Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ ip addr show
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: enp2s0f2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN group default qlen 1000
- link/ether 60:45:cb:b3:a0:be brd ff:ff:ff:ff:ff:ff
- 3: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
- link/ether 3c:a0:67:15:d9:13 brd ff:ff:ff:ff:ff:ff
- inet 192.168.1.109/24 brd 192.168.1.255 scope global dynamic wlp3s0
- valid_lft 42669sec preferred_lft 42669sec
- inet6 fe80::3b02:613c:971e:feba/64 scope link
- valid_lft forever preferred_lft forever
- 4: virbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
- link/ether 52:54:00:1c:12:1b brd ff:ff:ff:ff:ff:ff
- inet 192.168.100.1/24 brd 192.168.100.255 scope global virbr0
- valid_lft forever preferred_lft forever
- 5: virbr0-nic: <BROADCAST,MULTICAST> mtu 1500 qdisc pfifo_fast master virbr0 state DOWN group default qlen 1000
- link/ether 52:54:00:1c:12:1b brd ff:ff:ff:ff:ff:ff
- 6: vnet0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master virbr0 state UNKNOWN group default qlen 1000
- link/ether fe:54:00:a0:2e:44 brd ff:ff:ff:ff:ff:ff
- inet6 fe80::fc54:ff:fea0:2e44/64 scope link
- valid_lft forever preferred_lft forever
- $ ip route
- default via 192.168.1.1 dev wlp3s0 proto static metric 600
- 169.254.0.0/16 dev wlp3s0 scope link metric 1000
- 192.168.1.0/24 dev wlp3s0 proto kernel scope link src 192.168.1.109 metric 600
- 192.168.100.0/24 dev virbr0 proto kernel scope link src 192.168.100.1
- $ brctl show
- bridge name bridge id STP enabled interfaces
- virbr0 8000.5254001c121b yes virbr0-nic
- vnet0
- I sent 3 pings from the VM Guest and they all timed out while running tcpdump below on the host.
- $ sudo tcpdump -ni vnet0
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on vnet0, link-type EN10MB (Ethernet), capture size 262144 bytes
- 19:00:41.302206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:42.514663 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:42.514680 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:43.318208 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:44.478035 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:44.478053 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:45.302206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:45.478904 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:45.478921 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:46.480369 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:46.480386 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:47.318206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:47.602243 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:47.602272 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:49.194284 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:49.194302 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:49.302207 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:49.514817 IP 192.168.100.20.137 > 192.168.100.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 19:00:50.195626 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:50.195645 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:50.265787 IP 192.168.100.20.137 > 192.168.100.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 19:00:51.016963 IP 192.168.100.20.137 > 192.168.100.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 19:00:51.318208 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:51.407513 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:51.407531 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:52.488988 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:52.489006 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:53.302206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:53.630647 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:53.630667 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:54.221539 IP 192.168.100.20.1091 > 192.168.100.255.5353: 0 [2q] SRV (QM)? _host-config._udp.local. SRV (QM)? _network-scan._tcp.local. (71)
- 19:00:54.632077 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:54.632094 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:55.318206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:56.204338 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:56.204356 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:57.302207 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:57.346203 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:00:57.346224 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:00:59.318206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:00:59.509087 IP 192.168.100.20.137 > 192.168.100.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 19:01:00.260135 IP 192.168.100.20.137 > 192.168.100.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 19:01:00.640709 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:00.640729 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:01:01.011212 IP 192.168.100.20.137 > 192.168.100.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 19:01:01.302206 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:03.318346 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:04.519422 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:04.519465 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:01:04.891057 IP 192.168.100.1.17500 > 192.168.100.255.17500: UDP, length 431
- 19:01:05.302365 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:05.517857 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:05.517905 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:01:05.518528 IP 192.168.100.20.1096 > 192.168.100.255.5353: 0 [2q] SRV (QM)? _host-config._udp.local. SRV (QM)? _network-scan._tcp.local. (71)
- 19:01:06.519462 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:06.519516 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:01:07.318353 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:09.302383 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:09.954725 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:09.954784 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:01:11.318386 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:12.441683 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:12.441755 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- 19:01:12.481109 IP 192.168.100.1.10569 > 239.255.255.250.1900: UDP, length 173
- 19:01:12.481167 IP 192.168.100.1.10569 > 239.255.255.250.1900: UDP, length 173
- 19:01:13.302395 STP 802.1d, Config, Flags [none], bridge-id 8000.52:54:00:1c:12:1b.8002, length 35
- 19:01:13.439606 ARP, Request who-has 192.168.100.1 tell 192.168.100.20, length 28
- 19:01:13.439673 ARP, Reply 192.168.100.1 is-at 52:54:00:1c:12:1b, length 28
- ^C
- 68 packets captured
- 68 packets received by filter
- 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement