Unix-/Linux Netz: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
Zeile 11: Zeile 11:
  
 
{{#drawio:ul2}}
 
{{#drawio:ul2}}
 +
 +
=TCPDUMP auf rechter Firewall mit und ohne IP FORWARDING=
 +
;ip_forward an
 +
*echo 1 > /proc/sys/net/ip4/ip_forward
 +
;äussere Schnittstelle
 +
*tcpdump -n -c 2  -i enp0s8 icmp
 +
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
 +
listening on enp0s8, link-type EN10MB (Ethernet), snapshot length 262144 bytes
 +
09:12:55.057180 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 500, length 64
 +
09:12:55.057909 IP 10.0.22.21 > 10.0.21.21: ICMP echo reply, id 11437, seq 500, length 64
 +
2 packets captured
 +
2 packets received by filter
 +
0 packets dropped by kernel
 +
;innere Schnittstelle
 +
*tcpdump -n -c 2  -i enp0s8 icmp
 +
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
 +
listening on enp0s8, link-type EN10MB (Ethernet), snapshot length 262144 bytes
 +
09:12:55.057180 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 500, length 64
 +
09:12:55.057909 IP 10.0.22.21 > 10.0.21.21: ICMP echo reply, id 11437, seq 500, length 64
 +
2 packets captured
 +
2 packets received by filter
 +
0 packets dropped by kernel
 +
;ip_forward aus
 +
*echo 0 > /proc/sys/net/ip4/ip_forward
 +
;äussere Schnittstelle
 +
*tcpdump -n -c 2  -i enp0s3 icmp
 +
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
 +
listening on enp0s3, link-type EN10MB (Ethernet), snapshot length 262144 bytes
 +
09:13:54.225813 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 559, length 64
 +
09:13:55.249847 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 560, length 64
 +
2 packets captured
 +
2 packets received by filter
 +
0 packets dropped by kernel
 +
;innere Schnittstelle
 +
*tcpdump -n -c 2  -i enp0s8 icmp
 +
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
 +
listening on enp0s8, link-type EN10MB (Ethernet), snapshot length 262144 bytes

Version vom 13. September 2022, 07:17 Uhr

Vorarbeiten

Hostadapter

  • File
    • Host Network Manager
      • Create

Unix-linux.png

Schaubild


TCPDUMP auf rechter Firewall mit und ohne IP FORWARDING

ip_forward an
  • echo 1 > /proc/sys/net/ip4/ip_forward
äussere Schnittstelle
  • tcpdump -n -c 2 -i enp0s8 icmp
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp0s8, link-type EN10MB (Ethernet), snapshot length 262144 bytes
09:12:55.057180 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 500, length 64
09:12:55.057909 IP 10.0.22.21 > 10.0.21.21: ICMP echo reply, id 11437, seq 500, length 64
2 packets captured
2 packets received by filter 
0 packets dropped by kernel
innere Schnittstelle
  • tcpdump -n -c 2 -i enp0s8 icmp
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp0s8, link-type EN10MB (Ethernet), snapshot length 262144 bytes
09:12:55.057180 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 500, length 64
09:12:55.057909 IP 10.0.22.21 > 10.0.21.21: ICMP echo reply, id 11437, seq 500, length 64
2 packets captured
2 packets received by filter
0 packets dropped by kernel
ip_forward aus
  • echo 0 > /proc/sys/net/ip4/ip_forward
äussere Schnittstelle
  • tcpdump -n -c 2 -i enp0s3 icmp
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp0s3, link-type EN10MB (Ethernet), snapshot length 262144 bytes
09:13:54.225813 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 559, length 64
09:13:55.249847 IP 10.0.21.21 > 10.0.22.21: ICMP echo request, id 11437, seq 560, length 64
2 packets captured
2 packets received by filter
0 packets dropped by kernel
innere Schnittstelle
  • tcpdump -n -c 2 -i enp0s8 icmp
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp0s8, link-type EN10MB (Ethernet), snapshot length 262144 bytes