root@vpn-opn-1:~ # tcpdump -nienc0 host 10.50.10.10tcpdump: verbose output suppressed, use -v[v]... for full protocol decodelistening on enc0, link-type ENC (OpenBSD encapsulated IP), snapshot length 262144 bytes12:25:32.844266 (authentic,confidential): SPI 0xc231abbe: IP 10.50.10.10.41646 > 10.9.255.1.8101: Flags [S], seq 2403085221, win 62727, options [mss 1375,sackOK,TS val 2428826062 ecr 0,nop,wscale 7], length 012:25:43.840594 (authentic,confidential): SPI 0xc231abbe: IP 10.50.10.10.44598 > 10.9.255.1.8101: Flags [S], seq 2402410318, win 62727, options [mss 1375,sackOK,TS val 2428837058 ecr 0,nop,wscale 7], length 012:25:44.844619 (authentic,confidential): SPI 0xc231abbe: IP 10.50.10.10.44598 > 10.9.255.1.8101: Flags [S], seq 2402410318, win 62727, options [mss 1375,sackOK,TS val 2428838062 ecr 0,nop,wscale 7], length 0^C3 packets captured1289 packets received by filter0 packets dropped by kernel
root@ingester:~# tcpdump -ni bond0.1400 port 8101tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on bond0.1400, link-type EN10MB (Ethernet), capture size 262144 bytes12:30:08.390725 IP 10.50.10.10.52000 > 172.30.1.201.8101: Flags [S], seq 1619491635, win 62727, options [mss 1375,sackOK,TS val 2429101425 ecr 0,nop,wscale 7], length 012:30:08.390796 IP 172.30.1.201.8101 > 10.50.10.10.52000: Flags [S.], seq 2658258262, ack 1619491636, win 65160, options [mss 1460,sackOK,TS val 3474148164 ecr 2429101425,nop,wscale 7], length 012:30:09.428097 IP 10.50.10.10.52000 > 172.30.1.201.8101: Flags [S], seq 1619491635, win 62727, options [mss 1375,sackOK,TS val 2429102462 ecr 0,nop,wscale 7], length 012:30:09.428144 IP 172.30.1.201.8101 > 10.50.10.10.52000: Flags [S.], seq 2674466878, ack 1619491636, win 65160, options [mss 1460,sackOK,TS val 3474149201 ecr 2429102462,nop,wscale 7], length 0^C4 packets captured4 packets received by filter0 packets dropped by kernelroot@ingester:~#
root@vpn-opn-1:~ # tcpdump -nivtnet0 host 10.50.10.10tcpdump: verbose output suppressed, use -v[v]... for full protocol decodelistening on vtnet0, link-type EN10MB (Ethernet), snapshot length 262144 bytes12:31:56.379511 IP 10.50.10.10.38038 > 172.30.1.201.8101: Flags [S], seq 2684226038, win 62727, options [mss 1375,sackOK,TS val 2429209596 ecr 0,nop,wscale 7], length 012:31:56.380105 IP 172.30.1.201.8101 > 10.50.10.10.38038: Flags [S.], seq 2006560483, ack 2684226039, win 65160, options [mss 1460,sackOK,TS val 3474256336 ecr 2429209596,nop,wscale 7], length 012:31:57.404419 IP 10.50.10.10.38038 > 172.30.1.201.8101: Flags [S], seq 2684226038, win 62727, options [mss 1375,sackOK,TS val 2429210622 ecr 0,nop,wscale 7], length 012:31:57.404941 IP 172.30.1.201.8101 > 10.50.10.10.38038: Flags [S.], seq 2022573573, ack 2684226039, win 65160, options [mss 1460,sackOK,TS val 3474257361 ecr 2429210622,nop,wscale 7], length 012:31:58.430947 IP 172.30.1.201.8101 > 10.50.10.10.38038: Flags [S.], seq 2022573573, ack 2684226039, win 65160, options [mss 1460,sackOK,TS val 3474258387 ecr 2429210622,nop,wscale 7], length 012:32:00.446930 IP 172.30.1.201.8101 > 10.50.10.10.38038: Flags [S.], seq 2022573573, ack 2684226039, win 65160, options [mss 1460,sackOK,TS val 3474260403 ecr 2429210622,nop,wscale 7], length 0^C6 packets captured4609 packets received by filter0 packets dropped by kernelroot@vpn-opn-1:~ #