Eth0.2 port packet capture analysis

tcpdump -i eth0.2 -w catchra0.pcap crawl wlan mouth:

 

 1. Mobile heartbeat packet sent to the server, the mobile phone by eth0.2 (wlan port) the packet 5061 with
 2 packets back to the server through a mobile phone eth0.2
 3. cat contract to the server through eth0.2
 4. server via eth0. 2 packets back to the mobile phone
 5. 8,9 cat transmitting packets to the server 2 invert
 6.11 cat Trying packet sent to the server
 7.12 transmits the service packet to invert App
 8. the  
 
   APP-> server: 
   App gateways wireless LAN port, app send data to the wireless card, through the internal routing arriving eth0.2 ip (192.168.3.67),
   transmits data to the external network server
   
   cat -> server:
   cat connection gateway wifi, ra0 to send data to port, through the interior of the intake route, after eth0.2 uploaded to the server,
   
   APP-> Cat's Eye:
   App invert send packets to the gateway:
    APP-> ra0-> eth0.2-> server -> eht0.2-> ra0-> Cat's Eye

Published 141 original articles · won praise 51 · views 90000 +

Guess you like

Origin blog.csdn.net/dreams_deng/article/details/93505083