Ubuntu 18.04でデフォルトゲートウェイをpingできません。私の設定の結果は次のとおりです。
設定されている場合
enp12s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 172.30.149.90 netmask 255.255.255.240 broadcast 172.30.149.95
ether f0:1f:af:3e:73:a3 txqueuelen 1000 (Ethernet)
RX packets 2005 bytes 154598 (154.5 KB)
RX errors 0 dropped 380 overruns 0 frame 0
TX packets 950 bytes 117982 (117.9 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 18
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
loop txqueuelen 1000 (Boucle locale)
RX packets 31843 bytes 1932467 (1.9 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 31843 bytes 1932467 (1.9 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
パス-n
Table de routage IP du noyau
Destination Passerelle Genmask Indic Metric Ref Use Iface
0.0.0.0 172.30.149.94 0.0.0.0 UG 20100 0 0 enp12s0
169.254.0.0 0.0.0.0 255.255.0.0 U 1000 0 0 enp12s0
172.30.149.80 0.0.0.0 255.255.255.240 U 100 0 0 enp12s0
フラット 172.30.149.94
PING 172.30.149.94 (172.30.149.94) 56(84) bytes of data.
From 172.30.149.90 icmp_seq=1 Destination Host Unreachable
From 172.30.149.90 icmp_seq=2 Destination Host Unreachable
From 172.30.149.90 icmp_seq=3 Destination Host Unreachable
^C
--- 172.30.149.94 ping statistics ---
5 packets transmitted, 0 received, +3 errors, 100% packet loss, time 4080ms
Cat/etc/NetworkManager/NetworkManager.conf
[main]
plugins=ifupdown,keyfile
[ifupdown]
managed=false
[device]
wifi.scan-rand-mac-address=no
dhclient -v enp12s0
Internet Systems Consortium DHCP Client 4.3.5
...
Listening on LPF/enp12s0/f0:1f:af:3e:73:a3
Sending on LPF/enp12s0/f0:1f:af:3e:73:a3
Sending on Socket/fallback
DHCPDISCOVER on enp12s0 to 255.255.255.255 port 67 interval 3 (xid=0x2d28ac1e)
DHCPDISCOVER on enp12s0 to 255.255.255.255 port 67 interval 5 (xid=0x2d28ac1e)
アルプナ
? (172.30.149.92) à <incomplet> sur enp12s0
? (172.30.149.94) à <incomplet> sur enp12s0
IPネイバーディスプレイ
172.30.149.92 dev enp12s0 FAILED
172.30.149.94 dev enp12s0 FAILED
iptables -L -v -n
Chain INPUT (policy ACCEPT 6000 packets, 368K bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 6010 packets, 369K bytes)
pkts bytes target prot opt in out source destination
猫/etc/resolv.conf
# Dynamic resolv.conf(5) file for glibc resolver(3) generated by resolvconf(8)
..
# 127.0.0.53 is the systemd-resolved stub resolver.
# run "systemd-resolve --status" to see details about the actual nameservers.
nameserver 127.0.0.53
IPアドレス
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
2: enp12s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP
group default qlen 1000
link/ether f0:1f:af:3e:73:a3 brd ff:ff:ff:ff:ff:ff
inet 172.30.149.90/28 brd 172.30.149.95 scope global noprefixroute enp12s0
valid_lft forever preferred_lft forever
3: wlp2s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
link/ether 70:18:8b:70:10:4a brd ff:ff:ff:ff:ff:ff
システム制御 -p
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source >destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
リモートログイン 172.30.149.94 22
Trying 172.30.149.94...
telnet: Unable to connect to remote host: No route to host
リモートログイン 172.30.149.94 80
Trying 172.30.149.94...
telnet: Unable to connect to remote host: No route to host
猫/背中/ネットワーク/インターフェース
# interfaces(5) file used by ifup(8) and ifdown(8)
auto lo
iface lo inet loopback
iptables-L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
tcpdump -v arp
tcpdump: listening on enp12s0, link-type EN10MB (Ethernet), capture size 262144 bytes
13:44:09.289931 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:10.314067 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:14.021038 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 62.201.153.150 tell 62.201.153.145, length 46
13:44:14.021065 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 62.201.153.142 tell 62.201.153.137, length 46
13:44:14.409927 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:15.433950 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:16.457979 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:17.481925 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:18.505913 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has _gateway tell teltest, length 28
13:44:19.021013 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 62.201.153.142 tell 62.201.153.137, length 46