Sponsored Content
Full Discussion: Routing ICMP echo requests
Special Forums IP Networking Routing ICMP echo requests Post 302949421 by dschlic1 on Friday 10th of July 2015 12:04:12 PM
Old 07-10-2015
Routing ICMP echo requests

I have an application where I need to configure a router to pass through ping requests (ICMP type Image through to the LAN port. I have a Linksys WRT54GS with tiny DD-WRT V24 SP2 installed. I am adding the following iptables rules:
Code:
iptables -t nat -I PREROUTING -p icmp --icmp-type 8 -s 72.64.140.50 -j DNAT --to-destination 192.168.1.200 

iptables -t filter -I FORWARD -p icmp --icmp-type 8 -s 72.64.140.50 -d 192.168.1.200 -j ACCEPT 

iptables -t nat -I POSTROUTING -p icmp --icmp-type 8 -s 72.64.140.50 -d 192.168.1.200 -j ACCEPT

The intent is that the first rule will change an incoming echo request destination to the unit on the LAN which I want to receive the ping request.

The second rule allows the modified echo request to pass through the FORWARD table.

And the last one allows the modified echo request to pass through the POSTROUTING table.

When I send a ping to the router with four tries, I get no pings out the LAN. Using iptables -L -v -n I can see were rule #1 passes one packet (but not four), rule #2 passes four packets (good!) and rule #3 passes 1 packet.

At this point I am at loss as to why this is not working. Can someone help me out here?

Last edited by Don Cragun; 07-10-2015 at 04:56 PM.. Reason: Add CODE tags.
 

10 More Discussions You Might Find Interesting

1. IP Networking

icmp

how i can send the big icmp packets to the another ip for loose connection ....or how he can loose (1 Reply)
Discussion started by: seccom
1 Replies

2. Linux

Linux and ICMP timestamp requests.

Hi There, I am looking to disable ICMP timestamp requests and ICMP timestamp replies on my Linux server version 8. Can someone please tell me the simplest way to do this? I know a command to disable all ICMP traffic but this I have been told will cause many network problems which I... (2 Replies)
Discussion started by: gerwhelan
2 Replies

3. UNIX for Advanced & Expert Users

ICMP Echo-Request

Hello! I'm in extra urgent need to have a program that sends a series of ICMP echo requests over the network to a specified host and waits until the last echo reply is received. I know little about socket-programming (in particular I've never dealt with icmp sockets) that's why i'm desperate!! :)... (5 Replies)
Discussion started by: ilmora
5 Replies

4. Shell Programming and Scripting

Extracting ICMP Output for Plotting

Dear, I want to perform a plotting using xgraph, and the plotting data (ping.txt) is as below. For the graph I just want to plot the time for x-axis (line count) and the RTT for y-axis (time in ms). Below are script i write for that purpose but it seen did not work. Any guide for me because i... (1 Reply)
Discussion started by: Paris Heng
1 Replies

5. IP Networking

Ping ICMP

Hi All, How to disable ICMP time stamp request and time stamp reply of a machine? How to test this feature from remote machine? Please reply back Vasanth (2 Replies)
Discussion started by: vasanthan
2 Replies

6. Solaris

Jumpstart fails with ICMP Destination unreachable

Hi I am trying to perform a jumpstart with values below client sf440-003 - ip x.x.133.2 jumpstartserver zeus - ip x.x.133.19 The jumpstart tftp works as it should, I boot the machine with boot net - install etc. But when it should do a PORTMAP it fails with ICMP error. Any ideas... (2 Replies)
Discussion started by: ehsjoka
2 Replies

7. Solaris

ICMP Net Unreachable from gateway

Hi all, I cannot reach my SERVER from my NetBackup server connect through SERVER_prv ("cannot connect to client") My SERVER was Sun OS 5.8, below is the message i get when i ping my SERVER: # ping 192.168.X.X or # ping SERVER_prv ICMP Net Unreachable from gateway 172.16.102.XXX for... (3 Replies)
Discussion started by: beginningDBA
3 Replies

8. UNIX for Dummies Questions & Answers

Log file for icmp requests

I'm not a unix expert so I need to ask what maybe a simple question to some. Is there a log file which records any icmp packets hitting the server? I ask, because I need to verify what the ip is from a server pinging mine. (3 Replies)
Discussion started by: numele
3 Replies

9. Shell Programming and Scripting

ICMP for limited time

Hi, I am using following command: tcpdump -i eth1 icmp =8 >output.txt i want this command to get execute for a minute only. How can we do this? Thanks. Please use code tags next time for your code and data. Thanks (2 Replies)
Discussion started by: Satyajeet@uh
2 Replies

10. IP Networking

iptables - formatting icmp rules

Hi, I am relatively new to firewalls and netfilter. I have a Debian Stretch router box running dnsmasq, connected to a VPN. Occasionally dnsmasq polls all of the desired DNS servers to select the fastest. When it does this it responds to replies of the non-selected DNS servers with a icmp type... (0 Replies)
Discussion started by: CrazyDave
0 Replies
UIF.CONF(5)							File Formats Manual						       UIF.CONF(5)

UIF.CONF(5)						      BSD File Formats Manual						       UIF.CONF(5)

NAME
uif.conf -- Tool for generating optimized packetfilter rules DESCRIPTION
First of all, the syntax of this configuration file is far from being perfect. If you've got some better ideas just drop me a line... /etc/uif/uif.conf is the default configuration file for uif(8). This file may contain several sections and comments. Each section begins with the section name and the left curly brace and ends with the right curly brace in a single line. A comment starts with a hash mark (#) at the beginning of a line. Blank lines are silently ignored. The following sections are valid: include, sysconfig, service, network, interface, marker, filter, nat, input, output, forward, masquerade and stateless. The sections service, network, marker and interface have all a very similar syntax. Each line starts with an identifier followed by one or more blanks and one or more section specific entries or defined identifiers separated by blanks. A valid identifier is case sensitive and consists of letters, digits, underscores and hyphens. If two or more identifiers in one section are equal, the corresponding entries are merged to the first identifier. Hence, it's not possible to overwrite perviously defined identifiers. As a result the order of the section entries is irrelevant and it's possible to define a section more than once. include section Include other configuration files. Each line in this section, enclosed in quotation marks ("), must be a valid filename. The contents of this file are added to the actual configuration file and each file should contain at least one section (a comment only file is not really use- ful...). sysconfig section Set some global settings. Each line in this section starts with one of the following identifiers followed by one or more blanks and the desired value: LogLevel, LogPrefix, LogLimit, LogBurst, Limit, Burst and AccountPrefix. If there are multiple definitions of one entry the last definition is stored. LogLevel A valid default log priority (see syslog.conf(5)) LogPrefix The default log prefix. Each iptables logmessage starts with this prefix. LogLimit The default limit value for logmessages (see iptables(8)) LogBurst The default burst value for logmessages (see iptables(8)) Limit The default limit value (see iptables(8)) Burst The default burst value (see iptables(8)) AccountPrefix The default prefix for accounting chains. service section This section defines all needed services. A service description starts with the protocol (see protocols(5)) followed by parameters in paren- thesis. Most protocols don't need any parameters. The only exceptions are tcp, udp and icmp. The tcp and udp parameter defines the source and destionation port(-range). The source and destination ports are separated by a slash (/) and portranges are separated by a colon (eg. tcp(123:333/99): tcp protocol, source-portrange 123-333, destination port 99). Empty source or destination ports are expanded to 1:65535. The icmp protocol parameter must be a valid icmp type (see iptables -p icmp --help). network section This section defines all needed networks and hosts. A network description starts with a valid IPv4 address (dotted quad), an optional netmask in cidr notation (number of bits) or an optional MAC-address (with a prefixed equal sign (=). Some valid entries are: 127.0.0.1 127.0.0.0/8 192.168.0.1=00:00:00:00:00:FF. interface section This section defines all needed (physical and bridged) interfaces (eg. eth0, lo, ppp0). marker section This section defines all needed numerical (decimal) values for packet marking purposes. filter, nat, input, output, forward, masquerade and stateless sections Due to better partitioning of the packetfilter, rules can be split into these sections. Internally they are equivalent and contain all rules. As an exception to all other sections the order of entries in these sections is important. The default policy for the chains INPUT, OUTPUT and FORWARD is DROP (see iptables(8)) and it's not possible to change this. Each line in in this section begins with in, out, fw, nat, masq, slin, slout or slfw followed by '+', '-' or a mark identifier enclosed in curly braces (or, in case of fw followed by '>'). The identifiers in, out and fw define rules for incoming, outgoing and forwarded IP-pack- ets. Each packet with an INVALID state (see iptables(8)) is matched by slin, slout and slfw. The lines starting with nat and masq define rules to modify the source or destination address or the destination port. The plus and minus signs specify the type of the rule: '+' accepts matching packets and '-' drops them. As a special case the identifier out and fw accept the greater than (>) sign to modify the MSS depending on the PMTU (see iptables(8)) A very basic ruleset may look like this: out+ This allows every outgoing traffic and rejects all incoming connections (because of the default policy). To be more specific, each line may contain several parameters. Each parameter starts with a single character followed by an equal sign (=) and one or more previously defined identifiers (in the corresponding sections) separated by commas. The following parameters are valid: s The source address or network. d The destination address or network. i The input interface. o The output interface. pi The physical input interface (only useful when used with bridged interfaces). po The physical output interface (only useful when used with bridged interfaces). p The service description (protocol). m The mark field associated with a packet. S The the new source address in nat rules. D The the new destination address in nat rules. P The the new service description in nat rules. This is only valid with tcp or udp packets. f This parameter sets some 'flags'. A flag definition starts with the flag identifier and optional parameters in parenthesis. Valid flags are: log - Logs matching packages to syslog. The given parameter is included in the log entry. The number of logged packets and the loglevel can be set in the sysconfig section. reject - Only valid in DROP rules. This is used to send back an error packet in response to the matched packet. The default behaviour is a packet with set RST flag on tcp connections and a destination-unreachable icmp packet in every other case. Valid parameters are listed in iptables(8) in the REJECT section. account - Create an accounting chain for all matching packages and possible responses. The optional parameter is a part of the name of the chain. limit - Limits the number of matching packets. The default values are set in the sysconfig section. Other values can be defined with the optional parameter. The first entry sets a new limit and the second parameter (separated by a comma (,)) sets the burst value (see Limit and Burst in sysconfig section). It's possible to invert the identifier of one of following parameters - if it expands to ecactly one object - by prepending a exclamation mark (!): s, d, i, o, p (eg.: s=!local p=!http). FILES
Configuration files are located in /etc/uif. There is a sample configuration in /usr/share/doc/uif/uif.conf.tmpl.gz. SEE ALSO
iptables(8) uif(8) AUTHOR
This manual page was written by Jorg Platte <joerg.platte@gmx.de> and Cajus Pollmeier <pollmeier@gonicus.de>, for the Debian GNU/Linux system (but may be used by others). UIF.CONF(5) May 24, 2002 UIF.CONF(5)
All times are GMT -4. The time now is 10:12 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy