--- west.console.txt 2019-09-21 07:12:56.263539255 +0000 +++ OUTPUT/west.console.txt 2019-09-21 07:20:23.412484589 +0000 @@ -120,15 +120,7 @@ cp /tmp/nflog-50.log OUTPUT/nflog-50.log west # tcpdump -n -r OUTPUT/nflog-50.pcap -reading from file OUTPUT/nflog-50.pcap, link-type NFLOG (Linux netfilter log messages) -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 1, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 1, length 64 -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 2, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 2, length 64 -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 3, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 3, length 64 -IP 192.0.1.254 > 192.0.2.254: ICMP echo request, id XXXX, seq 4, length 64 -IP 192.0.2.254 > 192.0.1.254: ICMP echo reply, id XXXX, seq 4, length 64 +tcpdump: truncated dump file; tried to read 4 file header bytes, only got 0 west # echo done done @@ -155,7 +147,8 @@ west # west # ipsec stop -Redirecting to: [initsystem] +PATH/bin/nsenter --mount=/run/mountns/west-nflog-02-conn --net=/run/netns/west-nflog-02-conn --uts=/run/utsns/west-nflog-02-conn /bin/bash +002 shutting down west # # show no nflog left behind west #