https://github.com/x-way/ipsecdump
Dump incoming IPSec packets after they have been decrypted by the kernel
https://github.com/x-way/ipsecdump
ipsec tcpdump
Last synced: 3 months ago
JSON representation
Dump incoming IPSec packets after they have been decrypted by the kernel
- Host: GitHub
- URL: https://github.com/x-way/ipsecdump
- Owner: x-way
- License: mit
- Created: 2019-08-10T18:22:52.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2025-04-08T03:10:43.000Z (3 months ago)
- Last Synced: 2025-04-10T06:21:04.432Z (3 months ago)
- Topics: ipsec, tcpdump
- Language: Go
- Size: 1.75 MB
- Stars: 1
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ipsecdump
Dump incoming IPSec packets after they have been decrypted by the kernel
## usage
```
# ipsecdump -h
Usage of ipsecdump:
-d string
IPSec tunnel destination IP
-g int
NFLOG group to use (default 5050)
-i string
incoming interface to listen on (default: any) (default "any")
-m string
IPSec mode (tunnel or transport) (default "tunnel")
-s string
IPSec tunnel source IP
-t duration
how long to run the NFLOG dumping (default 10s)
```## example
```
# ipsecdump -i eth0
20:15:16.661512 IP 198.51.100.146 > 203.0.113.222: ICMP echo request, id 3567, seq 1, length 31
20:15:21.661062 IP 198.51.100.146 > 203.0.113.222: ICMP echo request, id 3567, seq 1, length 31
20:15:26.661180 IP 198.51.100.146 > 203.0.113.222: ICMP echo request, id 3567, seq 1, length 31
20:15:31.661353 IP 198.51.100.146 > 203.0.113.222: ICMP echo request, id 3567, seq 1, length 31
...
```