HELLO_wORLD
Very Senior Member
Now, I did a little experiment to check what is going on with the packets…
I tried to access the site from one device on the LAN (192.168.0.7), and I ran simultaneously tcpdump on the device, and on br0 and mw0 on the router.
Here are the results:
LAN DEVICE:
1/3
I tried to access the site from one device on the LAN (192.168.0.7), and I ran simultaneously tcpdump on the device, and on br0 and mw0 on the router.
Here are the results:
LAN DEVICE:
Code:
LAN_DEVICE ~ % tcpdump -i en0 -tnn net 151.101.0.0/16
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP 192.168.0.7.49702 > 151.101.65.69.443: Flags [S], seq 349707654, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2792555536 ecr 0,sackOK,eol], length 0
IP 151.101.65.69.443 > 192.168.0.7.49702: Flags [S.], seq 1940917054, ack 349707655, win 65535, options [mss 1436,sackOK,TS val 2364860915 ecr 2792555536,nop,wscale 9], length 0
IP 192.168.0.7.49702 > 151.101.65.69.443: Flags [.], ack 1, win 2069, options [nop,nop,TS val 2792555561 ecr 2364860915], length 0
IP 192.168.0.7.49702 > 151.101.65.69.443: Flags [P.], seq 1:518, ack 1, win 2069, options [nop,nop,TS val 2792555561 ecr 2364860915], length 517
IP 151.101.65.69.443 > 192.168.0.7.49702: Flags [R], seq 1940917055, win 0, length 0
IP 192.168.0.7.49704 > 151.101.65.69.443: Flags [S], seq 111806618, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2793825812 ecr 0,sackOK,eol], length 0
IP 151.101.65.69.443 > 192.168.0.7.49704: Flags [S.], seq 4084942119, ack 111806619, win 65535, options [mss 1436,sackOK,TS val 99780230 ecr 2793825812,nop,wscale 9], length 0
IP 192.168.0.7.49704 > 151.101.65.69.443: Flags [.], ack 1, win 2069, options [nop,nop,TS val 2793825830 ecr 99780230], length 0
IP 192.168.0.7.49704 > 151.101.65.69.443: Flags [P.], seq 1:518, ack 1, win 2069, options [nop,nop,TS val 2793825830 ecr 99780230], length 517
IP 151.101.65.69.443 > 192.168.0.7.49704: Flags [R], seq 4084942120, win 0, length 0
IP 192.168.0.7.49705 > 151.101.65.69.443: Flags [S], seq 3924872707, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1041151777 ecr 0,sackOK,eol], length 0
IP 151.101.65.69.443 > 192.168.0.7.49705: Flags [S.], seq 2124022676, ack 3924872708, win 65535, options [mss 1436,sackOK,TS val 2104550973 ecr 1041151777,nop,wscale 9], length 0
IP 192.168.0.7.49705 > 151.101.65.69.443: Flags [.], ack 1, win 2069, options [nop,nop,TS val 1041151799 ecr 2104550973], length 0
IP 192.168.0.7.49705 > 151.101.65.69.443: Flags [P.], seq 1:155, ack 1, win 2069, options [nop,nop,TS val 1041151799 ecr 2104550973], length 154
IP 151.101.65.69.443 > 192.168.0.7.49705: Flags [R], seq 2124022677, win 0, length 0
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [S], seq 2678318931, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 398440232 ecr 0,sackOK,eol], length 0
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [S.], seq 1036460967, ack 2678318932, win 65535, options [mss 1436,sackOK,TS val 3060488742 ecr 398440232,nop,wscale 9], length 0
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [.], ack 1, win 2069, options [nop,nop,TS val 398440251 ecr 3060488742], length 0
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [P.], seq 1:518, ack 1, win 2069, options [nop,nop,TS val 398440251 ecr 3060488742], length 517
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [.], ack 518, win 285, options [nop,nop,TS val 3060488762 ecr 398440251], length 0
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [.], seq 1:1425, ack 518, win 285, options [nop,nop,TS val 3060488765 ecr 398440251], length 1424
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [P.], seq 1425:2849, ack 518, win 285, options [nop,nop,TS val 3060488765 ecr 398440251], length 1424
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [.], seq 2849:4273, ack 518, win 285, options [nop,nop,TS val 3060488765 ecr 398440251], length 1424
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [P.], seq 4273:5487, ack 518, win 285, options [nop,nop,TS val 3060488765 ecr 398440251], length 1214
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [.], ack 5487, win 1983, options [nop,nop,TS val 398440275 ecr 3060488765], length 0
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [.], ack 5487, win 2048, options [nop,nop,TS val 398440275 ecr 3060488765], length 0
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [P.], seq 518:611, ack 5487, win 2048, options [nop,nop,TS val 398440280 ecr 3060488765], length 93
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [R], seq 1036466454, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [R], seq 1036466454, win 0, length 0
IP 192.168.0.7.49707 > 151.101.65.69.443: Flags [S], seq 4127560428, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2238924493 ecr 0,sackOK,eol], length 0
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [R], seq 1036466454, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49706: Flags [P.], seq 4273:5487, ack 518, win 285, options [nop,nop,TS val 3060488819 ecr 398440251], length 1214
IP 192.168.0.7.49706 > 151.101.65.69.443: Flags [R], seq 2678319449, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49707: Flags [S.], seq 3352961221, ack 4127560429, win 65535, options [mss 1436,sackOK,TS val 1748180666 ecr 2238924493,nop,wscale 9], length 0
IP 192.168.0.7.49707 > 151.101.65.69.443: Flags [.], ack 1, win 2069, options [nop,nop,TS val 2238924511 ecr 1748180666], length 0
IP 192.168.0.7.49707 > 151.101.65.69.443: Flags [P.], seq 1:518, ack 1, win 2069, options [nop,nop,TS val 2238924511 ecr 1748180666], length 517
IP 151.101.65.69.443 > 192.168.0.7.49707: Flags [R], seq 3352961222, win 0, length 0
IP 192.168.0.7.49709 > 151.101.65.69.443: Flags [S], seq 1383821784, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2703958094 ecr 0,sackOK,eol], length 0
IP 151.101.65.69.443 > 192.168.0.7.49709: Flags [S.], seq 3904209256, ack 1383821785, win 65535, options [mss 1436,sackOK,TS val 1930031065 ecr 2703958094,nop,wscale 9], length 0
IP 192.168.0.7.49709 > 151.101.65.69.443: Flags [.], ack 1, win 2069, options [nop,nop,TS val 2703958113 ecr 1930031065], length 0
IP 192.168.0.7.49709 > 151.101.65.69.443: Flags [P.], seq 1:155, ack 1, win 2069, options [nop,nop,TS val 2703958113 ecr 1930031065], length 154
IP 151.101.65.69.443 > 192.168.0.7.49709: Flags [R], seq 3904209257, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49702: Flags [S.], seq 1940917054, ack 349707655, win 65535, options [mss 1436,sackOK,TS val 2364861945 ecr 2792555561,nop,wscale 9], length 0
IP 192.168.0.7.49702 > 151.101.65.69.443: Flags [R], seq 349707655, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49704: Flags [S.], seq 4084942119, ack 111806619, win 65535, options [mss 1436,sackOK,TS val 99781254 ecr 2793825830,nop,wscale 9], length 0
IP 192.168.0.7.49704 > 151.101.65.69.443: Flags [R], seq 111806619, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49705: Flags [S.], seq 2124022676, ack 3924872708, win 65535, options [mss 1436,sackOK,TS val 2104551987 ecr 1041151799,nop,wscale 9], length 0
IP 192.168.0.7.49705 > 151.101.65.69.443: Flags [R], seq 3924872708, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49707: Flags [S.], seq 3352961221, ack 4127560429, win 65535, options [mss 1436,sackOK,TS val 1748181691 ecr 2238924511,nop,wscale 9], length 0
IP 192.168.0.7.49707 > 151.101.65.69.443: Flags [R], seq 4127560429, win 0, length 0
IP 151.101.65.69.443 > 192.168.0.7.49709: Flags [S.], seq 3904209256, ack 1383821785, win 65535, options [mss 1436,sackOK,TS val 1930032090 ecr 2703958113,nop,wscale 9], length 0
IP 192.168.0.7.49709 > 151.101.65.69.443: Flags [R], seq 1383821785, win 0, length 0
^C
52 packets captured
506 packets received by filter
0 packets dropped by kernel
1/3