Теперь так:
Сервер:
tap0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=80000<LINKSTATE>
ether 00:bd:40:a3:64:00
inet 192.168.1.161 netmask 0xfffffff0 broadcast 192.168.1.175
Opened by PID 56033192.168.1.160/28 link#5 U 1 210 tap0
192.168.1.161 link#5 UHS 0 0 lo0
192.168.12.0/22 192.168.1.164 UGS 0 16113 tap0
#ipnat -l
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 proxy port ftp ftp/tcp
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 portmap tcp/udp auto
map tap0 192.168.1.0/24 -> 192.168.1.161/32 icmpidmap icmp 64000:65535
ipnat.rules
map tap0 from 192.168.12.0/22 to 192.168.1.0/24 -> 192.168.1.164/32 proxy port ftp ftp/tcp
map tap0 from 192.168.12.0/22 to 192.168.1.0/24 -> 192.168.1.164/32 portmap tcp/udp auto
map tap0 from 192.168.12.0/22 to 192.168.1.0/24 -> 192.168.1.164/32 icmpidmap icmp 64000:65535
Клиент:
tap0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=80000<LINKSTATE>
ether 00:bd:d2:e0:a1:00
inet 192.168.1.164 netmask 0xfffffff0 broadcast 192.168.1.175
Opened by PID 76938
192.168.1.0/24 192.168.1.161 UGS 0 2588 tap0
192.168.1.160/28 link#8 U 0 15854 tap0
192.168.1.164 link#8 UHS 0 0 lo0
#ipnat -l
map tap0 from 192.168.12.0/22 to 192.168.1.0/24 -> 192.168.1.164/32 proxy port ftp ftp/tcp
map tap0 from 192.168.12.0/22 to 192.168.1.0/24 -> 192.168.1.164/32 portmap tcp/udp auto
map tap0 192.168.12.0/22 -> 192.168.1.164/32 icmpidmap icmp 64000:65535
#ipnat.rules
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 proxy port ftp ftp/tcp
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 portmap tcp/udp auto
map tap0 from 192.168.1.0/24 to 192.168.12.0/22 -> 192.168.1.161/32 icmpidmap icmp 64000:65535
Результат:
с сервера в сеть клиента идет пинг
# ping 192.168.14.100
PING 192.168.14.100 (192.168.14.100): 56 data bytes
64 bytes from 192.168.1.164: icmp_seq=0 ttl=127 time=3.820 ms
Но все что касается tcp соединений(ssh) не проходит.
Выдержка tcpdump с клиента.
15:08:28.551233 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
15:08:30.716933 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 11073, length 40
15:08:30.717257 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 11073, length 40
15:08:34.548745 IP 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
15:08:34.552098 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
15:08:36.216685 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 11329, length 40
15:08:36.217010 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 11329, length 40
15:08:37.747812 IP 192.168.1.161.21706 > jim.remt.local.ssh: Flags [S], seq 562607219, win 65535, options [mss 1336,sackOK,eol], length 0
15:08:37.747950 IP 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
15:08:37.750972 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
15:08:40.747337 IP 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
15:08:40.750862 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
15:08:41.716701 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 11585, length 40
15:08:41.717010 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 11585, length 40
15:08:46.747891 IP 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
15:08:46.750733 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
15:08:47.216642 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 11841, length 40
15:08:47.217017 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 11841, length 40
15:08:52.716580 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 12097, length 40
15:08:52.716924 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 12097, length 40
15:08:58.216423 IP 192.168.1.161 > 192.168.14.100: ICMP echo request, id 768, seq 12353, length 40
15:08:58.216783 IP 192.168.1.164 > 192.168.1.161: ICMP echo reply, id 768, seq 12353, length 40
15:08:58.749002 IP 192.168.1.164.ssh > 192.168.1.161.21706: Flags [S.], seq 1512465607, ack 562607220, win 65535, options [mss 1336,nop,wscale 3,sackOK,eol], length 0
15:08:58.752068 IP 192.168.1.161.65042 > 192.168.1.164.ssh: Flags [R], seq 562607220, win 0, length 0
Подскажите в чем дело, в каком направлении идти.