@@ -134,7 +134,7 @@ The default route via ``192.168.250.1`` directs upstream packets to
134134the Internet via the ``core `` interface, with a next hop of the
135135``core `` interface outside the UPF. These packets then undergo source
136136NAT in the kernel and are sent to the IP destination in the packet.
137- This means that the ``172.250.0 .0/16 `` addresses assigned to UEs are
137+ This means that the ``192.168.100 .0/24 `` addresses assigned to UEs are
138138not visible beyond the Aether server. The return (downstream) packets
139139undergo reverse NAT and now have a destination IP address of the UE.
140140They are forwarded by the kernel to the ``core `` interface by these
@@ -144,11 +144,11 @@ rules on the server:
144144
145145 $ route -n | grep "Iface\|core"
146146 Destination Gateway Genmask Flags Metric Ref Use Iface
147- 172.250.0 .0 192.168.250.3 255.255.0.0 UG 0 0 0 core
147+ 192.168.100 .0 192.168.250.3 255.255.0.0 UG 0 0 0 core
148148 192.168.250.0 0.0.0.0 255.255.255.0 U 0 0 0 core
149149
150150 The first rule above matches packets to the UEs on the
151- ``172.250.0 .0/16 `` subnet. The next hop for these packets is the
151+ ``192.168.100 .0/24 `` subnet. The next hop for these packets is the
152152``core `` IP address inside the UPF. The second rule says that next
153153hop address is reachable on the ``core `` interface outside the UPF.
154154As a result, the downstream packets arrive in the UPF where they are
@@ -232,7 +232,7 @@ sections, but for a summary, see the :doc:`Quick Reference </onramp/ref>`.
232232 ip:
233233 access: "192.168.252.3/24"
234234 core: "192.168.250.3/24"
235- ue_ip_pool: "172.250.0 .0/16 "
235+ ue_ip_pool: "192.168.100 .0/24 "
236236 amf:
237237 ip: "10.76.28.113"
238238
@@ -263,8 +263,8 @@ example ``ens18`` interface for illustrative purposes:
263263 $ sudo tcpdump -i any sctp -w sctp-test.pcap
264264 $ sudo tcpdump -i ens18 port 2152 -w n3-outside.pcap
265265 $ sudo tcpdump -i access port 2152 -w n3-inside.pcap
266- $ sudo tcpdump -i core net 172.250.0 .0/16 -w n6-inside.pcap
267- $ sudo tcpdump -i ens18 net 172.250.0 .0/16 -w n6-outside.pcap
266+ $ sudo tcpdump -i core net 192.168.100 .0/24 -w n6-inside.pcap
267+ $ sudo tcpdump -i ens18 net 192.168.100 .0/24 -w n6-outside.pcap
268268
269269 The first trace, saved in file ``sctp.pcap ``, captures SCTP packets
270270sent to establish the control path between the base station and the
@@ -284,7 +284,7 @@ the interface to ``access`` corresponds to "inside" the UPF. Running
284284Similarly, the fourth and fifth traces, saved in files
285285``n6-inside.pcap `` and ``n6-outside.pcap ``, respectively, capture IP
286286packets on the Internet side of the UPF (over the **N6 ** interface).
287- In these two tests, ``net 172.250.0 .0/16 `` corresponds to the IP
287+ In these two tests, ``net 192.168.100 .0/24 `` corresponds to the IP
288288addresses assigned to UEs by the SMF. Running ``ping `` from a physical
289289UE will generate the relevant user plane traffic; gNBsim automatically
290290triggers this activity.
0 commit comments