[strongSwan] How is to view "initial" packets within ikev2 packets by tcpdump ?
Noel Kuntze
noel at familie-kuntze.de
Tue Feb 3 21:02:18 CET 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello,
You can leverage the nflog iptables module and tcpdump/dumpcap to
dump traffic in *mangle PREROUTING, *mangle POSTROUTING and *mangle OUTPUT.
Read the manpage of dumpcap/tcpdump/wireshark/whatever you want to use to
see how to capture from an nflog interface.
Mit freundlichen Grüßen/Regards,
Noel Kuntze
GPG Key ID: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
Am 02.02.2015 um 15:47 schrieb CpServiceSPb .:
> I have Ubuntu 14.04 lts (no "x" ) with strongswan installed and set up with ikev2 connections also.
> I need to see what are in outgoing and incoming within ikev2 packets by tcpdump locally at the server.
> That is I need "initial" packet, for example, I ping road-warrior, so I need see these icmp packets.
> How is it possible ?
>
>
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=h9m+
-----END PGP SIGNATURE-----
More information about the Users
mailing list