@@ -134,7 +134,7 @@ The default route via ``192.168.250.1`` directs upstream packets to
134
134
the Internet via the ``core `` interface, with a next hop of the
135
135
``core `` interface outside the UPF. These packets then undergo source
136
136
NAT in the kernel and are sent to the IP destination in the packet.
137
- This means that the ``172.250.0 .0/16 `` addresses assigned to UEs are
137
+ This means that the ``192.168.100 .0/24 `` addresses assigned to UEs are
138
138
not visible beyond the Aether server. The return (downstream) packets
139
139
undergo reverse NAT and now have a destination IP address of the UE.
140
140
They are forwarded by the kernel to the ``core `` interface by these
@@ -144,11 +144,11 @@ rules on the server:
144
144
145
145
$ route -n | grep "Iface\|core"
146
146
Destination Gateway Genmask Flags Metric Ref Use Iface
147
- 172.250.0 .0 192.168.250.3 255.255.0.0 UG 0 0 0 core
147
+ 192.168.100 .0 192.168.250.3 255.255.0.0 UG 0 0 0 core
148
148
192.168.250.0 0.0.0.0 255.255.255.0 U 0 0 0 core
149
149
150
150
The first rule above matches packets to the UEs on the
151
- ``172.250.0 .0/16 `` subnet. The next hop for these packets is the
151
+ ``192.168.100 .0/24 `` subnet. The next hop for these packets is the
152
152
``core `` IP address inside the UPF. The second rule says that next
153
153
hop address is reachable on the ``core `` interface outside the UPF.
154
154
As a result, the downstream packets arrive in the UPF where they are
@@ -232,7 +232,7 @@ sections, but for a summary, see the :doc:`Quick Reference </onramp/ref>`.
232
232
ip:
233
233
access: "192.168.252.3/24"
234
234
core: "192.168.250.3/24"
235
- ue_ip_pool: "172.250.0 .0/16 "
235
+ ue_ip_pool: "192.168.100 .0/24 "
236
236
amf:
237
237
ip: "10.76.28.113"
238
238
@@ -263,8 +263,8 @@ example ``ens18`` interface for illustrative purposes:
263
263
$ sudo tcpdump -i any sctp -w sctp-test.pcap
264
264
$ sudo tcpdump -i ens18 port 2152 -w n3-outside.pcap
265
265
$ sudo tcpdump -i access port 2152 -w n3-inside.pcap
266
- $ sudo tcpdump -i core net 172.250.0 .0/16 -w n6-inside.pcap
267
- $ sudo tcpdump -i ens18 net 172.250.0 .0/16 -w n6-outside.pcap
266
+ $ sudo tcpdump -i core net 192.168.100 .0/24 -w n6-inside.pcap
267
+ $ sudo tcpdump -i ens18 net 192.168.100 .0/24 -w n6-outside.pcap
268
268
269
269
The first trace, saved in file ``sctp.pcap ``, captures SCTP packets
270
270
sent to establish the control path between the base station and the
@@ -284,7 +284,7 @@ the interface to ``access`` corresponds to "inside" the UPF. Running
284
284
Similarly, the fourth and fifth traces, saved in files
285
285
``n6-inside.pcap `` and ``n6-outside.pcap ``, respectively, capture IP
286
286
packets on the Internet side of the UPF (over the **N6 ** interface).
287
- In these two tests, ``net 172.250.0 .0/16 `` corresponds to the IP
287
+ In these two tests, ``net 192.168.100 .0/24 `` corresponds to the IP
288
288
addresses assigned to UEs by the SMF. Running ``ping `` from a physical
289
289
UE will generate the relevant user plane traffic; gNBsim automatically
290
290
triggers this activity.
0 commit comments