Portál AbcLinuxu, 12. května 2025 09:36
eth0 Link encap:Ethernet HWaddr 00:13:D4:6D:60:3D inet addr:172.16.1.1 Bcast:172.16.255.255 Mask:255.255.0.0 ... eth1 Link encap:Ethernet HWaddr 00:0A:CD:03:B1:60 inet addr:10.254.9.172 Bcast:10.255.255.255 Mask:255.0.0.0 ... lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0#route -n
Destination Gateway Genmask Flags Metric Ref Use Iface 172.16.1.2 0.0.0.0 255.255.255.255 UH 0 0 0 eth0 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 172.16.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 10.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 eth1 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo 0.0.0.0 10.254.9.171 0.0.0.0 UG 0 0 0 eth1#iptables -t nat -L
Chain PREROUTING (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere 172.16.1.0/24 Chain POSTROUTING (policy ACCEPT) target prot opt source destination MASQUERADE all -- 172.16.1.0/24 anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destinationKlient: ->eth0: nepripojeny ->eth1: vnutorna siet, staticka adresa 172.16.1.2/255.255.0.0
eth0 Link encap:Ethernet HWaddr 00:13:D4:67:FB:A2 inet6 addr: fe80::213:d4ff:fe67:fba2/64 Scope:Link ... eth1 Link encap:Ethernet HWaddr 00:13:D4:67:F2:E3 inet addr:172.16.1.2 Bcast:172.16.255.255 Mask:255.255.0.0 ... lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 ... vmnet1 Link encap:Ethernet HWaddr 00:50:56:C0:00:01 inet addr:192.168.161.1 Bcast:192.168.161.255 Mask:255.255.255.0 ... vmnet8 Link encap:Ethernet HWaddr 00:50:56:C0:00:08 inet addr:172.16.40.1 Bcast:172.16.40.255 Mask:255.255.255.0 ...#route -n
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 10.254.9.171 172.16.1.1 255.255.255.255 UGH 0 0 0 eth1 172.16.1.1 0.0.0.0 255.255.255.255 UH 0 0 0 eth1 192.168.161.0 0.0.0.0 255.255.255.0 U 0 0 0 vmnet1 172.16.40.0 0.0.0.0 255.255.255.0 U 0 0 0 vmnet8 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth1 172.16.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth1 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo 0.0.0.0 172.16.1.1 0.0.0.0 UG 0 0 0 eth1Dakujem za kazdu radu!!!
modem: "Rychly internet" od T-mobile, IP=10.254.9.171 eth1 Link encap:Ethernet HWaddr 00:0A:CD:03:B1:60 inet addr:10.254.9.172Je tam dobre nastavena adresa?
echo "1" > /proc/sys/net/ipv4/ip_forward iptables -A FORWARD -i eth0 -j ACCEPT iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
# no support for `ip_masquerade' on this system.ale iny vystup dostanem takto: # cat /proc/net/ip_conntrack
udp 17 164 src=10.254.9.172 dst=194.154.230.66 sport=1943 dport=53 packets=4 bytes=252 src=194.154.230.66 dst=10.254.9.172 sport=53 dport=1943 packets=4 bytes=503 [ASSURED] mark=0 use=1Nad takym niecim, ze v distribucii SuSE10.0 nie je v jadre skompilovane vsetko potrebne pre ip-maskaradu ani velmi neuvazujem. Kde by sa to mohlo teda spustat, ved aj v grafickej sprave firewalu je maskarada pristupna...nechapem. Ale vsetko je mozne, ved do SuSE10.0 som uz musel napriklad rucne pridavat /dev/lp0, aby bolo mozne pripojit obycajnu tlaciaren.
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.