Request for support / IOT connection setup

Greg Oliver oliver.greg at gmail.com
Mon Apr 1 16:21:42 UTC 2024


On Mon, Apr 1, 2024 at 4:31 AM <christian.kaiser at messagerie.de> wrote:

> Dear community,
>
> This is my
>
> Setup:
>
> I am on debian bookworm, uname -r: 6.6.20+rpt-rpi-v8 with NetworkManager
> –version:  1.42.4
>
> My wwan device is a ID 1e0e:9001 Qualcomm / Option SimTech SIM7000 with
>
> udev rule: ACTION=="add", SUBSYSTEM=="net", ATTR{qmi/raw_ip}=="*",
> ATTR{qmi/raw_ip}="Y"
>
> The NetworkManager connection
>
> nmcli connection add type gsm ifname '*' con-name 'test' apn 'iot.1nce.net'
> \n
>
> connection.autoconnect yes \n
>
> connection.lldp 0 \n
>
> ipv6.method disabled \n
>
> gsm.mtu 1200
>
> is successful: Connection successfully activated (D-Bus active path:
> /org/freedesktop/NetworkManager/ActiveConnection/8)
>
> and ifconfig reports:
>
> wwan0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST>  mtu 1200
>
>         inet 10.238.250.1  netmask 255.255.255.252  destination
> 10.238.250.1
>
>         unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  txqueuelen
> 1000  (UNSPEC)
>
>         RX packets 0  bytes 0 (0.0 B)
>
>         RX errors 0  dropped 0  overruns 0  frame 0
>
>         TX packets 1028  bytes 426040 (416.0 KiB)
>
>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
> After setting up the appropriate routing table – not shown here – I can
> send and receive udp datagrams.
>
>
>
> This is my
>
> Problem I am asking for help:
>
> tcpdump -vv  -i wwan0 shows this output (excerpt):
>
> ….
>
> 22:50:22.477131 IP (tos 0x0, ttl 1, id 54018, offset 0, flags [DF], proto
> UDP (17), length 419)
>
>     10.238.250.1.2053 > 239.2.1.1.2053: [udp sum ok] UDP, length 391
>
> 22:50:32.481315 IP (tos 0x0, ttl 1, id 54239, offset 0, flags [DF], proto
> UDP (17), length 419)
>
>     10.238.250.1.2053 > 239.2.1.1.2053: [udp sum ok] UDP, length 391
>
>>
>
>
> Some “process” is sending every 10 seconds traffic over wwan0.
>
>
>
> How can identify the “process”  and stop the traffic?
>

netstat --help
        -p, --programs           display PID/Program name for sockets

So - `netstat -p | grep 2053 | grep 239.2.1.1` will give you the pid of the
program sending traffic to 239.2.1.1 on port 2053



>
>
> Regards
>
> Christian
>
>
>
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.freedesktop.org/archives/networkmanager/attachments/20240401/54d5f50c/attachment.htm>


More information about the Networkmanager mailing list