NerdBarbado
(usa CentOS)
Enviado em 06/05/2014 - 14:59h
Eu executei o comando abaixo de tcpdump. Não sei sei seria esse o comando correto, mas estava tentando capturar o trafego na interface LAN(eth1) que tinha como fonte ou destino o IP 192.168.253.80. que é o da minha máquina de testes.
root@firewall:/var/log/squid# tcpdump -i eth1 src host 192.168.253.80 or dst host 192.168.253.80
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
14:54:06.433146 IP 132.245.92.194.https > 192.168.253.80.41141: Flags [P.], seq 2623678890:2623678956, ack 1669131596, win 64768, length 66
14:54:06.433322 IP 132.245.92.194.https > 192.168.253.80.41141: Flags [P.], seq 66:148, ack 1, win 64768, length 82
14:54:06.433910 IP 192.168.253.80.41141 > 132.245.92.194.https: Flags [.], ack 148, win 64512, length 0
14:54:06.703933 IP community.spiceworks.com.www > 192.168.253.80.5634: Flags [.], ack 2575276023, win 8190, length 0
14:54:06.704390 IP 192.168.253.80.5634 > community.spiceworks.com.www: Flags [.], ack 1, win 64243, length 0
14:54:15.383628 IP community.spiceworks.com.www > 192.168.253.80.5640: Flags [.], ack 3958703451, win 8190, length 0
14:54:15.384141 IP 192.168.253.80.5640 > community.spiceworks.com.www: Flags [.], ack 1, win 64512, length 0
14:54:21.434268 IP 132.245.92.194.https > 192.168.253.80.41588: Flags [P.], seq 1732835945:1732836011, ack 2580705986, win 64768, length 66
14:54:21.436080 IP 132.245.92.194.https > 192.168.253.80.41588: Flags [P.], seq 66:148, ack 1, win 64768, length 82
14:54:21.436580 IP 192.168.253.80.41588 > 132.245.92.194.https: Flags [.], ack 148, win 63312, length 0
14:54:24.312546 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [S], seq 1888499582, win 64512, options [mss 1460,nop,nop,sackOK], length 0
14:54:24.483824 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [S.], seq 1828693071, ack 1888499583, win 8192, options [mss 1460,nop,nop,sackOK], length 0
14:54:24.484451 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [.], ack 1, win 64512, length 0
14:54:24.484582 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [P.], seq 1:78, ack 1, win 64512, length 77
14:54:24.655136 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [.], seq 1:1461, ack 78, win 64240, length 1460
14:54:24.655374 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [.], seq 1461:2921, ack 78, win 64240, length 1460
14:54:24.656355 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [.], ack 2921, win 64512, length 0
14:54:24.829610 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [.], seq 2921:4381, ack 78, win 64240, length 1460
14:54:24.830059 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [P.], seq 4381:4679, ack 78, win 64240, length 298
14:54:24.830610 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [.], ack 4679, win 64512, length 0
14:54:24.831847 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [P.], seq 78:392, ack 4679, win 64512, length 314
14:54:25.009067 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [P.], seq 4679:4726, ack 392, win 63926, length 47
14:54:25.014596 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [P.], seq 392:723, ack 4726, win 64465, length 331
14:54:25.188162 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [P.], seq 4726:5176, ack 723, win 63595, length 450
14:54:25.189417 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [P.], seq 723:1576, ack 5176, win 64015, length 853
14:54:25.365298 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [P.], seq 5176:5717, ack 1576, win 64240, length 541
14:54:25.366316 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [F.], seq 1576, ack 5717, win 63474, length 0
14:54:25.538792 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [.], ack 1577, win 64240, length 0
14:54:25.538936 IP 134.170.113.218.https > 192.168.253.80.33301: Flags [F.], seq 5717, ack 1577, win 64240, length 0
14:54:25.539393 IP 192.168.253.80.33301 > 134.170.113.218.https: Flags [.], ack 5718, win 63474, length 0
14:54:25.602327 IP 192.168.253.80.41139 > 132.245.92.194.https: Flags [P.], seq 1903067520:1903067594, ack 879486448, win 63873, length 74
14:54:25.788556 IP 192.168.253.80.41575 > 132.245.92.194.https: Flags [P.], seq 3166251901:3166251975, ack 3241239307, win 63873, length 74
14:54:25.860158 IP 132.245.92.194.https > 192.168.253.80.41139: Flags [.], ack 74, win 65535, length 0
14:54:26.057229 IP 132.245.92.194.https > 192.168.253.80.41575: Flags [.], ack 74, win 64256, length 0
^C14:54:29.385141 IP 192.168.253.80.33302 > 132.245.1.21.https: Flags [S], seq 4027774949, win 64512, options [mss 1460,nop,nop,sackOK], length 0
35 packets captured
110 packets received by filter
45 packets dropped by kernel