Host-only VirtualBox vboxnet1 IP belongs to host -
i'm trying connect server running on guest os in virtualbox. virtualbox configured assign static ip guest. i'm pretty sure ip assigns belongs host. if have nginx server running on host requests vboxnet1 ip intercepted host serve , never reach guest.
both host , guest debian.
also, same result , without virtualbox dhcp server enabled.
here's virtualbox network settings (can't embed images <10 rep...sigh):
and vm network settings:
i've tried different ip addresses host, no change.
ifconfig on host:
$ ifconfig eth0 link encap:ethernet hwaddr 00:90:f5:e8:b0:e0 broadcast multicast mtu:1500 metric:1 rx packets:0 errors:0 dropped:0 overruns:0 frame:0 tx packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 rx bytes:0 (0.0 b) tx bytes:0 (0.0 b) lo link encap:local loopback inet addr:127.0.0.1 mask:255.0.0.0 inet6 addr: ::1/128 scope:host loopback running mtu:65536 metric:1 rx packets:183363 errors:0 dropped:0 overruns:0 frame:0 tx packets:183363 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 rx bytes:70022881 (70.0 mb) tx bytes:70022881 (70.0 mb) vboxnet1 link encap:ethernet hwaddr 0a:00:27:00:00:01 inet addr:192.168.66.1 bcast:192.168.66.255 mask:255.255.255.0 inet6 addr: fe80::800:27ff:fe00:1/64 scope:link broadcast running multicast mtu:1500 metric:1 rx packets:0 errors:0 dropped:0 overruns:0 frame:0 tx packets:2545 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 rx bytes:0 (0.0 b) tx bytes:308371 (308.3 kb) wlan0 link encap:ethernet hwaddr 24:fd:52:c0:1b:b1 inet addr:192.168.2.106 bcast:192.168.2.255 mask:255.255.255.0 inet6 addr: fe80::26fd:52ff:fec0:1bb1/64 scope:link broadcast running multicast mtu:1500 metric:1 rx packets:11724555 errors:0 dropped:0 overruns:0 frame:0 tx packets:7429276 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 rx bytes:16204472393 (16.2 gb) tx bytes:1222715861 (1.2 gb)
iptables on host:
$ sudo iptables -l [sudo] password aidan: chain input (policy accept) target prot opt source destination chain forward (policy accept) target prot opt source destination chain output (policy accept) target prot opt source destination
here's nmap comparing host ip , 'guest' ip:
$ nmap 192.168.66.1 starting nmap 6.40 ( http://nmap.org ) @ 2015-07-22 13:28 cest nmap scan report 192.168.66.1 host (0.00015s latency). not shown: 995 closed ports port state service 139/tcp open netbios-ssn 445/tcp open microsoft-ds 902/tcp open iss-realsecure 3128/tcp open squid-http 5050/tcp open mmcc nmap done: 1 ip address (1 host up) scanned in 0.16 seconds $ nmap 192.168.2.106 starting nmap 6.40 ( http://nmap.org ) @ 2015-07-22 13:28 cest nmap scan report 192.168.2.106 host (0.00015s latency). not shown: 995 closed ports port state service 139/tcp open netbios-ssn 445/tcp open microsoft-ds 902/tcp open iss-realsecure 3128/tcp open squid-http 5050/tcp open mmcc nmap done: 1 ip address (1 host up) scanned in 0.17 seconds
Comments
Post a Comment