Frame 6: 63 bytes on wire (504 bits), 63 bytes captured (504 bits) on interface \Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13}, id 0
Section number: 1
Interface id: 0 (\Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13})
Encapsulation type: Ethernet (1)
Arrival Time: Aug 21, 2025 10:07:13.159693000 中国标准时间
UTC Arrival Time: Aug 21, 2025 02:07:13.159693000 UTC
Epoch Arrival Time: 1755742033.159693000
[Time shift for this packet: 0.000000000 seconds]
[Time delta from previous captured frame: 0.295483000 seconds]
[Time delta from previous displayed frame: 0.295483000 seconds]
[Time since reference or first frame: 12.017632000 seconds]
Frame Number: 6
Frame Length: 63 bytes (504 bits)
Capture Length: 63 bytes (504 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:ip:tcp:data]
[Coloring Rule Name: TCP]
[Coloring Rule String: tcp]
Ethernet II, Src: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55), Dst: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28)
Destination: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28)
… …0. … … … … = LG bit: Globally unique address (factory default)
… …0 … … … … = IG bit: Individual address (unicast)
Source: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55)
… …0. … … … … = LG bit: Globally unique address (factory default)
… …0 … … … … = IG bit: Individual address (unicast)
Type: IPv4 (0x0800)
[Stream index: 0]
Internet Protocol Version 4, Src: 192.168.1.100, Dst: 192.168.3.101
0100 … = Version: 4
… 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 49
Identification: 0x5be7 (23527)
010. … = Flags: 0x2, Don’t fragment
…0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 128
Protocol: TCP (6)
Header Checksum: 0x0000 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.100
Destination Address: 192.168.3.101
[Stream index: 0]
Transmission Control Protocol, Src Port: 64166, Dst Port: 60000, Seq: 1, Ack: 1, Len: 9
Source Port: 64166
Destination Port: 60000
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (31)]
[TCP Segment Len: 9]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 387336689
[Next Sequence Number: 10 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 1889122141
0101 … = Header Length: 20 bytes (5)
Flags: 0x018 (PSH, ACK)
000. … … = Reserved: Not set
…0 … … = Accurate ECN: Not set
… 0… … = Congestion Window Reduced: Not set
… .0… … = ECN-Echo: Not set
… …0. … = Urgent: Not set
… …1 … = Acknowledgment: Set
… … 1… = Push: Set
… … .0… = Reset: Not set
… … …0. = Syn: Not set
… … …0 = Fin: Not set
[TCP Flags: ·······AP···]
Window: 255
[Calculated window size: 65280]
[Window size scaling factor: 256]
Checksum: 0x863d [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
[Timestamps]
[Time since first frame in this TCP stream: 12.017632000 seconds]
[Time since previous frame in this TCP stream: 12.013701000 seconds]
[SEQ/ACK analysis]
[iRTT: 0.003931000 seconds]
[Bytes in flight: 9]
[Bytes sent since last PSH flag: 9]
TCP payload (9 bytes)
Data (9 bytes)
Data: 313233343536373839
[Length: 9]
Frame 7: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface \Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13}, id 0
Section number: 1
Interface id: 0 (\Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13})
Encapsulation type: Ethernet (1)
Arrival Time: Aug 21, 2025 10:07:13.201939000 中国标准时间
UTC Arrival Time: Aug 21, 2025 02:07:13.201939000 UTC
Epoch Arrival Time: 1755742033.201939000
[Time shift for this packet: 0.000000000 seconds]
[Time delta from previous captured frame: 0.042246000 seconds]
[Time delta from previous displayed frame: 0.042246000 seconds]
[Time since reference or first frame: 12.059878000 seconds]
Frame Number: 7
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:ip:tcp]
[Coloring Rule Name: TCP]
[Coloring Rule String: tcp]
Ethernet II, Src: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28), Dst: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55)
Destination: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55)
… …0. … … … … = LG bit: Globally unique address (factory default)
… …0 … … … … = IG bit: Individual address (unicast)
Source: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28)
… …0. … … … … = LG bit: Globally unique address (factory default)
… …0 … … … … = IG bit: Individual address (unicast)
Type: IPv4 (0x0800)
[Stream index: 0]
Trailer: 0000
Internet Protocol Version 4, Src: 192.168.3.101, Dst: 192.168.1.100
0100 … = Version: 4
… 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 40
Identification: 0x331f (13087)
010. … = Flags: 0x2, Don’t fragment
…0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 127
Protocol: TCP (6)
Header Checksum: 0x4297 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.3.101
Destination Address: 192.168.1.100
[Stream index: 0]
Transmission Control Protocol, Src Port: 60000, Dst Port: 64166, Seq: 1, Ack: 10, Len: 0
Source Port: 60000
Destination Port: 64166
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (31)]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 1889122141
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 10 (relative ack number)
Acknowledgment number (raw): 387336698
0101 … = Header Length: 20 bytes (5)
Flags: 0x010 (ACK)
000. … … = Reserved: Not set
…0 … … = Accurate ECN: Not set
… 0… … = Congestion Window Reduced: Not set
… .0… … = ECN-Echo: Not set
… …0. … = Urgent: Not set
… …1 … = Acknowledgment: Set
… … 0… = Push: Not set
… … .0… = Reset: Not set
… … …0. = Syn: Not set
… … …0 = Fin: Not set
[TCP Flags: ·······A····]
Window: 255
[Calculated window size: 65280]
[Window size scaling factor: 256]
Checksum: 0xbaac [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
[Timestamps]
[Time since first frame in this TCP stream: 12.059878000 seconds]
[Time since previous frame in this TCP stream: 0.042246000 seconds]
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 6]
[The RTT to ACK the segment was: 0.042246000 seconds]
[iRTT: 0.003931000 seconds]
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
00:54:08.812647 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2066893244:2066893356, ack 3794839666, win 1002, length 112
00:54:08.814409 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 112:320, ack 1, win 1002, length 208
00:54:08.815139 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 320, win 251, length 0
00:54:09.821509 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 320:512, ack 1, win 1002, length 192
00:54:09.821680 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 512:784, ack 1, win 1002, length 272
00:54:09.822547 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 784, win 255, length 0
00:54:10.844496 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 784:1152, ack 1, win 1002, length 368
00:54:10.897588 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 1152, win 254, length 0
00:54:11.290370 IP 192.168.1.100.57933 > 192.168.1.1.53: 50024+ A? optimizationguide-pa.googleapis.com. (53)
00:54:11.290729 IP 192.168.1.1.53 > 192.168.1.100.57933: 50024 ServFail 0/0/0 (53)
00:54:11.291268 IP 192.168.1.100 > 192.168.1.1: ICMP 192.168.1.100 udp port 57933 unreachable, length 89
00:54:11.868777 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1152:1424, ack 1, win 1002, length 272
00:54:11.869673 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1424:1584, ack 1, win 1002, length 160
00:54:11.869787 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1584:1824, ack 1, win 1002, length 240
00:54:11.870553 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 1584, win 252, length 0
00:54:11.924818 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 1824, win 251, length 0
00:54:12.892435 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1824:2000, ack 1, win 1002, length 176
00:54:12.892673 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2000:2480, ack 1, win 1002, length 480
00:54:12.893585 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 2480, win 255, length 0
00:54:13.916503 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2480:2864, ack 1, win 1002, length 384
00:54:13.962323 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 2864, win 254, length 0
00:54:14.940463 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2864:3136, ack 1, win 1002, length 272
00:54:14.989752 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 3136, win 253, length 0
00:54:15.299954 IP 192.168.0.100.58105 > 192.168.3.101.60000: Flags [P.], seq 747139898:747139899, ack 2277206824, win 255, length 1
00:54:15.300131 ARP, Request who-has 192.168.3.101 tell 192.168.3.1, length 28
00:54:15.300988 ARP, Reply 192.168.3.101 is-at e0:d3:62:10:0f:3f (oui Unknown), length 46
00:54:15.301011 IP 192.168.3.1.58105 > 192.168.3.101.60000: Flags [P.], seq 747139898:747139899, ack 2277206824, win 255, length 1
00:54:15.351015 IP 192.168.3.101.60000 > 192.168.3.1.58105: Flags [.], ack 1, win 255, length 0
00:54:15.351118 IP 192.168.3.101.60000 > 192.168.0.100.58105: Flags [.], ack 1, win 255, length 0
00:54:15.964443 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3136:3312, ack 1, win 1002, length 176
00:54:15.964643 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3312:3472, ack 1, win 1002, length 160
00:54:15.965096 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3472:3664, ack 1, win 1002, length 192
00:54:15.965463 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 3472, win 252, length 0
00:54:15.965798 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3664:3808, ack 1, win 1002, length 144
00:54:15.966026 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3808:4288, ack 1, win 1002, length 480
00:54:15.966458 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 3808, win 250, length 0
00:54:16.014638 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 4288, win 255, length 0
00:54:16.211652 IP 192.168.0.100.58105 > 192.168.3.101.60000: Flags [P.], seq 1:2, ack 1, win 255, length 1
00:54:16.211815 IP 192.168.3.1.58105 > 192.168.3.101.60000: Flags [P.], seq 1:2, ack 1, win 255, length 1
00:54:16.267878 IP 192.168.3.101.60000 > 192.168.3.1.58105: Flags [.], ack 2, win 255, length 0
00:54:16.267982 IP 192.168.3.101.60000 > 192.168.0.100.58105: Flags [.], ack 2, win 255, length 0
00:54:16.988822 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 4288:5616, ack 1, win 1002, length 1328
00:54:17.040537 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 5616, win 250, length 0
00:54:17.916230 IP 192.168.0.1.54004 > 255.255.255.255.29810: UDP, length 521
00:54:18.012792 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 5616:5888, ack 1, win 1002, length 272
00:54:18.013131 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 5888:6032, ack 1, win 1002, length 144
00:54:18.013899 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 6032, win 255, length 0
00:54:19.036493 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 6032:6416, ack 1, win 1002, length 384
00:54:19.088657 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 6416, win 254, length 0
00:54:20.060458 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 6416:6688, ack 1, win 1002, length 272
00:54:20.112309 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 6688, win 253, length 0
00:54:20.161769 ARP, Request who-has 192.168.3.1 (8c:86:dd:33:2f:2c (oui Unknown)) tell 192.168.3.101, length 46
00:54:20.161838 ARP, Reply 192.168.3.1 is-at 8c:86:dd:33:2f:2c (oui Unknown), length 28
00:54:21.084556 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 6688:7152, ack 1, win 1002, length 464
00:54:21.137446 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7152, win 251, length 0
00:54:22.108460 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7152:7424, ack 1, win 1002, length 272
00:54:22.161746 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7424, win 250, length 0
00:54:23.132461 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7424:7696, ack 1, win 1002, length 272
00:54:23.187595 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7696, win 255, length 0
00:54:24.156459 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7696:7968, ack 1, win 1002, length 272
00:54:24.211727 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7968, win 254, length 0
00:54:25.180454 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7968:8240, ack 1, win 1002, length 272
00:54:25.233308 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 8240, win 253, length 0
00:54:26.204492 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 8240:8512, ack 1, win 1002, length 272
00:54:26.258181 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 8512, win 252, length 0
00:54:27.228475 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 8512:8784, ack 1, win 1002, length 272
00:54:27.283643 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 8784, win 251, length 0
00:54:27.988247 IP 192.168.0.1.54004 > 255.255.255.255.29810: UDP, length 521
00:54:28.252496 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 8784:9136, ack 1, win 1002, length 352
00:54:28.296458 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 9136, win 250, length 0
00:54:29.276447 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 9136:9312, ack 1, win 1002, length 176
00:54:29.276614 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 9312:9472, ack 1, win 1002, length 160
00:54:29.277521 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 9472, win 255, length 0
00:54:29.299489 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [P.], seq 1:161, ack 9472, win 255, length 160
00:54:29.299700 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 9472:9520, ack 161, win 1002, length 48
00:54:29.352007 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 9520, win 255, length 0
root@ER7206:/# ip route
127.0.0.0/8 dev lo scope link
169.254.11.20/30 dev br-lan scope link
192.168.0.0/24 dev inf.1 proto kernel scope link src 192.168.0.1
192.168.1.0/24 dev inf.2 proto kernel scope link src 192.168.1.1
192.168.2.0/24 dev inf.3 proto kernel scope link src 192.168.2.1
192.168.3.0/24 dev inf.4091 scope link
root@ER7206:/# ip rule
0: from all lookup local
25: from all fwmark 0x20000/0x20000 lookup 25
27: from all lookup link
29: from all lookup lan
221: from all fwmark 0x20000/0x20000 lookup 221
20044: from 192.168.3.1 lookup wan4_eth
32766: from all lookup main
32767: from all lookup default以上是相关信息,请分析说明
最新发布