ip source routing

Posted on 2002-05-28
Last Modified: 2010-03-18


I have a changing IP-address on a ppp-device, and I have to use that address as a source to ping another machine via the ppp-device. The machine has lots of other firewall/routing rules, and many other devices have to connect straight via eth0 to the destination so I cannot use default route. So, what options do I have to give to ip route in order to route packets from a certain source to a machine via the ppp-device, and not the eth0/ipsec0/whatever. I use ipchains/ip/route, kernel is 2.2.x

Question by:acidia
LVL 51

Accepted Solution

ahoffmann earned 25 total points
ID: 7038888
if you cannot use a special route, try iproute2 (aka   linux Advanced Routing & Traffic Control)
LVL 16

Assisted Solution

The--Captain earned 25 total points
ID: 7086321
hehe - I think that's what acidia was talking about when s/he said "options to ip route"...

I've got a client running a system in exactly the same way (except that there are two ethernet interfaces, instead of a ppp link and a single ethernet interface).  I also have some old PAQs in the archives here at EE that tell how to do it...  I'll get back to you soon after I get some sleep - my brain is too tired to dig through those things right now.


Expert Comment

ID: 9078481
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
Post your closing recommendations!  No comment means you don't care.
LVL 12

Expert Comment

ID: 10004274
No comment has been added lately, so it's time to clean up this TA.
I will leave the following recommendation for this question in the Cleanup topic area:

Split: ahoffmann {http:#7038888} & The--Captain {http:#7086321}

Please leave any comments here within the next seven days.

EE Cleanup Volunteer

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exploits in Kali Linux 4 336
dns master and slave in linux 2 69
Linux on a Dell PowerEdge 720 3 132
Xymon customize http timeout 2 87
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question