Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #########HOST########
- Software
- OS Version: RHEL - 7 - 1.1503.el7.centos.2.8
- Kernel Version: 3.10.0 - 229.14.1.el7.x86_64
- KVM Version: 3.10.0 - 229.14.1.el7.x86_64
- LIBVIRT Version: libvirt-1.2.8-16.el7_1.4
- VDSM Version: vdsm-4.17.9-0.el7.centos
- SPICE Version: 0.12.4 - 9.el7_1.3
- GlusterFS Version: glusterfs-3.7.5-1.el7
- CEPH Version: librbd1-0.80.7-2.el7
- Hardware
- Manufacturer: HP
- Family: ProLiant
- Product Name: ProLiant BL460c Gen8
- Version: [N/A]
- UUID: 2197C286-BC9C-4CF3-99CB-......
- Serial Number: VCX.....
- CPU Model: Intel(R) Xeon(R) CPU E5-2667 v2 @ 3.30GHz
- CPU Type: Intel SandyBridge Family
- CPU Sockets: 2
- CPU Cores per Socket: 8
- CPU Threads per Core: 2 (SMT Enabled)
- Model name: QMH2572 - PCI-Express Dual Channel 8Gb Fibre Channel Mezzanine HBA, NFF
- Device type: FC
- Model name: QMH2572 - PCI-Express Dual Channel 8Gb Fibre Channel Mezzanine HBA, NFF
- Device type: FC
- #
- hostnamectl
- Static hostname: srvovirt03.cnsc.net
- Icon name: computer-server
- Chassis: server
- Machine ID: 468822dbc1ce4462bf7d4ac2525ad7c1
- Boot ID: 5d2c3612db7c4ca78d946d52b449ad75
- Operating System: CentOS Linux 7 (Core)
- CPE OS Name: cpe:/o:centos:centos:7
- Kernel: Linux 3.10.0-229.14.1.el7.x86_64
- Architecture: x86_64
- #
- sestatus
- SELinux status: enabled
- SELinuxfs mount: /sys/fs/selinux
- SELinux root directory: /etc/selinux
- Loaded policy name: targeted
- Current mode: permissive
- Mode from config file: permissive
- Policy MLS status: enabled
- Policy deny_unknown status: allowed
- Max kernel policy version: 28
- #
- systemctl status firewalld.service
- firewalld.service - firewalld - dynamic firewall daemon
- Loaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled)
- Active: inactive (dead)
- #
- systemctl status iptables.service
- iptables.service - IPv4 firewall with iptables
- Loaded: loaded (/usr/lib/systemd/system/iptables.service; enabled)
- Active: active (exited) since Wed 2015-10-21 16:44:51 COT; 2h 16min ago
- Process: 12347 ExecStop=/usr/libexec/iptables/iptables.init stop (code=exited, status=0/SUCCESS)
- Process: 12455 ExecStart=/usr/libexec/iptables/iptables.init start (code=exited, status=0/SUCCESS)
- Main PID: 12455 (code=exited, status=0/SUCCESS)
- CGroup: /system.slice/iptables.service
- Oct 21 16:44:51 srvovirt03.cnsc.net systemd[1]: Starting IPv4 firewall with iptables...
- Oct 21 16:44:51 srvovirt03.cnsc.net iptables.init[12455]: iptables: Applying firewall rules: [ OK ]
- Oct 21 16:44:51 srvovirt03.cnsc.net systemd[1]: Started IPv4 firewall with iptables.
- #
- iptables -L -n
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
- ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:54321
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:111
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:111
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:161
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:16514
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 2223
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 5900:6923
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 49152:49216
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:24007
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:38465
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:38466
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:38467
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2049
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:38469
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5666
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:39543
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:55863
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:38468
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:963
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:965
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:4379
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:24009:24108
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:49152:49251
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:49217:49316
- REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- Chain FORWARD (policy ACCEPT)
- target prot opt source destination
- REJECT all -- 0.0.0.0/0 0.0.0.0/0 PHYSDEV match ! --physdev-is-bridged reject-with icmp-host-prohibited
- Chain OUTPUT (policy ACCEPT)
- target prot opt source destination
- #
- journalctl -b -p 3
- -- Logs begin at Wed 2015-10-21 13:14:42 COT, end at Wed 2015-10-21 13:45:55 COT. --
- Oct 21 13:14:42 srvovirt03.cnsc.net kernel: [Firmware Bug]: the BIOS has corrupted hw-PMU resources (MSR 38d is 330)
- Oct 21 13:14:46 srvovirt03.cnsc.net kernel: qla2xxx [0000:21:00.0]-505f:0: Link is operational (8 Gbps).
- Oct 21 13:14:48 srvovirt03.cnsc.net kernel: qla2xxx [0000:21:00.1]-505f:2: Link is operational (8 Gbps).
- Oct 21 13:14:51 srvovirt03.cnsc.net kernel: cpufreq: __cpufreq_add_dev: ->get() failed
- Oct 21 13:14:51 srvovirt03.cnsc.net kernel: power_meter ACPI000D:00: Ignoring unsafe software power cap!
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sda: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net kernel: device-mapper: table: 253:3: multipath: error getting device
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: 3600508b1001c392027940d66390c2c91: failed in domap for addition of new path sda
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: uevent trigger error
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sde: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdh: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdb: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdd: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdc: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdf: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdg: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdi: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdj: spurious uevent, path already in pathvec
- Oct 21 13:14:51 srvovirt03.cnsc.net multipathd[912]: sdk: spurious uevent, path already in pathvec
- Oct 21 13:14:53 srvovirt03.cnsc.net systemd[1]: Dependency failed for Network Manager Wait Online.
- Oct 21 13:14:54 srvovirt03.cnsc.net wdmd[1904]: wdmd started S0 H1 G179
- Oct 21 13:14:54 srvovirt03.cnsc.net wdmd[1904]: /dev/watchdog armed with fire_timeout 60
- Oct 21 13:14:56 srvovirt03.cnsc.net ntpd_intres[1921]: host name not found: 0.centos.pool.ntp.org
- Oct 21 13:14:56 srvovirt03.cnsc.net ntpd_intres[1921]: host name not found: 1.centos.pool.ntp.org
- Oct 21 13:14:56 srvovirt03.cnsc.net ntpd_intres[1921]: host name not found: 2.centos.pool.ntp.org
- Oct 21 13:14:56 srvovirt03.cnsc.net ntpd_intres[1921]: host name not found: 3.centos.pool.ntp.org
- Oct 21 13:16:00 srvovirt03.cnsc.net systemd[1]: Failed to start LSB: Bring up/down networking.
- Oct 21 13:16:01 srvovirt03.cnsc.net iscsid[2881]: iSCSI daemon with pid=2882 started!
- Oct 21 13:16:08 srvovirt03.cnsc.net kernel: device-mapper: table: 253:50: multipath: error getting device
- Oct 21 13:19:57 srvovirt03.cnsc.net kernel: device-mapper: table: 253:16: multipath: error getting device
- Oct 21 13:19:58 srvovirt03.cnsc.net kernel: device-mapper: table: 253:16: multipath: error getting device
- Oct 21 13:20:39 srvovirt03.cnsc.net libvirtd[2886]: End of file while reading data: Input/output error
- Oct 21 13:21:57 srvovirt03.cnsc.net systemd[1]: Failed to start LSB: Bring up/down networking.
- Oct 21 13:22:00 srvovirt03.cnsc.net kernel: device-mapper: table: 253:16: multipath: error getting device
- Oct 21 13:22:02 srvovirt03.cnsc.net kernel: device-mapper: table: 253:16: multipath: error getting device
- Oct 21 13:22:02 srvovirt03.cnsc.net kernel: device-mapper: table: 253:16: multipath: error getting device
- Oct 21 13:23:37 srvovirt03.cnsc.net sanlock[1906]: 2015-10-21 13:23:37-0500 536 [1906]: cmd 9 target pid 7044 not found
- Oct 21 13:23:44 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x606
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x611
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x639
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x641
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x619
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x611
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x639
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x641
- Oct 21 13:23:47 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x619
- Oct 21 13:23:50 srvovirt03.cnsc.net kernel: kvm [7044]: vcpu0 unhandled rdmsr: 0x1ad
- Oct 21 13:24:25 srvovirt03.cnsc.net systemd[1]: Failed to reset devices.list on /machine.slice: Invalid argument
- Oct 21 13:24:31 srvovirt03.cnsc.net systemd[1]: Failed to reset devices.list on /machine.slice: Invalid argument
- Oct 21 13:29:41 srvovirt03.cnsc.net systemd[1]: Failed to reset devices.list on /machine.slice: Invalid argument
- #
- lspci -vvv | grep 'Initial VFs'
- R//
- Initial VFs: 0, Total VFs: 0, Number of VFs: 0, Function Dependency Link: 00
- Initial VFs: 0, Total VFs: 0, Number of VFs: 0, Function Dependency Link: 01
- Initial VFs: 0, Total VFs: 0, Number of VFs: 0, Function Dependency Link: 00
- Initial VFs: 0, Total VFs: 0, Number of VFs: 0, Function Dependency Link: 01
- #
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eno1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master bond1 state UP qlen 1000
- link/ether 00:17:a4:77:00:20 brd ff:ff:ff:ff:ff:ff
- 3: eno2: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master bond0 state UP qlen 1000
- link/ether 00:17:a4:77:00:22 brd ff:ff:ff:ff:ff:ff
- 4: ens1f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master bond1 state UP qlen 1000
- link/ether 00:17:a4:77:00:24 brd ff:ff:ff:ff:ff:ff
- 5: ens1f1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master bond0 state UP qlen 1000
- link/ether 00:17:a4:77:00:26 brd ff:ff:ff:ff:ff:ff
- 6: bond0: <BROADCAST,MULTICAST,MASTER,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
- link/ether 00:17:a4:77:00:22 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::217:a4ff:fe77:22/64 scope link
- valid_lft forever preferred_lft forever
- 7: bond1: <BROADCAST,MULTICAST,MASTER,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
- link/ether 00:17:a4:77:00:20 brd ff:ff:ff:ff:ff:ff
- inet 192.168.0.243/24 brd 192.168.0.255 scope global bond1
- valid_lft forever preferred_lft forever
- inet6 fe80::217:a4ff:fe77:20/64 scope link
- valid_lft forever preferred_lft forever
- 8: bond0.50@bond0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master dmz state UP
- link/ether 00:17:a4:77:00:22 brd ff:ff:ff:ff:ff:ff
- 9: dmz: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
- link/ether 00:17:a4:77:00:22 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::217:a4ff:fe77:22/64 scope link
- valid_lft forever preferred_lft forever
- 10: bond0.90@bond0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
- link/ether 00:17:a4:77:00:22 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::217:a4ff:fe77:22/64 scope link
- valid_lft forever preferred_lft forever
- 11: bond1.100@bond1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master hosting state UP
- link/ether 00:17:a4:77:00:20 brd ff:ff:ff:ff:ff:ff
- 12: hosting: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
- link/ether 00:17:a4:77:00:20 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::217:a4ff:fe77:20/64 scope link
- valid_lft forever preferred_lft forever
- 13: bond1.91@bond1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master ha state UP
- link/ether 00:17:a4:77:00:20 brd ff:ff:ff:ff:ff:ff
- 14: ha: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
- link/ether 00:17:a4:77:00:20 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::217:a4ff:fe77:20/64 scope link
- valid_lft forever preferred_lft forever
- 15: ;vdsmdummy;: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN
- link/ether 46:14:8f:30:f8:55 brd ff:ff:ff:ff:ff:ff
- 16: vnet0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master hosting state UNKNOWN qlen 500
- link/ether fe:1a:4a:df:b8:0b brd ff:ff:ff:ff:ff:ff
- inet6 fe80::fc1a:4aff:fedf:b80b/64 scope link
- valid_lft forever preferred_lft forever
- #
- ifconfig -a
- ;vdsmdummy;: flags=4098<BROADCAST,MULTICAST> mtu 1500
- ether 46:14:8f:30:f8:55 txqueuelen 0 (Ethernet)
- RX packets 0 bytes 0 (0.0 B)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 0 bytes 0 (0.0 B)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- bond0: flags=5187<UP,BROADCAST,RUNNING,MASTER,MULTICAST> mtu 1500
- inet6 fe80::217:a4ff:fe77:22 prefixlen 64 scopeid 0x20<link>
- ether 00:17:a4:77:00:22 txqueuelen 0 (Ethernet)
- RX packets 1444 bytes 123629 (120.7 KiB)
- RX errors 0 dropped 97 overruns 0 frame 0
- TX packets 17553 bytes 1174446 (1.1 MiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- bond1: flags=5187<UP,BROADCAST,RUNNING,MASTER,MULTICAST> mtu 1500
- inet 192.168.0.243 netmask 255.255.255.0 broadcast 192.168.0.255
- inet6 fe80::217:a4ff:fe77:20 prefixlen 64 scopeid 0x20<link>
- ether 00:17:a4:77:00:20 txqueuelen 0 (Ethernet)
- RX packets 137092 bytes 15924753 (15.1 MiB)
- RX errors 0 dropped 103 overruns 0 frame 0
- TX packets 46203 bytes 6581661 (6.2 MiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- bond0.50: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:22 txqueuelen 0 (Ethernet)
- RX packets 749 bytes 47183 (46.0 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 16 bytes 1296 (1.2 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- bond0.90: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet6 fe80::217:a4ff:fe77:22 prefixlen 64 scopeid 0x20<link>
- ether 00:17:a4:77:00:22 txqueuelen 0 (Ethernet)
- RX packets 598 bytes 42844 (41.8 KiB)
- RX errors 0 dropped 17 overruns 0 frame 0
- TX packets 21 bytes 5094 (4.9 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- bond1.91: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:20 txqueuelen 0 (Ethernet)
- RX packets 578 bytes 38068 (37.1 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 16 bytes 1296 (1.2 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- bond1.100: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:20 txqueuelen 0 (Ethernet)
- RX packets 10818 bytes 509768 (497.8 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 1043 bytes 44742 (43.6 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- dmz: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet6 fe80::217:a4ff:fe77:22 prefixlen 64 scopeid 0x20<link>
- ether 00:17:a4:77:00:22 txqueuelen 0 (Ethernet)
- RX packets 717 bytes 44686 (43.6 KiB)
- RX errors 0 dropped 22 overruns 0 frame 0
- TX packets 8 bytes 648 (648.0 B)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- eno1: flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:20 txqueuelen 1000 (Ethernet)
- RX packets 81256 bytes 12418546 (11.8 MiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 17942 bytes 3235489 (3.0 MiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- eno2: flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:22 txqueuelen 1000 (Ethernet)
- RX packets 1361 bytes 114887 (112.1 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 8796 bytes 590562 (576.7 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- ens1f0: flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:24 txqueuelen 1000 (Ethernet)
- RX packets 55836 bytes 3506207 (3.3 MiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 28261 bytes 3346172 (3.1 MiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- ens1f1: flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
- ether 00:17:a4:77:00:26 txqueuelen 1000 (Ethernet)
- RX packets 83 bytes 8742 (8.5 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 8757 bytes 583884 (570.1 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- ha: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet6 fe80::217:a4ff:fe77:20 prefixlen 64 scopeid 0x20<link>
- ether 00:17:a4:77:00:20 txqueuelen 0 (Ethernet)
- RX packets 577 bytes 38022 (37.1 KiB)
- RX errors 0 dropped 1 overruns 0 frame 0
- TX packets 8 bytes 648 (648.0 B)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- hosting: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet6 fe80::217:a4ff:fe77:20 prefixlen 64 scopeid 0x20<link>
- ether 00:17:a4:77:00:20 txqueuelen 0 (Ethernet)
- RX packets 10798 bytes 494520 (482.9 KiB)
- RX errors 0 dropped 6 overruns 0 frame 0
- TX packets 8 bytes 648 (648.0 B)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
- inet 127.0.0.1 netmask 255.0.0.0
- inet6 ::1 prefixlen 128 scopeid 0x10<host>
- loop txqueuelen 0 (Local Loopback)
- RX packets 2788 bytes 1694312 (1.6 MiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 2788 bytes 1694312 (1.6 MiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- vnet0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet6 fe80::fc1a:4aff:fedf:b80b prefixlen 64 scopeid 0x20<link>
- ether fe:1a:4a:df:b8:0b txqueuelen 500 (Ethernet)
- RX packets 1027 bytes 43446 (42.4 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 8298 bytes 507708 (495.8 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- #
- ifcfg-bond0
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=bond0
- BONDING_OPTS='mode=5 miimon=100'
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- #
- ifcfg-bond0.50
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=bond0.50
- VLAN=yes
- BRIDGE=dmz
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- #
- ifcfg-bond0.90
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=bond0.90
- VLAN=yes
- ONBOOT=yes
- BOOTPROTO=dhcp
- MTU=1500
- DEFROUTE=no
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- #
- ifcfg-bond1
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=bond1
- BONDING_OPTS='mode=5 miimon=100'
- ONBOOT=yes
- IPADDR=192.168.0.243
- NETMASK=255.255.255.0
- GATEWAY=192.168.0.1
- BOOTPROTO=none
- MTU=1500
- DEFROUTE=yes
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- #
- ifcfg-bond1.100
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=bond1.100
- VLAN=yes
- BRIDGE=hosting
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- #
- ifcfg-bond1.91
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=bond1.91
- VLAN=yes
- BRIDGE=ha
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- #
- ifcfg-eno1
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=eno1
- HWADDR=00:17:a4:77:00:20
- MASTER=bond1
- SLAVE=yes
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- #
- ifcfg-eno2
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=eno2
- HWADDR=00:17:a4:77:00:22
- MASTER=bond0
- SLAVE=yes
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- #
- ifcfg-ens1f0
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=ens1f0
- HWADDR=00:17:a4:77:00:24
- MASTER=bond1
- SLAVE=yes
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- #
- ifcfg-ens1f1
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=ens1f1
- HWADDR=00:17:a4:77:00:26
- MASTER=bond0
- SLAVE=yes
- ONBOOT=yes
- MTU=1500
- NM_CONTROLLED=no
- IPV6INIT=no
- #
- ifcfg-dmz
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=dmz
- TYPE=Bridge
- DELAY=0
- STP=off
- ONBOOT=yes
- DEFROUTE=no
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- MTU=1500
- #
- ifcfg-ha
- # Generated by VDSM version 4.17.9-0.el7.centos
- DEVICE=ha
- TYPE=Bridge
- DELAY=0
- STP=off
- ONBOOT=yes
- DEFROUTE=no
- NM_CONTROLLED=no
- IPV6INIT=no
- HOTPLUG=no
- MTU=1500
- #
- route-bond1
- # Generated by VDSM version 4.17.9-0.el7.centos
- 0.0.0.0/0 via 192.168.0.1 dev bond1 table 3232235763
- 192.168.0.0/24 via 192.168.0.243 dev bond1 table 3232235763
- #
- rule-bond1
- # Generated by VDSM version 4.17.9-0.el7.centos
- from 192.168.0.0/24 table 3232235763
- from all to 192.168.0.0/24 dev bond1 table 3232235763
- #
- arp -n
- Address HWtype HWaddress Flags Mask Iface
- 192.168.0.240 ether d4:85:64:be:c2:65 C bond1
- 192.168.0.13 ether 44:1e:a1:45:54:c0 C bond1
- 192.168.0.1 ether 00:09:0f:09:00:00 C bond1
- 192.168.0.241 ether 00:17:a4:77:00:10 C bond1
- 192.168.0.2 ether 00:50:56:98:2c:99 C bond1
- 192.168.0.254 ether 00:1f:a0:11:c9:37 C bond1
- 192.168.0.242 ether 00:17:a4:77:00:18 C bond1
- #
- route -n
- Kernel IP routing table
- Destination Gateway Genmask Flags Metric Ref Use Iface
- 0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 bond1
- 169.254.0.0 0.0.0.0 255.255.0.0 U 1006 0 0 bond0
- 169.254.0.0 0.0.0.0 255.255.0.0 U 1007 0 0 bond1
- 169.254.0.0 0.0.0.0 255.255.0.0 U 1009 0 0 dmz
- 169.254.0.0 0.0.0.0 255.255.0.0 U 1012 0 0 hosting
- 169.254.0.0 0.0.0.0 255.255.0.0 U 1014 0 0 ha
- 192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 bond1
- #
- brctl show
- bridge name bridge id STP enabled interfaces
- ;vdsmdummy; 8000.000000000000 no
- dmz 8000.0017a4770022 no bond0.50
- ha 8000.0017a4770020 no bond1.91
- hosting 8000.0017a4770020 no bond1.100
- vnet0
- vnet1
- #
- brctl showmacs dmz
- port no mac addr is local? ageing timer
- 1 00:17:a4:77:00:22 yes 0.00
- 1 00:17:a4:77:00:22 yes 0.00
- 1 00:1f:a0:11:c9:37 no 15.58
- 1 00:50:56:98:77:6a no 262.36
- 1 40:a8:f0:c3:6f:41 no 3.96
- #
- brctl showmacs ha
- port no mac addr is local? ageing timer
- 1 00:17:a4:77:00:20 yes 0.00
- 1 00:17:a4:77:00:20 yes 0.00
- 1 40:a8:f0:c3:6f:41 no 3.27
- #
- brctl showmacs hosting
- port no mac addr is local? ageing timer
- 1 00:09:0f:09:00:06 no 18.46
- 1 00:17:a4:77:00:20 yes 0.00
- 1 00:17:a4:77:00:20 yes 0.00
- 3 00:1a:4a:df:b8:09 no 0.77
- 1 00:1a:4a:df:b8:0b no 0.77
- 1 00:1f:a0:11:c9:30 no 0.07
- 1 00:1f:a0:11:c9:37 no 2.12
- 1 00:50:56:98:2e:4a no 269.63
- 1 00:50:56:98:62:87 no 167.08
- 1 00:50:56:98:65:6f no 240.39
- 1 40:a8:f0:c3:6f:41 no 0.22
- 3 fe:1a:4a:df:b8:09 yes 0.00
- 3 fe:1a:4a:df:b8:09 yes 0.00
- 2 fe:1a:4a:df:b8:0b yes 0.00
- 2 fe:1a:4a:df:b8:0b yes 0.00
- #
- tcpdump -i dmz -nn arp
- tcpdump: WARNING: dmz: no IPv4 address assigned
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on dmz, link-type EN10MB (Ethernet), capture size 65535 bytes
- 18:45:04.410447 ARP, Request who-has 192.168.50.1 tell 192.168.50.99, length 46
- 18:45:04.410447 ARP, Request who-has 192.168.50.1 tell 192.168.50.99, length 46
- 18:45:08.410201 ARP, Request who-has 192.168.50.14 tell 192.168.50.99, length 46
- 18:45:08.410201 ARP, Request who-has 192.168.50.14 tell 192.168.50.99, length 46
- 18:46:15.420911 ARP, Request who-has 192.168.50.6 tell 192.168.50.99, length 46
- 18:46:15.420910 ARP, Request who-has 192.168.50.6 tell 192.168.50.99, length 46
- 18:46:25.424629 ARP, Request who-has 192.168.50.13 tell 192.168.50.99, length 46
- 18:46:25.424629 ARP, Request who-has 192.168.50.13 tell 192.168.50.99, length 46
- #
- tcpdump -i ha -nn arp
- tcpdump: WARNING: ha: no IPv4 address assigned
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on ha, link-type EN10MB (Ethernet), capture size 65535 bytes
- #
- tcpdump -i hosting -nn arp
- tcpdump: WARNING: hosting: no IPv4 address assigned
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on hosting, link-type EN10MB (Ethernet), capture size 65535 bytes
- 18:48:27.025333 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:27.025334 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:27.025380 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:27.025380 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:27.032894 ARP, Request who-has 192.168.100.3 (ff:ff:ff:ff:ff:ff) tell 192.168.100.3, length 46
- 18:48:27.032894 ARP, Request who-has 192.168.100.3 (ff:ff:ff:ff:ff:ff) tell 192.168.100.3, length 46
- 18:48:27.032925 ARP, Reply 192.168.100.3 is-at 00:1f:a0:11:c9:30, length 46
- 18:48:27.032925 ARP, Reply 192.168.100.3 is-at 00:1f:a0:11:c9:30, length 46
- 18:48:28.025657 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:28.025657 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:28.025690 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:28.025690 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:28.220249 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:28.220314 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:28.220332 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 18:48:29.222361 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:29.222422 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:29.222447 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 18:48:30.224353 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:30.224413 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:30.224437 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 18:48:31.065051 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:31.065051 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:31.065092 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:31.065092 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:31.411392 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:31.411451 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:31.411478 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 18:48:32.065247 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:32.065247 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:32.065291 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:32.065291 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:32.414345 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:32.414409 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:32.414431 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 18:48:33.065525 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:33.065525 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 18:48:33.065564 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:33.065564 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 18:48:33.416347 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:33.416406 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:33.416432 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 18:48:35.412863 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 18:48:35.412920 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 18:48:35.412940 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- #
- tcpdump -i eno1 -nn arp
- listening on eno1, link-type EN10MB (Ethernet), capture size 65535 bytes
- 19:27:44.895057 ARP, Request who-has 192.168.1.1 tell 192.168.1.109, length 46
- 19:27:44.934165 ARP, Request who-has 192.168.1.1 tell 192.168.1.117, length 46
- 19:27:44.955189 ARP, Request who-has 192.168.1.1 tell 192.168.1.222, length 46
- 19:27:45.034681 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:27:45.085149 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:27:45.108405 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:27:45.139802 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:27:45.183503 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:27:45.197176 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:27:45.197209 ARP, Request who-has 192.168.0.35 tell 192.168.0.254, length 46
- 19:27:45.197215 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:27:45.208436 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:27:45.294957 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:27:45.408468 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:27:45.561438 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:27:45.679090 ARP, Request who-has 192.168.0.24 tell 192.168.0.7, length 46
- 19:27:45.763118 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:27:45.807745 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:27:46.085336 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:27:46.108539 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:27:46.139888 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:27:46.158887 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:27:46.158942 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:27:46.294900 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:27:46.408562 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:27:46.561420 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:27:46.659361 ARP, Request who-has 192.168.1.1 tell 192.168.1.101, length 46
- 19:27:46.763153 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:27:46.840373 ARP, Request who-has 192.168.1.1 tell 192.168.1.124, length 46
- 19:27:46.948612 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:27:46.974152 ARP, Request who-has 192.168.1.1 tell 192.168.1.102, length 46
- 19:27:47.085245 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:27:47.139907 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:27:47.159654 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:27:47.159720 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:27:47.248374 ARP, Request who-has 192.168.1.112 tell 192.168.1.100, length 46
- 19:27:47.248390 ARP, Request who-has 192.168.1.113 tell 192.168.1.100, length 46
- 19:27:47.248395 ARP, Request who-has 192.168.1.114 tell 192.168.1.100, length 46
- 19:27:47.248398 ARP, Request who-has 192.168.1.115 tell 192.168.1.100, length 46
- 19:27:47.248402 ARP, Request who-has 192.168.1.121 tell 192.168.1.100, length 46
- 19:27:47.248406 ARP, Request who-has 192.168.1.123 tell 192.168.1.100, length 46
- 19:27:47.408665 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:27:47.561482 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:27:47.659355 ARP, Request who-has 192.168.1.1 tell 192.168.1.101, length 46
- 19:27:47.763165 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:27:47.840330 ARP, Request who-has 192.168.1.1 tell 192.168.1.124, length 46
- 19:27:47.895071 ARP, Request who-has 192.168.1.1 tell 192.168.1.109, length 46
- 19:27:47.934235 ARP, Request who-has 192.168.1.1 tell 192.168.1.117, length 46
- 19:27:47.948696 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:27:47.955284 ARP, Request who-has 192.168.1.1 tell 192.168.1.222, length 46
- 19:27:47.973696 ARP, Request who-has 192.168.1.1 tell 192.168.1.102, length 46
- 19:27:48.034786 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:27:48.096663 ARP, Request who-has 192.168.0.16 tell 192.168.0.7, length 46
- 19:27:48.096677 ARP, Request who-has 192.168.0.23 tell 192.168.0.7, length 46
- 19:27:48.096681 ARP, Request who-has 192.168.0.24 tell 192.168.0.7, length 46
- 19:27:48.161670 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:27:48.161737 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- #
- tcpdump -i bond1.100 -nn arp
- tcpdump: WARNING: bond1.100: no IPv4 address assigned
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on bond1.100, link-type EN10MB (Ethernet), capture size 65535 bytes
- 19:30:30.434329 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:30.434329 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:30.434379 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:30.434379 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:31.203610 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:30:31.203649 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:30:31.203681 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:30:31.434319 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:31.434320 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:31.434357 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:31.434357 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:32.204055 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:30:32.204099 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:30:32.204126 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:30:33.206062 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:30:33.206106 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:30:33.206126 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:30:34.470049 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:34.470049 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:34.470097 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:34.470097 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:35.204345 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:30:35.204387 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:30:35.204409 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:30:35.470248 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:35.470248 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:35.470296 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:35.470296 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:36.206079 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:30:36.206122 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:30:36.206147 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:30:36.470403 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:36.470403 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:30:36.470440 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:36.470440 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:30:36.803041 ARP, Request who-has 192.168.100.56 tell 192.168.100.2, length 46
- 19:30:36.803041 ARP, Request who-has 192.168.100.56 tell 192.168.100.2, length 46
- 19:30:36.803220 ARP, Reply 192.168.100.56 is-at 00:1a:4a:df:b8:0b, length 28
- 19:30:36.803243 ARP, Reply 192.168.100.56 is-at 00:1a:4a:df:b8:0b, length 28
- 19:30:37.208075 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:30:37.208114 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:30:37.208140 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- #
- tcpdump -i bond1 -nn arp
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on bond1, link-type EN10MB (Ethernet), capture size 65535 bytes
- 19:32:28.134272 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:32:28.134272 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:32:28.226975 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:28.226975 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:28.233354 ARP, Request who-has 192.168.1.112 tell 192.168.1.100, length 46
- 19:32:28.233354 ARP, Request who-has 192.168.1.112 tell 192.168.1.100, length 46
- 19:32:28.233375 ARP, Request who-has 192.168.1.113 tell 192.168.1.100, length 46
- 19:32:28.233375 ARP, Request who-has 192.168.1.113 tell 192.168.1.100, length 46
- 19:32:28.233380 ARP, Request who-has 192.168.1.114 tell 192.168.1.100, length 46
- 19:32:28.233380 ARP, Request who-has 192.168.1.114 tell 192.168.1.100, length 46
- 19:32:28.233383 ARP, Request who-has 192.168.1.115 tell 192.168.1.100, length 46
- 19:32:28.233384 ARP, Request who-has 192.168.1.115 tell 192.168.1.100, length 46
- 19:32:28.233387 ARP, Request who-has 192.168.1.121 tell 192.168.1.100, length 46
- 19:32:28.233388 ARP, Request who-has 192.168.1.121 tell 192.168.1.100, length 46
- 19:32:28.233391 ARP, Request who-has 192.168.1.123 tell 192.168.1.100, length 46
- 19:32:28.233391 ARP, Request who-has 192.168.1.123 tell 192.168.1.100, length 46
- 19:32:28.244325 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:32:28.244366 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:32:28.244390 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:32:28.283284 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:32:28.283284 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:32:28.386989 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:28.386989 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:28.755234 ARP, Request who-has 192.168.0.16 tell 192.168.0.7, length 46
- 19:32:28.755234 ARP, Request who-has 192.168.0.16 tell 192.168.0.7, length 46
- 19:32:28.895399 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:32:28.895399 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:32:28.919672 ARP, Request who-has 192.168.1.1 tell 192.168.1.124, length 46
- 19:32:28.919672 ARP, Request who-has 192.168.1.1 tell 192.168.1.124, length 46
- 19:32:28.949415 ARP, Request who-has 192.168.1.1 tell 192.168.1.109, length 46
- 19:32:28.949415 ARP, Request who-has 192.168.1.1 tell 192.168.1.109, length 46
- 19:32:29.053939 ARP, Request who-has 192.168.1.1 tell 192.168.1.222, length 46
- 19:32:29.053939 ARP, Request who-has 192.168.1.1 tell 192.168.1.222, length 46
- 19:32:29.065149 ARP, Request who-has 192.168.1.1 tell 192.168.1.117, length 46
- 19:32:29.065149 ARP, Request who-has 192.168.1.1 tell 192.168.1.117, length 46
- 19:32:29.134307 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:32:29.134307 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:32:29.227059 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:29.227059 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:29.233360 ARP, Request who-has 192.168.1.112 tell 192.168.1.100, length 46
- 19:32:29.233360 ARP, Request who-has 192.168.1.112 tell 192.168.1.100, length 46
- 19:32:29.233382 ARP, Request who-has 192.168.1.113 tell 192.168.1.100, length 46
- 19:32:29.233382 ARP, Request who-has 192.168.1.113 tell 192.168.1.100, length 46
- 19:32:29.233386 ARP, Request who-has 192.168.1.114 tell 192.168.1.100, length 46
- 19:32:29.233387 ARP, Request who-has 192.168.1.114 tell 192.168.1.100, length 46
- 19:32:29.233390 ARP, Request who-has 192.168.1.115 tell 192.168.1.100, length 46
- 19:32:29.233390 ARP, Request who-has 192.168.1.115 tell 192.168.1.100, length 46
- 19:32:29.233394 ARP, Request who-has 192.168.1.121 tell 192.168.1.100, length 46
- 19:32:29.233394 ARP, Request who-has 192.168.1.121 tell 192.168.1.100, length 46
- 19:32:29.233397 ARP, Request who-has 192.168.1.123 tell 192.168.1.100, length 46
- 19:32:29.233397 ARP, Request who-has 192.168.1.123 tell 192.168.1.100, length 46
- 19:32:29.246351 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:32:29.246392 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:32:29.246418 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:32:29.282655 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:32:29.282655 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:32:29.297046 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:32:29.297046 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:32:29.353165 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:32:29.353165 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:32:29.387040 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:29.387040 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:29.895418 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:32:29.895418 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:32:29.949363 ARP, Request who-has 192.168.1.1 tell 192.168.1.109, length 46
- 19:32:29.949363 ARP, Request who-has 192.168.1.1 tell 192.168.1.109, length 46
- 19:32:30.053992 ARP, Request who-has 192.168.1.1 tell 192.168.1.222, length 46
- 19:32:30.053992 ARP, Request who-has 192.168.1.1 tell 192.168.1.222, length 46
- 19:32:30.065370 ARP, Request who-has 192.168.1.1 tell 192.168.1.117, length 46
- 19:32:30.065370 ARP, Request who-has 192.168.1.1 tell 192.168.1.117, length 46
- 19:32:30.134311 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:32:30.134311 ARP, Request who-has 192.168.1.1 tell 192.168.1.107, length 46
- 19:32:30.165555 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:32:30.165555 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:32:30.220925 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:32:30.220925 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:32:30.227131 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:30.227131 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:30.248353 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 28
- 19:32:30.248395 ARP, Request who-has 192.168.100.1 tell 192.168.100.56, length 42
- 19:32:30.248418 ARP, Reply 192.168.100.1 is-at 00:09:0f:09:00:06, length 42
- 19:32:30.282717 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:32:30.282716 ARP, Request who-has 192.168.1.1 tell 192.168.1.106, length 46
- 19:32:30.297426 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:32:30.297426 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:32:30.300110 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:32:30.300110 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:32:30.300151 ARP, Request who-has 192.168.0.35 tell 192.168.0.254, length 46
- 19:32:30.300151 ARP, Request who-has 192.168.0.35 tell 192.168.0.254, length 46
- 19:32:30.300158 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:32:30.300158 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:32:30.353190 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:32:30.353190 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:32:30.387181 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:30.387181 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:30.681529 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:32:30.681529 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:32:30.874088 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:32:30.874088 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:32:30.895491 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:32:30.895491 ARP, Request who-has 192.168.1.1 tell 192.168.1.116, length 46
- 19:32:31.165626 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:32:31.165626 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:32:31.220978 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:32:31.220978 ARP, Request who-has 192.168.1.1 tell 192.168.1.119, length 46
- 19:32:31.297237 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:32:31.297237 ARP, Request who-has 192.168.0.24 tell 192.168.0.1, length 46
- 19:32:31.300294 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:32:31.300294 ARP, Request who-has 192.168.100.14 tell 192.168.100.2, length 46
- 19:32:31.300333 ARP, Request who-has 192.168.0.35 tell 192.168.0.254, length 46
- 19:32:31.300333 ARP, Request who-has 192.168.0.35 tell 192.168.0.254, length 46
- 19:32:31.300340 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:32:31.300340 ARP, Request who-has 192.168.100.13 tell 192.168.100.2, length 46
- 19:32:31.353242 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:32:31.353242 ARP, Request who-has 192.168.1.1 tell 192.168.1.118, length 46
- 19:32:31.407248 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:31.407248 ARP, Request who-has 192.168.0.23 tell 192.168.0.1, length 46
- 19:32:31.407270 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:31.407270 ARP, Request who-has 192.168.0.30 tell 192.168.0.1, length 46
- 19:32:31.681498 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:32:31.681498 ARP, Request who-has 192.168.1.1 tell 192.168.1.110, length 46
- 19:32:31.874134 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:32:31.874134 ARP, Request who-has 192.168.1.1 tell 192.168.1.111, length 46
- 19:32:31.919812 ARP, Request who-has 192.168.1.1 tell 192.168.1.124, length 46
- 19:32:31.919812 ARP, Request who-has 192.168.1.1 tell 192.168.1.124, length 46
- 19:32:32.105300 ARP, Request who-has 192.168.1.1 tell 192.168.1.102, length 46
- 19:32:32.105300 ARP, Request who-has 192.168.1.1 tell 192.168.1.102, length 46
- 19:32:32.165655 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- 19:32:32.165654 ARP, Request who-has 192.168.1.1 tell 192.168.1.103, length 46
- #
- ping 192.168.100.1
- PING 192.168.100.1 (192.168.100.1) 56(84) bytes of data.
- 64 bytes from 192.168.100.1: icmp_seq=1 ttl=255 time=0.149 ms
- 64 bytes from 192.168.100.1: icmp_seq=2 ttl=255 time=0.086 ms
- 64 bytes from 192.168.100.1: icmp_seq=3 ttl=255 time=0.082 ms
- 64 bytes from 192.168.100.1: icmp_seq=4 ttl=255 time=0.082 ms
- 64 bytes from 192.168.100.1: icmp_seq=5 ttl=255 time=0.081 ms
- 64 bytes from 192.168.100.1: icmp_seq=6 ttl=255 time=0.087 ms
- 64 bytes from 192.168.100.1: icmp_seq=7 ttl=255 time=0.092 ms
- 64 bytes from 192.168.100.1: icmp_seq=8 ttl=255 time=0.069 ms
- 64 bytes from 192.168.100.1: icmp_seq=9 ttl=255 time=0.079 ms
- 64 bytes from 192.168.100.1: icmp_seq=10 ttl=255 time=0.064 ms
- 64 bytes from 192.168.100.1: icmp_seq=11 ttl=255 time=0.084 ms
- 64 bytes from 192.168.100.1: icmp_seq=12 ttl=255 time=0.066 ms
- #######GUEST#######
- #
- hostnamectl
- Static hostname: testarp.cnsc.net
- Icon name: computer-vm
- Chassis: vm
- Machine ID: c428f975d4704158b2731db05235a16d
- Boot ID: 3d0c792b1e864d75a33fffcfae7ea09e
- Virtualization: kvm
- Operating System: CentOS Linux 7 (Core)
- CPE OS Name: cpe:/o:centos:centos:7
- Kernel: Linux 3.10.0-229.14.1.el7.x86_64
- Architecture: x86_64
- #
- sestatus
- SELinux status: enabled
- SELinuxfs mount: /sys/fs/selinux
- SELinux root directory: /etc/selinux
- Loaded policy name: targeted
- Current mode: permissive
- Mode from config file: permissive
- Policy MLS status: enabled
- Policy deny_unknown status: allowed
- Max kernel policy version: 28
- #
- ip address
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
- link/ether 00:1a:4a:df:b8:0b brd ff:ff:ff:ff:ff:ff
- inet 192.168.100.56/26 brd 192.168.100.63 scope global eth0
- valid_lft forever preferred_lft forever
- inet6 fe80::21a:4aff:fedf:b80b/64 scope link
- valid_lft forever preferred_lft forever
- #
- ifconfig -a
- eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet 192.168.100.56 netmask 255.255.255.192 broadcast 192.168.100.63
- inet6 fe80::21a:4aff:fedf:b80b prefixlen 64 scopeid 0x20<link>
- ether 00:1a:4a:df:b8:0b txqueuelen 1000 (Ethernet)
- RX packets 5645 bytes 352360 (344.1 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 1028 bytes 58196 (56.8 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
- inet 127.0.0.1 netmask 255.0.0.0
- inet6 ::1 prefixlen 128 scopeid 0x10<host>
- loop txqueuelen 0 (Local Loopback)
- RX packets 1364 bytes 148888 (145.3 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 1364 bytes 148888 (145.3 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- #
- /etc/sysconfig/network-scripts/ifcfg-eth0
- TYPE=Ethernet
- BOOTPROTO=none
- DEFROUTE=yes
- IPV4_FAILURE_FATAL=yes
- IPV6INIT=no
- IPV6_AUTOCONF=yes
- IPV6_DEFROUTE=yes
- IPV6_PEERDNS=yes
- IPV6_PEERROUTES=yes
- IPV6_FAILURE_FATAL=no
- NAME=eth0
- UUID=1ddb8727-5037-4792-b02a-f396d144699b
- DEVICE=eth0
- ONBOOT=yes
- IPADDR=192.168.100.56
- PREFIX=26
- GATEWAY=192.168.100.1
- DNS1=192.168.0.2
- DNS2=8.8.8.8
- DNS3=192.168.0.13
- DNS4=208.67.222.222
- DOMAIN="cnsc.net CNSC.NET"
- #
- systemctl status firewalld.service -l
- firewalld.service - firewalld - dynamic firewall daemon
- Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled)
- Active: active (running) since Wed 2015-10-21 18:45:51 COT; 21min ago
- Main PID: 617 (firewalld)
- CGroup: /system.slice/firewalld.service
- └─617 /usr/bin/python -Es /usr/sbin/firewalld --nofork --nopid
- Oct 21 18:45:50 testarp.cnsc.net systemd[1]: Starting firewalld - dynamic firewall daemon...
- Oct 21 18:45:51 testarp.cnsc.net systemd[1]: Started firewalld - dynamic firewall daemon.
- #
- iptables -L -n
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
- INPUT_ZONES_SOURCE all -- 0.0.0.0/0 0.0.0.0/0
- INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
- REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- Chain FORWARD (policy ACCEPT)
- target prot opt source destination
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
- FORWARD_IN_ZONES_SOURCE all -- 0.0.0.0/0 0.0.0.0/0
- FORWARD_IN_ZONES all -- 0.0.0.0/0 0.0.0.0/0
- FORWARD_OUT_ZONES_SOURCE all -- 0.0.0.0/0 0.0.0.0/0
- FORWARD_OUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
- REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- Chain OUTPUT (policy ACCEPT)
- target prot opt source destination
- OUTPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
- Chain FORWARD_IN_ZONES (1 references)
- target prot opt source destination
- FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
- FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain FORWARD_IN_ZONES_SOURCE (1 references)
- target prot opt source destination
- Chain FORWARD_OUT_ZONES (1 references)
- target prot opt source destination
- FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
- FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain FORWARD_OUT_ZONES_SOURCE (1 references)
- target prot opt source destination
- Chain FORWARD_direct (1 references)
- target prot opt source destination
- Chain FWDI_public (2 references)
- target prot opt source destination
- FWDI_public_log all -- 0.0.0.0/0 0.0.0.0/0
- FWDI_public_deny all -- 0.0.0.0/0 0.0.0.0/0
- FWDI_public_allow all -- 0.0.0.0/0 0.0.0.0/0
- Chain FWDI_public_allow (1 references)
- target prot opt source destination
- Chain FWDI_public_deny (1 references)
- target prot opt source destination
- Chain FWDI_public_log (1 references)
- target prot opt source destination
- Chain FWDO_public (2 references)
- target prot opt source destination
- FWDO_public_log all -- 0.0.0.0/0 0.0.0.0/0
- FWDO_public_deny all -- 0.0.0.0/0 0.0.0.0/0
- FWDO_public_allow all -- 0.0.0.0/0 0.0.0.0/0
- Chain FWDO_public_allow (1 references)
- target prot opt source destination
- Chain FWDO_public_deny (1 references)
- target prot opt source destination
- Chain FWDO_public_log (1 references)
- target prot opt source destination
- Chain INPUT_ZONES (1 references)
- target prot opt source destination
- IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
- IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
- Chain INPUT_ZONES_SOURCE (1 references)
- target prot opt source destination
- Chain INPUT_direct (1 references)
- target prot opt source destination
- Chain IN_public (2 references)
- target prot opt source destination
- IN_public_log all -- 0.0.0.0/0 0.0.0.0/0
- IN_public_deny all -- 0.0.0.0/0 0.0.0.0/0
- IN_public_allow all -- 0.0.0.0/0 0.0.0.0/0
- Chain IN_public_allow (1 references)
- target prot opt source destination
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
- Chain IN_public_deny (1 references)
- target prot opt source destination
- Chain IN_public_log (1 references)
- target prot opt source destination
- Chain OUTPUT_direct (1 references)
- target prot opt source destination
- #
- ping 8.8.8.8
- PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
- From 192.168.100.56 icmp_seq=1 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=2 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=3 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=4 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=5 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=6 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=7 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=8 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=9 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=10 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=11 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=12 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=13 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=14 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=15 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=16 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=17 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=18 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=19 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=20 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=21 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=22 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=23 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=24 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=25 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=26 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=27 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=28 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=29 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=30 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=31 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=32 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=33 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=34 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=35 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=36 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=37 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=38 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=39 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=40 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=41 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=42 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=43 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=44 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=45 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=46 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=47 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=48 Destination Host Unreachable
- From 192.168.100.56 icmp_seq=49 Destination Host Unreachable
- #
- arp -n
- Address HWtype HWaddress Flags Mask Iface
- 192.168.100.1 (incomplete) eth0
- #
- route -n
- Kernel IP routing table
- Destination Gateway Genmask Flags Metric Ref Use Iface
- 0.0.0.0 192.168.100.1 0.0.0.0 UG 100 0 0 eth0
- 192.168.100.0 0.0.0.0 255.255.255.192 U 100 0 0 eth0
- #
- traceroute 8.8.8.8
- traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets
- 1 testarp.cnsc.net (192.168.100.56) 3006.099 ms !H 3005.968 ms !H 3005.933 ms !H
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement