Linux – Traceroute doesn’t reach gateway

gatewayipv4linuxnetworking

I have problem with my openSUSE 11.3 network. So, I've assigned IP address 192.168.137.2 to it, and another computer (Windows 7) with IP address 192.168.137.1.

On the openSUSE, the gateway is the 192.168.137.1. and the ping result is

ping 192.168.137.1

PING 192.168.137.1 (192.168.137.1) 56(84) bytes of data.
64 bytes from 192.168.137.1: icmp_seq=1 ttl=128 time=2.53 ms
64 bytes from 192.168.137.1: icmp_seq=2 ttl=128 time=0.437 ms
^C
--- 192.168.137.1 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 0.437/1.487/2.537/1.050 ms

And the routing is:

route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.137.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
10.1.1.0        0.0.0.0         255.255.255.0   U     0      0        0 eth0
169.254.0.0     0.0.0.0         255.255.0.0     U     0      0        0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         192.168.137.1   0.0.0.0         UG    0      0        0 eth0

but, what the problem is,

traceroute 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 40 byte packets using UDP
 1  * * *
 2  * * *
 .
 .
 .
30  * * *

Why does the traceroute not even reach the gateway? Or maybe, this is the networking rule I missed somehow.

Best Answer

The reason probably is that the Windows 7 internal firewall filters some kinds of packets. Try to disable firewall in Win7 for a while. Use GUI Control Panel or start CLI window as an administrator and issue command

netsh firewall set opmode disable

Now repeat traceroute test. In case of positive response from your gateway 192.168.137.1 your next step must be to re-enable Win7 firewall

netsh firewall set opmode enable

and change its setting to allow the trace.

If problem persist with disabled W7 firewall you should check local firewall in OpenSUSE PC. Next command flushes all firewall rules and enables totally open communication till next reboot:

iptables -F *