U60 and masquerading

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 	Hello,

 	I'm trying to use iptables on a ULTRASparc U60 (smp) without any
 	success. I use the same version of iptables on several i386, an
 	U420R (kernel 2.4 SMP) and an U1E with succes...

 Root bohr:[~] > lsmod
 Module                  Size  Used by
 iptable_mangle          3328  0 
 autofs4                18632  1 
 ipt_TCPMSS              4800  0 
 ipt_tcpmss              3008  0 
 ipt_MASQUERADE          3844  1 
 iptable_nat             8708  1 
 ip_nat                 20824  2 ipt_MASQUERADE,iptable_nat
 ip_conntrack           60264  3 ipt_MASQUERADE,iptable_nat,ip_nat
 iptable_filter          3392  0 
 ip_tables              21184  6
 iptable_mangle,ipt_TCPMSS,ipt_tcpmss,ipt_MASQUERADE,iptable_nat,iptable_filter
 sg                     33720  0 
 sr_mod                 16940  0 
 cdrom                  40880  1 sr_mod
 usblp                  12928  0 
 parport_pc             39816  0 
 parport                41688  1 parport_pc
 Root bohr:[~] > iptables -L -n
 Chain INPUT (policy ACCEPT)
 target     prot opt source               destination         

 Chain FORWARD (policy ACCEPT)
 target     prot opt source               destination         

 Chain OUTPUT (policy ACCEPT)
 target     prot opt source               destination         
 Root bohr:[~] > iptables -t nat -L -n
 Chain PREROUTING (policy ACCEPT)
 target     prot opt source               destination         

 Chain POSTROUTING (policy ACCEPT)
 target     prot opt source               destination         
 MASQUERADE  all  --  192.168.0.0/24       0.0.0.0/0           

 Chain OUTPUT (policy ACCEPT)
 target     prot opt source               destination         
 Root bohr:[~] > cat /proc/sys/net/ipv4/ip_forward 
 1
 Root bohr:[~] > 

 192.168.0.100 is a i386 workstation. Its default gateway is
 192.168.0.128.

 192.168.0.128 is the second ethernet interface of my U60. Address of the
 first one is 10.0.0.1 and is used to be the support of ppp0.

 When I try to ping www.kernel.org from 192.168.0.200. I can see :
 Root bohr:[~] > tcpdump -i eth1 proto ICMP
 tcpdump: verbose output suppressed, use -v or -vv for full protocol
 decode
 listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
 18:04:56.333172 IP 192.168.0.100 > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 13056, length 64
 18:04:57.337379 IP 192.168.0.100 > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 13312, length 64
 18:04:58.341366 IP 192.168.0.100 > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 13568, length 64
 18:04:59.345455 IP 192.168.0.100 > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 13824, length 64

 4 packets captured
 8 packets received by filter
 0 packets dropped by kernel
 Root bohr:[~] > tcpdump -i ppp0 proto ICMP
 tcpdump: verbose output suppressed, use -v or -vv for full protocol
 decode
 listening on ppp0, link-type LINUX_SLL (Linux cooked), capture size 96
 bytes
 18:05:36.501017 IP bohr.systella.fr > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 23296, length 64
 18:05:36.712653 IP zeus-pub1.kernel.org > bohr.systella.fr: ICMP echo
 reply, id 53550, seq 23296, length 64
 18:05:37.505105 IP bohr.systella.fr > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 23552, length 64
 18:05:37.717251 IP zeus-pub1.kernel.org > bohr.systella.fr: ICMP echo
 reply, id 53550, seq 23552, length 64
 18:05:38.509186 IP bohr.systella.fr > zeus-pub1.kernel.org: ICMP echo
 request, id 53550, seq 23808, length 64
 18:05:38.723250 IP zeus-pub1.kernel.org > bohr.systella.fr: ICMP echo
 reply, id 53550, seq 23808, length 64

 6 packets captured
 12 packets received by filter
 0 packets dropped by kernel
 Root bohr:[~] > cat /var/lib/iptables/active 
 # Generated by iptables-save v1.2.7a on Tue Mar  4 10:43:40 2003
 *nat
 :PREROUTING ACCEPT [5:340]
 :POSTROUTING ACCEPT [0:0]
 :OUTPUT ACCEPT [334:24336]
 [334:24336] -A POSTROUTING -s 192.168.0.0/255.255.255.0 -j MASQUERADE 
 COMMIT
 # Completed on Tue Mar  4 10:43:40 2003
 # Generated by iptables-save v1.2.7a on Tue Mar  4 10:43:40 2003
 *filter
 :INPUT ACCEPT [3612:629789]
 :FORWARD ACCEPT [0:0]
 :OUTPUT ACCEPT [3708:560260]
 COMMIT
 # Completed on Tue Mar  4 10:43:40 2003
 Root bohr:[~] > 

	When I try to make a ping over the U60, I obtain :

 Root bohr:[~] > cat /proc/net/ip_conntrack | grep icmp
 icmp     1 29 src=192.168.0.100 dst=213.41.184.253 type=8 code=0 id=64616
 packets=2888 bytes=242592 [UNREPLIED] src=213.41.184.253 dst=213.41.140.153
 type=0 code=0 id=64616 packets=0 bytes=0 mark=0 use=1
 Root bohr:[~] > 

 	Strange, isn't it ?

 	Thus, all paquets taht come from 192.168.0.100 are routed by ppp0.
 	www.kernel.org answers to my ping, but my U60 doesn't transmet the
 	incoming paquet to 192.168.0.100. Why ? Any idea ?

 	Regards,

 	JKB


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux