Troquei o IP para outra coisa e tudo funcionou. Eu não tenho idéia do porque 192.168.1.100 não funcionou.
Eu pesquisei muito e encontrei muitos problemas similares, mas sem soluções. Por favor ajude.
Servidor Ubuntu 14.04 (server1) com IP estático agindo como um servidor DNS e DHCP. Ele se conecta a outros servidores (com IPs estáticos) e a clientes (usando DHCP) na rede, mas não consegue se conectar à Internet nem ao ping do roteador. Meu roteador não pode fazer ping nem traceroute server1, mas pode as outras máquinas na rede. DNS e DHCP parecem funcionar bem para a rede e os arquivos de diário do DNS no servidor1 estão sendo atualizados dinamicamente.
Anteriormente, um roteador Linksys antigo funcionava bem e agia como servidor DHCP. Eu instalei um novo roteador Netgear C6300 e as coisas ainda estavam OK. Então atualizei do Ubuntu 12.04 para o 14.04. Então eu mudei o servidor DHCP do roteador para o servidor Ubuntu. Agora, o servidor perdeu a capacidade de executar ping no roteador e acessar a rede ... embora eu saiba que estava funcionando por um tempo depois que instalei o novo roteador. Acredito que o roteador atualizou automaticamente seu firmware em algum momento também e não tenho certeza se esse foi o momento em que esse problema surgiu.
Layout:
Comportamento do server1 (192.168.1.100):
Comportamento de outras máquinas:
/ etc / network / interfaces
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
# The loopback network interface
auto lo
iface lo inet loopback
# The primary network interface
auto eth0
iface eth0 inet static
address 192.168.1.100
netmask 255.255.255.0
gateway 192.168.1.1
network 192.168.1.0
broadcast 192.168.1.255
dns-nameservers 127.0.0.1
dns-search xx.lan
dns-domain xx.lan
/etc/resolv.conf:
# Dynamic resolv.conf(5) file for glibc resolver(3) generated by resolvconf(8)
# DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE OVERWRITTEN
nameserver 127.0.0.1
search xx.lan
ifconfig
eth0 Link encap:Ethernet HWaddr 00:0b:db:94:20:e3
inet addr:192.168.1.100 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: 2601:187:8400:673c:9d87:98c5:8063:b35e/64 Scope:Global
inet6 addr: 2601:187:8400:673c:6472:fd28:10d8:17c7/64 Scope:Global
inet6 addr: 2601:187:8400:673c:e058:2568:41d8:d42b/64 Scope:Global
inet6 addr: 2601:187:8400:673c:20b:dbff:fe94:20e3/64 Scope:Global
inet6 addr: fe80::20b:dbff:fe94:20e3/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:648391 errors:0 dropped:0 overruns:0 frame:0
TX packets:156845 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:64451406 (64.4 MB) TX bytes:19330886 (19.3 MB)
Interrupt:16
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:174552 errors:0 dropped:0 overruns:0 frame:0
TX packets:174552 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:40028479 (40.0 MB) TX bytes:40028479 (40.0 MB)
Ping
ping -c 3 192.168.1.1
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
From 192.168.1.100 icmp_seq=2 Destination Host Unreachable
From 192.168.1.100 icmp_seq=3 Destination Host Unreachable
--- 192.168.1.1 ping statistics ---
3 packets transmitted, 0 received, +2 errors, 100% packet loss, time 2016ms
ping -c 3 192.168.1.2
PING 192.168.1.2 (192.168.1.2) 56(84) bytes of data.
64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=0.587 ms
64 bytes from 192.168.1.2: icmp_seq=2 ttl=64 time=46.3 ms
64 bytes from 192.168.1.2: icmp_seq=3 ttl=64 time=0.623 ms
--- 192.168.1.2 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2000ms
ping -c 3 192.168.1.100
PING 192.168.1.100 (192.168.1.100) 56(84) bytes of data.
64 bytes from 192.168.1.100: icmp_seq=1 ttl=64 time=0.079 ms
64 bytes from 192.168.1.100: icmp_seq=2 ttl=64 time=0.066 ms
64 bytes from 192.168.1.100: icmp_seq=3 ttl=64 time=0.062 ms
--- 192.168.1.100 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 1998ms
rtt min/avg/max/mdev = 0.062/0.069/0.079/0.007 ms
ping -c 3 192.168.1.102
PING 192.168.1.102 (192.168.1.102) 56(84) bytes of data.
64 bytes from 192.168.1.102: icmp_seq=1 ttl=64 time=0.197 ms
64 bytes from 192.168.1.102: icmp_seq=2 ttl=64 time=0.149 ms
64 bytes from 192.168.1.102: icmp_seq=3 ttl=64 time=0.121 ms
--- 192.168.1.102 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 1999ms
rtt min/avg/max/mdev = 0.121/0.155/0.197/0.034 ms
ping -c 3 192.168.1.6
PING 192.168.1.6 (192.168.1.6) 56(84) bytes of data.
64 bytes from 192.168.1.6: icmp_seq=1 ttl=128 time=9.66 ms
64 bytes from 192.168.1.6: icmp_seq=2 ttl=128 time=4.37 ms
64 bytes from 192.168.1.6: icmp_seq=3 ttl=128 time=3.98 ms
--- 192.168.1.6 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 3.984/6.008/9.665/2.591 ms
/etc/bind/named.conf.options
acl goodclients {
192.168.1.0/24 ;
localhost ;
localnets ;
};
acl trusted {
localhost ; #localhost
192.168.1.0/24 ;
};
options {
directory "/var/cache/bind/zones";
recursion yes; # enables resursive queries
allow-recursion { trusted; }; # allows recursive queries from "trusted" clients
allow-query { goodclients; }; # allows "good" clients to query (the whole 192.168.1 subnet)
listen-on { 127.0.0.1; 192.168.1.100; }; # server1 private IP address - listen on private network only
allow-transfer { goodclients; }; # disable zone transfers by default
// If there is a firewall between you and nameservers you want
// to talk to, you may need to fix the firewall to allow multiple
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
// If your ISP provided one or more IP addresses for stable
// nameservers, you probably want to use them as forwarders.
// Uncomment the following block, and insert the addresses replacing
// the all-0's placeholder.
forward first;
forwarders {
207.172.3.9; //L3
4.2.2.5; //Genuity
};
dnssec-enable no;
dnssec-validation no;
auth-nxdomain no; # conform to RFC1035
listen-on-v6 { any; };
};
/etc/bind/named.conf.local
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization include "/etc/bind/zones.rfc1918";
//
include "/etc/bind/rndc.key";
zone "1.168.192.in-addr.arpa" {
type master;
file "/var/lib/bind/zones/rev.1.168.192.in-addr.arpa";
allow-update { key rndc-key; }; # allow update from clients with this key
notify yes;
};
zone "xx.lan" IN {
type master;
file "/var/lib/bind/zones/xx.lan.db";
allow-update { key rndc-key; }; # allow update from clients with this key
notify yes;
};
/var/lib/bind/zones/xx.lan.db
$ORIGIN .
$TTL 604800 ; 1 week
xx.lan IN SOA server1.xx.lan. tech.email.com. (
2015102430 ; serial
28800 ; refresh (8 hours)
3600 ; retry (1 hour)
604800 ; expire (1 week)
36000 ; minimum (10 hours)
)
NS server1.xx.lan.
$ORIGIN xx.lan.
$TTL 3600 ; 1 hour
e6500 A 192.168.1.6
TXT "3162db65ed92629b5cd94d99bb7b492987"
$TTL 604800 ; 1 week
localhost CNAME server1
$TTL 3600 ; 1 hour
m4600 A 192.168.1.8
TXT "31e36ff666bee353e79bc3f88f6798e595"
$TTL 604800 ; 1 week
netgearc6300 A 192.168.1.1
netgeargs724t A 192.168.1.2
server2 A 192.168.1.101
server1 A 192.168.1.100
server3 A 192.168.1.102
$TTL 604800 ; 1 week
www CNAME server1
/var/lib/bind/zones/rev.1.168.192.in-addr.arpa
$ORIGIN .
$TTL 604800 ; 1 week
1.168.192.in-addr.arpa IN SOA server1.xx.lan. tech.advantagerugby.com. (
2015102411 ; serial
28800 ; refresh (8 hours)
3600 ; retry (1 hour)
604800 ; expire (1 week)
36000 ; minimum (10 hours)
)
NS server1.xx.lan.
$ORIGIN 1.168.192.in-addr.arpa.
1 PTR netgearc6300.xx.lan.
2 PTR netgeargs724t.xx.lan.
$TTL 604800 ; 1 week
100 PTR server1.xx.lan.
101 PTR server2.xx.lan.
102 PTR server3.xx.lan.
PTR xx.lan.
$TTL 3600 ; 1 hour
8.1.168.192 PTR m4600.xx.lan.
6 PTR e6500.xx.lan.
iproute
default via 192.168.1.1 dev eth0
169.254.0.0/16 dev eth0 scope link metric 1000
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.100
arp
Address HWtype HWaddress Flags Mask Iface
e6500.xx.lan ether 00:21:6a:26:d7:c6 C eth0
android-d2def8bec293334 ether 98:d6:f7:88:38:b2 C eth0
192.168.1.8 ether 24:77:03:2b:24:24 C eth0
192.168.1.9 ether 00:1d:09:2f:4c:ac C eth0
server2.xx.lan ether 00:04:23:86:f0:cb C eth0
android-d8bb6eddaacb8dd ether f8:84:f2:02:3d:dc C eth0
server3.xx.lan ether 00:12:3f:ec:f0:3a C eth0
netgearc6300.xx.lan (incomplete) eth0
Alguém pode ver algo que possa dar uma pista?
Agradecemos antecipadamente por sua ajuda.
Atualizar por solicitação
tcpdump
sudo tcpdump -i eth0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
12:46:02.316789 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 1055870237:1055870273, ack 2041895597, win 1603, length 36
12:46:02.321889 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 36, win 16218, length 0
12:46:03.071668 ARP, Request who-has 192.168.1.1 tell pe1750-3.as.lan, length 28
12:46:03.198355 IP 192.168.1.6.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:46:03.319996 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 36:128, ack 1, win 1603, length 92
12:46:03.320048 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 128:164, ack 1, win 1603, length 36
12:46:03.320778 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 164:216, ack 1, win 1603, length 52
12:46:03.321677 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 216:260, ack 1, win 1603, length 44
12:46:03.325460 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 164, win 16186, length 0
12:46:03.325692 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 260, win 16162, length 0
12:46:03.948314 IP 192.168.1.6.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:46:04.072080 IP pe1750-3.as.lan.ssh > 192.168.1.6.54255: Flags [P.], seq 3186349454:3186349490, ack 684974901, win 1603, length 36
12:46:04.088953 ARP, Request who-has 192.168.1.1 tell pe1750-3.as.lan, length 28
12:46:04.276914 IP 192.168.1.6.54255 > pe1750-3.as.lan.ssh: Flags [.], ack 36, win 16213, length 0
12:46:04.322982 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 260:328, ack 1, win 1603, length 68
12:46:04.323121 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 328:436, ack 1, win 1603, length 108
12:46:04.323208 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 436:536, ack 1, win 1603, length 100
12:46:04.328437 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 436, win 16118, length 0
12:46:04.528043 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 536, win 16093, length 0
12:46:04.698113 IP 192.168.1.6.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:46:05.087654 ARP, Request who-has 192.168.1.1 tell pe1750-3.as.lan, length 28
12:46:05.324436 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 536:684, ack 1, win 1603, length 148
12:46:05.449430 IP 192.168.1.6.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:46:05.528911 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 684, win 16425, length 0
12:46:06.087661 ARP, Request who-has 192.168.1.1 tell pe1750-3.as.lan, length 28
12:46:06.198837 IP 192.168.1.6.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:46:06.325543 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 684:752, ack 1, win 1603, length 68
12:46:06.325630 IP pe1750-3.as.lan.ssh > 192.168.1.6.54419: Flags [P.], seq 752:820, ack 1, win 1603, length 68
12:46:06.330675 IP 192.168.1.6.54419 > pe1750-3.as.lan.ssh: Flags [.], ack 820, win 16391, length 0
12:46:06.949389 IP 192.168.1.6.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:46:07.088090 IP pe1750-3.as.lan.ssh > 192.168.1.6.54255: Flags [P.], seq 36:72, ack 1, win 1603, length 36
12:46:07.104948 ARP, Request who-has 192.168.1.1 tell pe1750-3.as.lan, length 28
12:46:07.293994 IP 192.168.1.6.54255 > pe1750-3.as.lan.ssh: Flags [.], ack 72, win 16204, length 0
^C
33 packets captured
38 packets received by filter
0 packets dropped by kernel
Troquei o IP para outra coisa e tudo funcionou. Eu não tenho idéia do porque 192.168.1.100 não funcionou.
A primeira fase atribui algum outro endereço IP de preferência atribuição automática e verifica o status. A fase dois é para redefinir a configuração de rede, bem como para verificar a configuração do smart switch. Tanto quanto eu entendo, tem alguns problemas com o interruptor inteligente.
Tags networking ubuntu