Hey i solved the problem , the problem was with iptables only.
I flush the iptalbes and then try to connect and it connected and now i can ssh also to 192.168.0.1.

Now someone pls tell me what exectly the problem was with my firewall ???

On 8/13/06, Rahul Sexana <[EMAIL PROTECTED] > wrote:
[EMAIL PROTECTED] ~]# tcpdump -i ppp0 icmp

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ppp0, link-type LINUX_SLL (Linux cooked), capture size 96 bytes
05:13:09.862855 IP 192.168.0.10 > 192.168.0.1: icmp 40: echo request seq 256
05:13:10.006719 IP 192.168.0.1 > 192.168.0.10: icmp 40: echo reply seq 256
05:13:10.879095 IP 192.168.0.10 > 192.168.0.1: icmp 40: echo request seq 512
05:13:10.879128 IP 192.168.0.1 > 192.168.0.10: icmp 40: echo reply seq 512
05:13:11.888939 IP 192.168.0.10 > 192.168.0.1: icmp 40: echo request seq 768
05:13:11.888971 IP 192.168.0.1 > 192.168.0.10: icmp 40: echo reply seq 768
05:13:12.902500 IP 192.168.0.10 > 192.168.0.1: icmp 40: echo request seq 1024
05:13:12.902533 IP 192.168.0.1 > 192.168.0.10: icmp 40: echo reply seq 1024

tcpdump: pcap_loop: recvfrom: Network is down
8 packets captured
8 packets received by filter
0 packets dropped by kernel


On 8/13/06, Brad Campbell < [EMAIL PROTECTED]> wrote:

Rahul Sexana wrote:
>
> Thanks for the Reply again Brad.
>
> I got the output this.
> It seems that request is comming but my kernel is not able to handle the
> packets.
>
> [EMAIL PROTECTED] ~]# tcpdump -i ppp0 port 22
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on ppp0, link-type LINUX_SLL (Linux cooked), capture size 96 bytes
> 04:31:07.868749 IP 192.168.0.10.1088 > 192.168.0.1.22: S
> 835932766:835932766(0) win 8192 <mss 1360,nop,nop,sackOK>
> 04:31:10.874502 IP 192.168.0.10.1088 > 192.168.0.1.22: S
> 835932766:835932766(0) win 8192 <mss 1360,nop,nop,sackOK>
> 04:31:16.904847 IP 192.168.0.10.1088 > 192.168.0.1.22: S
> 835932766:835932766(0) win 8192 <mss 1360,nop,nop,sackOK>

Ok, so your machine is sending the initial packet out interface ppp0 but not seeing anything come
back.. at least we know the routing is correct..

Silly question I guess, but are there firewall rules at the other end?

and can we see the result of ..

tcpdump -i ppp0 icmp

of some pings being sent ?

Firewall rules don't look out of order, and of course icmp packets are being passed..

>
>
>
> [EMAIL PROTECTED] ~]# iptables -L
> Chain INPUT (policy ACCEPT)
> target prot opt source destination
> RH-Firewall-1-INPUT all -- anywhere anywhere
> ACCEPT gre -- anywhere anywhere
>

--
"Human beings, who are almost unique in having the ability
to learn from the experience of others, are also remarkable
for their apparent disinclination to do so." -- Douglas Adams



__._,_.___


YAHOO! GROUPS LINKS




__,_._,___

Reply via email to