[Linux Network] 05. 리눅스 서버를 라우터 구성
카테고리: LINUX_NETWORK
태그: linux linux_network
01. 리눅스 서버를 라우터 구성
a) 가상머신의 IP 주소 확인
# 클라이언트
$ ifconfig ens160 | egrep 'ens|inet'
ens160: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.219.101 netmask 255.255.255.0 broadcast 192.168.219.255
inet6 fe80::20c:29ff:fea4:73ef prefixlen 64 scopeid 0x20<link>
$ ifconfig ens224 | egrep 'ens|inet'
ens224: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 172.20.15.101 netmask 255.255.255.0 broadcast 172.20.15.255
inet6 fe80::2b79:8d72:464f:181a prefixlen 64 scopeid 0x20<link>
$ netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 192.168.219.2 0.0.0.0 UG 0 0 0 ens160
172.20.15.0 0.0.0.0 255.255.255.0 U 0 0 0 ens224
192.168.219.0 0.0.0.0 255.255.255.0 U 0 0 0 ens160
# 라우터
$ ifconfig ens32 | egrep 'ens|inet'
ens32: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 172.20.15.191 netmask 255.255.255.0 broadcast 172.20.15.255
inet6 fe80::20c:29ff:fea0:ba90 prefixlen 64 scopeid 0x20<link>
$ ifconfig ens34 | egrep 'ens|inet'
ens34: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.1.2.191 netmask 255.255.255.0 broadcast 10.1.2.255
inet6 fe80::20c:29ff:fea0:ba9a prefixlen 64 scopeid 0x20<link>
$ netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.1.2.0 0.0.0.0 255.255.255.0 U 0 0 0 ens34
172.20.15.0 0.0.0.0 255.255.255.0 U 0 0 0 ens32
# 웹 서버
$ ifconfig ens32 | egrep 'ens|inet'
ens32: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.1.2.192 netmask 255.255.255.0 broadcast 10.1.2.255
inet6 fe80::250:56ff:fe2f:2a7c prefixlen 64 scopeid 0x20<link>
$ netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.1.2.0 0.0.0.0 255.255.255.0 U 0 0 0 ens32
b) 클라이언트와 웹 서버 간 통신을 위해 정적 경로를 추가
# 클라이언트
$ route add -net 10.1.2.0/24 gw 172.20.15.191 metric 10
$ netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 192.168.219.2 0.0.0.0 UG 0 0 0 ens160
10.1.2.0 172.20.15.191 255.255.255.0 UG 0 0 0 ens224
172.20.15.0 0.0.0.0 255.255.255.0 U 0 0 0 ens224
192.168.219.0 0.0.0.0 255.255.255.0 U 0 0 0 ens160
# 라우터 - 패킷 포워딩이 가능하도록 설정
$ sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 0
$ sysctl -w net.ipv4.ip_forward=1
net.ipv4.ip_forward = 1
$ cat /proc/sys/net/ipv4/ip_forward
1
# 웹 서버
$ route add -net 172.20.15.0/24 gw 10.1.2.191 metric 10
$ netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.1.2.0 0.0.0.0 255.255.255.0 U 0 0 0 ens32
172.20.15.0 10.1.2.191 255.255.255.0 UG 0 0 0 ens32
c) 결과 확인
# 클라이언트에서 웹 서버로 ping 테스트
$ ping -c 3 10.1.2.192
PING 10.1.2.192 (10.1.2.192) 56(84) bytes of data.
64 bytes from 10.1.2.192: icmp_seq=1 ttl=63 time=0.781 ms
64 bytes from 10.1.2.192: icmp_seq=2 ttl=63 time=3.46 ms
64 bytes from 10.1.2.192: icmp_seq=3 ttl=63 time=2.66 ms
--- 10.1.2.102 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2006ms
rtt min/avg/max/mdev = 0.781/2.302/3.461/1.123 ms
댓글 남기기