Sponsored Content
Full Discussion: gateway
Operating Systems AIX gateway Post 302208078 by magasem on Monday 23rd of June 2008 02:27:32 AM
Old 06-23-2008
# netstat -rn
Routing tables
Destination Gateway Flags Refs Use If PMTU Exp Groups

Route Tree for Protocol Family 2 (Internet):
default 172.29.2.127 UGcA 0 0 en1 - - - =>
default 172.29.2.126 UGcA 0 0 en1 - - -
10.96.70.81/32 172.29.2.126 UGc 0 0 en1 - - -
10.96.70.222 172.29.2.126 UGHW 2 2318 en1 - - - =>
10.96.70.222/32 172.29.2.126 UGc 0 0 en1 - - -
127/8 127.0.0.1 U 10 8961 lo0 - - -
172.20.239.192/32 255.255.255.254 UGc 0 0 en1 - - -
172.29.2/25 172.29.2.1 U 4 84890 en1 - - -
172.29.2.1 127.0.0.1 UGHS 5 73 lo0 - - - =>
172.29.2.1/32 172.29.2.126 UGc 0 0 en1 - - - =>
172.29.2.1/32 127.0.0.1 UG 0 0 lo0 - - -
172.29.2.126 172.29.2.1 UHSb 5 85182 en1 - - -
172.29.7.192/27 172.29.2.100 UGc 0 0 en1 - - -
172.29.7.197 172.29.2.100 UGHW 0 6 en1 - - - =>
172.29.7.197/32 172.29.2.100 UGc 0 0 en1 - - -
192.168.1.0 192.168.1.2 UHSb 0 0 en0 - - - =>
192.168.1/24 192.168.1.2 U 0 1 en0 - - -
192.168.1.2 127.0.0.1 UGHS 0 1 lo0 - - - =>
192.168.1.2/32 127.0.0.1 UG 0 0 lo0 - - -
192.168.1.255 192.168.1.2 UHSb 0 4 en0 - - -

Route Tree for Protocol Family 24 (Internet v6):
::1 ::1 UH 0 0 lo0 16896 - -


My problem appeared in above specific lines.
I have 2 Def.Gw I tried to delete from smitty but I can't, also I tried to delete by command but I faced problem in destination address. By the result above I need to proper way to delete GW:172.29.2.127.
If possible pls.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

gateway address

How can I change the gateway address on my sco Openserver 5.0.6. A cisco firewall is recently installed but the gateway on the system is still pointing at the old one. I want it to use the gateway address of the router. Please help. Thanks (2 Replies)
Discussion started by: sshokunbi
2 Replies

2. IP Networking

gateway

I used "route" to add the default gateway I wrote this: route add default 19x.x.x.x 0 but this is not permanent default gateway. Do I need to use another command? Thank a lot (2 Replies)
Discussion started by: lmena
2 Replies

3. Red Hat

gateway

Hi, in which file and how shuold be decalred a gateway and its IP adresse ? Where and how add a gateway ? Many thanks before. (3 Replies)
Discussion started by: big123456
3 Replies

4. Programming

how we can get gateway address

how we can get the gateway address. i know gethostname used for ipaddress how we can get the system gateway address. thank u inadvance, sree (2 Replies)
Discussion started by: phani_sree
2 Replies

5. SCO

SCO Gateway

Hy everybody ! I'm new on your forum, i'm french and don't speak a good english, so scuse me please for it ! I would to know how modify a gateway on a SCO 5.06 We have a problem, we have multi "beach" adress, one is 192.1.1.x, an other is 192.1.4.x Actually, the computer on 192.1.4.x... (2 Replies)
Discussion started by: LB59
2 Replies

6. AIX

Help with Default Gateway

Hi, I have two interfaces on m AIX 5.3 box. One going to 192.168.1.x and it has a gateway of 192.168.1.1. I configured the other gateway with 192.168.2.x and the default gateway as 192.168.2.1. But I can't get connectivity to the 192.168.2.1 network. Can someone help me out and let me know... (7 Replies)
Discussion started by: bbbngowc
7 Replies

7. Solaris

Gateway

Hi all, Just now i had change the gateway for a server Go to /etc/defaultrouter, change to 10.86.33.1 route delete default 10.86.39.222 route add default 10.86.33.1 now cannot telnet to the server already.. any idea? (5 Replies)
Discussion started by: SmartAntz
5 Replies

8. AIX

Can not Ping Gateway

Hello, I am new to Unix :D and have been trying to configure an AIX server running 5.3. I used smitty or smit to configure interface 0 on the server. I am able to ping the IP I set, however I am still unable to ping the gateway. I configured the IP by navigating to Communications Applications... (6 Replies)
Discussion started by: cdub50
6 Replies

9. Linux

GNUGK-How to setup static gateway to gateway routing

Dear Sir I am a newbie in the world of IP telephony. I have been working with Asterisk PBX (SIP) and Cisco Call Manager (MGCP) but now I am learning on how to work GNUGK for H.323 Gatekeeper. I am having a problem, configuring static call routing on GNUGK in the section ... (0 Replies)
Discussion started by: mfondoum
0 Replies

10. UNIX for Beginners Questions & Answers

Inconsistency between RedHat 6.5 global gateway and single gateway leads to loss of default gateway

Dear friends I use RedHat 6.5, which sets the gateway in the configuration file / etc / sysconfig / network as GATEWAY = 192.168.1.26, and the gateway in the configuration file / etc / sysconfig / network-scripts / ifcfg-eth11 as GATEWAY = 192.168.1.256. The two gateways are different.... (6 Replies)
Discussion started by: tanpeng
6 Replies
IPSEC_POLICY(8) 						  [FIXME: manual]						   IPSEC_POLICY(8)

NAME
ipsec_policy - list of existing policy SYNOPSIS
ipsec policy DESCRIPTION
Note that policy is only supported on the new NAST stack. It is not supported on any other stack. On the klips stack, use ipsec eroute, on the netkey stack, use ip xfrm lists the IPSEC policy tables (aka eroutes) which control what (if any) processing is applied to non-encrypted packets arriving for IPSEC processing and forwarding. A table entry consists of: + packet count, + source address with mask and source port (0 if all ports or not applicable) + a '->' separator for visual and automated parsing between src and dst + destination address with mask and destination port (0 if all ports or not applicable) + a '=>' separator for visual and automated parsing between selection criteria and SAID to use + SAID (Security Association IDentifier), comprised of: + protocol (proto), + address family (af), where '.' stands for IPv4 and ':' for IPv6 + Security Parameters Index (SPI), + effective destination (edst), where the packet should be forwarded after processing (normally the other security gateway) together indicate which Security Association should be used to process the packet, + a ':' separating the SAID from the transport protocol (0 if all protocols) + source identity text string with no whitespace, in parens, + destination identity text string with no whitespace, in parens Addresses are written as IPv4 dotted quads or IPv6 coloned hex, protocol is one of "ah", "esp", "comp" or "tun" and SPIs are prefixed hexadecimal numbers where the prefix '.' is for IPv4 and the prefix ':' is for IPv6 SAIDs are written as "protoafSPI@edst". There are also 5 "magic" SAIDs which have special meaning: + %drop means that matches are to be dropped + %reject means that matches are to be dropped and an ICMP returned, if possible to inform + %trap means that matches are to trigger an ACQUIRE message to the Key Management daemon(s) and a hold policy will be put in place to prevent subsequent packets also triggering ACQUIRE messages. + %hold means that matches are to stored until the policy is replaced or until that policy gets reaped + %pass means that matches are to allowed to pass without IPSEC processing EXAMPLES
1867 172.31.252.0/24:0 -> 0.0.0.0/0:0 => tun0x130@192.168.43.1:0 () () means that 1,867 packets have been sent to an policy that has been set up to protect traffic between the subnet 172.31.252.0 with a subnet mask of 24 bits and the default address/mask represented by an address of 0.0.0.0 with a subnet mask of 0 bits using the local machine as a security gateway on this end of the tunnel and the machine 192.168.43.1 on the other end of the tunnel with a Security Association IDentifier of tun0x130@192.168.43.1 which means that it is a tunnel mode connection (4, IPPROTO_IPIP) with a Security Parameters Index of 130 in hexadecimal with no identies defined for either end. 746 192.168.2.110/32:0 -> 192.168.2.120/32:25 => esp0x130@192.168.2.120:6 () () means that 746 packets have been sent to an policy that has been set up to protect traffic sent from any port on the host 192.168.2.110 to the SMTP (TCP, port 25) port on the host 192.168.2.120 with a Security Association IDentifier of tun0x130@192.168.2.120 which means that it is a transport mode connection with a Security Parameters Index of 130 in hexadecimal with no identies defined for either end. 125 3049:1::/64 -> 0:0/0 => tun:130@3058:4::5 () () means that 125 packets have been sent to an policy that has been set up to protect traffic between the subnet 3049:1:: with a subnet mask of 64 bits and the default address/mask represented by an address of 0:0 with a subnet mask of 0 bits using the local machine as a security gateway on this end of the tunnel and the machine 3058:4::5 on the other end of the tunnel with a Security Association IDentifier of tun:130@3058:4::5 which means that it is a tunnel mode connection with a Security Parameters Index of 130 in hexadecimal with no identies defined for either end. 42 192.168.6.0/24:0 -> 192.168.7.0/24:0 => %passthrough means that 42 packets have been sent to an policy that has been set up to pass the traffic from the subnet 192.168.6.0 with a subnet mask of 24 bits and to subnet 192.168.7.0 with a subnet mask of 24 bits without any IPSEC processing with no identies defined for either end. 2112 192.168.8.55/32:0 -> 192.168.9.47/24:0 => %hold (east) () means that 2112 packets have been sent to an policy that has been set up to hold the traffic from the host 192.168.8.55 and to host 192.168.9.47 until a key exchange from a Key Management daemon succeeds and puts in an SA or fails and puts in a pass or drop policy depending on the default configuration with the local client defined as "east" and no identy defined for the remote end. 2001 192.168.2.110/32:0 -> 192.168.2.120/32:0 => esp0xe6de@192.168.2.120:0 () () means that 2001 packets have been sent to an policy that has been set up to protect traffic between the host 192.168.2.110 and the host 192.168.2.120 using 192.168.2.110 as a security gateway on this end of the connection and the machine 192.168.2.120 on the other end of the connection with a Security Association IDentifier of esp0xe6de@192.168.2.120 which means that it is a transport mode connection with a Security Parameters Index of e6de in hexadecimal using Encapsuation Security Payload protocol (50, IPPROTO_ESP) with no identies defined for either end. 1984 3049:1::110/128 -> 3049:1::120/128 => ah:f5ed@3049:1::120 () () means that 1984 packets have been sent to an policy that has been set up to authenticate traffic between the host 3049:1::110 and the host 3049:1::120 using 3049:1::110 as a security gateway on this end of the connection and the machine 3049:1::120 on the other end of the connection with a Security Association IDentifier of ah:f5ed@3049:1::120 which means that it is a transport mode connection with a Security Parameters Index of f5ed in hexadecimal using Authentication Header protocol (51, IPPROTO_AH) with no identies defined for either end. SEE ALSO
ipsec(8), ipsec_tncfg(5), ipsec_spi(5), ipsec_spigrp(5), ipsec_klipsdebug(5), ipsec_eroute(8), ipsec_version(5), ipsec_pf_key(5), ipsec_eroute(5) HISTORY
Written for the Openswan project <http://www.openswan.org/> by Bart Trojanowski. [FIXME: source] 10/06/2010 IPSEC_POLICY(8)
All times are GMT -4. The time now is 01:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy