/l3/users/eb/2009/linux13/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 :36 :37 :38 :39 :40 :41 :42 :43 :44 :45 :46 :47 :48 :49 :50 :51 :52 :53 :54 :55 :56 :57 :58 :59 :60 :61 :62 :63 :64 :65 :66 :67 :68 :69 :70 :71 :72 :73 :74 :75 :76 |
|
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:1b:fc:c1:52:e8 inet addr:192.168.15.13 Bcast:192.168.15.255 Mask:255.255.255.0 inet6 addr: fe80::21b:fcff:fec1:52e8/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:8409 errors:0 dropped:0 overruns:0 frame:0 TX packets:6375 errors:0 dropped:0 overruns:0 carrier:6 collisions:0 txqueuelen:1000 RX bytes:1951060 (1.8 MiB) TX bytes:486152 (474.7 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:42 errors:0 dropped:0 overruns:0 frame:0 TX packets:42 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:42473 (41.4 KiB) TX bytes:42473 (41.4 KiB) |
#ifconfig eth0:1 192.168.108.1
|
#route
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.108.0 * 255.255.255.0 U 0 0 0 eth0 192.168.15.0 * 255.255.255.0 U 0 0 0 eth0 default 192.168.15.254 0.0.0.0 UG 0 0 0 eth0 |
#ping 192.168.108.2
PING 192.168.108.2 (192.168.108.2) 56(84) bytes of data. From 192.168.108.1 icmp_seq=1 Destination Host Unreachable From 192.168.108.1 icmp_seq=2 Destination Host Unreachable From 192.168.108.1 icmp_seq=3 Destination Host Unreachable ^C --- 192.168.108.2 ping statistics --- 6 packets transmitted, 0 received, +3 errors, 100% packet loss, time 5032ms , pipe 3 |
#route
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.108.0 * 255.255.255.0 U 0 0 0 eth0 192.168.15.0 * 255.255.255.0 U 0 0 0 eth0 default 192.168.15.254 0.0.0.0 UG 0 0 0 eth0 |
#vi /proc/sys/net/ipv4/ip_forward
|
#ifconfig eth0:1 192.168.107.1
|
#vi /etc/sysctl.conf
|
#ping 192.168.107.1
PING 192.168.107.1 (192.168.107.1) 56(84) bytes of data. 64 bytes from 192.168.107.1: icmp_seq=1 ttl=64 time=0.022 ms 64 bytes from 192.168.107.1: icmp_seq=2 ttl=64 time=0.006 ms ^C --- 192.168.107.1 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.006/0.014/0.022/0.008 ms |
#ping 192.168.107.2
PING 192.168.107.2 (192.168.107.2) 56(84) bytes of data. From 192.168.107.1 icmp_seq=1 Destination Host Unreachable From 192.168.107.1 icmp_seq=2 Destination Host Unreachable From 192.168.107.1 icmp_seq=3 Destination Host Unreachable ^C --- 192.168.107.2 ping statistics --- 6 packets transmitted, 0 received, +3 errors, 100% packet loss, time 5030ms , pipe 3 |
#ifconfig
eth0 Link encap:Ethernet HWaddr 00:1b:fc:c1:52:e8 inet addr:192.168.15.13 Bcast:192.168.15.255 Mask:255.255.255.0 inet6 addr: fe80::21b:fcff:fec1:52e8/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:9763 errors:0 dropped:0 overruns:0 frame:0 TX packets:7063 errors:0 dropped:0 overruns:0 carrier:6 collisions:0 txqueuelen:1000 RX bytes:2350217 (2.2 MiB) TX bytes:541541 (528.8 KiB) eth0:1 Link encap:Ethernet HWaddr 00:1b:fc:c1:52:e8 inet addr:192.168.107.1 Bcast:192.168.107.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:58 errors:0 dropped:0 overruns:0 frame:0 TX packets:58 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:44153 (43.1 KiB) TX bytes:44153 (43.1 KiB) |
#route
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.15.0 * 255.255.255.0 U 0 0 0 eth0 192.168.107.0 * 255.255.255.0 U 0 0 0 eth0 default 192.168.15.254 0.0.0.0 UG 0 0 0 eth0 |
#ssh 10.0.35.100
ssh: connect to host 10.0.35.100 port 22: Connection refused |
#ssh 10.0.35.100
ssh: connect to host 10.0.35.100 port 22: Connection refused |
#route
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.15.0 * 255.255.255.0 U 0 0 0 eth0 192.168.107.0 * 255.255.255.0 U 0 0 0 eth0 default 192.168.15.254 0.0.0.0 UG 0 0 0 eth0 |
#cat /proc/sys/net/ipv4/ip_forward
1 |
#ssh 10.0.35.100
root@10.0.35.100's password: Linux linux0 2.6.18-6-xen-686 #1 SMP Sun Feb 10 22:43:13 UTC 2008 i686 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Mon Jun 1 17:29:18 2009 from linux6.unix.nt l3-agent is already running: pid=1765; pidfile=/root/.lilalo/l3-agent.pid |
#ping 192.168.107.2
PING 192.168.107.2 (192.168.107.2) 56(84) bytes of data. From 192.168.107.1 icmp_seq=1 Destination Host Unreachable From 192.168.107.1 icmp_seq=2 Destination Host Unreachable From 192.168.107.1 icmp_seq=3 Destination Host Unreachable ^C --- 192.168.107.2 ping statistics --- 6 packets transmitted, 0 received, +3 errors, 100% packet loss, time 5033ms , pipe 3 |
#route
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.15.0 * 255.255.255.0 U 0 0 0 eth0 192.168.107.0 * 255.255.255.0 U 0 0 0 eth0 default 192.168.15.254 0.0.0.0 UG 0 0 0 eth0 |
#ip route
192.168.15.0/24 dev eth0 proto kernel scope link src 192.168.15.13 192.168.107.0/24 dev eth0 proto kernel scope link src 192.168.107.1 default via 192.168.15.254 dev eth0 |
#ping 192.168.107.2
PING 192.168.107.2 (192.168.107.2) 56(84) bytes of data. From 192.168.107.1 icmp_seq=1 Destination Host Unreachable From 192.168.107.1 icmp_seq=2 Destination Host Unreachable From 192.168.107.1 icmp_seq=3 Destination Host Unreachable ^C --- 192.168.107.2 ping statistics --- 5 packets transmitted, 0 received, +3 errors, 100% packet loss, time 4022ms , pipe 3 |
#ifconfig -a
eth0 Link encap:Ethernet HWaddr 00:1b:fc:c1:52:e8 inet addr:192.168.15.13 Bcast:192.168.15.255 Mask:255.255.255.0 inet6 addr: fe80::21b:fcff:fec1:52e8/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:10663 errors:0 dropped:0 overruns:0 frame:0 TX packets:7742 errors:0 dropped:0 overruns:0 carrier:6 collisions:0 txqueuelen:1000 RX bytes:2473331 (2.3 MiB) TX bytes:605600 (591.4 KiB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:72 errors:0 dropped:0 overruns:0 frame:0 TX packets:72 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:45649 (44.5 KiB) TX bytes:45649 (44.5 KiB) |
#vconfig add eth0 107
WARNING: Could not open /proc/net/vlan/config. Maybe you need to load the 8021q module, or maybe you are not using PROCFS?? Added VLAN with VID == 107 to IF -:eth0:- |
#ifconfig eth0.107 192.168.107.1
|
#ping 192.168.107.2
PING 192.168.107.2 (192.168.107.2) 56(84) bytes of data. 64 bytes from 192.168.107.2: icmp_seq=1 ttl=64 time=1.21 ms 64 bytes from 192.168.107.2: icmp_seq=2 ttl=64 time=0.217 ms ^C --- 192.168.107.2 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 0.217/0.714/1.212/0.498 ms |
#route
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.15.0 * 255.255.255.0 U 0 0 0 eth0 192.168.107.0 * 255.255.255.0 U 0 0 0 eth0.107 default 192.168.15.254 0.0.0.0 UG 0 0 0 eth0 |
#exit
exit Connection to 10.0.35.100 closed. |
#openvt
|
#ssh 10.0.35.100
root@10.0.35.100's password: Linux linux0 2.6.18-6-xen-686 #1 SMP Sun Feb 10 22:43:13 UTC 2008 i686 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Tue Jun 2 10:05:01 2009 from linux11.unix.nt l3-agent is already running: pid=1765; pidfile=/root/.lilalo/l3-agent.pid |
#tcpdump -i eth0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 10:05:35.892890 ARP, Request who-has 192.168.107.2 tell 192.168.107.1, length 28 10:05:35.893110 ARP, Reply 192.168.107.2 is-at 00:1b:fc:7d:bd:0e (oui Unknown), length 46 10:05:35.894561 IP linux13.53256 > 10.0.35.1.domain: 6307+ PTR? 2.107.168.192.in-addr.arpa. (44) 10:05:35.894986 IP 10.0.35.1.domain > linux13.53256: 6307 NXDomain 0/1/0 (121) 10:05:35.895057 IP linux13.51139 > 10.0.35.1.domain: 49358+ PTR? 1.107.168.192.in-addr.arpa. (44) 10:05:35.953224 IP 10.0.35.1.domain > linux13.51139: 49358 NXDomain 0/1/0 (121) 10:05:35.953347 IP linux13.48802 > 10.0.35.1.domain: 27425+ PTR? 1.35.0.10.in-addr.arpa. (40) 10:05:35.953633 IP 10.0.35.1.domain > linux13.48802: 27425 NXDomain 0/1/0 (117) ... 10:05:41.612255 IP 10.0.35.100.ssh > 192.168.107.2.50456: Flags [P.], seq 1985:2129, ack 96, win 857, options [nop,nop,TS val 17195325 ecr 22250330], length 144 10:05:41.612456 IP 192.168.107.2.50456 > 10.0.35.100.ssh: Flags [.], ack 2129, win 655, options [nop,nop,TS val 22250333 ecr 17195325], length 0 10:05:41.612459 IP 192.168.107.2.50456 > 10.0.35.100.ssh: Flags [.], ack 2129, win 655, options [nop,nop,TS val 22250333 ecr 17195325], length 0 10:05:49.691654 00:15:60:7a:63:80 (oui Unknown) > 09:00:09:00:00:67 (oui Unknown) Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 99 10:06:11.518987 LLDP, name ProCurve Switch 3400cl-48G, length 166 [|LLDP] ^C 133 packets captured 133 packets received by filter 0 packets dropped by kernel |
#tcpdump -n eth0
tcpdump: syntax error |
#tcpdump -n
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 10:06:29.419868 IP 192.168.15.13.42423 > 10.0.35.1.53: 49134+ A? xgu.ru. (24) 10:06:29.420191 IP 10.0.35.1.53 > 192.168.15.13.42423: 49134 1/3/0 A 194.150.93.78 (106) 10:06:29.420320 IP 192.168.15.13.34713 > 194.150.93.78.18030: Flags [S], seq 3055099370, win 5840, options [mss 1460,sackOK,TS val 16647768 ecr 0,nop,wscale 6], length 0 10:06:29.427217 IP 194.150.93.78.18030 > 192.168.15.13.34713: Flags [S.], seq 386815051, ack 3055099371, win 5792, options [mss 1460,sackOK,TS val 687592747 ecr 16647768,nop,wscale 7], length 0 10:06:29.427231 IP 192.168.15.13.34713 > 194.150.93.78.18030: Flags [.], ack 1, win 92, options [nop,nop,TS val 16647770 ecr 687592747], length 0 10:06:29.427306 IP 192.168.15.13.34713 > 194.150.93.78.18030: Flags [P.], seq 1:581, ack 1, win 92, options [nop,nop,TS val 16647770 ecr 687592747], length 580 10:06:29.427342 IP 192.168.15.13.34713 > 194.150.93.78.18030: Flags [F.], seq 581, ack 1, win 92, options [nop,nop,TS val 16647770 ecr 687592747], length 0 10:06:29.435955 IP 194.150.93.78.18030 > 192.168.15.13.34713: Flags [.], ack 1, win 46, options [nop,nop,TS val 687592749 ecr 16647770,nop,nop,sack 1 {581:582}], length 0 ... 10:06:33.434249 IP 192.168.107.2.50660 > 213.254.12.146.5222: Flags [.], ack 315, win 1002, options [nop,nop,TS val 22263288 ecr 857095865], length 0 10:06:33.434252 IP 192.168.107.2.50660 > 213.254.12.146.5222: Flags [.], ack 315, win 1002, options [nop,nop,TS val 22263288 ecr 857095865], length 0 10:06:38.432886 ARP, Request who-has 192.168.107.2 tell 192.168.107.1, length 28 10:06:38.433106 ARP, Reply 192.168.107.2 is-at 00:1b:fc:7d:bd:0e, length 46 10:06:41.695274 LLDP, name ProCurve Switch 3400cl-48G, length 166 [|LLDP] ^C 24 packets captured 24 packets received by filter 0 packets dropped by kernel |
#tcpdump linux14 192.168.15.14
tcpdump: syntax error |
#tcpdump linux14 192.168.107.2
tcpdump: syntax error |
#tcpdump host 192.168.107.2
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 10:08:20.562820 IP linux9.unix.nt > 192.168.107.2: ICMP echo request, id 3090, seq 1, length 64 10:08:20.562825 IP linux9.unix.nt > 192.168.107.2: ICMP echo request, id 3090, seq 1, length 64 10:08:20.563027 IP 192.168.107.2 > linux9.unix.nt: ICMP echo reply, id 3090, seq 1, length 64 10:08:20.563030 IP 192.168.107.2 > linux9.unix.nt: ICMP echo reply, id 3090, seq 1, length 64 10:08:21.309570 IP 192.168.107.2.41122 > 192.168.107.1.ssh: Flags [S], seq 1784430122, win 5840, options [mss 1460,sackOK,TS val 22290257 ecr 0,nop,wscale 6], length 0 10:08:21.309585 IP 192.168.107.1.ssh > 192.168.107.2.41122: Flags [S.], seq 531798664, ack 1784430123, win 5792, options [mss 1460,sackOK,TS val 16675741 ecr 22290257,nop,wscale 6], length 0 10:08:21.309979 IP 192.168.107.2.41122 > 192.168.107.1.ssh: Flags [.], ack 1, win 92, options [nop,nop,TS val 22290257 ecr 16675741], length 0 10:08:21.316734 IP 192.168.107.1.ssh > 192.168.107.2.41122: Flags [P.], seq 1:36, ack 1, win 91, options [nop,nop,TS val 16675742 ecr 22290257], length 35 ... 10:08:21.317867 IP 192.168.107.1.ssh > 192.168.107.2.41122: Flags [P.], seq 36:820, ack 828, win 116, options [nop,nop,TS val 16675743 ecr 22290259], length 784 10:08:21.318198 IP 192.168.107.2.41122 > 192.168.107.1.ssh: Flags [P.], seq 828:852, ack 820, win 116, options [nop,nop,TS val 22290259 ecr 16675743], length 24 10:08:21.320844 IP 192.168.107.1.ssh > 192.168.107.2.41122: Flags [P.], seq 820:972, ack 852, win 116, options [nop,nop,TS val 16675743 ecr 22290259], length 152 10:08:21.323186 IP 192.168.107.2.41122 > 192.168.107.1.ssh: Flags [P.], seq 852:996, ack 972, win 141, options [nop,nop,TS val 22290260 ecr 16675743], length 144 10:08:21.340219 IP 192.168.107.1.ssh > 192.168.107.2.41122: Flags [P.], seq 972:1692, ack 996, win 140, options [nop,nop,TS val 16675748 ecr 22290260], length 720 10:08:21.377065 IP 192.168.107.2.41122 > 192.168.107.1.ssh: Flags [.], ack 1692, win 165, options [nop,nop,TS val 22290274 ecr 16675748], length 0 ^C 19 packets captured 19 packets received by filter 0 packets dropped by kernel |
#ssh 192.168.107.2
The authenticity of host '192.168.107.2 (192.168.107.2)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '192.168.107.2' (RSA) to the list of known hosts. Linux linux14 2.6.29-2-686 #1 SMP Sun May 17 17:56:29 UTC 2009 i686 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Mon Jun 1 14:33:11 2009 l3-agent is already running: pid=11361; pidfile=/root/.lilalo/l3-agent.pid |
#tcpdump -i eth0
10:08:52.309373 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 30176:30384, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 208 10:08:52.309385 IP 192.168.107.1.54889 > 192.168.107.2.ssh: Flags [.], ack 28992, win 1002, options [nop,nop,TS val 16683576 ecr 22298092], length 0 10:08:52.309443 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 30384:30736, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 352 10:08:52.309498 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 30736:30944, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 208 10:08:52.309553 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 30944:31152, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 208 10:08:52.309592 IP 192.168.107.1.54889 > 192.168.107.2.ssh: Flags [.], ack 29968, win 1002, options [nop,nop,TS val 16683576 ecr 22298092], length 0 10:08:52.309608 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 31152:31360, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 208 10:08:52.309676 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 31360:31712, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 352 10:08:52.309732 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 31712:31920, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 208 10:08:52.309788 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 31920:32128, ack 1, win 239, options [nop,nop,TS val 22298092 ecr 16683576], length 208 ... 10:08:52.316760 IP 192.168.107.1.54889 > 192.168.107.2.ssh: Flags [.], ack 55680, win 1002, options [nop,nop,TS val 16683578 ecr 22298094], length 0 10:08:52.316816 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 57216:57568, ack 1, win 239, options [nop,nop,TS val 22298094 ecr 16683578], length 352 10:08:52.316873 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 57568:57776, ack 1, win 239, options [nop,nop,TS val 22298094 ecr 16683578], length 208 10:08:52.316929 IP 192.168.107.2.ssh > 192.168.107.1.54889: Flags [P.], seq 57776:57984, ack 1, win 239, optio |