Re: problem with (incorrectly?) INVALID packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/15/06 05:34, Mike Williams wrote:

<really big snip>

Routing table now:
# route -n Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
90.1...1.64    0.0.0.0         255.255.255.224 U     0      0        0 bond0
192.168.131.0   0.0.0.0         255.255.255.0   U     0      0        0 bond1
192.168.22.0    90.1...1.69    255.255.255.0   UG    0      0        0 bond0
192.168.128.0   0.0.0.0         255.255.255.0   U     0      0        0 bond3
192.168.0.0     90.1...1.69    255.255.255.0   UG    0      0        0 bond0
192.168.30.0    90.1...1.69    255.255.255.0   UG    0      0        0 bond0
192.168.136.0   0.0.0.0         255.255.255.0   U     0      0        0 bond2
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         90.1...1.69    0.0.0.0         UG    0      0        0 bond0

Routing table previously:
# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
90.1...1.64    0.0.0.0         255.255.255.224 U     0      0        0 br0
192.168.131.0   0.0.0.0         255.255.255.0   U     0      0        0 bond1
192.168.22.0    90.1...1.69    255.255.255.0   UG    0      0        0 br0
192.168.128.0   0.0.0.0         255.255.255.0   U     0      0        0 bond3
192.168.0.0     90.1...1.69    255.255.255.0   UG    0      0        0 br0
192.168.30.0    90.1...1.69    255.255.255.0   UG    0      0        0 br0
192.168.136.0   0.0.0.0         255.255.255.0   U     0      0        0 bond2
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         90.1...1.69    0.0.0.0         UG    1000   0        0 br0

Sorry, if I have missed it, but which system are these routing tables from? Bridge or LFW?

# uname -r
2.6.17-hardened-r1
# zgrep BRIDGE_NETFILTER /proc/config.gz
CONFIG_BRIDGE_NETFILTER=y

This means that you will be able to use IPTables to filter your bridged traffic. Which as I think about it, with out seeing your full IPTables rule set, may be the reason some of your packets are having their state incorrectly identified. Can we see a full iptables-save output?



Grant. . . .


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux