernel this is needed (for IPv4):



modprobe nf_log_ipv4
sysctl net.netfilter.nf_log.2=nf_log_ipv4


credits:



  • https://www.centos.org/forums/viewtopic.php?f=47&t=54411

  • upvoting other answers as they gave me important hints





share|improve this answer

























  • This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

    – Ash Berlin-Taylor
    Mar 17 '17 at 8:53


















7














I found that I needed to perform both of the previous answers, in this order:



sudo modprobe ipt_LOG
sudo sysctl net.netfilter.nf_log.2=ipt_LOG


Here are a couple of things that I discovered along the way.



You can get a list of valid loggers (along with the currently selected logger) with the following:



cat /proc/net/netfilter/nf_log


The numbers here represent the protocol family numbers, as defined in /usr/include/bits/socket.h. 2 is AF_INET (that's IPv4), and 10 is AF_INET6 (IPv6).






share|improve this answer






























    2














    This worked for me sudo sysctl net.netfilter.nf_log.2=ipt_LOG






    share|improve this answer























      Your Answer








      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "2"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: true,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: 10,
      bindNavPrevention: true,
      postfix: "",
      imageUploader:
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      ,
      onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );













      draft saved

      draft discarded


















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f385937%2fhow-to-enable-iptables-trace-target-on-debian-squeeze-6%23new-answer', 'question_page');

      );

      Post as a guest















      Required, but never shown

























      4 Answers
      4






      active

      oldest

      votes








      4 Answers
      4






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      8














      Run:



      modprobe ipt_LOG


      That fixed it for me.






      share|improve this answer

























      • Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

        – bernie
        Sep 24 '12 at 18:55
















      8














      Run:



      modprobe ipt_LOG


      That fixed it for me.






      share|improve this answer

























      • Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

        – bernie
        Sep 24 '12 at 18:55














      8












      8








      8







      Run:



      modprobe ipt_LOG


      That fixed it for me.






      share|improve this answer















      Run:



      modprobe ipt_LOG


      That fixed it for me.







      share|improve this answer














      share|improve this answer



      share|improve this answer








      edited May 21 at 23:13









      bain

      17515




      17515










      answered Jun 13 '12 at 10:03









      Gido BrunoGido Bruno

      962




      962












      • Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

        – bernie
        Sep 24 '12 at 18:55


















      • Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

        – bernie
        Sep 24 '12 at 18:55

















      Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

      – bernie
      Sep 24 '12 at 18:55






      Thanks, that worked! The logs are available in /var/log/syslog or /var/log/kern.log

      – bernie
      Sep 24 '12 at 18:55














      14














      Seems like (i.e. works for me) with new kernel this is needed (for IPv4):



      modprobe nf_log_ipv4
      sysctl net.netfilter.nf_log.2=nf_log_ipv4


      credits:



      • https://www.centos.org/forums/viewtopic.php?f=47&t=54411

      • upvoting other answers as they gave me important hints





      share|improve this answer

























      • This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

        – Ash Berlin-Taylor
        Mar 17 '17 at 8:53















      14














      Seems like (i.e. works for me) with new kernel this is needed (for IPv4):



      modprobe nf_log_ipv4
      sysctl net.netfilter.nf_log.2=nf_log_ipv4


      credits:



      • https://www.centos.org/forums/viewtopic.php?f=47&t=54411

      • upvoting other answers as they gave me important hints





      share|improve this answer

























      • This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

        – Ash Berlin-Taylor
        Mar 17 '17 at 8:53













      14












      14








      14







      Seems like (i.e. works for me) with new kernel this is needed (for IPv4):



      modprobe nf_log_ipv4
      sysctl net.netfilter.nf_log.2=nf_log_ipv4


      credits:



      • https://www.centos.org/forums/viewtopic.php?f=47&t=54411

      • upvoting other answers as they gave me important hints





      share|improve this answer















      Seems like (i.e. works for me) with new kernel this is needed (for IPv4):



      modprobe nf_log_ipv4
      sysctl net.netfilter.nf_log.2=nf_log_ipv4


      credits:



      • https://www.centos.org/forums/viewtopic.php?f=47&t=54411

      • upvoting other answers as they gave me important hints






      share|improve this answer














      share|improve this answer



      share|improve this answer








      edited Jan 22 '16 at 18:29

























      answered Nov 27 '15 at 22:00









      akostadinovakostadinov

      739511




      739511












      • This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

        – Ash Berlin-Taylor
        Mar 17 '17 at 8:53

















      • This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

        – Ash Berlin-Taylor
        Mar 17 '17 at 8:53
















      This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

      – Ash Berlin-Taylor
      Mar 17 '17 at 8:53





      This was the one that worked for me on Ubuntu 16.04 (kernel 4.4.0-21-generic)

      – Ash Berlin-Taylor
      Mar 17 '17 at 8:53











      7














      I found that I needed to perform both of the previous answers, in this order:



      sudo modprobe ipt_LOG
      sudo sysctl net.netfilter.nf_log.2=ipt_LOG


      Here are a couple of things that I discovered along the way.



      You can get a list of valid loggers (along with the currently selected logger) with the following:



      cat /proc/net/netfilter/nf_log


      The numbers here represent the protocol family numbers, as defined in /usr/include/bits/socket.h. 2 is AF_INET (that's IPv4), and 10 is AF_INET6 (IPv6).






      share|improve this answer



























        7














        I found that I needed to perform both of the previous answers, in this order:



        sudo modprobe ipt_LOG
        sudo sysctl net.netfilter.nf_log.2=ipt_LOG


        Here are a couple of things that I discovered along the way.



        You can get a list of valid loggers (along with the currently selected logger) with the following:



        cat /proc/net/netfilter/nf_log


        The numbers here represent the protocol family numbers, as defined in /usr/include/bits/socket.h. 2 is AF_INET (that's IPv4), and 10 is AF_INET6 (IPv6).






        share|improve this answer

























          7












          7








          7







          I found that I needed to perform both of the previous answers, in this order:



          sudo modprobe ipt_LOG
          sudo sysctl net.netfilter.nf_log.2=ipt_LOG


          Here are a couple of things that I discovered along the way.



          You can get a list of valid loggers (along with the currently selected logger) with the following:



          cat /proc/net/netfilter/nf_log


          The numbers here represent the protocol family numbers, as defined in /usr/include/bits/socket.h. 2 is AF_INET (that's IPv4), and 10 is AF_INET6 (IPv6).






          share|improve this answer













          I found that I needed to perform both of the previous answers, in this order:



          sudo modprobe ipt_LOG
          sudo sysctl net.netfilter.nf_log.2=ipt_LOG


          Here are a couple of things that I discovered along the way.



          You can get a list of valid loggers (along with the currently selected logger) with the following:



          cat /proc/net/netfilter/nf_log


          The numbers here represent the protocol family numbers, as defined in /usr/include/bits/socket.h. 2 is AF_INET (that's IPv4), and 10 is AF_INET6 (IPv6).







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Aug 9 '13 at 12:26









          mavitmavit

          18313




          18313





















              2














              This worked for me sudo sysctl net.netfilter.nf_log.2=ipt_LOG






              share|improve this answer



























                2














                This worked for me sudo sysctl net.netfilter.nf_log.2=ipt_LOG






                share|improve this answer

























                  2












                  2








                  2







                  This worked for me sudo sysctl net.netfilter.nf_log.2=ipt_LOG






                  share|improve this answer













                  This worked for me sudo sysctl net.netfilter.nf_log.2=ipt_LOG







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Jan 7 '13 at 23:49









                  Nikolay BryskinNikolay Bryskin

                  211




                  211



























                      draft saved

                      draft discarded
















































                      Thanks for contributing an answer to Server Fault!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f385937%2fhow-to-enable-iptables-trace-target-on-debian-squeeze-6%23new-answer', 'question_page');

                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown







                      Popular posts from this blog

                      Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                      Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                      Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020