Нали на втория или третия хост нямаш iptables rule, който да спира трафика към 192.168.1.16/28 например. Защо също така не изпратиш рутинг таблиците на 82.147.151.81 и 82.147.151.68 (всички от /etc/iproute2/rc_tables) - ip route list table local, main, default, etc... Ако те притеснява да изнесеш цялата информация - | grep 192.168.1.

Best e-gards,
Georgi Sinapov


Няма филтри. роутинг таблиците са наред . Ето тук е интересното : Рутера дропва пакетите към 192.168.1.18 , т.е не ги изпраща на eth0 .

[EMAIL PROTECTED]:/etc/iproute2# arp
Address HWtype HWaddress Flags Mask Iface
192.168.1.1 ether 00:04:DD:0B:C4:CE C eth0
192.168.1.18 ether 00:0C:41:33:8B:32 C eth0
core-rtr-fe4.dupnica.ne ether 00:E0:29:41:09:60 C eth1



[EMAIL PROTECTED]:/etc/iproute2# tcpdump -i eth1 -p icmp -v
tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
21:55:18.611759 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.1: icmp 64: echo request seq 150
21:55:18.645845 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], length: 84) 192.168.1.1 > stux.dupnica.net: icmp 64: echo reply seq 150
21:55:19.614236 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.1: icmp 64: echo request seq 151
21:55:19.618857 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], length: 84) 192.168.1.1 > stux.dupnica.net: icmp 64: echo reply seq 151
21:55:20.616118 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.1: icmp 64: echo request seq 152
21:55:20.621028 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], length: 84) 192.168.1.1 > stux.dupnica.net: icmp 64: echo reply seq 152
21:55:21.624234 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.1: icmp 64: echo request seq 153
21:55:21.650069 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], length: 84) 192.168.1.1 > stux.dupnica.net: icmp 64: echo reply seq 153
21:55:22.626012 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.1: icmp 64: echo request seq 154



[EMAIL PROTECTED]:/etc/iproute2# tcpdump -i eth1 -p icmp -v
tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
21:58:39.456041 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.18: icmp 64: echo request seq 11
21:58:40.445832 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.18: icmp 64: echo request seq 12
21:58:41.462845 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.18: icmp 64: echo request seq 13
21:58:42.464745 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.18: icmp 64: echo request seq 14
21:58:43.445787 IP (tos 0x0, ttl 62, id 0, offset 0, flags [DF], length: 84) stux.dupnica.net > 192.168.1.18: icmp 64: echo request seq 15


5 packets captured
12 packets received by filter
0 packets dropped by kernel

[EMAIL PROTECTED]:/etc/iproute2# tcpdump -i eth0 -p icmp -v
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes


0 packets captured
0 packets received by filter
0 packets dropped by kernel




Поздрави
Стефан /вече няма да сe пиша инж. отпред, щото ще си късам дипломата вече :) /








============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================

Reply via email to