tcpdump -i eth0.2 -w catchra0.pcap crawl wlan mouth:
1. Mobile heartbeat packet sent to the server, the mobile phone by eth0.2 (wlan port) the packet 5061 with
2 packets back to the server through a mobile phone eth0.2
3. cat contract to the server through eth0.2
4. server via eth0. 2 packets back to the mobile phone
5. 8,9 cat transmitting packets to the server 2 invert
6.11 cat Trying packet sent to the server
7.12 transmits the service packet to invert App
8. the
APP-> server:
App gateways wireless LAN port, app send data to the wireless card, through the internal routing arriving eth0.2 ip (192.168.3.67),
transmits data to the external network server
cat -> server:
cat connection gateway wifi, ra0 to send data to port, through the interior of the intake route, after eth0.2 uploaded to the server,
APP-> Cat's Eye:
App invert send packets to the gateway:
APP-> ra0-> eth0.2-> server -> eht0.2-> ra0-> Cat's Eye