# route -v -n get 192.168.0.32RTA_DST: inet 192.168.0.32; RTA_IFP: link ; RTM_GET: Report Metrics: len 224, pid: 0, seq 1, errno 0, flags:<UP,GATEWAY,HOST,STATIC>locks: inits:sockaddrs: <DST,IFP> 192.168.0.32 link#0 route to: 192.168.0.32destination: 192.168.0.0 mask: 255.255.255.0 fib: 0 interface: vtnet0 flags: <UP,DONE,PINNED> recvpipe sendpipe ssthresh rtt,msec mtu weight expire 0 0 0 0 1500 1 0locks: inits:sockaddrs: <DST,GATEWAY,NETMASK,IFP,IFA> 192.168.0.0 link#1 255.255.255.0 vtnet0:0.a0.98.6f.f4.40 192.168.0.5# tcpdump -n -i vtnet0 -e src or dst host 192.168.0.32 and tcp and src or dst port 22tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on vtnet0, link-type EN10MB (Ethernet), capture size 262144 bytes10:34:21.463675 00:0d:b9:47:25:40 > 00:a0:98:6f:f4:40, ethertype IPv4 (0x0800), length 74: 192.168.0.32.38774 > 192.168.0.5.22: Flags [S], seq 3385995390, win 64240, options [mss 1460,sackOK,TS val 2147404981 ecr 0,nop,wscale 7], length 010:34:21.463721 00:a0:98:6f:f4:40 > 00:0d:b9:47:25:40, ethertype IPv4 (0x0800), length 74: 192.168.0.5.22 > 192.168.0.32.38774: Flags [S.], seq 704437459, ack 3385995391, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 432472754 ecr 2147404981], length 010:34:21.463923 00:0d:b9:47:25:40 > 00:a0:98:6f:f4:40, ethertype IPv4 (0x0800), length 66: 192.168.0.32.38774 > 192.168.0.5.22: Flags [.], ack 1, win 502, options [nop,nop,TS val 2147404982 ecr 432472754], length 010:34:21.466826 00:0d:b9:47:25:40 > 00:a0:98:6f:f4:40, ethertype IPv4 (0x0800), length 106: 192.168.0.32.38774 > 192.168.0.5.22: Flags [P.], seq 1:41, ack 1, win 502, options [nop,nop,TS val 2147404985 ecr 432472754], length 4010:34:21.466862 00:a0:98:6f:f4:40 > 00:0d:b9:47:25:40, ethertype IPv4 (0x0800), length 66: 192.168.0.5.22 > 192.168.0.32.^C
# route -v -n get 192.168.0.32RTA_DST: inet 192.168.0.32; RTA_IFP: link ; RTM_GET: Report Metrics: len 224, pid: 0, seq 1, errno 0, flags:<UP,GATEWAY,HOST,STATIC>locks: inits:sockaddrs: <DST,IFP> 192.168.0.32 link#0 route to: 192.168.0.32destination: 192.168.0.32 gateway: 192.168.0.254 fib: 0 interface: vtnet0 flags: <UP,GATEWAY,HOST,DONE,STATIC> recvpipe sendpipe ssthresh rtt,msec mtu weight expire 0 0 0 0 1500 1 0locks: inits:sockaddrs: <DST,GATEWAY,IFP,IFA> 192.168.0.32 192.168.0.254 vtnet0:0.a0.98.6f.f4.40 192.168.0.5# tcpdump -n -i vtnet0 -e src or dst host 192.168.0.32 and tcp and src or dst port 22tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on vtnet0, link-type EN10MB (Ethernet), capture size 262144 bytes10:24:31.951129 00:0d:b9:47:25:40 > 00:a0:98:6f:f4:40, ethertype IPv4 (0x0800), length 74: 192.168.0.32.59048 > 192.168.0.5.22: Flags [S], seq 4118321306, win 64240, options [mss 1460,sackOK,TS val 2146815468 ecr 0,nop,wscale 7], length 010:24:31.951217 00:a0:98:6f:f4:40 > 00:00:5e:00:01:01, ethertype IPv4 (0x0800), length 74: 192.168.0.5.22 > 192.168.0.32.59048: Flags [S.], seq 42904569, ack 4118321307, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2836344428 ecr 2146815468], length 010:24:32.947798 00:a0:98:6f:f4:40 > 00:00:5e:00:01:01, ethertype IPv4 (0x0800), length 74: 192.168.0.5.22 > 192.168.0.32.59048: Flags [S.], seq 42904569, ack 4118321307, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2836345424 ecr 2146815468], length 010:24:32.964348 00:0d:b9:47:25:40 > 00:a0:98:6f:f4:40, ethertype IPv4 (0x0800), length 74: 192.168.0.32.59048 > 192.168.0.5.22: Flags [S], seq 4118321306, win 64240, options [mss 1460,sackOK,TS val 2146816482 ecr 0,nop,wscale 7], length 010:24:32.964389 00:a0:98:6f:f4:40 > 00:00:5e:00:01:01, ethertype IPv4 (0x0800), length 74: 192.168.0.5.22 > 192.168.0.32.59048: Flags [S.], seq 42904569, ack 4118321307, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2836345438 ecr 2146816482], length 010:24:34.017659 00:a0:98:6f:f4:40 > 00:00:5e:00:01:01, ethertype IPv4 (0x0800), length 74: 192.168.0.5.22 > 192.168.0.32.59048: Flags [S.], seq 42904569, ack 4118321307, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2836346494 ecr 2146816482], length 0^C
# pfctl -saFILTER RULES:INFO:Status: Disabled Debug: UrgentState Table Total Rate current entries 0 searches 0 0.0/s inserts 0 0.0/s removals 0 0.0/sCounters match 0 0.0/s bad-offset 0 0.0/s fragment 0 0.0/s short 0 0.0/s normalize 0 0.0/s memory 0 0.0/s bad-timestamp 0 0.0/s congestion 0 0.0/s ip-option 0 0.0/s proto-cksum 0 0.0/s state-mismatch 0 0.0/s state-insert 0 0.0/s state-limit 0 0.0/s src-limit 0 0.0/s synproxy 0 0.0/s map-failed 0 0.0/sTIMEOUTS:tcp.first 120stcp.opening 30stcp.established 86400stcp.closing 900stcp.finwait 45stcp.closed 90stcp.tsdiff 30ssctp.first 120ssctp.opening 30ssctp.established 86400ssctp.closing 900ssctp.closed 90sudp.first 60sudp.single 30sudp.multiple 60sicmp.first 20sicmp.error 10sother.first 60sother.single 30sother.multiple 60sfrag 30sinterval 10sadaptive.start 60000 statesadaptive.end 120000 statessrc.track 0sLIMITS:states hard limit 100000src-nodes hard limit 10000frags hard limit 5000table-entries hard limit 200000TABLES:__lan_network__lo0_network# netstat -nrRouting tablesInternet:Destination Gateway Flags Netif Expiredefault 192.168.0.254 UGS vtnet0127.0.0.1 link#2 UH lo0192.168.0.0/24 link#1 U vtnet0192.168.0.5 link#1 UHS lo0Internet6:Destination Gateway Flags Netif Expire::1 link#2 UHS lo0fe80::%lo0/64 link#2 U lo0fe80::1%lo0 link#2 UHS lo0