- 论坛徽章:
- 0
|
请教大虾关于IP碎片通过包过滤防火墙的问题。希望斑竹置顶。谢谢
呵呵,我来看看。
我做了一下实验,把你这个实验简化了一下。
就2机器,没有用FORWARD,用的INPUT。
实验结果如下。
C:\>;ping -l 1472 192.168.0.1
Pinging 192.168.0.1 with 1472 bytes of data:
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Ping statistics for 192.168.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
C:\>;ping -l 1473 192.168.0.1
Pinging 192.168.0.1 with 1472 bytes of data:
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Reply from 192.168.0.1: bytes=1472 time<10ms TTL=64
Ping statistics for 192.168.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
我感觉你的理论里面没有问题,就看
iptables -A INPUT -p icmp --icmp-type 8 -s 192.168.0.116 -d 192.168.0.1 -j ACCEPT
是不是有特殊的地方了。 |
|