On 05/06/2012 09:15 PM, imnotpc wrote:

I apologize that I didn't give more detail when I started this thread, but this has become more involved/detailed discussion than I envisioned. Let me give you the topography of my network as best as I can describe:

Firewall/Gateway: Mga2 box with 3 NICs which forwards traffic from the DMZ and the LAN to the Internet and back. The Internet facing NIC has a public IP. The DMZ is a private subnet with all fixed IPs. The LAN subnet also has all fixed IPs in the 192.168.0.0/24 range. Iptables firewall logs and drops all traffic that doesn't originate from these subnets.

LAN: All the LAN hosts have fixed IPs IN the 192.168.0.0/24 range. Linux host firewalls block all outgoing traffic that doesn't originate from the assigned IP address. Windows/other hosts do whatever they do.

Wireless Router Attached to the LAN: The LAN facing NIC on the wireless router has a fixed IP of 192.168.0.100. The wireless interface is configured to assign IPs in the 192.168.2.0/24 range to the wireless hosts using DHCP.

Wireless Hosts: Connect to wireless router via DHCP. I believe these hosts are generating the martian packets.

I understand the the wireless host may identify themselves using other IPs due to other connection/configuration issues, but I can't understand how the kernel on the Mga2 gateway is ever able to see packets originating from 192.168.3.2 or any other unauthorized subnet. This is my major concern since it may indicate an error in my LAN configuration.

1) Is eth0 the interface facing the internet ?

2) Is 173.194.74.154 the IP address assigned (currently) to you by your ISP ?

3) If you ping 192.168.3.2 when you're getting the martians, do you get any response ?

4) What does "traceroute 192.168.3.2" from the gateway give ?

Reply via email to