Hi, We are using Tcpreplay to test against network devices. It is powerful and help us greatly! As to handling src-nat device, after reading http://tcpreplay.synfin.net/trac/wiki/usage#PassingTrafficThroughaFirewallRouterNon-TransparentDevice, I still have some questions:
In the attached scenario, Client is on Trust side and Server is on Untrust side. Firewall changes packet’s src ip and src port on its Untrust interface when client access outside server. This is the most normal src-nat implementation. In detail, src ip is changed to Untrust interface ip and src port is changed randomly. As to this diagram, for example, original packet 1.1.1.2:5555à2.2.2.2:80 is changed to 2.2.2.1:6000 (may be 5211 next time)à2.2.2.2:80 These 2 changes cause 2 issues when Tcpreplay sending packets from Server to Client: 1. It should change dst ip address to 2.2.2.1. This can be resolved by tcpwrite. 2. It should change dst port to the randomly generated port, here is 6000. By now tcpreplay likely can’t handle it. So would you help us about issue 2 ?
<<attachment: topology.png>>
------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________ Tcpreplay-users mailing list Tcpreplay-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tcpreplay-users Support Information: http://tcpreplay.synfin.net/trac/wiki/Support