Solved

1 Cable -> Spliter -> 2 modems

Posted on 2004-04-16
3
229 Views
Last Modified: 2010-03-18
My situation:
1 Cable -> Spliter -> 2 modems
eth0(1st modem): inet addr:xxx.xxx.xxx.194  Bcast:xxx.xxx.xxx.207  Mask:255.55.255.240
eth1(2nd modem): inet addr:yyy.yyy.yyy.70  Bcast:yyy.yyy.yyy.255  Mask:255.255.255.0
gw1: xxx.xxx.xxx.193
gw2: yyy.yyy.yyy.1

The problem is that i want to split the traffic on the eth2 (LAN) via both interfaces, but the packets sent from eth2 to eth1 are going further to eth0 (same damn line).

route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
yyy.yyy.yyy.70     yyy.yyy.yyy.1      255.255.255.255 UGH   0      0        0 eth1
xxx.xxx.xxx.192  0.0.0.0         255.255.255.240 U     0      0        0 eth0
192.168.zzz.0     0.0.0.0         255.255.255.0   U     0      0        0 eth2
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         xxx.xxx.xxx.193  0.0.0.0         UG    1      0        0 eth0

yyy.yyy.yyy.70 is declared on host and not on net after some hours of trying (I cannot put the server offline).
I'm trying for a while to set it up but my eth1 doesn't want to throw the packets directly his modem, uses eth0.

Please help me, i have a while since i could use both lines.

Thanks
0
Comment
Question by:asks_me
3 Comments
 
LVL 5

Accepted Solution

by:
brabard earned 125 total points
ID: 10847959
How to split connections - randomly or by some matches ?
In case of first , try this - http://www.ssi.bg/~ja/nano.txt - it is working when the both lines are up , but sometimes crashes when is trying to redirect packets other route ... But there is a lot of things could be done to make it better .

Regards
Brabard
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now