"Bob Puff@NLE" wrote:
> 
> > I can only suspect you are experiencing the rule
> > which states:  "a packet from netX cannot be routed through netY and back to
> > netX" [EXCEPT if the final destination is netZ]*
> 
> One more thought.  If a http request is made from netX to a machine on netX,
> and the machine generates reply packets sent thru netY to netX, aren't we
> talking about two entirely different packets?  Or are reply packets somehow
> tied to their request packet, sort of like what IP MASQing does?
> 
> Bob

Each direction is distinct and separate; though they generally follow the same
path. 

Let's look at some examples...

Topology:

                   r2--------r4----s2
                    |        |
                    |        |
             s1----r1--------r3
                      
1) All in same net:  any path combination of [s1>r1>r2>r4>s2 | s1>r1>r3>r4>s2]
<--> [s2>r4>r2>r1>s1 | s2>r4>r3>r1>s1] is valid; "ping -R" will often show the
different paths if r1-r2-r4 has the same routing metric as r1-r3-r4 (unless the
"flow" is nailed to one path; even in this last case, the "to" and "from" paths
could be different depending on the router implementation.  Careful examination
of the "ping -R" outputs is required.

2) All but r3 in same "[ABC] net"** (your reply example):  in classful routing,
traffic would NEVER go through r3.  In classless/classful combo (ISPs can
implement this combo by accident), it depends...  All classless, r3 could be
used.

3) s1 in netA, r[124] in netB, r3 in netC, s2 in netD (all classful):  r3 could
handle traffic between s1<-->s2 because this is covered by the "exception"... 
depends on metrics at r[14].

** Using [ABC] *very* loosely...  really mean classful, though not necessarily
restricted to /8, /16 or /24 masking...

Clear as mud...?  :^)

Pierre

Reply via email to