** Reply to message from Raymond van den Houwen <[EMAIL PROTECTED]> on Tue,
03 Dec 2002 09:44:22 +0000


> Hi Mike,
> 
> I already found the problem, thanks for your help:
> 
> The problem was that the Linux kernel has a LOT more routing
> capability then is normally discussed. It allows policy-based routing
> and lots of other options, along with -- and this is what killed me --
> reverse path filtering. Reverse path filtering, when enabled,
> specifically tells the kernel to drop packets that have a source
> address that isn't appropriate for the network from which it is
> arriving. Dropping these packets is a BAD thing when multiple
> interfaces are used for the connection to the outside world, since
> this implies asymmetric routing, i.e. packets will often come in via
> one interface and the reply will be via the other interface.
> 
> Reverse packet filtering is disabled by the following:
> 
> for file in /proc/sys/net/ipv4/conf/*/rp_filter
> do
> echo "0" > $file
> done


Or the Red Hat way:

Replace the "1" with a "0" in the following line in /etc/sysctl.conf

# Controls source route verification
net.ipv4.conf.default.rp_filter = 1

and then issue an "/sbin/service network restart"

jb



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to