Beim Client kommt nix an...
Ping Server:
root@intranet:/var/log# tcpdump -i eth1 dst 10.145.1.101 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes 12:31:59.972240 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:00.972247 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:01.972246 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:05.208242 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:06.208246 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:07.208244 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:10.208243 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:11.208246 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:12.208246 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:15.712244 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:16.712257 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:32:17.712251 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12 packets captured 12 packets received by filter 0 packets dropped by kernel
SSH Server:
root@intranet:/var/log# tcpdump -i eth1 dst 10.145.1.101 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes 12:33:25.896245 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:33:26.896260 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:33:27.896247 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:33:34.832242 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:33:35.832255 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28 12:33:36.832243 ARP, Request who-has 10.145.1.101 tell 10.145.0.89, length 28
Aber warum sollte, wenn es an der Firewall liegt, den Intranetserver blocken, aber den Rest nicht?