質問編集履歴

2

tcpdumpコマンドの出力内容の修正とip routeコマンドの出力内容の追記

2019/11/25 12:11

投稿

TsubasaSato
TsubasaSato

スコア15

test CHANGED
File without changes
test CHANGED
@@ -56,19 +56,33 @@
56
56
 
57
57
  <Server2の情報>
58
58
 
59
- ・tcpdumpコマンドを実行した際の出力
59
+ ・tcpdumpコマンドを実行した際の出力 (修正)
60
60
 
61
- tsubasa@server3:~/tutorials/exercises/basic/solution$ sudo tcpdump -i eth1
61
+ root@server2:/home/tsubasa# tcpdump -i any icmp
62
62
 
63
63
  tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
64
64
 
65
- listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
65
+ listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
66
66
 
67
- 10:39:53.570324 IP 10.0.1.1 > server2: ICMP echo request, id 18503, seq 55, length 64
67
+ 12:07:27.170769 IP 10.0.1.1 > server2: ICMP echo request, id 18611, seq 137, length 64
68
68
 
69
- 10:39:54.594341 IP 10.0.1.1 > server2: ICMP echo request, id 18503, seq 56, length 64
69
+ 12:07:28.194847 IP 10.0.1.1 > server2: ICMP echo request, id 18611, seq 138, length 64
70
70
 
71
- 10:39:55.618373 IP 10.0.1.1 > server2: ICMP echo request, id 18503, seq 57, length 64
71
+ 12:07:29.218772 IP 10.0.1.1 > server2: ICMP echo request, id 18611, seq 139, length 64
72
+
73
+
74
+
75
+ ・ip routeコマンドを実行した際の出力 (追記)
76
+
77
+ root@server2:/home/tsubasa# ip route
78
+
79
+ default via 10.31.22.1 dev eno1 proto static
80
+
81
+ 10.0.1.0/24 dev eth1 proto kernel scope link src 10.0.1.2
82
+
83
+ 10.31.22.0/24 dev eno1 proto kernel scope link src 10.31.22.34
84
+
85
+
72
86
 
73
87
 
74
88
 

1

Server2でのファイアウォール設定を追記

2019/11/25 12:11

投稿

TsubasaSato
TsubasaSato

スコア15

test CHANGED
File without changes
test CHANGED
@@ -69,3 +69,25 @@
69
69
  10:39:54.594341 IP 10.0.1.1 > server2: ICMP echo request, id 18503, seq 56, length 64
70
70
 
71
71
  10:39:55.618373 IP 10.0.1.1 > server2: ICMP echo request, id 18503, seq 57, length 64
72
+
73
+
74
+
75
+ ・ファイアウォール設定 (追記)
76
+
77
+ tsubasa@server2:~/tutorials/exercises/basic/solution$ sudo iptables -L
78
+
79
+ Chain INPUT (policy ACCEPT)
80
+
81
+ target prot opt source destination
82
+
83
+
84
+
85
+ Chain FORWARD (policy ACCEPT)
86
+
87
+ target prot opt source destination
88
+
89
+
90
+
91
+ Chain OUTPUT (policy ACCEPT)
92
+
93
+ target prot opt source destination