• Willkommen im Linux Club - dem deutschsprachigen Supportforum für GNU/Linux. Registriere dich kostenlos, um alle Inhalte zu sehen und Fragen zu stellen.

[gelöst]openSuSE 11.2 - Routing funktioniert nicht

Hallo,

ich habe folgendes Problem mit meinem Linux-Rechner, der im internen Netz als Server und Router zum Internet fungiert:

Die angeschlossenen Windows-Rechner im internen Netz (eth1) können nicht per PING erreicht werden und folglich auch keine Verbindung zum Internet herstellen. Der Linux-Rechner selber kann über eth0 eine Verbindung zum Internet herstellen. Der Internetzugang selbst wird durch eine Fritz!Box aufgebaut, mit welcher der Linux-Rechner über eth0 verbunden ist.

In den Netzwerkeinstellungen habe ich IP Forwarding aktiviert. Ebenfalls ist in der Firewall Masquerading aktiviert. Dies sind die Einträge der Routing-Tabelle:
Kernel IP routing table
Code:
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.178.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 eth1
169.254.0.0     0.0.0.0         255.255.0.0     U     0      0        0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         192.168.178.1   0.0.0.0         UG    0      0        0 eth0

In der Firewall habe ich bei Masquerading keine Einträge hinterlegt. Muss hier noch etwas eingetragen werden?
Woran kann es liegen, dass ich keinen PING in das interne Netz schicken kann und der Linux-Rechner nicht per PING erreichbar ist?

Ich hoffe, mir kann jemand einen Tipp geben, was ich noch prüfen / einstellen kann.
Vielen Dank dafür schon einmal!

sandhase2001
 

framp

Moderator
Teammitglied
Rufe mal das Script mit den Parametern
Code:
./collectNWData.sh -frlc
als root auf und poste dann den Inhal der im selben Verzeichnis erstellten Datei collectNWData.txt.
 
OP
S

sandhase2001

Newbie
Hallo,

hier der Inhalt des Scripts:

Code:
collectNWData.sh V0.6.3.2 (Rev: 1.205, Build: 2010/03/13 15:50:37 UTC)
--- Which type of your network connection should be tested?
--- (1) Wired connection
--- What's the type of networktopology?
--- (3) DSL modem <---> LinuxRouter <---> LinuxClient
--- On which host is the script executed?
--- (2) LinuxRouter

--- NWEliza is analyzing the system for common network configuration errors ...

!!! CND0310W: Classic network configuration with ifup was detected. Configuration with knetworkmanager is much easier

--- Go to http://www.linux-tips-and-tricks.de/CND#English to get more detailed instructions 
--- about the error/warning messages and how to fix the problems on your own.

--- If you are unsuccessful then place the contents of file collectNWData.txt in the net
--- (see http://www.linux-tips-and-tricks.de/CND_UPL#English for links) 
--- and then paste the nopaste link on your favorite Linux forum.

==================================================================================================================
==================================================================================================================
*** uname -a
Linux linux-onoa 2.6.31.12-0.1-desktop #1 SMP PREEMPT 2010-01-27 08:20:11 +0100 i686 i686 i386 GNU/Linux
==================================================================================================================
*** cat /etc/*[-_]release || cat /etc/*[-_]version
/etc/SuSE-release
openSUSE 11.2 (i586)
VERSION = 11.2
==================================================================================================================
*** cat /etc/resolv | grep -i "nameserver"
nameserver 192.168.178.1
==================================================================================================================
*** cat /etc/hosts
127.0.0.1       localhost
127.0.0.2       linux-onoa.site linux-onoa
==================================================================================================================
*** route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.178.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 eth1
169.254.0.0     0.0.0.0         255.255.0.0     U     0      0        0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         192.168.178.1   0.0.0.0         UG    0      0        0 eth0
==================================================================================================================
*** arp
Address                  HWtype  HWaddress           Flags Mask            Iface
192.168.178.1            ether   ##:##:##:##:##:#1   C                     eth0
==================================================================================================================
*** ifconfig
eth0      Link encap:Ethernet  HWaddr ##:##:##:##:##:#2  
          inet addr:192.168.178.10  Bcast:192.168.178.255  Mask:255.255.255.0
          inet6 addr: fe80::201:2eff:fe2c:d74/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2060 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1983 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:2305791 (2.1 Mb)  TX bytes:282026 (275.4 Kb)
          Interrupt:21 Base address:0x8000 
eth1      Link encap:Ethernet  HWaddr ##:##:##:##:##:#3  
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)
          Interrupt:30 Base address:0x4000 
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:78 errors:0 dropped:0 overruns:0 frame:0
          TX packets:78 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:5140 (5.0 Kb)  TX bytes:5140 (5.0 Kb)
==================================================================================================================
*** ping tests
Ping of 195.135.220.3 OK
Ping of www.suse.de OK
==================================================================================================================
*** dhcpcd-test
eth0: DHCP server available
eth1: DHCP server available
==================================================================================================================
*** lspci
00:0a.0 Ethernet controller [0200]: nVidia Corporation MCP79 Ethernet [10de:0ab0] (rev b1)
05:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd. RTL8111/8168B PCI Express Gigabit Ethernet controller [10ec:8168] (rev 01)
==================================================================================================================
*** lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 002: ID 1532:0003 Razer USA, Ltd Krait Mouse
==================================================================================================================
*** hwinfo (filtered)
21: PCI 0a.0: 0200 Ethernet controller
  Model: "nVidia MCP79 Ethernet"
  Vendor: pci 0x10de "nVidia Corporation"
  Device: pci 0x0ab0 "MCP79 Ethernet"
  SubVendor: pci 0x19da "ZOTAC International (MCO) Ltd."
  SubDevice: pci 0xa119 
  Driver: "forcedeth"
  Driver Modules: "forcedeth"
  Device File: eth0
  Link detected: yes
    Driver Status: forcedeth is active
    Driver Activation Cmd: "modprobe forcedeth"
30: PCI 500.0: 0200 Ethernet controller
  Model: "Realtek RTL8111/8168B PCI Express Gigabit Ethernet controller"
  Vendor: pci 0x10ec "Realtek Semiconductor Co., Ltd."
  Device: pci 0x8168 "RTL8111/8168B PCI Express Gigabit Ethernet controller"
  SubVendor: pci 0x10ec "Realtek Semiconductor Co., Ltd."
  SubDevice: pci 0x8168 
  Driver: "r8169"
  Driver Modules: "r8169"
  Device File: eth1
  Link detected: no
    Driver Status: r8169 is active
    Driver Activation Cmd: "modprobe r8169"
==================================================================================================================
*** lsmod # (filtered)
| af_packet       | crc16           | dm_log          | dm_mirror       | dm_region_hash   |
| edd             | forcedeth       | fuse            | i2c_nforce2     | jbd2             |
| pci_hotplug     | r8169           | sg              | shpchp          | snd_hda_codec    |
| snd_hda_codec_nvhdmi| snd_hda_codec_realtek| snd_hda_intel   | snd_hwdep       | snd_seq_device   |
| sr_mod          | thermal         | thermal_sys     | wmi             |
==================================================================================================================
*** iptables -L -vn
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
==================================================================================================================
*** SuSE firewall configuration
FW_DEV_EXT="any eth0"
FW_DEV_INT="eth1"
FW_DEV_DMZ=""
FW_ROUTE="yes"
FW_MASQUERADE="yes"
FW_MASQ_DEV="zone:ext"
FW_MASQ_NETS="0/0"
FW_NOMASQ_NETS=""
FW_PROTECT_FROM_INT="no"
FW_SERVICES_EXT_TCP=""
FW_SERVICES_EXT_UDP=""
FW_SERVICES_EXT_IP=""
FW_SERVICES_EXT_RPC=""
FW_CONFIGURATIONS_EXT=""
FW_SERVICES_DMZ_TCP=""
FW_SERVICES_DMZ_UDP=""
FW_SERVICES_DMZ_IP=""
FW_SERVICES_DMZ_RPC=""
FW_CONFIGURATIONS_DMZ=""
FW_SERVICES_INT_TCP=""
FW_SERVICES_INT_UDP=""
FW_SERVICES_INT_IP=""
FW_SERVICES_INT_RPC=""
FW_CONFIGURATIONS_INT="samba-server"
FW_SERVICES_DROP_EXT=""
FW_SERVICES_DROP_DMZ=""
FW_SERVICES_DROP_INT=""
FW_SERVICES_REJECT_EXT=""
FW_SERVICES_REJECT_DMZ=""
FW_SERVICES_REJECT_INT=""
FW_SERVICES_ACCEPT_EXT=""
FW_SERVICES_ACCEPT_DMZ=""
FW_SERVICES_ACCEPT_INT=""
FW_SERVICES_ACCEPT_RELATED_EXT=""
FW_SERVICES_ACCEPT_RELATED_DMZ=""
FW_SERVICES_ACCEPT_RELATED_INT=""
FW_TRUSTED_NETS=""
FW_ALLOW_INCOMING_HIGHPORTS_TCP=""
FW_ALLOW_INCOMING_HIGHPORTS_UDP=""
FW_FORWARD=""
FW_FORWARD_REJECT=""
FW_FORWARD_DROP=""
FW_FORWARD_MASQ=""
FW_REDIRECT=""
FW_LOG_DROP_CRIT="yes"
FW_LOG_DROP_ALL="no"
FW_LOG_ACCEPT_CRIT="yes"
FW_LOG_ACCEPT_ALL="no"
FW_LOG_LIMIT=""
FW_LOG=""
FW_KERNEL_SECURITY="yes"
FW_STOP_KEEP_ROUTING_STATE="no"
FW_ALLOW_PING_FW="yes"
FW_ALLOW_PING_DMZ="no"
FW_ALLOW_PING_EXT="no"
FW_ALLOW_FW_SOURCEQUENCH=""
FW_ALLOW_FW_BROADCAST_EXT="no"
FW_ALLOW_FW_BROADCAST_INT="no"
FW_ALLOW_FW_BROADCAST_DMZ="no"
FW_IGNORE_FW_BROADCAST_EXT="yes"
FW_IGNORE_FW_BROADCAST_INT="no"
FW_IGNORE_FW_BROADCAST_DMZ="no"
FW_ALLOW_CLASS_ROUTING=""
FW_CUSTOMRULES=""
FW_REJECT=""
FW_REJECT_INT="yes"
FW_HTB_TUNE_DEV=""
FW_IPv6=""
FW_IPv6_REJECT_OUTGOING=""
FW_IPSEC_TRUST="no"
FW_ZONES=""
FW_ZONE_DEFAULT=""
FW_USE_IPTABLES_BATCH=""
FW_LOAD_MODULES="nf_conntrack_netbios_ns"
FW_FORWARD_ALWAYS_INOUT_DEV=""
FW_FORWARD_ALLOW_BRIDGING=""
FW_WRITE_STATUS=""
FW_RUNTIME_OVERRIDE=""
FW_LO_NOTRACK=""
==================================================================================================================
*** iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
==================================================================================================================
*** cat /etc/sysconfig/network/ifcfg-eth0 /etc/sysconfig/network/ifcfg-eth1 | egrep -v ".*=''"
BOOTPROTO='static'
IPADDR='192.168.178.10/24'
NAME='MCP79 Ethernet'
STARTMODE='auto'
USERCONTROL='no'
PREFIXLEN='24'
BOOTPROTO='static'
IPADDR='192.168.1.1/24'
NAME='RTL8111/8168B PCI Express Gigabit Ethernet controller'
STARTMODE='auto'
USERCONTROL='no'
PREFIXLEN='24'
==================================================================================================================
*** IP forwarding
1
==================================================================================================================
*** NWElizaStates
IF:eth0 IM:1 IF:eth1 IM:1 DI:2 dI:0 NIC:0 cNiC:1:0 NIC:0 cNiC:2:0 NI:0 cNI:0 PNG:0 DNS:0 MTU:1 NISS:0 IP6:0 KM:0 WLW:0 RTDT:SuSE
 

framp

Moderator
Teammitglied
Es sieht alles soweit Ok aus (Die FW muss aktiv sein - ist sie zum Zeitpunkt des Scriptlaufs nicht gewesen). Benutzt Du die IP Adresse oder einen Namen? Teste mal mit der IP Adresse ein ping.
Code:
ping 195.135.220.3
Das ist die IP von http://www.suse.de

U.U. ist was mit dem DNS Setup nicht Ok.

Nur um sicherzugehen: Vielleicht kannst Du das Script auch noch mal starten wenn die FW an ist und die Ausgabe posten.
 
OP
S

sandhase2001

Newbie
Vom SuSE-Rechner funktioniert der Ping ins Internet ohne weiteres. Aber aus dem internen Netz (192.168.1.0/24) kann ich keinen Ping absetzen. Weder vom Windows-Client erreiche ich den Linux-Rechner noch vom Linux-Rechner einen Windows-Client.

Hier nochmal das Script:

Code:
collectNWData.sh V0.6.3.2 (Rev: 1.205, Build: 2010/03/13 15:50:37 UTC)
--- Which type of your network connection should be tested?
--- (1) Wired connection
--- What's the type of networktopology?
--- (3) DSL modem <---> LinuxRouter <---> LinuxClient
--- On which host is the script executed?
--- (2) LinuxRouter

--- NWEliza is analyzing the system for common network configuration errors ...

!!! CND0230W: IPV6 enabled
!!! CND0310W: Classic network configuration with ifup was detected. Configuration with knetworkmanager is much easier

--- Go to http://www.linux-tips-and-tricks.de/CND#English to get more detailed instructions 
--- about the error/warning messages and how to fix the problems on your own.

--- If you are unsuccessful then place the contents of file collectNWData.txt in the net
--- (see http://www.linux-tips-and-tricks.de/CND_UPL#English for links) 
--- and then paste the nopaste link on your favorite Linux forum.

==================================================================================================================
==================================================================================================================
*** uname -a
Linux linux-onoa 2.6.31.12-0.1-desktop #1 SMP PREEMPT 2010-01-27 08:20:11 +0100 i686 i686 i386 GNU/Linux
==================================================================================================================
*** cat /etc/*[-_]release || cat /etc/*[-_]version
/etc/SuSE-release
openSUSE 11.2 (i586)
VERSION = 11.2
==================================================================================================================
*** cat /etc/resolv | grep -i "nameserver"
nameserver 192.168.178.1
==================================================================================================================
*** cat /etc/hosts
127.0.0.1       localhost
127.0.0.2       linux-onoa.site linux-onoa
==================================================================================================================
*** route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.178.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 eth1
169.254.0.0     0.0.0.0         255.255.0.0     U     0      0        0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         192.168.178.1   0.0.0.0         UG    0      0        0 eth0
==================================================================================================================
*** arp
Address                  HWtype  HWaddress           Flags Mask            Iface
192.168.178.1            ether   ##:##:##:##:##:#1   C                     eth0
==================================================================================================================
*** ifconfig
eth0      Link encap:Ethernet  HWaddr ##:##:##:##:##:#2  
          inet addr:192.168.178.10  Bcast:192.168.178.255  Mask:255.255.255.0
          inet6 addr: fe80::201:2eff:fe2c:d74/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:4296 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3796 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:4140428 (3.9 Mb)  TX bytes:635667 (620.7 Kb)
          Interrupt:21 Base address:0x2000 
eth1      Link encap:Ethernet  HWaddr ##:##:##:##:##:#3  
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)
          Interrupt:30 Base address:0x8000 
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:359 errors:0 dropped:0 overruns:0 frame:0
          TX packets:359 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:32307 (31.5 Kb)  TX bytes:32307 (31.5 Kb)
==================================================================================================================
*** ping tests
Ping of 195.135.220.3 OK
Ping of www.suse.de OK
==================================================================================================================
*** dhcpcd-test
eth0: DHCP server available
eth1: DHCP server available
==================================================================================================================
*** lspci
00:0a.0 Ethernet controller [0200]: nVidia Corporation MCP79 Ethernet [10de:0ab0] (rev b1)
05:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd. RTL8111/8168B PCI Express Gigabit Ethernet controller [10ec:8168] (rev 01)
==================================================================================================================
*** lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 002: ID 1532:0003 Razer USA, Ltd Krait Mouse
==================================================================================================================
*** hwinfo (filtered)
21: PCI 0a.0: 0200 Ethernet controller
  Model: "nVidia MCP79 Ethernet"
  Vendor: pci 0x10de "nVidia Corporation"
  Device: pci 0x0ab0 "MCP79 Ethernet"
  SubVendor: pci 0x19da "ZOTAC International (MCO) Ltd."
  SubDevice: pci 0xa119 
  Driver: "forcedeth"
  Driver Modules: "forcedeth"
  Device File: eth0
  Link detected: yes
    Driver Status: forcedeth is active
    Driver Activation Cmd: "modprobe forcedeth"
30: PCI 500.0: 0200 Ethernet controller
  Model: "Realtek RTL8111/8168B PCI Express Gigabit Ethernet controller"
  Vendor: pci 0x10ec "Realtek Semiconductor Co., Ltd."
  Device: pci 0x8168 "RTL8111/8168B PCI Express Gigabit Ethernet controller"
  SubVendor: pci 0x10ec "Realtek Semiconductor Co., Ltd."
  SubDevice: pci 0x8168 
  Driver: "r8169"
  Driver Modules: "r8169"
  Device File: eth1
  Link detected: no
    Driver Status: r8169 is active
    Driver Activation Cmd: "modprobe r8169"
==================================================================================================================
*** lsmod # (filtered)
| af_packet       | crc16           | dm_log          | dm_mirror       | dm_region_hash   |
| edd             | forcedeth       | fuse            | i2c_nforce2     | ide_cd_mod       |
| ide_gd_mod      | ip6t_LOG        | ip6t_REJECT     | ipt_MASQUERADE  | iptable_nat      |
| iptable_raw     | jbd2            | nf_conntrack_ipv4| nf_conntrack_netbios_ns| nf_nat           |
| pci_hotplug     | r8169           | sg              | shpchp          | snd_hda_codec    |
| snd_hda_codec_nvhdmi| snd_hda_codec_realtek| snd_hda_intel   | snd_hwdep       | snd_seq_device   |
| sr_mod          | st              | thermal         | thermal_sys     | wmi              |
| xt_NOTRACK      | xt_TCPMSS       | xt_limit        | xt_pkttype      | xt_state         |
| xt_tcpudp       |
==================================================================================================================
*** iptables -L -vn
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
  333 30527 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
 3876 4046K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED 
  549  117K input_int  all  --  eth1   *       0.0.0.0/0            0.0.0.0/0           
  502 58422 input_ext  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           
    0     0 input_ext  all  --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET ' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU 
    0     0 forward_int  all  --  eth1   *       0.0.0.0/0            0.0.0.0/0           
    0     0 forward_ext  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING ' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain OUTPUT (policy ACCEPT 11 packets, 548 bytes)
 pkts bytes target     prot opt in     out     source               destination         
  333 30527 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0           
 4627  712K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state NEW,RELATED,ESTABLISHED 
    9   444 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR ' 

Chain forward_ext (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 code 2 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 5 
    0     0 ACCEPT     all  --  eth0   eth1    0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast 
    0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT ' 
    0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT ' 
    0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT ' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain forward_int (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 code 2 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 5 
    0     0 ACCEPT     all  --  eth1   eth0    0.0.0.0/0            0.0.0.0/0           state NEW,RELATED,ESTABLISHED 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast 
    0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT ' 
    0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT ' 
    0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT ' 
    0     0 reject_func  all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain input_ext (2 references)
 pkts bytes target     prot opt in     out     source               destination         
   86 21050 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8 
   42  5885 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast 
   55  3300 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 
    0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 
    0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 
  374 31487 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain input_int (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  549  117K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain reject_func (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-proto-unreachable 
==================================================================================================================
*** SuSE firewall configuration
FW_DEV_EXT="any eth0"
FW_DEV_INT="eth1"
FW_DEV_DMZ=""
FW_ROUTE="yes"
FW_MASQUERADE="yes"
FW_MASQ_DEV="zone:ext"
FW_MASQ_NETS="0/0"
FW_NOMASQ_NETS=""
FW_PROTECT_FROM_INT="no"
FW_SERVICES_EXT_TCP=""
FW_SERVICES_EXT_UDP=""
FW_SERVICES_EXT_IP=""
FW_SERVICES_EXT_RPC=""
FW_CONFIGURATIONS_EXT=""
FW_SERVICES_DMZ_TCP=""
FW_SERVICES_DMZ_UDP=""
FW_SERVICES_DMZ_IP=""
FW_SERVICES_DMZ_RPC=""
FW_CONFIGURATIONS_DMZ=""
FW_SERVICES_INT_TCP=""
FW_SERVICES_INT_UDP=""
FW_SERVICES_INT_IP=""
FW_SERVICES_INT_RPC=""
FW_CONFIGURATIONS_INT="samba-server"
FW_SERVICES_DROP_EXT=""
FW_SERVICES_DROP_DMZ=""
FW_SERVICES_DROP_INT=""
FW_SERVICES_REJECT_EXT=""
FW_SERVICES_REJECT_DMZ=""
FW_SERVICES_REJECT_INT=""
FW_SERVICES_ACCEPT_EXT=""
FW_SERVICES_ACCEPT_DMZ=""
FW_SERVICES_ACCEPT_INT=""
FW_SERVICES_ACCEPT_RELATED_EXT=""
FW_SERVICES_ACCEPT_RELATED_DMZ=""
FW_SERVICES_ACCEPT_RELATED_INT=""
FW_TRUSTED_NETS=""
FW_ALLOW_INCOMING_HIGHPORTS_TCP=""
FW_ALLOW_INCOMING_HIGHPORTS_UDP=""
FW_FORWARD=""
FW_FORWARD_REJECT=""
FW_FORWARD_DROP=""
FW_FORWARD_MASQ=""
FW_REDIRECT=""
FW_LOG_DROP_CRIT="yes"
FW_LOG_DROP_ALL="no"
FW_LOG_ACCEPT_CRIT="yes"
FW_LOG_ACCEPT_ALL="no"
FW_LOG_LIMIT=""
FW_LOG=""
FW_KERNEL_SECURITY="yes"
FW_STOP_KEEP_ROUTING_STATE="no"
FW_ALLOW_PING_FW="yes"
FW_ALLOW_PING_DMZ="no"
FW_ALLOW_PING_EXT="no"
FW_ALLOW_FW_SOURCEQUENCH=""
FW_ALLOW_FW_BROADCAST_EXT="no"
FW_ALLOW_FW_BROADCAST_INT="no"
FW_ALLOW_FW_BROADCAST_DMZ="no"
FW_IGNORE_FW_BROADCAST_EXT="yes"
FW_IGNORE_FW_BROADCAST_INT="no"
FW_IGNORE_FW_BROADCAST_DMZ="no"
FW_ALLOW_CLASS_ROUTING=""
FW_CUSTOMRULES=""
FW_REJECT=""
FW_REJECT_INT="yes"
FW_HTB_TUNE_DEV=""
FW_IPv6=""
FW_IPv6_REJECT_OUTGOING=""
FW_IPSEC_TRUST="no"
FW_ZONES=""
FW_ZONE_DEFAULT=""
FW_USE_IPTABLES_BATCH=""
FW_LOAD_MODULES="nf_conntrack_netbios_ns"
FW_FORWARD_ALWAYS_INOUT_DEV=""
FW_FORWARD_ALLOW_BRIDGING=""
FW_WRITE_STATUS=""
FW_RUNTIME_OVERRIDE=""
FW_LO_NOTRACK=""
==================================================================================================================
*** iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         
MASQUERADE  all  --  anywhere             anywhere            

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
==================================================================================================================
*** cat /etc/sysconfig/network/ifcfg-eth0 /etc/sysconfig/network/ifcfg-eth1 | egrep -v ".*=''"
BOOTPROTO='static'
IPADDR='192.168.178.10/24'
NAME='MCP79 Ethernet'
STARTMODE='auto'
USERCONTROL='no'
PREFIXLEN='24'
BOOTPROTO='static'
IPADDR='192.168.1.1/24'
NAME='RTL8111/8168B PCI Express Gigabit Ethernet controller'
STARTMODE='auto'
USERCONTROL='no'
PREFIXLEN='24'
==================================================================================================================
*** IP forwarding
1
==================================================================================================================
*** NWElizaStates
IF:eth0 IM:1 IF:eth1 IM:1 DI:2 dI:0 NIC:0 cNiC:1:0 NIC:0 cNiC:2:0 NI:0 cNI:0 PNG:0 DNS:0 MTU:1 NISS:0 IP6:1 KM:0 WLW:0 RTDT:SuSE
 

framp

Moderator
Teammitglied
Zwei Dinge:

1) Du hast noch nicht gesagt ob der Ping mit der IP Adresse failed und/oder der Ping mit einem Netzwerknamen ;)
2)
!!! CND0230W: IPV6 enabled
Das hat sich auch schon oft als Bremser herausgestellt. Disable das doch mal.
 

prinzunix

Hacker
Mal eine blöde Frage:

hast Du in der FritzBox auch hinterlegt (Route eingetragen), dass er Deinen
Linux-Rechner (Router) benutzen soll, um mit Deinem Client zu kommunizieren?

Wenn dem nicht so ist, dann weiß die FritzBox nicht, wohin sie denn die
Pakete zurück zu Deinem Client schicken soll.

Bis denn,

Prinzunix
 

framp

Moderator
Teammitglied
Weder vom Windows-Client erreiche ich den Linux-Rechner noch vom Linux-Rechner einen Windows-Client.
und
eth1 Link encap:Ethernet HWaddr ##:##:##:##:##:#3
inet addr:192.168.1.1 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
Interrupt:30 Base address:0x4000
- also werden keine Daten über eth1 übertragen :???:

30: PCI 500.0: 0200 Ethernet controller
Model: "Realtek RTL8111/8168B PCI Express Gigabit Ethernet controller"
Vendor: pci 0x10ec "Realtek Semiconductor Co., Ltd."
Device: pci 0x8168 "RTL8111/8168B PCI Express Gigabit Ethernet controller"
SubVendor: pci 0x10ec "Realtek Semiconductor Co., Ltd."
SubDevice: pci 0x8168
Driver: "r8169"
Driver Modules: "r8169"
Device File: eth1
Link detected: no
Driver Status: r8169 is active
Driver Activation Cmd: "modprobe r8169"

Link detected: no

Ist Dein Verbindungskabel an eth1 OK? Benutze testweise mal ein anderes. Oder hast Du aus Versehen ein CrossoverKabel benutzt?
 
OP
S

sandhase2001

Newbie
hmm... Manchmal sind es dann doch die einfachsten Dinge, nur merkt man es nicht. :irre:
Bin wohl einer defekten Netzwerkdose zum Opfer gefallen. Aber man lernt dazu, das Script kannte ich bisher noch nicht.

Vielen Dank für eure Hilfe!!
 

framp

Moderator
Teammitglied
sandhase2001 schrieb:
... Bin wohl einer defekten Netzwerkdose zum Opfer gefallen. ...
Kann jedem passieren ;) Der Test ob der Link aktiv ist ist relativ leicht von dem Script auszuführen. Ich werde ihn einbauen und eine entsprechende Fehlermeldung erzeugen.
 
Oben