Re: L2 NAT

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/14/2008 10:34 AM, ivan wrote:
I need to connect three devices via ethernet, through a switch, to the same tftp server. The problem is that these devices have the same IPs, i.e. 192.168.0.181, and when I address to or get data from one of them, I can't tell which device I'm actually talking to. The devices are three items of the same product, and their IP cannot be changed.

Do the devices ever initiate connections to your server or just respond to connections that the server initiates?

If it is your server initiating connections, you might be able to statically set arp entries for each device on it's own bogus IP. By doing this you should be able to talk to each bogus IP and have the ethernet frames go to the proper device. If the IP stack / software on each device is simple enough, you can probably talk to it with the incorrect destination IP. Though I'm not 100% sure what the returning packet would be like. But it is a direction to look.

I have implemented a perl script that changes the ARP table in tftp server side, but I need a stronger solution.

*nod*

I was thinking on developing a sort of L2 NAT which could change the IP source address of a package according to its MAC address, and put it in the middle of the tftp server and the devices.

You might be able to use Bridge NetFilter extensions on a box between the three devices and the server to be able to NAT the IPs of the traffic.

You could choose what source IP to SNAT traffic to based on the source MAC address. If you send the new ethernet frame out with the original source MAC address your server will have the proper MAC address and a spoofed IP to know where the packet came from.

Your server will have to reply to a MAC address, probably the real MAC address of the device but with a spoofed IP. So the bridge will have to DNAT the traffic based on the destination MAC address.

This should take care of packets leaving the devices going to the server.

You will need to watch for ARP queries from the network for the spoofed IPs of the devices and have the bridge send the ARP reply with the correct MAC addresses and the spoofed IPs.

Using the current iptables command can I set up this?? or I need to develop my own kernel module???

I think you might be able to pull it off with a combination of IPTables and EBTables.

If you have any idea please let me know.

See what you think of the above ideas.



Grant. . . .
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux