sudo iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ifconfig:
eth0 Link encap:Ethernet HWaddr 00:50:8d:98:8e:e6
inet addr:192.168.1.100 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::250:8dff:fe98:8ee6/64 Диапазон:Ссылка
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:11003 errors:0 dropped:0 overruns:0 frame:0
TX packets:10431 errors:0 dropped:0 overruns:0 carrier:0
коллизии:0 txqueuelen:1000
RX bytes:9448567 (9.4 MB) TX bytes:1617626 (1.6 MB)
Прервано:20 Base address:0xa000
lo Link encap:Локальная петля (Loopback)
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Диапазон:Узел
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:4 errors:0 dropped:0 overruns:0 frame:0
TX packets:4 errors:0 dropped:0 overruns:0 carrier:0
коллизии:0 txqueuelen:0
RX bytes:240 (240.0 B) TX bytes:240 (240.0 B)
127.0.0.1 localhost
127.0.1.1 vi-desktop
# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts
сat /etc/hosts.allow
# /etc/hosts.allow: list of hosts that are allowed to access the system.
# See the manual pages hosts_access(5) and hosts_options(5).
#
# Example: ALL: LOCAL @some_netgroup
# ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper, as well as for
# rpc.mountd (the NFS mount daemon). See portmap(
and rpc.mountd(
# for further information.
cat /etc/hosts.deny
# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
# See the manual pages hosts_access(5) and hosts_options(5).
#
# Example: ALL: some.host.name, .some.domain
# ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper, as well as for
# rpc.mountd (the NFS mount daemon). See portmap(
and rpc.mountd(
# for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
# You may wish to enable this to ensure any programs that don't
# validate looked up hostnames still leave understandable logs. In past
# versions of Debian this has been the default.
# ALL: PARANOID
cat /etc/resolv.conf
# Generated by NetworkManager
nameserver 10.20.1.254
nameserver 10.0.1.254
Все настройки и в винде и в ubuntu получены автоматом.
Дома стоит роутер:
конфиг:
LAN
MAC Address:
******************
WAN
IP Address:
192.168.1.1
Subnet Mask:
255.255.255.0
MAC Address: ****************
IP Address: 10.20.173.13 Dynamic IP
Subnet Mask: 255.255.255.0
Default Gateway: 10.20.173.254
DNS Server: 10.20.1.254 , 10.0.1.254
Пользователь решил продолжить мысль 29 Ноября 2009, 13:02:07:
sht0rm, подключение получаю автоматом, стоит роутер ...mtu в роутере =1500 ... на сколько понижать можно?