> 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win
> 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
> несколько раз, похоже пакет не доходит до туда 15:08:28.551233 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
15:08:30.716933 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 11073, length 40
15:08:30.717257 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 11073, length 40
15:08:34.548745 IP 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
161>164.ssh , потом 164.ssh>161 значит доходит на машине в клиентской сети
Просто похоже ipnat как-то не отрабатывает
С сервера vpn:
# ssh 192.168.14.2
ssh: connect to host 192.168.14.2 port 22: Operation timed out
На машине, к которой обращаюсь в сети клиента:
# tcpdump -n port 22 | grep 192.168.1.161
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes
09:33:12.375897 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3340007363 ecr 0], length 0
09:33:12.375921 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3034815067 ecr 3340007363], length 0
09:33:15.374689 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3340010363 ecr 0], length 0
09:33:15.374708 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3034815067 ecr 3340010363], length 0
09:33:18.374169 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3034815067 ecr 3340010363], length 0
09:33:18.574448 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3340013563 ecr 0], length 0
09:33:18.574468 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3034815067 ecr 3340013563], length 0
09:33:21.574470 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,TS val 3034815067 ecr 3340013563], length 0
09:33:21.774626 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,sackOK,eol], length 0
09:33:21.774645 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:24.774761 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:24.974610 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,sackOK,eol], length 0
09:33:24.974629 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:27.974064 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:28.174574 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,sackOK,eol], length 0
09:33:28.174592 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:31.174354 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:34.375826 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,sackOK,eol], length 0
09:33:34.375845 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:37.375937 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:43.376487 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
09:33:46.574383 IP 192.168.1.161.32561 > 192.168.14.2.22: Flags [S], seq 1748667508, win 65535, options [mss 1336,sackOK,eol], length 0
09:33:46.574401 IP 192.168.14.2.22 > 192.168.1.161.32561: Flags [S.], seq 1397778113, ack 1748667509, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
ipnat на сервере:
# cat ipnat.ssh.connect
List of active MAP/Redirect filters:
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 proxy port ftp ftp/tcp
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 portmap tcp/udp auto
map tap0 192.168.1.0/24 -> 192.168.1.161/32 icmpidmap icmp 64000:65535
List of active sessions:
MAP 192.168.1.161 32561 <- -> 192.168.1.161 64083 [192.168.1.164 22]
MAP 192.168.1.161 32561 <- -> 192.168.1.161 32561 [192.168.14.2 22]
proxy ftp/6 use 1 flags 0
proto 6 flags 0 bytes 420 pkts 8 data YES size 312
FTP Proxy:
passok: 1
Client:
seq 0 (ack 0) len 0 junk 0 cmds 0
buf [\000]
Server:
seq 0 (ack 0) len 0 junk 0 cmds 0
buf [\000]
MAP 192.168.1.7 3389 <- -> 192.168.1.161 3389 [192.168.14.113 1047]
proxy ftp/6 use 1 flags 0
proto 6 flags 0 bytes 224 pkts 5 data YES size 312
FTP Proxy:
passok: 1
Client:
seq e7fd7091 (ack 0) len 0 junk 0 cmds 0
buf [\000]
Server:
seq 9fa8bfa1 (ack 0) len 0 junk 0 cmds 0
buf [\000]
иногда выдает такое:
# ipnat -l
List of active MAP/Redirect filters:
unknown value for in_redir: 0
0.0.0.0/0 -> 0.0.0.0/0
List of active sessions:
unknown(0000) 0.0.0.0 <- -> 0.0.0.0 [0.0.0.0]