servidorlinux
(usa Debian)
Enviado em 05/10/2018 - 23:05h
LSSilva escreveu:
Você pode testar aquele script agora que dará certo, porém vários serviços estão no exterior; o que vai empedir o funcionamento correto da rede. O que vale é insistir mais um pouco nessa idéia de identificar os IP's/redes. Esses VPN's clients são complicados de lidar mesmo. É bem provável também que esta lista mude com o tempo, te forçando a atualizar. Se conhecessemos melhor o funcionamento da extensão/client talvez pudessemos encontrar um meio mais "elegante" de lidar com isto. Emergencialmente, essa alternativa é válida.
Consegue enviar o log de tráfego de pacotes desta VPN para análise?
[]'s
LSSilva, a navegação está intermitente, ora navega, ora não navega, não sei porque está dando erro de dns_probe_finished_no_internet e err_connection_timed_out. Agora estou na máquina fisica.
Postei o meu script e as saídas dos comandos iptables -t nat -nL, iptables -nL, ip addr show, ip route show, route print e ipconfig /all. Mando também os meus arquivos de /etc/firewall/rules:
#!/bin/bash
#vars
iflocalnet="eth1"
localnet="192.168.8.0/24"
ifwan="eth0"
start (){
#Set permissive defaults
#Policy
iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT ACCEPT
#Clean
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -t mangle -F
iptables -t mangle -X
##############
#Filter(INPUT)
##############
#Invalid
iptables -A INPUT -m state --state INVALID -j LOG --log-prefix "Firewall: Invalid Input "
iptables -A INPUT -m state --state INVALID -j DROP
#Valid
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
#Services-Accept (TCP / LAN)
for port in $(cat /etc/firewall/rules/allow-ports-input-tcp-lan | grep -v "#")
do
iptables -A INPUT -p tcp -i $iflocalnet --dport $port -s $localnet -m state --state NEW --syn -j ACCEPT
done
#Services-Accept (UDP / LAN)
for port in $(cat /etc/firewall/rules/allow-ports-input-udp-lan | grep -v "#")
do
iptables -A INPUT -p udp -i $iflocalnet --dport $port -s $localnet -m state --state NEW -j ACCEPT
done
#Services-Accept (TCP / WAN)
for port in $(cat /etc/firewall/rules/allow-ports-input-tcp-wan | grep -v "#")
do
iptables -A INPUT -p tcp -i $ifwan --dport $port -m state --state NEW --syn -j ACCEPT
done
#Services-Accept (UDP / WAN)
for port in $(cat /etc/firewall/rules/allow-ports-input-udp-wan | grep -v "#")
do
iptables -A INPUT -p udp -i $ifwan --dport $port -m state --state NEW -j ACCEPT
done
#Services-Accept (ICMP)
iptables -A INPUT -p icmp --icmp-type echo-request -s $localnet -j ACCEPT
#Loopback
iptables -A INPUT -i lo -j ACCEPT
#Default LOG
iptables -A INPUT ! -i lo -j LOG --log-prefix "Firewall: Drop Input "
###############
#Filter(OUTPUT)
###############
iptables -A OUTPUT -m state --state INVALID -j LOG --log-prefix "Firewall: Invalid Output "
iptables -A OUTPUT -m state --state INVALID -j DROP
################
#Filter(FORWARD)
################
#Invalid
iptables -A FORWARD -m state --state INVALID -j LOG --log-prefix "Firewall: Invalid Forward "
iptables -A FORWARD -m state --state INVALID -j DROP
#Valid
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
#Blocked Sites
for site in $(cat /etc/firewall/rules/blocked-sites | grep -v "#")
do
iptables -I FORWARD -p tcp -m multiport --dports 80,443 -s $localnet -i $iflocalnet -m string --algo bm --string $site -j DROP
done
#Libera algum ip na rede pra acesso total
for ip in $(cat /etc/firewall/rules/allow-ips | grep -v "#")
do
iptables -I FORWARD -i $iflocalnet -s $ip -j ACCEPT
done
#Anti-Spoof Rule
iptables -A FORWARD -i $iflocalnet ! -s $localnet -j LOG --log-prefix "Firewall: Spoofed Packet "
iptables -A FORWARD -i $iflocalnet ! -s $localnet -j DROP
#Services-Accept (TCP)
for port in $(cat /etc/firewall/rules/allow-ports-forward-tcp | grep -v "#")
do
iptables -A FORWARD -p tcp -i $iflocalnet --dport $port -s $localnet -m state --state NEW --syn -j ACCEPT
done
#Services-Accept (UDP)
for port in $(cat /etc/firewall/rules/allow-ports-forward-udp | grep -v "#")
do
iptables -A FORWARD -p udp -i $iflocalnet --dport $port -s $localnet -m state --state NEW -j ACCEPT
done
#Services-Accept (ICMP)
iptables -A FORWARD -p icmp --icmp-type echo-request -s $localnet -i $iflocalnet -j ACCEPT
#Default LOG
iptables -A FORWARD ! -i lo -j LOG --log-prefix "Firewall: Drop Forward "
##################
#Nat - PreRouting
##################
#Proxy Transparente
#iptables -t nat -A PREROUTING -p tcp --dport 80 -i $iflocalnet -s $localnet -j REDIRECT --to-port 3128
##################
#Nat - PostRouting
##################
iptables -t nat -A POSTROUTING -o $ifwan -j MASQUERADE
#Misc.
#Não precisa colocar isso aqui
#O debian tem um arquivo "/etc/sysctl.conf", que contem essa e outras configurações
#É só descomentar a linha no dito arquivo, é bom ativar
#rp_filter
#tcp_syn_cookies
#Edite o arquivo descomentando as configurações que deseja e depois digite para ativar: "sysctl -p"
echo 1 > /proc/sys/net/ipv4/ip_forward
}
stop (){
#Set permissive defaults
#Policy
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
#Clean
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -t mangle -F
iptables -t mangle -X
#Masquerading
iptables -t nat -A POSTROUTING -j MASQUERADE
}
case $1 in
start) start;;
stop) stop;;
restart) stop;start;;
*) echo "Use";;
esac
allow-ports-forward-tcp:
#http
80
#ftp
21
#ssh
22
#smtp
25
#dns
53
953
#dhcp
67
#pop
110
#ntp
123
#https
443
#tls-smtp
465
#tls-ntp
563
#tls-smtp
587
#MS-Exchange
691
#tls-imap
993
#voice-port
5006
#whatsapp
5222
5228
#radio
8024
#winbox
8291
#ssh
2222
#wais
210
#http-mgmt
280
#gss-http
488
#multiling http
777
#gopher
70
#filemaker
591
#swat
901
allow-ports-forward-udp:
#dns
53
137
138
#dhcp
67
#ntp
123
#https
443
#tls-smtp
587
allow-ports-input-tcp-lan:
#ssh
2222
#proxy
3128
3129
#http
80
#https
443
#dns
953
allow-ports-input-tcp-wan:
#ssh
2222
allow-ports-input-udp-lan:
#dns
53
137
138
#dhcp
67
#ntp
123
#https
443
#tls-smtp
587
allow-ports-input-udp-wan:
#dns
53
137
138
#dhcp
67
#ntp
123
#https
443
#tls-smtp
587
blocked-sites:
#Bloqueia facebook
facebook.com
facebook.com.br
fb.com
#Bloqueia youtube
youtube.com
A saida do comando iptables -t nat -nL é esta:
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0
A saída do comando iptables -nL é esta:
Chain INPUT (policy DROP)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 state INVALID LOG flags 0 level 4 prefix "Firewall: Invalid Input "
DROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:2222 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:3128 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:3129 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:80 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:443 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:953 flags:0x17/0x02 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:53 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:137 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:138 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:67 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:123 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:443 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:587 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 flags:0x17/0x02 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:123 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:443 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:587 state NEW
ACCEPT icmp -- 192.168.8.0/24 0.0.0.0/0 icmptype 8
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix "Firewall: Drop Input "
Chain FORWARD (policy DROP)
target prot opt source destination
DROP tcp -- 192.168.8.0/24 0.0.0.0/0 multiport dports 80,443 STRING match "youtube.com" ALGO name bm TO 65535
DROP tcp -- 192.168.8.0/24 0.0.0.0/0 multiport dports 80,443 STRING match "fb.com" ALGO name bm TO 65535
DROP tcp -- 192.168.8.0/24 0.0.0.0/0 multiport dports 80,443 STRING match "facebook.com.br" ALGO name bm TO 65535
DROP tcp -- 192.168.8.0/24 0.0.0.0/0 multiport dports 80,443 STRING match "facebook.com" ALGO name bm TO 65535
LOG all -- 0.0.0.0/0 0.0.0.0/0 state INVALID LOG flags 0 level 4 prefix "Firewall: Invalid Forward "
DROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
LOG all -- !192.168.8.0/24 0.0.0.0/0 LOG flags 0 level 4 prefix "Firewall: Spoofed Packet "
DROP all -- !192.168.8.0/24 0.0.0.0/0
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:80 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:21 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:22 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:25 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:53 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:953 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:67 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:110 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:123 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:443 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:465 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:563 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:587 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:691 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:993 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:5006 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:5222 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:5228 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:8024 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:8291 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:2222 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:210 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:280 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:488 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:777 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:70 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:591 flags:0x17/0x02 state NEW
ACCEPT tcp -- 192.168.8.0/24 0.0.0.0/0 tcp dpt:901 flags:0x17/0x02 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:53 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:137 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:138 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:67 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:123 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:443 state NEW
ACCEPT udp -- 192.168.8.0/24 0.0.0.0/0 udp dpt:587 state NEW
ACCEPT icmp -- 192.168.8.0/24 0.0.0.0/0 icmptype 8
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix "Firewall: Drop Forward "
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 state INVALID LOG flags 0 level 4 prefix "Firewall: Invalid Output "
DROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID
ip addr show:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 00:08:54:28:c7:64 brd ff:ff:ff:ff:ff:ff
inet 192.168.8.1/24 brd 192.168.8.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::208:54ff:fe28:c764/64 scope link
valid_lft forever preferred_lft forever
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 00:0f:ea:d7:a8:0f brd ff:ff:ff:ff:ff:ff
inet 192.168.2.50/24 brd 192.168.2.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::20f:eaff:fed7:a80f/64 scope link
valid_lft forever preferred_lft forever
ip route show:
default via 192.168.2.1 dev eth0
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.50
192.168.8.0/24 dev eth1 proto kernel scope link src 192.168.8.1
route print:
===========================================================================
Lista de interfaces
11...00 40 a7 13 53 cb ......NIC Gigabit Ethernet PCI-E Realtek Fam¡lia RTL8168B/8111B (NDIS 6.20)
14...0a 00 27 00 00 0e ......VirtualBox Host-Only Ethernet Adapter
20...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1
21...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8
1...........................Software Loopback Interface 1
12...00 00 00 00 00 00 00 e0 Adaptador do Microsoft ISATAP
13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
15...00 00 00 00 00 00 00 e0 Adaptador do Microsoft ISATAP #2
18...00 00 00 00 00 00 00 e0 Adaptador do Microsoft ISATAP #3
19...00 00 00 00 00 00 00 e0 Adaptador do Microsoft ISATAP #4
===========================================================================
Tabela de rotas IPv4
===========================================================================
Rotas ativas:
Endere‡o de rede M scara Ender. gateway Interface Custo
0.0.0.0 0.0.0.0 192.168.8.1 192.168.8.2 276
127.0.0.0 255.0.0.0 No v¡nculo 127.0.0.1 306
127.0.0.1 255.255.255.255 No v¡nculo 127.0.0.1 306
127.255.255.255 255.255.255.255 No v¡nculo 127.0.0.1 306
192.168.8.0 255.255.255.0 No v¡nculo 192.168.8.2 276
192.168.8.2 255.255.255.255 No v¡nculo 192.168.8.2 276
192.168.8.255 255.255.255.255 No v¡nculo 192.168.8.2 276
192.168.56.0 255.255.255.0 No v¡nculo 192.168.56.1 266
192.168.56.1 255.255.255.255 No v¡nculo 192.168.56.1 266
192.168.56.255 255.255.255.255 No v¡nculo 192.168.56.1 266
192.168.92.0 255.255.255.0 No v¡nculo 192.168.92.1 276
192.168.92.1 255.255.255.255 No v¡nculo 192.168.92.1 276
192.168.92.255 255.255.255.255 No v¡nculo 192.168.92.1 276
192.168.161.0 255.255.255.0 No v¡nculo 192.168.161.1 276
192.168.161.1 255.255.255.255 No v¡nculo 192.168.161.1 276
192.168.161.255 255.255.255.255 No v¡nculo 192.168.161.1 276
224.0.0.0 240.0.0.0 No v¡nculo 127.0.0.1 306
224.0.0.0 240.0.0.0 No v¡nculo 192.168.56.1 266
224.0.0.0 240.0.0.0 No v¡nculo 192.168.8.2 276
224.0.0.0 240.0.0.0 No v¡nculo 192.168.92.1 276
224.0.0.0 240.0.0.0 No v¡nculo 192.168.161.1 276
255.255.255.255 255.255.255.255 No v¡nculo 127.0.0.1 306
255.255.255.255 255.255.255.255 No v¡nculo 192.168.56.1 266
255.255.255.255 255.255.255.255 No v¡nculo 192.168.8.2 276
255.255.255.255 255.255.255.255 No v¡nculo 192.168.92.1 276
255.255.255.255 255.255.255.255 No v¡nculo 192.168.161.1 276
===========================================================================
Rotas persistentes:
Endere‡o de rede M scara Ender. gateway Custo
0.0.0.0 0.0.0.0 192.168.8.1 PadrÆo
===========================================================================
Tabela de rotas IPv6
===========================================================================
Rotas ativas:
Se destino de rede de m‚trica Gateway
1 306 ::1/128 No v¡nculo
14 266 fe80::/64 No v¡nculo
11 276 fe80::/64 No v¡nculo
20 276 fe80::/64 No v¡nculo
21 276 fe80::/64 No v¡nculo
21 276 fe80::347c:2f93:52a9:ef38/128
No v¡nculo
20 276 fe80::81ad:3715:a9f4:f5ff/128
No v¡nculo
14 266 fe80::c88f:ccd3:1853:3052/128
No v¡nculo
11 276 fe80::ccf3:5d39:2d98:a200/128
No v¡nculo
1 306 ff00::/8 No v¡nculo
14 266 ff00::/8 No v¡nculo
11 276 ff00::/8 No v¡nculo
20 276 ff00::/8 No v¡nculo
21 276 ff00::/8 No v¡nculo
===========================================================================
Rotas persistentes:
Nenhuma
ipconfig /all:
Configura‡Æo de IP do Windows
Nome do host. . . . . . . . . . . . . . . . : manutencaobancada
Sufixo DNS prim rio . . . . . . . . . . . . :
Tipo de n¢. . . . . . . . . . . . . . . . . : h¡brido
Roteamento de IP ativado. . . . . . . . . . : nÆo
Proxy WINS ativado. . . . . . . . . . . . . : nÆo
Adaptador Ethernet ConexÆo local:
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : NIC Gigabit Ethernet PCI-E Realtek Fam¡lia RTL8168B/8111B (NDIS 6.20)
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-40-A7-13-53-CB
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Endere‡o IPv6 de link local . . . . . . . . : fe80::ccf3:5d39:2d98:a200%11(Preferencial)
Endere‡o IPv4. . . . . . . . . . . . . . . : 192.168.8.2(Preferencial)
M scara de Sub-rede . . . . . . . . . . . . : 255.255.255.0
Gateway PadrÆo. . . . . . . . . . . . . . . : 192.168.8.1
IAID de DHCPv6. . . . . . . . . . . . . . . : 234897575
DUID de Cliente DHCPv6. . . . . . . . . . . : 00-01-00-01-21-1F-8F-A8-00-40-A7-13-53-CB
Servidores DNS. . . . . . . . . . . . . . . : 8.8.8.8
8.8.4.4
NetBIOS em Tcpip. . . . . . . . . . . . . . : Habilitado
Adaptador Ethernet VirtualBox Host-Only Network:
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter
Endere‡o F¡sico . . . . . . . . . . . . . . : 0A-00-27-00-00-0E
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Endere‡o IPv6 de link local . . . . . . . . : fe80::c88f:ccd3:1853:3052%14(Preferencial)
Endere‡o IPv4. . . . . . . . . . . . . . . : 192.168.56.1(Preferencial)
M scara de Sub-rede . . . . . . . . . . . . : 255.255.255.0
Gateway PadrÆo. . . . . . . . . . . . . . . :
IAID de DHCPv6. . . . . . . . . . . . . . . : 319422503
DUID de Cliente DHCPv6. . . . . . . . . . . : 00-01-00-01-21-1F-8F-A8-00-40-A7-13-53-CB
Servidores DNS. . . . . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS em Tcpip. . . . . . . . . . . . . . : Habilitado
Adaptador Ethernet VMware Network Adapter VMnet1:
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet1
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-50-56-C0-00-01
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Endere‡o IPv6 de link local . . . . . . . . : fe80::81ad:3715:a9f4:f5ff%20(Preferencial)
Endere‡o IPv4. . . . . . . . . . . . . . . : 192.168.92.1(Preferencial)
M scara de Sub-rede . . . . . . . . . . . . : 255.255.255.0
Gateway PadrÆo. . . . . . . . . . . . . . . :
IAID de DHCPv6. . . . . . . . . . . . . . . : 453005398
DUID de Cliente DHCPv6. . . . . . . . . . . : 00-01-00-01-21-1F-8F-A8-00-40-A7-13-53-CB
Servidores DNS. . . . . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS em Tcpip. . . . . . . . . . . . . . : Habilitado
Adaptador Ethernet VMware Network Adapter VMnet8:
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-50-56-C0-00-08
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Endere‡o IPv6 de link local . . . . . . . . : fe80::347c:2f93:52a9:ef38%21(Preferencial)
Endere‡o IPv4. . . . . . . . . . . . . . . : 192.168.161.1(Preferencial)
M scara de Sub-rede . . . . . . . . . . . . : 255.255.255.0
Gateway PadrÆo. . . . . . . . . . . . . . . :
IAID de DHCPv6. . . . . . . . . . . . . . . : 486559830
DUID de Cliente DHCPv6. . . . . . . . . . . : 00-01-00-01-21-1F-8F-A8-00-40-A7-13-53-CB
Servidores DNS. . . . . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS em Tcpip. . . . . . . . . . . . . . : Habilitado
Adaptador de t£nel isatap.{09C21422-F4BD-454D-AC8C-649689CB9542}:
Estado da m¡dia. . . . . . . . . . . . . . : m¡dia desconectada
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : Adaptador do Microsoft ISATAP
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Adaptador de t£nel Teredo Tunneling Pseudo-Interface:
Estado da m¡dia. . . . . . . . . . . . . . : m¡dia desconectada
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Adaptador de t£nel isatap.{A228B3AE-17BA-4261-8A7D-5DE53469BE2C}:
Estado da m¡dia. . . . . . . . . . . . . . : m¡dia desconectada
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : Adaptador do Microsoft ISATAP #2
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Adaptador de t£nel isatap.{4524335E-9333-4DF5-A55D-71594040FEF0}:
Estado da m¡dia. . . . . . . . . . . . . . : m¡dia desconectada
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : Adaptador do Microsoft ISATAP #3
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim
Adaptador de t£nel isatap.{613F099D-B263-425C-8AE8-85062772DBF5}:
Estado da m¡dia. . . . . . . . . . . . . . : m¡dia desconectada
Sufixo DNS espec¡fico de conexÆo. . . . . . :
Descri‡Æo . . . . . . . . . . . . . . . . . : Adaptador do Microsoft ISATAP #4
Endere‡o F¡sico . . . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Habilitado . . . . . . . . . . . . . . : NÆo
Configura‡Æo Autom tica Habilitada. . . . . : Sim