我有兩個行動 Wi-Fi 路由器(帶有 IP192.168.0.1和192.168.1.1)和兩個 USB Wi-Fi 轉接器,並嘗試將它們綁定到故障轉移連接。使用開放SUSE 12.3在 YaST 中我選擇了使用 ifup 的傳統方法首先我建立了兩個 DHCP 連接
通過以下路線,它運作良好(具有網路存取權限和兩個管理介面192.168.0.1和192.168.1.1)但沒有黏合
sudo /sbin/route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 wlan0
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan1
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
sudo /sbin/ifconfig
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:402 errors:0 dropped:0 overruns:0 frame:0
TX packets:402 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:43639 (42.6 Kb) TX bytes:43639 (42.6 Kb)
wlan0 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
inet addr:192.168.1.107 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::16dd:a9ff:fe2d:5392/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:16625 errors:0 dropped:0 overruns:0 frame:0
TX packets:14142 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:9640939 (9.1 Mb) TX bytes:3377293 (3.2 Mb)
wlan1 Link encap:Ethernet HWaddr AC:22:0B:92:CE:13
inet addr:192.168.0.159 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::ae22:bff:fe92:ce13/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:21216 errors:0 dropped:0 overruns:0 frame:0
TX packets:20869 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3655149 (3.4 Mb) TX bytes:3807217 (3.6 Mb)
現在我正在嘗試添加債券連接,例如這手動的
sudo /sbin/route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 bond0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 bond0
sudo /sbin/ifconfig
bond0 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
inet addr:192.168.0.159 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::16dd:a9ff:fe2d:5392/64 Scope:Link
UP BROADCAST RUNNING MASTER MULTICAST MTU:1500 Metric:1
RX packets:773 errors:0 dropped:6 overruns:0 frame:0
TX packets:854 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:181197 (176.9 Kb) TX bytes:173550 (169.4 Kb)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:946 errors:0 dropped:0 overruns:0 frame:0
TX packets:946 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:90497 (88.3 Kb) TX bytes:90497 (88.3 Kb)
wlan0 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:8 errors:0 dropped:6 overruns:0 frame:0
TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1026 (1.0 Kb) TX bytes:288 (288.0 b)
wlan1 Link encap:Ethernet HWaddr 14:DD:A9:2D:53:92
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:765 errors:0 dropped:0 overruns:0 frame:0
TX packets:852 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:180171 (175.9 Kb) TX bytes:173262 (169.2 Kb)
cat /etc/sysconfig/network/ifcfg-bond0
BONDING_MASTER='yes'
BONDING_MODULE_OPTS='mode=active-backup miimon=100'
BONDING_SLAVE0='wlan0'
BONDING_SLAVE1='wlan1'
BOOTPROTO='dhcp'
BROADCAST=''
ETHTOOL_OPTIONS=''
IPADDR=''
MTU=''
NAME=''
NETMASK=''
NETWORK=''
REMOTE_IPADDR=''
STARTMODE='auto'
USERCONTROL='no'
現在我面臨兩個問題:
我無法存取 192.168.1.1 上的管理面板
連接不能相互保證
a) 第一個轉接器斷開連接
sudo /usr/sbin/traceroute google.com
traceroute to google.com (173.194.122.193), 30 hops max, 40 byte packets using UDP
1 192.168.0.1 (192.168.0.1) 0.984 ms 0.977 ms 0.970 ms
...
b) 當另一台斷開時,完全沒有連接
sudo /usr/sbin/traceroute google.com
traceroute to google.com (173.194.122.193), 30 hops max, 40 byte packets using UDP
1 * * *
...
30 * * *
答案1
大多數 wifi 設備使用 MAC 過濾,它們不會發送來源 MAC 位址不是它們自己的 MAC 位址的訊框。
大多數綁定模式都會根據設計更改設備的 MAC 位址。所有綁定模式都會遇到可能發送具有不同 MAC 的訊框的情況。
要么不要這樣做,要么使用不這樣過濾的 wifi 設備。
網路安全社群可能有一個適合此目的的 wifi 設備列表,這些設備通常用於駕駛和欺騙另一台設備以接管 wifi 通道。四處搜尋。