<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<p>Hello Joe,</p>
<p>Thank you for your reply. In my case (given the kernel) I
understand that the suggested solution would be:</p>
<ol>
<li>To send the data from one interface to another interface on
the same host.</li>
<li>To setup forwarding of data from that second interface to your
destination</li>
<li>configure the ip address of the second interface in the
security policy to create the tunnel on the second interface.</li>
</ol>
<p>a) How exactly can I do the above using IP tables?</p>
<p>b) If I configure the IP address of the second interface to
create the tunnel would I have to let the other party of the VPN
end of the new IP? If yes then this is not a feasible option for
my case.<br>
</p>
Regards,<br>
<br>
Alex<br>
<br>
<div class="moz-cite-prefix">On 01/04/2017 03:31 PM, Madden, Joe
wrote:<br>
</div>
<blockquote
cite="mid:AM5PR0601MB270642662D5FC4B8675E4DC291610@AM5PR0601MB2706.eurprd06.prod.outlook.com"
type="cite">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered
medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;
color:black;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:12.0pt;
font-family:"Times New Roman",serif;
color:black;}
span.EmailStyle18
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
<div class="WordSection1">
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US">Hi
Alexk,<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US">Its
normal not to see any outgoing packets for IPsec.<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US">The
packets an encapsulated before they reach the interface as a
result you can only see ESP/NAT-T packets exiting the
interface.<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US"><a
moz-do-not-send="true"
href="http://stackoverflow.com/questions/21931614/how-to-see-outgoing-esp-packets-in-tcpdump-before-they-get-encrypted"><a class="moz-txt-link-freetext" href="http://stackoverflow.com/questions/21931614/how-to-see-outgoing-esp-packets-in-tcpdump-before-they-get-encrypted">http://stackoverflow.com/questions/21931614/how-to-see-outgoing-esp-packets-in-tcpdump-before-they-get-encrypted</a></a><o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US">Joe<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<div>
<div style="border:none;border-top:solid #E1E1E1
1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext"
lang="EN-US">From:</span></b><span
style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:windowtext"
lang="EN-US"> Users
[<a class="moz-txt-link-freetext" href="mailto:users-bounces@lists.openswan.org">mailto:users-bounces@lists.openswan.org</a>]
<b>On Behalf Of </b>alexk<br>
<b>Sent:</b> 04 January 2017 13:18<br>
<b>To:</b> <a class="moz-txt-link-abbreviated" href="mailto:users@lists.openswan.org">users@lists.openswan.org</a><br>
<b>Subject:</b> [Openswan Users] tcpdump no outgoing
traffic over VPN<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt">Hello to all
and happy new year.<br>
<br>
I am trying to acquire a tcp dump in a pcap file using the
following command:<br>
<br>
<i><span style="font-family:"Courier New"">sudo
tcpdump -s 0 host HOST_IP -i eth0 -w tcpdump_test.pcap</span></i><br>
<br>
The OS is <i><u>Ubuntu 14.04</u></i> server edition with the
<b><i>3.13.0-92-generic</i></b> kernel running on an AWS
instance.<br>
<br>
I am able to capture incoming traffic from the host to my
server but when I download the pcap file and open it in
Wireshark I do not see the outgoing traffic (neither ESP
packets nor clear text).
<br>
<br>
I have tried to use nflog as described in (<a
moz-do-not-send="true"
href="https://wiki.strongswan.org/projects/strongswan/wiki/CorrectTrafficDump"><a class="moz-txt-link-freetext" href="https://wiki.strongswan.org/projects/strongswan/wiki/CorrectTrafficDump">https://wiki.strongswan.org/projects/strongswan/wiki/CorrectTrafficDump</a></a>)
but it seems that nflog is not included with the Ubuntu
kernel. I am unable to find a way to see outgoing traffic
towards the host in question.<br>
<br>
Can anyone please suggest a solution?<br>
<br>
Thank you in advance<br>
<br>
Alex<br>
<br>
<o:p></o:p></p>
</div>
</blockquote>
<br>
</body>
</html>