not exactly it seems, the route command (route add 81.100.216.106 mask
255.255.255.255 192.168.10.1) worked with no error, netstat -nr gave me:
[snip routing table]
but i would have liked the traffic to be normally routed to my localhost,
and pinging 81.100.216.106 gives no reply, though you can easily ping
local interface address 192.168.10.1
That is your localhost (127.0.0.1) and since 192.168.10.1
routes to 127.0.0.1 that is precisely where it goes (eventually).
--
Herb Martin
So you want to make sure your machine cannot send
to that address?
You have the right idea (drop the quotes if you are really using
them) but send to your OWN IP (not 127.0.0.1)....
route ADD 192.168.229.157 MASK 255.255.255.255 YOUR_OWN_IP
...or if your IP is 192.168.0.5
route ADD 192.168.229.157 MASK 255.255.255.255 192.168.0.5
You own IP is routed to the 127.0.0.1 address so it means the
same thing.
not exactly it seems, the route command (route add 81.100.216.106 mask
255.255.255.255 192.168.10.1) worked with no error, netstat -nr gave me:
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.11.1 192.168.10.1 1
81.100.216.106 255.255.255.255 192.168.10.1 192.168.10.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.10.0 255.255.255.0 192.168.10.1 192.168.10.1 1
192.168.10.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.10.255 255.255.255.255 192.168.10.1 192.168.10.1 1
224.0.0.0 224.0.0.0 192.168.10.1 192.168.10.1 1
255.255.255.255 255.255.255.255 192.168.10.1 192.168.10.1 1
Default Gateway: 192.168.11.1
but i would have liked the traffic to be normally routed to my localhost,
and pinging 81.100.216.106 gives no reply, though you can easily ping
local interface address 192.168.10.1