1
German - Deutsch / Re: OPNsense Source IP ist immer 0.0.0.0 im LAN
« on: December 21, 2022, 09:05:24 am »
Danke für deine Antwort!
ifconfig vom LAN Interface:
igb0: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
description: LAN
options=4800028<VLAN_MTU,JUMBO_MTU,NOMAP>
ether f4:90:ea:00:74:00
inet 192.168.57.1 netmask 0xffffff00 broadcast 192.168.57.255
media: Ethernet autoselect (1000baseT <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
Packet Caputure von einem Ping auf ein Gerät im Netzwerk und einer LDAP Anfrage (Die Cap datei habe ich auch angehangen):
LAN
igb0 09:00:29.473554 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 4702, offset 0, flags [none], proto ICMP (1), length 84)
0.0.0.0 > 192.168.57.10: ICMP echo request, id 53961, seq 0, length 64
0.0.0.0 > 192.168.57.10: ICMP echo request, id 53961, seq 1, length 64
0.0.0.0 > 192.168.57.10: ICMP echo request, id 53961, seq 2, length 64
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xd2b2 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495195297 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xcec8 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495196299 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xc630 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495198499 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xb5c8 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495202699 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0x95c0 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495210899 ecr 0], length 0
LAN
igb0 09:00:30.479610 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 32146, offset 0, flags [none], proto ICMP (1), length 84)
LAN
igb0 09:00:31.482102 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 60271, offset 0, flags [none], proto ICMP (1), length 84)
LAN
igb0 09:00:38.155586 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:39.158113 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:41.357964 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:45.557359 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:53.757360 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
Als Source IP wird für diese Aktionen immer 0.0.0.0 anstatt der Interface IP 192.168.57.1 verwendet.
ifconfig vom LAN Interface:
igb0: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
description: LAN
options=4800028<VLAN_MTU,JUMBO_MTU,NOMAP>
ether f4:90:ea:00:74:00
inet 192.168.57.1 netmask 0xffffff00 broadcast 192.168.57.255
media: Ethernet autoselect (1000baseT <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
Packet Caputure von einem Ping auf ein Gerät im Netzwerk und einer LDAP Anfrage (Die Cap datei habe ich auch angehangen):
LAN
igb0 09:00:29.473554 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 4702, offset 0, flags [none], proto ICMP (1), length 84)
0.0.0.0 > 192.168.57.10: ICMP echo request, id 53961, seq 0, length 64
0.0.0.0 > 192.168.57.10: ICMP echo request, id 53961, seq 1, length 64
0.0.0.0 > 192.168.57.10: ICMP echo request, id 53961, seq 2, length 64
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xd2b2 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495195297 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xcec8 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495196299 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xc630 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495198499 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0xb5c8 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495202699 ecr 0], length 0
0.0.0.0.41043 > 192.168.57.10.389: Flags [ S], cksum 0x95c0 (correct), seq 884831251, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 495210899 ecr 0], length 0
LAN
igb0 09:00:30.479610 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 32146, offset 0, flags [none], proto ICMP (1), length 84)
LAN
igb0 09:00:31.482102 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 60271, offset 0, flags [none], proto ICMP (1), length 84)
LAN
igb0 09:00:38.155586 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:39.158113 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:41.357964 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:45.557359 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
LAN
igb0 09:00:53.757360 f4:90:ea:00:74:00 > 2c:b8:ed:78:6b:1d, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
Als Source IP wird für diese Aktionen immer 0.0.0.0 anstatt der Interface IP 192.168.57.1 verwendet.