客户端拒绝服务端过来的连接:
node2:/root#iptables -I INPUT -s 192.168.137.2 -j DROP
node2:/root#iptables -I INPUT -s 192.168.137.2 -j ACCEPT
node1:/root#tcpdump -S -i eth1 '((tcp) and (port 8080) and (host 192.168.137.2) )'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
18:34:48.286206 IP node2.12860 > node1.webcache: Flags [F.], seq 2835618282, ack 1845830511, win 115, options [nop,nop,TS val 165957858 ecr 8948825], length 0
18:34:48.286226 IP node1.webcache > node2.12860: Flags [.], ack 2835618283, win 227, options [nop,nop,TS val 8960593 ecr 165957858], length 0
^C
2 packets captured
2 packets received by filter
0 packets dropped by kernel
node1:/root#tcpdump -S -
TCP 重传机制
最新推荐文章于 2024-04-20 21:27:50 发布
本文深入探讨TCP协议中的重传机制,包括超时重传、快速重传和快速恢复等策略,旨在理解TCP如何确保数据可靠传输。通过分析TCP报文段的ACK机制,解释了重传触发条件及对网络拥塞的应对措施。
摘要由CSDN通过智能技术生成