I\'m practicing penetration testing and I\'m in front of a basic routing exercise. The context is the following: I\'m using a virtual machine with Kali Linux from which I connec