Du hast vermutlich nur Konnektivität zu Hosts von bluewin.ch, zu keinen anderen. Du musst mit Deinem Carrier klären, wie weiter zu verfahren ist.
Der ISP gibt nur Support von ihrem Geräten im Internet
Ich muss auf die Seite
www.swisscom.ch/registration und mich dort einloggen mit meinem Login!
Habe die DNS Server mal auf Swisscom-DNS geändert
root@ROUTER morta]# tcpdump -n -p -i eth0.10
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0.10, link-type EN10MB (Ethernet), capture size 262144 bytes
16:00:27.937717 IP 192.168.1.25.37632 > 172.217.168.74.443: Flags [S], seq 2332390700, win 64240, options [mss 1460,sackOK,TS val 1700528057 ecr 0,nop,wscale 7], length 0
16:00:27.940937 IP 192.168.1.25.52190 > 172.217.168.42.443: Flags [S], seq 473960116, win 64240, options [mss 1460,sackOK,TS val 3742993511 ecr 0,nop,wscale 7], length 0
16:00:28.719438 IP 192.168.1.25.48858 > 54.175.13.201.443: Flags [S], seq 3979048970, win 64240, options [mss 1460,sackOK,TS val 3339468644 ecr 0,nop,wscale 7], length 0
16:00:28.719527 IP 192.168.1.25.48860 > 54.175.13.201.443: Flags [S], seq 3918067417, win 64240, options [mss 1460,sackOK,TS val 3339468644 ecr 0,nop,wscale 7], length 0
16:00:36.302015 IP 83.76.250.253.45495 > 193.33.30.39.123: NTPv4, Client, length 48
16:00:46.552007 IP 83.76.250.253.48078 > 213.144.138.218.123: NTPv4, Client, length 48
16:00:47.376905 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
16:00:47.420924 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339487346 ecr 0,nop,wscale 7], length 0
16:00:47.422895 IP 83.76.250.253.3509 > 195.186.1.162.53: 38+ A? collector-hpn.ghostery.net. (44)
16:00:47.422999 IP 83.76.250.253.3509 > 195.186.4.162.53: 38+ A? collector-hpn.ghostery.net. (44)
16:00:47.423279 IP 83.76.250.253.37335 > 195.186.1.162.53: 20794+ AAAA? collector-hpn.ghostery.net. (44)
16:00:47.427931 IP 195.186.1.162.53 > 83.76.250.253.3509: 38 4/0/0 CNAME collector-hpn.privacy.ghostery.net., A 54.175.13.201, A 3.94.1.170, A 3.208.182.109 (128)
16:00:47.428636 IP 195.186.1.162.53 > 83.76.250.253.37335: 20794 1/1/0 CNAME collector-hpn.privacy.ghostery.net. (161)
16:00:47.429293 IP 195.186.4.162.53 > 83.76.250.253.3509: 38 4/0/0 CNAME collector-hpn.privacy.ghostery.net., A 54.175.13.201, A 3.94.1.170, A 3.208.182.109 (128)
16:00:47.429455 IP 83.76.250.253 > 195.186.4.162: ICMP 83.76.250.253 udp port 3509 unreachable, length 164
16:00:47.671611 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339487597 ecr 0,nop,wscale 7], length 0
16:00:47.797940 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339487723 ecr 0,nop,wscale 7], length 0
16:00:47.940314 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034930975 ecr 0,nop,wscale 7], length 0
16:00:48.053010 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339487978 ecr 0,nop,wscale 7], length 0
16:00:48.190949 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743013761 ecr 0,nop,wscale 7], length 0
16:00:48.422438 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339488347 ecr 0,nop,wscale 7], length 0
16:00:48.689143 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339488614 ecr 0,nop,wscale 7], length 0
16:00:48.822404 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339488747 ecr 0,nop,wscale 7], length 0
16:00:48.955765 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034931991 ecr 0,nop,wscale 7], length 0
16:00:49.062345 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339488987 ecr 0,nop,wscale 7], length 0
16:00:49.195762 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743014766 ecr 0,nop,wscale 7], length 0
16:00:50.475793 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339490401 ecr 0,nop,wscale 7], length 0
16:00:50.546119 IP 83.76.250.253 > 224.0.0.22: igmp v3 report, 1 group record(s)
16:00:50.905714 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339490831 ecr 0,nop,wscale 7], length 0
16:00:50.905797 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339490831 ecr 0,nop,wscale 7], length 0
16:00:51.115680 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339491041 ecr 0,nop,wscale 7], length 0
16:00:51.115758 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034934151 ecr 0,nop,wscale 7], length 0
16:00:51.328986 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743016899 ecr 0,nop,wscale 7], length 0
16:00:54.315696 IP 192.168.1.25.58312 > 195.186.145.93.443: Flags [S], seq 684680908, win 64240, options [mss 1460,sackOK,TS val 3440070699 ecr 0,nop,wscale 7], length 0
16:00:54.315795 IP 192.168.1.25.58314 > 195.186.145.93.443: Flags [S], seq 3451636052, win 64240, options [mss 1460,sackOK,TS val 3440070699 ecr 0,nop,wscale 7], length 0
16:00:54.528972 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339494454 ecr 0,nop,wscale 7], length 0
16:00:54.955638 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339494881 ecr 0,nop,wscale 7], length 0
16:00:54.955724 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339494881 ecr 0,nop,wscale 7], length 0
16:00:55.168883 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034938204 ecr 0,nop,wscale 7], length 0
16:00:55.168959 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339495094 ecr 0,nop,wscale 7], length 0
16:00:55.382251 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743020952 ecr 0,nop,wscale 7], length 0
16:00:55.506092 ARP, Request who-has 83.76.250.1 tell 83.76.250.253, length 28
16:00:55.509811 ARP, Reply 83.76.250.1 is-at 4c:96:14:68:43:c9, length 42
16:00:56.810069 IP 83.76.250.253.35966 > 172.104.136.243.53: 89+% [1au] A? 2.arch.pool.ntp.org. (71)
16:00:56.810760 IP 83.76.250.253.32815 > 195.186.4.162.53: 24507+% [1au] A? 2.arch.pool.ntp.org. (71)
16:00:56.816843 IP 195.186.4.162.53 > 83.76.250.253.32815: 24507 4/0/1 A 185.17.70.106, A 82.197.188.130, A 185.134.196.76, A 31.3.135.232 (112)
16:00:56.817938 IP 83.76.250.253.54907 > 195.186.4.162.53: 37836+% [1au] SOA? 2.arch.pool.ntp.org. (71)
16:00:56.824581 IP 195.186.4.162.53 > 83.76.250.253.54907: 37836 0/1/1 (103)
16:00:56.828271 IP 83.76.250.253.55096 > 185.17.70.106.123: NTPv4, Client, length 48
16:00:57.941245 IP 192.168.1.25.44772 > 216.58.215.234.443: Flags [S], seq 2188739712, win 64240, options [mss 1460,sackOK,TS val 2371188078 ecr 0,nop,wscale 7], length 0
16:00:58.540702 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339498466 ecr 0,nop,wscale 7], length 0
16:00:58.796543 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339498722 ecr 0,nop,wscale 7], length 0
16:00:59.542253 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339499467 ecr 0,nop,wscale 7], length 0
16:00:59.808889 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339499734 ecr 0,nop,wscale 7], length 0
16:01:01.568896 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339501494 ecr 0,nop,wscale 7], length 0
16:01:01.995510 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339501921 ecr 0,nop,wscale 7], length 0
16:01:02.619148 IP6 fe80::f2ad:4eff:fe09:6a7f > ff02::2: ICMP6, router solicitation, length 16
16:01:02.628961 IP 192.168.1.25.40670 > 193.247.167.91.80: Flags [S], seq 1037446016, win 64240, options [mss 1460,sackOK,TS val 913004153 ecr 0,nop,wscale 7], length 0
16:01:02.635401 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339502561 ecr 0,nop,wscale 7], length 0
16:01:02.879491 IP 192.168.1.25.40672 > 193.247.167.91.80: Flags [S], seq 1002981317, win 64240, options [mss 1460,sackOK,TS val 913004404 ecr 0,nop,wscale 7], length 0
16:01:02.881925 IP 162.243.142.246.58753 > 83.76.250.253.135: Flags [S], seq 3021953845, win 65535, length 0
16:01:02.882075 IP 83.76.250.253.135 > 162.243.142.246.58753: Flags [R.], seq 0, ack 3021953846, win 0, length 0
16:01:03.062172 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339502987 ecr 0,nop,wscale 7], length 0
16:01:03.062252 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339502987 ecr 0,nop,wscale 7], length 0
16:01:03.275490 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339503201 ecr 0,nop,wscale 7], length 0
16:01:03.648829 IP 192.168.1.25.40670 > 193.247.167.91.80: Flags [S], seq 1037446016, win 64240, options [mss 1460,sackOK,TS val 913005173 ecr 0,nop,wscale 7], length 0
16:01:03.888803 IP 192.168.1.25.40672 > 193.247.167.91.80: Flags [S], seq 1002981317, win 64240, options [mss 1460,sackOK,TS val 913005413 ecr 0,nop,wscale 7], length 0
16:01:05.622147 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339505547 ecr 0,nop,wscale 7], length 0
16:01:05.835356 IP 192.168.1.25.40670 > 193.247.167.91.80: Flags [S], seq 1037446016, win 64240, options [mss 1460,sackOK,TS val 913007360 ecr 0,nop,wscale 7], length 0
16:01:06.048755 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339505974 ecr 0,nop,wscale 7], length 0
16:01:06.048832 IP 192.168.1.25.40672 > 193.247.167.91.80: Flags [S], seq 1002981317, win 64240, options [mss 1460,sackOK,TS val 913007573 ecr 0,nop,wscale 7], length 0
16:01:07.051956 IP 83.76.250.253.55132 > 82.197.188.130.123: NTPv4, Client, length 48
16:01:07.630471 IP 192.168.1.25.47664 > 193.247.167.104.80: Flags [S], seq 1751409768, win 64240, options [mss 1460,sackOK,TS val 1310493402 ecr 0,nop,wscale 7], length 0
16:01:07.880979 IP 192.168.1.25.47666 > 193.247.167.104.80: Flags [S], seq 3827386569, win 64240, options [mss 1460,sackOK,TS val 1310493652 ecr 0,nop,wscale 7], length 0
16:01:08.635361 IP 192.168.1.25.47664 > 193.247.167.104.80: Flags [S], seq 1751409768, win 64240, options [mss 1460,sackOK,TS val 1310494407 ecr 0,nop,wscale 7], length 0
16:01:08.902020 IP 192.168.1.25.47666 > 193.247.167.104.80: Flags [S], seq 3827386569, win 64240, options [mss 1460,sackOK,TS val 1310494673 ecr 0,nop,wscale 7], length 0
16:01:09.709870 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339509635 ecr 0,nop,wscale 7], length 0
16:01:09.965729 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339509891 ecr 0,nop,wscale 7], length 0
16:01:10.715325 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339510641 ecr 0,nop,wscale 7], length 0
16:01:10.741923 IP 192.168.1.25.47664 > 193.247.167.104.80: Flags [S], seq 1751409768, win 64240, options [mss 1460,sackOK,TS val 1310496513 ecr 0,nop,wscale 7], length 0
16:01:10.955300 IP 192.168.1.25.47666 > 193.247.167.104.80: Flags [S], seq 3827386569, win 64240, options [mss 1460,sackOK,TS val 1310496727 ecr 0,nop,wscale 7], length 0
16:01:10.981960 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339510907 ecr 0,nop,wscale 7], length 0
16:01:12.875345 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339512801 ecr 0,nop,wscale 7], length 0
16:01:13.088671 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339513014 ecr 0,nop,wscale 7], length 0
16:01:13.728555 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339513654 ecr 0,nop,wscale 7], length 0
16:01:14.155273 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339514081 ecr 0,nop,wscale 7], length 0
16:01:16.928563 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339516854 ecr 0,nop,wscale 7], length 0
16:01:17.141832 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339517067 ecr 0,nop,wscale 7], length 0
16:01:17.302235 IP 83.76.250.253.37498 > 185.134.196.76.123: NTPv4, Client, length 48
16:01:17.377215 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
16:01:17.939106 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700578060 ecr 0,nop,wscale 7], length 0
16:01:18.189757 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034961225 ecr 0,nop,wscale 7], length 0
16:01:18.955144 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700579076 ecr 0,nop,wscale 7], length 0
16:01:19.195129 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034962231 ecr 0,nop,wscale 7], length 0
16:01:19.716334 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669025726 ecr 0,nop,wscale 7], length 0
16:01:19.915157 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:19.915227 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:19.915263 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:19.915295 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:20.707696 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339520633 ecr 0,nop,wscale 7], length 0
16:01:20.741737 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669026751 ecr 0,nop,wscale 7], length 0
16:01:20.960374 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339520886 ecr 0,nop,wscale 7], length 0
16:01:20.981711 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700581102 ecr 0,nop,wscale 7], length 0
16:01:21.408528 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034964444 ecr 0,nop,wscale 7], length 0
16:01:21.666127 IP 83.76.250.253 > 224.0.0.22: igmp v3 report, 1 group record(s)
16:01:21.728424 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339521654 ecr 0,nop,wscale 7], length 0
16:01:21.968456 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339521894 ecr 0,nop,wscale 7], length 0
16:01:22.901753 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669028911 ecr 0,nop,wscale 7], length 0
16:01:23.755112 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339523681 ecr 0,nop,wscale 7], length 0
16:01:24.181724 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339524107 ecr 0,nop,wscale 7], length 0
16:01:25.035039 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339524961 ecr 0,nop,wscale 7], length 0
16:01:25.035128 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700585156 ecr 0,nop,wscale 7], length 0
16:01:25.248436 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339525174 ecr 0,nop,wscale 7], length 0
16:01:25.461613 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034968497 ecr 0,nop,wscale 7], length 0
16:01:26.742174 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700586863 ecr 0,nop,wscale 7], length 0
16:01:26.954912 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669032965 ecr 0,nop,wscale 7], length 0
16:01:27.551985 IP 83.76.250.253.53104 > 31.3.135.232.123: NTPv4, Client, length 48
16:01:27.755035 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700587876 ecr 0,nop,wscale 7], length 0
16:01:27.808276 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339527734 ecr 0,nop,wscale 7], length 0
16:01:27.938579 IP 192.168.1.25.52234 > 172.217.168.42.443: Flags [S], seq 2901926855, win 64240, options [mss 1460,sackOK,TS val 3743053509 ecr 0,nop,wscale 7], length 0
16:01:28.234960 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339528161 ecr 0,nop,wscale 7], length 0
16:01:29.941697 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700590062 ecr 0,nop,wscale 7], length 0
16:01:30.158239 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339530084 ecr 0,nop,wscale 7], length 0
16:01:31.861680 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339531787 ecr 0,nop,wscale 7], length 0
16:01:33.994878 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700594116 ecr 0,nop,wscale 7], length 0
16:01:34.946096 ARP, Request who-has 83.76.250.1 tell 83.76.250.253, length 28
16:01:34.947251 ARP, Reply 83.76.250.1 is-at 4c:96:14:68:43:c9, length 42
16:01:35.061495 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669041071 ecr 0,nop,wscale 7], length 0
16:01:35.914797 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339535841 ecr 0,nop,wscale 7], length 0
16:01:36.341494 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339536267 ecr 0,nop,wscale 7], length 0
16:01:37.810629 IP 83.76.250.253.51203 > 172.104.136.243.53: 27206+% [1au] A? 3.arch.pool.ntp.org. (71)
16:01:37.811251 IP 83.76.250.253.47108 > 195.186.4.162.53: 6393+% [1au] A? 3.arch.pool.ntp.org. (71)
16:01:37.818044 IP 195.186.4.162.53 > 83.76.250.253.47108: 6393 4/0/1 A 217.147.223.78, A 185.17.70.106, A 212.51.144.44, A 195.186.4.101 (112)
16:01:37.818880 IP 83.76.250.253.46756 > 195.186.4.162.53: 65109+% [1au] SOA? 3.arch.pool.ntp.org. (71)
16:01:37.826172 IP 195.186.4.162.53 > 83.76.250.253.46756: 65109 0/1/1 (103)
16:01:37.829778 IP 83.76.250.253.44069 > 217.147.223.78.123: NTPv4, Client, length 48
^C
136 packets captured
136 packets received by filter
0 packets dropped by kernel
[root@ROUTER morta]#
Ich muss doch von eth0.10 zu Ausgang br0 ein Routing machen... Irgendwie kann ich die DNS auflösen habe aber Packet Loss