Hello,
On Tue, 16 Oct 2001, Djamil ESSAISSI wrote:
> fx0:~# tcpdump -ln -i eth0 host 212.43.218.152
> tcpdump: listening on eth0
> 13:00:35.381118 [|tcp] (DF) (ipip)
> 13:06:09.047160 [|tcp] (DF) (ipip)
> 13:06:21.047999 [|tcp] (DF) (ipip)
> 13:06:45.058544 [|tcp] (DF) (ipip)
> 13:07:33.052832 [|tcp] (DF) (ipip)
What is the tunl0/rp_filter value in the RS?
Set /proc/sys/net/ipv4/conf/tunl0/rp_filter to 0
Then try this command:
ip route get to 212.43.218.154 from 193.252.175.157 iif tunl0
it should work with rp_filter=0 (but then think for possible
src addr spoofing from attackers). When you see that RS replies to
client make the test with traceroute to see whether the RS's gateway
passes the packets to client.
Regards
--
Julian Anastasov <ja@xxxxxx>
|