Re: DNAT hiding routers behind it

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




No Linksys here, the firewall is a linux PC, the "router" is an Extreme Networks Summit 200 switch that acts like a router.


I do not think it matters. Point is that the router sends an icmp ttl-exceeded, which the firewall apparently considers part of the connection, and therefore does reverse DNAT on.

My problem is why it does that, and if it can be avoided.


Simon


Dick St.Peters skrev:
Simon Lodal writes:

I am traceroute'ing a DNAT'ed host. Surprisingly, all routers between the DNAT'ing firewall and the host appear as the IP address I am traceroute'ing. Is this intended? Can it be controlled in some way? (it is not necessarily bad)

Example:
traceroute to 217.116.235.62 (217.116.235.62), 30 hops max, 38 byte packets
 1  192.168.0.2 (192.168.0.2)  4.152 ms  0.875 ms  0.865 ms
 2  217.116.235.62 (217.116.235.62)  1.928 ms  1.272 ms  1.430 ms
 3  217.116.235.62 (217.116.235.62)  2.013 ms  2.338 ms  2.330 ms

Line 1: DNAT'ing firewall.
Line 2: A router.
Line 3: DNAT'ed host.


Is the router a small Linksys router?  They do this without being
behind a firewall or NAT box.

--
Dick St.Peters, stpeters@xxxxxxxxxxxxx


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux