Closed faritor closed 1 year ago
Use tcpdump
on the tun0
interface for debugging, this is user-space TCP stack and netstat
will show nothing.
yes, tcpdump
are used for traffic monitoring. There is traffic on the client side tun0
and eth0
, but there is no traffic on the server side.
Hmm, if you can not see any traffic on the traffic side, maybe the server side iptables
rule are not configured correctly. Or you did not enable masquerade on the client side and the client is using the private address of tun0
as the source IP. It will be helpful if you can provide some tcpdump
on the eth0
of client.
I also encountered the same problem, did you solve it?
@dndx hello,
I can't caputure any traffic on eth0 ( did sysctl -w .forwarding=1 / iptables -I FORWORD -j ACCEPT
), even if I iptables -t nat -A PREROUTING -j MASQUERADE
,
but I can caputure some traffic on tun0. Could you give any hints?
$>tcpdump -i tun0 dst port=4567 (OK)
$>tcpdump -i eth0 dst port=4567 (KO) nothing showed
version: 0.6.0
preconditions:
firewall allows 1-65535 ports and and all protocol
question:
unable to connect to remote. using the
netstat -anp | grep 50000
has no results on the server. How can I adjust it for normal use?config:
client:
server:
log:
client:
server: