software:linux:duelethernetports
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| software:linux:duelethernetports [2014/07/21 19:06] – created superwizard | software:linux:duelethernetports [2020/10/04 17:20] (current) – [Bridging] superwizard | ||
|---|---|---|---|
| Line 33: | Line 33: | ||
| ===== Bridging ===== | ===== Bridging ===== | ||
| + | <WRAP center round box > | ||
| , for example, links the two network adapters so that Ethernet frames flow freely between them, just as if they were connected on a simple hub. All of the traffic heard on one interface is passed through to the other. | , for example, links the two network adapters so that Ethernet frames flow freely between them, just as if they were connected on a simple hub. All of the traffic heard on one interface is passed through to the other. | ||
| Line 46: | Line 47: | ||
| You can then attach as many computers, hub, switches, and other devices as you want through the machine' | You can then attach as many computers, hub, switches, and other devices as you want through the machine' | ||
| + | </ | ||
| + | |||
| + | <WRAP center round box > | ||
| + | 2020-07-16 | ||
| + | |||
| + | Bridging networks | ||
| + | |||
| + | Packets not moving through linux ethernet bridge | ||
| + | |||
| + | From < | ||
| + | |||
| + | |||
| + | This is a quite old question, but it might be helpful for others. | ||
| + | Linux bridge might drop packages, if not configured correctly. I had a likewise problem and could solve it with the following information: | ||
| + | • https:// | ||
| + | • https:// | ||
| + | In short, there are options to configure the bridge: e.g. | ||
| + | # do not query iptables for package routing | ||
| + | echo 0 > / | ||
| + | # no additional processing for multicast packages | ||
| + | echo 0 > / | ||
| + | echo 0 > / | ||
| + | |||
| + | From < | ||
| + | |||
| + | |||
| + | echo 0 > / | ||
| + | echo 0 > / | ||
| + | |||
| + | |||
| + | Linux: Disabling Multicast snooping on bridges | ||
| + | Snooping should be enabled on either the router / switch or on the linux bridge, but it may not work if enabled on both. If you have a hosting provider that has igmp snooping enabled on the multicast switch, it may be necessary to disable snooping on the linux bridge. In that case use: | ||
| + | post-up ( echo 1 > / | ||
| + | post-up ( echo 0 > / | ||
| + | |||
| + | From < | ||
| + | |||
| + | Default for OpenSuse 15.1 | ||
| + | 0 for / | ||
| + | 1 for / | ||
| + | |||
| + | |||
| + | Bring the bridge up | ||
| + | Like the Ethernet interfaces, the bridge will not become operational until it is brought into the ‘up’ state. This can be done for all three of these devices using the ifconfig command: | ||
| + | ifconfig eth0 up | ||
| + | ifconfig eth1 up | ||
| + | ifconfig br0 up | ||
| + | |||
| + | From < | ||
| + | |||
| + | 2.1. Using " | ||
| + | Usage: | ||
| + | # ip link set dev < | ||
| + | # ip link set dev < | ||
| + | Example: | ||
| + | |||
| + | # ip link set dev eth0 up | ||
| + | # ip link set dev eth0 down | ||
| + | |||
| + | From < | ||
| + | |||
| + | D.3. tcpdump: | ||
| + | It’s often more useful to capture packets using tcpdump rather than wireshark. For example, you might want to do a remote capture and either don’t have GUI access or don’t have Wireshark installed on the remote machine. | ||
| + | Older versions of tcpdump truncate packets to 68 or 96 bytes. If this is the case, use -s to capture full-sized packets: | ||
| + | $ tcpdump -i < | ||
| + | You will have to specify the correct interface and the name of a file to save into. In addition, you will have to terminate the capture with ^C when you believe you have captured enough packets | ||
| + | |||
| + | From < | ||
| + | |||
| + | |||
| + | Comments | ||
| + | https:// | ||
| + | tshark -T json -r file.pcap | ||
| + | tshark -T json -j "http tcp ip" -x -r file.pcap | ||
| + | |||
| + | From < | ||
| + | |||
| + | |||
| + | Visualizing Packet Captures For Fun and Profit | ||
| + | Filed under: Log Analysis, | ||
| + | |||
| + | Have you ever collected a packet capture and you needed to know what the collected traffic is about? Here is a quick tutorial on how to use AfterGlow to generate link graphs from your packet captures (PCAP). | ||
| + | I am sitting at the 2012 Honeynet Project Security Workshop. One of the trainers of a workshop tomorrow just approached me and asked me to help him visualize some PCAP files. I thought it might be useful for other people as well. So here is a quick tutorial. | ||
| + | |||
| + | From < | ||
| + | |||
| + | </ | ||
| + | |||
| ===== Firewalling and gateway-ing ===== | ===== Firewalling and gateway-ing ===== | ||
software/linux/duelethernetports.1405969609.txt.gz · Last modified: by superwizard
