-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hello,
You can leverage the nflog iptables module and tcpdump/dumpcap to dump traffic in *mangle PREROUTING, *mangle POSTROUTING and *mangle OUTPUT. Read the manpage of dumpcap/tcpdump/wireshark/whatever you want to use to see how to capture from an nflog interface. Mit freundlichen Grüßen/Regards, Noel Kuntze GPG Key ID: 0x63EC6658 Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658 Am 02.02.2015 um 15:47 schrieb CpServiceSPb .: > I have Ubuntu 14.04 lts (no "x" ) with strongswan installed and set up with > ikev2 connections also. > I need to see what are in outgoing and incoming within ikev2 packets by > tcpdump locally at the server. > That is I need "initial" packet, for example, I ping road-warrior, so I need > see these icmp packets. > How is it possible ? > > > _______________________________________________ > Users mailing list > [email protected] > https://lists.strongswan.org/mailman/listinfo/users -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJU0SlKAAoJEDg5KY9j7GZY8MkP/jloobNXxbhhL0V5H36upqNx 9HwW2baBFXcoXn2LJxEuNr+QzQsfANbHM0xY0zcSeo6sU6WPF8RdOfxjAOv35Um8 eHCR0g3Q9h8T8fViGPF890Qvt45UbiIUtDRt7hFBfqdfMDrR9YuXhGIvnPKiIQ+z /YIsBDVG3hFgJGPIACoDcDiMcU/MjsRMkW40RR26hVIGXz84ibRJbOG1EAGzQwL2 C2kFmkpmihg9DHRIIx6QRb/jcapH86HI2Wtj0C1JCeAdpGX+EYaESgs9NA059++G cMSj6cbDmbIkql4d+WTvDu5qgdAzbIX9CgpzkizPN5b+GrXeeR/RmTTG9n+oeRdy YTOHj2FF/hIrbpq5W0KD70Vvw+eosnqgcu19BKK2RFZvm/VFiHIXBpXw7ZRxJuji XcoUnOXlDn7vNvdohOpEJNVnxvHtpl30CELCsNAE5HJx1AuFcy/HUo5K2iX0CAFx uLUwAZ1j3va3+b3KCazdsuQyo0wzX93sqL+C5UBs3L1/uj9oOzTtvwGwAcKDRRAH kJZCoMptZwO3Zy+IV99U0j+Udo1wE4SZw6R1EUTOmOU5Mu3fNYHmIx82bxJhKTDQ T1cCLaKU5IDxYxn3oyJ4Xd85b6bb/uLjkoPZuwd/qly5E0Qgizxy96E90BN/sG0I vvMeb5XFboaIeeGVAIEP =h9m+ -----END PGP SIGNATURE----- _______________________________________________ Users mailing list [email protected] https://lists.strongswan.org/mailman/listinfo/users
