[plug] Still not able to route to adsl
bob
bob at fots.org.au
Sat May 1 19:48:42 WST 2004
On Saturday 01 May 2004 19:18, Matt Kemner wrote:
> On Sat, 1 May 2004, quoth bob:
> > Ok, some success ! :). I can ping 192.168.1/24 from 192.168.0/24 (but
> > still can't see out when I set the ADSL as the default route)
>
> It's a good start :)
Yes, most promising after a frustrating couple of days :).
> > This is now sort of behaving like it can't resolve IPs outside the LAN
> > (once I change the default route to gw via 192.168.1.1). Some thing I
> > should mention is that I'm running a DNS on the gateway. Is there any
> > config-fu I should know ?
>
> Can you ping IPs? That will tell you if it's a DNS issue or something
> else.
>
> eg try pinging 202.72.177.62 (spark.plug.linux.org.au) from a .0.x host
>
> It may also be worth running "tcpdump -lnfi eth1 icmp" on your gateway to
> check the packets are going where they should. The same for eth0 and ppp0
> may help too, if the packets aren't going where you expect :)
I get traffic on eth1
tcpdump gives stuff like
19:22:35.870650 192.168.0.111 > 202.72.177.62: icmp: echo request (DF)
Its stopping at the NB1300 (or going out and not returning -hard to say
which, the leds on the NB1300 are not that informative)
(just checked... yes it does ping via ppp0 :)
Hmm... pinging the ADSL assigned IP from spark is VERY slow. I would have
expected much better than min/avg/max = 1041.3/1595.5/2040.1 ms to a
westnet IP#
> > Interesting... although I can ping 192.168.1.1 from 192.168.0/24 I
> > can't access the web config.
>
> That may be a security feature on the router - only allow access to the
> config from "local" hosts. "It's a feature, not a bug!" :)
Could be... though that may be a bit smarter than it actually is.
> > 'Sok. :). I'd still like to know how to definitively check for
> > masquerading/SNAT. Would doing both routing and SNAT be bad?
>
> iptables -t nat -vnxL
> look for -j SNAT or -j MASQUERADE
=================================
iptables -t nat -vnxL
Chain PREROUTING (policy ACCEPT 1248 packets, 82917 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 653 packets, 39867 bytes)
pkts bytes target prot opt in out source
destination
59 4468 MASQUERADE all -- * ppp0 192.168.0.0/24
0.0.0.0/0
60 4560 MASQUERADE all -- * ppp0 192.168.1.0/24
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 691 packets, 43085 bytes)
pkts bytes target prot opt in out source
destination
==============================
No -j SNAT or -j MASQUERADE !?
Looks to me like 192.168.0.0/24 and 192.168.1.0/24 are masq'd out ppp0
though (yes?)
> Regards,
>
> - Matt
Thanks for following this up. Much appreciated.
--
I'm going to raise an issue and stick it in your ear.
-- John Foreman
More information about the plug
mailing list