NetBSD-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Getting wg(4) NetBSD server to work with WireGuard(R) macOS client
> Plenty. 1.146.105.131 is my macOS client IP and 64.176.222.118 is the
> server IP:
>
> # tcpdump -n port 9443
> 23:06:02.270381 IP 64.176.222.118.9443 > 1.146.105.131.3117: UDP, length 1312
> 23:06:02.270603 IP 64.176.222.118.9443 > 1.146.105.131.3117: UDP, length 208
tcpdump(1) just shows the first active, non-loopback interface by
default. In your your case above, the public ethernet interface.
Use tcpdump -tn -i wg0
or tcpdump -tn -i wg0 icmp
to dump the (filtered) payload of the tunnel. (I like -t to get
rid of the timestamps.)
Martin Neitzel
Home |
Main Index |
Thread Index |
Old Index