[Debian Stretch] passerelle

Bonjour,
depuis hier soir ma passerelle ne fonctionne plus
je manipule un peu ipv6

[code]
root@alpha30:/etc/network# pg interfaces

This file describes the network interfaces available on your system

and how to activate them. For more information, see interfaces(5).

source /etc/network/interfaces.d/*

The loopback network interface

auto lo
iface lo inet loopback

iface enp0s7 inet auto
address 192.168.1.30
netmask 255.255.255.0
gateway 192.168.1.1
#dns-domain example.com
dns-nameservers 193.252.19.3

iface enp0s8 inet auto
address 10.0.0.30
netmask 255.255.255.0

gateway 192.168.1.1

#dns-domain example.com

dns-nameservers 193.252.19.3

root@alpha30:/etc/network# ifconfig -a
enp7s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.30 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 fe80::1e6f:65ff:fe3d:3516 prefixlen 64 scopeid 0x20
ether 1c:6f:65:3d:35:16 txqueuelen 1000 (Ethernet)
RX packets 160716 bytes 163593641 (156.0 MiB)
RX errors 0 dropped 10572 overruns 0 frame 0
TX packets 90742 bytes 8711970 (8.3 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

enp8s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.0.0.30 netmask 255.0.0.0 broadcast 10.255.255.255
inet6 fe80::20c:76ff:feae:b556 prefixlen 64 scopeid 0x20
ether 00:0c:76:ae:b5:56 txqueuelen 1000 (Ethernet)
RX packets 17593 bytes 2077786 (1.9 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 21349 bytes 21016210 (20.0 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1000 (Boucle locale)
RX packets 140 bytes 436207 (425.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 140 bytes 436207 (425.9 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

root@alpha30:/etc/network# ip6tables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all anywhere anywhere
ACCEPT all anywhere anywhere state RELATED,ESTABLISHED
LOG icmp anywhere anywhere LOG level warning
DROP icmp anywhere anywhere
ACCEPT tcp anywhere anywhere tcp dpt:http
ACCEPT tcp anywhere anywhere tcp dpt:https
ACCEPT tcp anywhere anywhere tcp dpt:mysql
ACCEPT tcp anywhere anywhere tcp dpt:netbios-ns
ACCEPT tcp anywhere anywhere tcp dpt:netbios-dgm
ACCEPT tcp anywhere anywhere tcp dpt:netbios-ssn
ACCEPT tcp anywhere anywhere tcp dpt:microsoft-ds
ACCEPT tcp anywhere anywhere tcp dpt:ipp
ACCEPT udp anywhere anywhere udp dpt:80
ACCEPT udp anywhere anywhere udp dpt:443
ACCEPT udp anywhere anywhere udp dpt:mysql
ACCEPT udp anywhere anywhere udp dpt:netbios-ns
ACCEPT udp anywhere anywhere udp dpt:netbios-dgm
ACCEPT udp anywhere anywhere udp dpt:netbios-ssn
ACCEPT udp anywhere anywhere udp dpt:microsoft-ds
ACCEPT udp anywhere anywhere udp dpt:ipp
ACCEPT all anywhere anywhere
ACCEPT icmp anywhere anywhere
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmp router-solicitation HL match HL == 255
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmp neighbour-solicitation HL match HL == 255
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmp neighbour-advertisement HL match HL == 255
LOG all anywhere anywhere LOG level warning

Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all anywhere anywhere state RELATED,ESTABLISHED
ACCEPT all anywhere anywhere

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmp router-advertisement
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmp neighbour-solicitation
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmp neighbour-advertisement
root@alpha30:/etc/network# cd /home/jb1
root@alpha30:/home/jb1# ./res*

  • /sbin/ifconfig enp7s0 192.168.1.30
  • /sbin/ifconfig enp8s0 10.0.0.30
  • /sbin/route add default gw 192.168.1.1 dev enp7s0
    SIOCADDRT: Le fichier existe
  • /home/jb1/fw.sh restart
  • . /lib/lsb/init-functions
  • run-parts --lsbsysinit --list /lib/lsb/init-functions.d
  • [ -r /lib/lsb/init-functions.d/20-left-info-blocks ]
  • . /lib/lsb/init-functions.d/20-left-info-blocks
  • [ -r /lib/lsb/init-functions.d/40-systemd ]
  • . /lib/lsb/init-functions.d/40-systemd
  • _use_systemctl=0
  • [ -d /run/systemd/system ]
  • prog=fw.sh
  • service=fw.service
  • systemctl -p LoadState --value show fw.service
  • state=not-found
  • [ not-found = masked ]
  • [ 2495 -ne 1 ]
  • [ -z ]
  • readlink -f /home/jb1/fw.sh
  • [ 0 = 1 ]
  • FANCYTTY=
  • [ -e /etc/lsb-base-logging.sh ]
  • true
  • IPV6=1
  • TCP_SERVICES=80 443 3306 137 138 139 445 631
  • UDP_SERVICES=80 443 3306 137 138 139 445 631
  • REMOTE_TCP_SERVICES=
  • REMOTE_UDP_SERVICES=
  • ISROUTERNAT=true
  • ethx=enp8s0
  • ethy=enp7s0
  • readonly IPTABLES=/sbin/iptables
  • readonly IP6TABLES=/sbin/ip6tables
  • [ -x /sbin/iptables ]
  • [ 1 -eq 1 ]
  • [ -x /sbin/ip6tables ]
  • log_daemon_msg Starting firewall…
  • [ -z Starting firewall… ]
  • log_daemon_msg_pre Starting firewall…
  • log_use_fancy_output
  • TPUT=/usr/bin/tput
  • EXPR=/usr/bin/expr
  • [ -t 1 ]
  • [ xxterm != x ]
  • [ xxterm != xdumb ]
  • [ -x /usr/bin/tput ]
  • [ -x /usr/bin/expr ]
  • /usr/bin/tput hpa 60
  • /usr/bin/tput setaf 1
  • [ -z ]
  • FANCYTTY=1
  • true
  • echo -n […]
    […] + [ -z ]
  • echo -n Starting firewall…:
    Starting firewall…:+ return
  • fw_start
  • fw_clear
  • /sbin/iptables -t filter -F
  • /sbin/iptables -t nat -F
  • /sbin/iptables -t mangle -F
  • /sbin/iptables -t raw -F
  • /sbin/iptables -t filter -P INPUT ACCEPT
  • /sbin/iptables -t filter -P OUTPUT ACCEPT
  • /sbin/iptables -t filter -P FORWARD ACCEPT
  • /sbin/iptables -t nat -P PREROUTING ACCEPT
  • /sbin/iptables -t nat -P POSTROUTING ACCEPT
  • /sbin/iptables -t nat -P OUTPUT ACCEPT
  • /sbin/iptables -t mangle -P PREROUTING ACCEPT
  • /sbin/iptables -t mangle -P OUTPUT ACCEPT
  • /sbin/iptables -t mangle -P POSTROUTING ACCEPT
  • /sbin/iptables -t mangle -P FORWARD ACCEPT
  • /sbin/iptables -t mangle -P INPUT ACCEPT
  • /sbin/iptables -t raw -P OUTPUT ACCEPT
  • /sbin/iptables -t raw -P PREROUTING ACCEPT
  • /sbin/iptables -F
  • [ 1 -eq 1 ]
  • /sbin/ip6tables -t filter -F
  • /sbin/ip6tables -t nat -F
  • /sbin/ip6tables -t mangle -F
  • /sbin/ip6tables -t raw -F
  • /sbin/ip6tables -t filter -P INPUT ACCEPT
  • /sbin/ip6tables -t filter -P OUTPUT ACCEPT
  • /sbin/ip6tables -t filter -P FORWARD ACCEPT
  • /sbin/ip6tables -t nat -P PREROUTING ACCEPT
  • /sbin/ip6tables -t nat -P POSTROUTING ACCEPT
  • /sbin/ip6tables -t nat -P OUTPUT ACCEPT
  • /sbin/ip6tables -t mangle -P PREROUTING ACCEPT
  • /sbin/ip6tables -t mangle -P OUTPUT ACCEPT
  • /sbin/ip6tables -t mangle -P POSTROUTING ACCEPT
  • /sbin/ip6tables -t mangle -P FORWARD ACCEPT
  • /sbin/ip6tables -t mangle -P INPUT ACCEPT
  • /sbin/ip6tables -t raw -P OUTPUT ACCEPT
  • /sbin/ip6tables -t raw -P PREROUTING ACCEPT
  • /sbin/ip6tables -F
  • /sbin/iptables -t filter -P INPUT DROP
  • /sbin/iptables -t filter -P FORWARD DROP
  • /sbin/iptables -t filter -P OUTPUT DROP
  • /sbin/iptables -t filter -A INPUT -i lo -j ACCEPT
  • /sbin/iptables -t filter -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  • [ -z ]
  • [ -z ]
  • /sbin/iptables -t filter -P OUTPUT ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 80 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 443 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 3306 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 137 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 138 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 139 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 445 -j ACCEPT
  • /sbin/iptables -A INPUT -p tcp --dport 631 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 80 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 443 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 3306 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 137 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 138 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 139 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 445 -j ACCEPT
  • /sbin/iptables -A INPUT -p udp --dport 631 -j ACCEPT
  • true
  • /sbin/iptables -A INPUT -i enp8s0 -j ACCEPT
  • /sbin/iptables -A INPUT -p icmp -j ACCEPT
  • /sbin/iptables -A FORWARD -i enp7s0 -o enp8s0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  • /sbin/iptables -A FORWARD -o enp7s0 -j ACCEPT
  • /sbin/iptables -t nat -A POSTROUTING -o enp7s0 -j MASQUERADE
  • /sbin/iptables -t filter -A INPUT -j LOG --log-level=4
  • [ 1 -eq 1 ]
  • /sbin/ip6tables -t filter -P INPUT DROP
  • /sbin/ip6tables -t filter -P FORWARD DROP
  • /sbin/ip6tables -t filter -P OUTPUT DROP
  • /sbin/ip6tables -t filter -A INPUT -i lo -j ACCEPT
  • /sbin/ip6tables -t filter -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  • /sbin/ip6tables -t filter -A INPUT -p icmp -j LOG
  • /sbin/ip6tables -t filter -A INPUT -p icmp -j DROP
  • [ -z ]
  • [ -z ]
  • /sbin/ip6tables -t filter -P OUTPUT ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 80 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 443 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 3306 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 137 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 138 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 139 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 445 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p tcp --dport 631 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 80 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 443 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 3306 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 137 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 138 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 139 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 445 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p udp --dport 631 -j ACCEPT
  • true
  • /sbin/ip6tables -A INPUT -i enp8s0 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p icmp -j ACCEPT
  • /sbin/ip6tables -A FORWARD -i enp7s0 -o enp8s0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  • /sbin/ip6tables -A FORWARD -o enp7s0 -j ACCEPT
  • /sbin/ip6tables -t nat -A POSTROUTING -o enp7s0 -j MASQUERADE
  • /sbin/ip6tables -A INPUT -p icmpv6 --icmpv6-type router-solicitation -m hl --hl-eq 255 -j ACCEPT
  • /sbin/ip6tables -A OUTPUT -p icmpv6 --icmpv6-type router-advertisement -j ACCEPT
  • /sbin/ip6tables -A INPUT -p icmpv6 --icmpv6-type neighbour-solicitation -m hl --hl-eq 255 -j ACCEPT
  • /sbin/ip6tables -A INPUT -p icmpv6 --icmpv6-type neighbour-advertisement -m hl --hl-eq 255 -j ACCEPT
  • /sbin/ip6tables -A OUTPUT -p icmpv6 --icmpv6-type neighbour-solicitation -j ACCEPT
  • /sbin/ip6tables -A OUTPUT -p icmpv6 --icmpv6-type neighbour-advertisement -j ACCEPT
  • /sbin/ip6tables -t filter -A INPUT -j LOG --log-level=4
  • log_end_msg 0
  • [ -z 0 ]
  • local retval
  • retval=0
  • log_end_msg_pre 0
  • log_use_fancy_output
  • TPUT=/usr/bin/tput
  • EXPR=/usr/bin/expr
  • [ -t 1 ]
  • [ xxterm != x ]
  • [ xxterm != xdumb ]
  • [ -x /usr/bin/tput ]
  • [ -x /usr/bin/expr ]
  • /usr/bin/tput hpa 60
  • /usr/bin/tput setaf 1
  • [ -z 1 ]
  • true
  • true
  • /usr/bin/tput setaf 1
  • RED=
  • /usr/bin/tput setaf 2
  • GREEN=
  • /usr/bin/tput setaf 3
  • YELLOW=
  • /usr/bin/tput op
  • NORMAL=
  • /usr/bin/tput civis
  • /usr/bin/tput sc
  • /usr/bin/tput hpa 0
  • [ 0 -eq 0 ]
  • /bin/echo -ne [ ok
    [ ok + /usr/bin/tput rc
  • /usr/bin/tput cnorm
  • log_use_fancy_output
  • TPUT=/usr/bin/tput
  • EXPR=/usr/bin/expr
  • [ -t 1 ]
  • [ xxterm != x ]
  • [ xxterm != xdumb ]
  • [ -x /usr/bin/tput ]
  • [ -x /usr/bin/expr ]
  • /usr/bin/tput hpa 60
  • /usr/bin/tput setaf 1
  • [ -z 1 ]
  • true
  • true
  • /usr/bin/tput setaf 1
  • RED=
  • /usr/bin/tput setaf 3
  • YELLOW=
  • /usr/bin/tput op
  • NORMAL=
  • [ 0 -eq 0 ]
  • echo .
    .
  • log_end_msg_post 0
  • :
  • return 0
  • exit 0
  • /sbin/ifconfig -a
    enp7s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
    inet 192.168.1.30 netmask 255.255.255.0 broadcast 192.168.1.255
    inet6 fe80::1e6f:65ff:fe3d:3516 prefixlen 64 scopeid 0x20
    ether 1c:6f:65:3d:35:16 txqueuelen 1000 (Ethernet)
    RX packets 164653 bytes 166445972 (158.7 MiB)
    RX errors 0 dropped 10633 overruns 0 frame 0
    TX packets 94269 bytes 9226643 (8.7 MiB)
    TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

enp8s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.0.0.30 netmask 255.0.0.0 broadcast 10.255.255.255
inet6 fe80::20c:76ff:feae:b556 prefixlen 64 scopeid 0x20
ether 00:0c:76:ae:b5:56 txqueuelen 1000 (Ethernet)
RX packets 17597 bytes 2078086 (1.9 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 21389 bytes 21041548 (20.0 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1000 (Boucle locale)
RX packets 140 bytes 436207 (425.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 140 bytes 436207 (425.9 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

  • /sbin/route -n
    Table de routage IP du noyau
    Destination Passerelle Genmask Indic Metric Ref Use Iface
    0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 enp7s0
    10.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 enp8s0
    192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 enp7s0
    root@alpha30:/home/jb1#
    [|/code]

aprés le boot, je lance le reseau à la maiin sans networkmanager
A+
JB1

Rebonjoir,
à priori c’est sur le Windows 10 familial,
j’ai eu une encore MAJ hier soir

défense de taper sur l’âne

j’ai voulu essayé un cable usb3 super speed 5 métres pour imprimante, le connecteur n’est pas identique à usb2
j’avais déplacer le portable et débranché le rj45
nota le wifi ne part pas automatiquement off
je me suis aperçu que le cable était débranché avec ipconfig
donc résolu

Bonsoir, désolé de ne répondre que maintenant.
Très bien que ce soit résolu.

Merci de relire la FAQ : de l’importance de poster au bon endroit ! Sujet déplacé dans le forum "Support…"
Maintenant que le sujet est résolu ; merci de le passer en résolu !