newf5learner
Aug 19, 2016Nimbostratus
TCPDUMP with SNAT and '-p' usage
Hi,
I was reading about the tcpdump and various filters we can use in capturing the appropriate traffic.
came across the post @ https://devcentral.f5.com/questions/long-term-tcpdump
Assuming that I can capture the traffic from my server even if I have SNAT enabled, I have used option '-p' this is capture filter I have used.
tcpdump -ni 0.0:nnn -s0 -v -p host 10.20.20.29 and port 80 -w /var/tmp/test_sw.bin
I used wireshark to read the content of the file, but I couldn't find any details traffic of the traffic from my backend server. Is it possible to see the traffic from my backend server with the option -p
Am i missing something here ? or It will not show the traffic from my backend server as the IP is not included in the filter?