我有两个移动 Wi-Fi 路由器(带 IP192.168.0.1和192.168.1.1) 和两个 USB Wi-Fi 适配器,并尝试将它们绑定到故障转移连接。使用OpenSUSE 12.3在 YaST 中我选择了使用 ifup 的传统方法首先我创建了两个 DHCP 连接
通过以下路线,它可以很好地工作(具有网络访问和两个管理界面192.168.0.1和192.168.1.1)但没有粘合
sudo /sbin/route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 wlan0
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan1
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
sudo /sbin/ifconfig
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:402 errors:0 dropped:0 overruns:0 frame:0
TX packets:402 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:43639 (42.6 Kb) TX bytes:43639 (42.6 Kb)
wlan0 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
inet addr:192.168.1.107 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::16dd:a9ff:fe2d:5392/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:16625 errors:0 dropped:0 overruns:0 frame:0
TX packets:14142 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:9640939 (9.1 Mb) TX bytes:3377293 (3.2 Mb)
wlan1 Link encap:Ethernet HWaddr AC:22:0B:92:CE:13
inet addr:192.168.0.159 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::ae22:bff:fe92:ce13/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:21216 errors:0 dropped:0 overruns:0 frame:0
TX packets:20869 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3655149 (3.4 Mb) TX bytes:3807217 (3.6 Mb)
现在我尝试添加债券连接,如这手动的
sudo /sbin/route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 bond0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 bond0
sudo /sbin/ifconfig
bond0 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
inet addr:192.168.0.159 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::16dd:a9ff:fe2d:5392/64 Scope:Link
UP BROADCAST RUNNING MASTER MULTICAST MTU:1500 Metric:1
RX packets:773 errors:0 dropped:6 overruns:0 frame:0
TX packets:854 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:181197 (176.9 Kb) TX bytes:173550 (169.4 Kb)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:946 errors:0 dropped:0 overruns:0 frame:0
TX packets:946 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:90497 (88.3 Kb) TX bytes:90497 (88.3 Kb)
wlan0 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:8 errors:0 dropped:6 overruns:0 frame:0
TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1026 (1.0 Kb) TX bytes:288 (288.0 b)
wlan1 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:765 errors:0 dropped:0 overruns:0 frame:0
TX packets:852 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:180171 (175.9 Kb) TX bytes:173262 (169.2 Kb)
cat /etc/sysconfig/network/ifcfg-bond0
BONDING_MASTER='yes'
BONDING_MODULE_OPTS='mode=active-backup miimon=100'
BONDING_SLAVE0='wlan0'
BONDING_SLAVE1='wlan1'
BOOTPROTO='dhcp'
BROADCAST=''
ETHTOOL_OPTIONS=''
IPADDR=''
MTU=''
NAME=''
NETMASK=''
NETWORK=''
REMOTE_IPADDR=''
STARTMODE='auto'
USERCONTROL='no'
现在我面临两个问题:
我无法访问 192.168.1.1 上的管理面板
连接无法相互保证
a) 断开第一个适配器
sudo /usr/sbin/traceroute google.com
traceroute to google.com (173.194.122.193), 30 hops max, 40 byte packets using UDP
1 192.168.0.1 (192.168.0.1) 0.984 ms 0.977 ms 0.970 ms
...
b)另一个断开连接,则根本没有连接
sudo /usr/sbin/traceroute google.com
traceroute to google.com (173.194.122.193), 30 hops max, 40 byte packets using UDP
1 * * *
...
30 * * *
答案1
大多数 wifi 设备使用 MAC 过滤,它们不会发送源 MAC 地址不是其自身 MAC 地址的帧。
大多数绑定模式都会根据设计更改设备的 MAC 地址。所有绑定模式都会遇到可能发送具有不同 MAC 的帧的情况。
要么不要这样做,要么购买不进行此类过滤的 wifi 设备。
网络安全社区可能有一份适合此用途的 wifi 设备列表,这些设备通常用于驾驶攻击和欺骗其他设备以接管 wifi 信道。四处搜索。