1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
| $ curl 192.168.20.128:80
$ ip netns exec ns01 tcpdump -i veth01 -nn -v tcpdump: listening on veth01, link-type EN10MB (Ethernet), snapshot length 262144 bytes 15:06:21.537188 IP (tos 0x0, ttl 63, id 17209, offset 0, flags [DF], proto TCP (6), length 60) 172.16.140.134.58956 > 10.1.0.1.80: Flags [S], cksum 0x42c7 (incorrect -> 0xe8f4), seq 2924738622, win 64240, options [mss 1460,sackOK,TS val 3067927925 ecr 0,nop,wscale 7], length 0 15:06:21.537199 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 10.1.0.1.80 > 172.16.140.134.58956: Flags [R.], cksum 0xe007 (correct), seq 0, ack 2924738623, win 0, length 0 15:06:24.905873 IP (tos 0x0, ttl 63, id 33240, offset 0, flags [DF], proto TCP (6), length 60) 172.16.140.134.48152 > 10.1.0.2.80: Flags [S], cksum 0x42c8 (incorrect -> 0xb3b0), seq 807127238, win 64240, options [mss 1460,sackOK,TS val 3067931293 ecr 0,nop,wscale 7], length 0 15:06:25.384265 IP (tos 0x0, ttl 63, id 45310, offset 0, flags [DF], proto TCP (6), length 60) 172.16.140.134.48166 > 10.1.0.1.80: Flags [S], cksum 0x42c7 (incorrect -> 0x5987), seq 3884018077, win 64240, options [mss 1460,sackOK,TS val 3067931772 ecr 0,nop,wscale 7], length 0 15:06:25.384275 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 10.1.0.1.80 > 172.16.140.134.48166: Flags [R.], cksum 0x5fa1 (correct), seq 0, ack 3884018078, win 0, length 0 15:06:26.215791 IP (tos 0x0, ttl 63, id 59300, offset 0, flags [DF], proto TCP (6), length 60) 172.16.140.134.48178 > 10.1.0.1.80: Flags [S], cksum 0x42c7 (incorrect -> 0xc171), seq 3535541037, win 64240, options [mss 1460,sackOK,TS val 3067932603 ecr 0,nop,wscale 7], length 0 15:06:26.215803 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
|