Hi Piba, (and other people)

Thank you very much for your answer !

You’re perfectly right i only gave extracts of the logs :) next time I’m going 
to be more precise and make the capture from the beginning...
Anyway, as you suppose, I continue to see the same [S] paquet repeating again 
and again…

These captures have been done directly on a WAN interface (not on the LAN one) 
the reason you see a private address is because there is a double NAT...

As you ask, I am going to send you :

- tcpdump on a client for the port 2223
- tcpdump on the pfsense on the port 2223 choosing the interface that is 
directly connected to the modem-router

1- From the pfsense WAN interface point of view with a not working gateway from 
the begining until the end (time out from the client side) :

[2.3.1-RELEASE][r...@pfsense.concorde-pereire.loc]/root: tcpdump -i re0 port 
2223 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:01:51.206180 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333778453 ecr 0,sackOK,eol], length 0
18:01:51.206358 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333778453], length 0
18:01:52.214077 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333779453 ecr 0,sackOK,eol], length 0
18:01:52.214177 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333779453], length 0
18:01:53.218322 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333780453 ecr 0,sackOK,eol], length 0
18:01:53.218431 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333780453], length 0
18:01:54.222440 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333781453 ecr 0,sackOK,eol], length 0
18:01:54.222547 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333781453], length 0
18:01:55.222574 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333782453 ecr 0,sackOK,eol], length 0
18:01:55.222688 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333782453], length 0
18:01:56.224698 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333783453 ecr 0,sackOK,eol], length 0
18:01:56.224785 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333783453], length 0
18:01:58.234946 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333785453 ecr 0,sackOK,eol], length 0
18:01:58.235056 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333785453], length 0
18:02:01.234194 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333785453], length 0
18:02:02.253723 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333789453 ecr 0,sackOK,eol], length 0
18:02:02.253832 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333789453], length 0
18:02:05.253333 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333789453], length 0
18:02:08.253228 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333789453], length 0
18:02:10.470731 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333797453 ecr 0,sackOK,eol], length 0
18:02:10.470843 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333797453], length 0
18:02:13.470229 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333797453], length 0
18:02:16.470238 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333797453], length 0
18:02:19.470228 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51548: 
Flags [S.], seq 2254053748, ack 3384870709, win 65228, options [mss 
1460,nop,wscale 7,sackOK,TS val 1269164786 ecr 333797453], length 0
18:02:26.536174 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS 
val 333813453 ecr 0,sackOK,eol], length 0
18:02:58.757779 IP 196.222.21.93.rev.sfr.net.51548 > 192.168.101.254.2223: 
Flags [S], seq 3384870708, win 65535, options [mss 1460,sackOK,eol], length 0
^C
26 packets captured
1210 packets received by filter
0 packets dropped by kernel 


2- From the client point of view to the not working gateway from the begining 
until the end (time out from the client side) :

root@MacBook-de-Jean-Laurent:~$ tcpdump -i en0 port 2223
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en0, link-type EN10MB (Ethernet), capture size 262144 bytes
18:01:51.196869 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333778453 ecr 0,sackOK,eol], 
length 0
18:01:52.206194 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333779453 ecr 0,sackOK,eol], 
length 0
18:01:53.208781 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333780453 ecr 0,sackOK,eol], 
length 0
18:01:54.211667 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333781453 ecr 0,sackOK,eol], 
length 0
18:01:55.212703 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333782453 ecr 0,sackOK,eol], 
length 0
18:01:56.215156 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333783453 ecr 0,sackOK,eol], 
length 0
18:01:58.224730 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333785453 ecr 0,sackOK,eol], 
length 0
18:02:02.239931 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333789453 ecr 0,sackOK,eol], 
length 0
18:02:10.460794 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333797453 ecr 0,sackOK,eol], 
length 0
18:02:26.526341 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 333813453 ecr 0,sackOK,eol], 
length 0
18:02:58.748155 IP 192.168.10.50.51548 > 
20-98-190-109.dsl.ovh.fr.rockwell-csp3: Flags [S], seq 3384870708, win 65535, 
options [mss 1460,sackOK,eol], length 0
^C
11 packets captured
22117 packets received by filter
0 packets dropped by kernel

3- From the pfsense WAN interface point of view with a working gateway from the 
begining until the end (connexion then a few commands and deconnexion) :

[2.3.1-RELEASE][r...@pfsense.concorde-pereire.loc]/root: tcpdump -i re0 port 
2223
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:09:12.648018 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [S], seq 4029864830, win 65535, options [mss 1460,wscale 6,sackOK,eol], 
length 0
18:09:12.648159 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [S.], seq 2831647839, ack 4029864831, win 65228, options [mss 
1460,nop,wscale 7,sackOK,eol], length 0
18:09:12.687456 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 1, win 8192, length 0
18:09:12.687607 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 1:22, ack 1, win 8192, length 21
18:09:12.687653 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 22, win 513, length 0
18:09:12.737138 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 1:22, ack 22, win 513, length 21
18:09:12.773830 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 22, win 8191, length 0
18:09:12.773947 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 22:910, ack 22, win 513, length 888
18:09:12.778947 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], seq 22:1482, ack 22, win 8192, length 1460
18:09:12.779050 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 1482, win 501, length 0
18:09:12.779057 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 1482:1990, ack 22, win 8192, length 508
18:09:12.779087 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 1990, win 509, length 0
18:09:12.812612 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 910, win 8164, length 0
18:09:12.817871 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 1990:2038, ack 910, win 8192, length 48
18:09:12.817955 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 2038, win 512, length 0
18:09:12.863790 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 910:1190, ack 2038, win 513, length 280
18:09:12.908646 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 1190, win 8183, length 0
18:09:12.913361 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 2038:2054, ack 1190, win 8192, length 16
18:09:12.913461 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 2054, win 513, length 0
18:09:12.953703 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 2054:2098, ack 1190, win 8192, length 44
18:09:12.953811 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 2098, win 512, length 0
18:09:12.954068 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 1190:1234, ack 2098, win 513, length 44
18:09:12.995870 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 1234, win 8190, length 0
18:09:12.999742 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 2098:2158, ack 1234, win 8192, length 60
18:09:12.999851 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 2158, win 512, length 0
18:09:13.003695 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 1234:1278, ack 2158, win 513, length 44
18:09:13.039531 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 1278, win 8190, length 0
18:09:13.044368 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 2158:2522, ack 1278, win 8192, length 364
18:09:13.044453 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 2522, win 510, length 0
18:09:13.048290 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 1278:1594, ack 2522, win 513, length 316
18:09:13.093739 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 1594, win 8182, length 0
18:09:13.093913 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 2522:3158, ack 1594, win 8192, length 636
18:09:13.094019 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3158, win 508, length 0
18:09:13.099648 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 1594:1622, ack 3158, win 513, length 28
18:09:13.135664 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 1622, win 8191, length 0
18:09:13.135753 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 1622:2114, ack 3158, win 513, length 492
18:09:13.140603 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3158:3262, ack 1622, win 8192, length 104
18:09:13.140709 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3262, win 512, length 0
18:09:13.173691 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2114, win 8176, length 0
18:09:13.173748 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2114:2158, ack 3262, win 513, length 44
18:09:13.211695 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2158, win 8190, length 0
18:09:13.216000 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3262:3758, ack 2158, win 8192, length 496
18:09:13.216098 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3758, win 509, length 0
18:09:13.222387 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2158:2242, ack 3758, win 513, length 84
18:09:13.261953 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2242, win 8189, length 0
18:09:13.848405 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2242:2350, ack 3758, win 513, length 108
18:09:13.857533 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2350:2426, ack 3758, win 513, length 76
18:09:13.857627 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2426:2486, ack 3758, win 513, length 60
18:09:13.863947 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2486:2562, ack 3758, win 513, length 76
18:09:13.864139 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2562:2622, ack 3758, win 513, length 60
18:09:13.870282 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2622:2698, ack 3758, win 513, length 76
18:09:13.870447 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2698:2758, ack 3758, win 513, length 60
18:09:13.955958 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2350, win 8188, length 0
18:09:13.960137 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2426, win 8189, length 0
18:09:13.960244 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2486, win 8190, length 0
18:09:13.960262 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2562, win 8187, length 0
18:09:13.960279 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2622, win 8185, length 0
18:09:13.960295 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2698, win 8183, length 0
18:09:13.960312 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2758, win 8190, length 0
18:09:14.171133 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2758:2786, ack 3758, win 513, length 28
18:09:14.171471 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 2786:3326, ack 3758, win 513, length 540
18:09:14.171539 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3326:3370, ack 3758, win 513, length 44
18:09:14.171600 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3370:3414, ack 3758, win 513, length 44
18:09:14.260293 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 2786, win 8191, length 0
18:09:14.264279 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3326, win 8175, length 0
18:09:14.264306 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3370, win 8173, length 0
18:09:14.264328 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3414, win 8172, length 0
18:09:16.784416 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3758:3786, ack 3414, win 8192, length 28
18:09:16.784547 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3786, win 513, length 0
18:09:16.785482 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3414:3442, ack 3786, win 513, length 28
18:09:16.826426 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3442, win 8191, length 0
18:09:17.339765 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3786:3814, ack 3442, win 8192, length 28
18:09:17.339893 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3814, win 513, length 0
18:09:17.340785 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3442:3470, ack 3814, win 513, length 28
18:09:17.340857 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3470:3498, ack 3814, win 513, length 28
18:09:17.381732 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3470, win 8191, length 0
18:09:17.381786 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3498, win 8190, length 0
18:09:17.436780 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3498:3718, ack 3814, win 513, length 220
18:09:17.476278 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3718, win 8185, length 0
18:09:18.454541 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3814:3842, ack 3718, win 8192, length 28
18:09:18.454659 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3842, win 513, length 0
18:09:18.455286 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3718:3746, ack 3842, win 513, length 28
18:09:18.496544 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3746, win 8191, length 0
18:09:18.608558 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3842:3870, ack 3746, win 8192, length 28
18:09:18.608669 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3870, win 513, length 0
18:09:18.609278 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3746:3774, ack 3870, win 513, length 28
18:09:18.650530 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3774, win 8191, length 0
18:09:18.860811 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3870:3898, ack 3774, win 8192, length 28
18:09:18.860903 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3898, win 513, length 0
18:09:18.861765 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3774:3818, ack 3898, win 513, length 44
18:09:18.870233 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3818:3942, ack 3898, win 513, length 124
18:09:18.870639 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 3942:4114, ack 3898, win 513, length 172
18:09:18.871981 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4114:4334, ack 3898, win 513, length 220
18:09:18.906408 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3818, win 8190, length 0
18:09:18.910628 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 3942, win 8188, length 0
18:09:18.915277 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4114, win 8182, length 0
18:09:18.915304 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4334, win 8175, length 0
18:09:21.893305 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3898:3926, ack 4334, win 8192, length 28
18:09:21.893432 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3926, win 513, length 0
18:09:21.894097 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4334:4378, ack 3926, win 513, length 44
18:09:21.894615 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4378:4422, ack 3926, win 513, length 44
18:09:21.935364 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4378, win 8190, length 0
18:09:21.935461 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4422, win 8189, length 0
18:09:22.487902 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4422:4530, ack 3926, win 513, length 108
18:09:22.495528 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4530:4606, ack 3926, win 513, length 76
18:09:22.495672 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4606:4666, ack 3926, win 513, length 60
18:09:22.503062 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4666:4742, ack 3926, win 513, length 76
18:09:22.503217 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4742:4802, ack 3926, win 513, length 60
18:09:22.508775 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4802:4878, ack 3926, win 513, length 76
18:09:22.509068 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4878:4938, ack 3926, win 513, length 60
18:09:22.559145 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4530, win 8188, length 0
18:09:22.563148 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4606, win 8189, length 0
18:09:22.563253 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4666, win 8187, length 0
18:09:22.563277 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4742, win 8185, length 0
18:09:22.563294 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4802, win 8183, length 0
18:09:22.563311 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4878, win 8181, length 0
18:09:22.563327 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4938, win 8190, length 0
18:09:22.807365 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4938:4966, ack 3926, win 513, length 28
18:09:22.807812 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 4966:5298, ack 3926, win 513, length 332
18:09:22.807888 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 5298:5550, ack 3926, win 513, length 252
18:09:22.808221 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 5550:5594, ack 3926, win 513, length 44
18:09:22.846286 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 4966, win 8191, length 0
18:09:22.849817 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5298, win 8181, length 0
18:09:22.849843 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5550, win 8173, length 0
18:09:22.853600 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5594, win 8190, length 0
18:09:23.549009 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3926:3954, ack 5594, win 8192, length 28
18:09:23.549134 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3954, win 513, length 0
18:09:23.550033 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 5594:5638, ack 3954, win 513, length 44
18:09:23.550471 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 5638:5666, ack 3954, win 513, length 28
18:09:23.560833 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 5666:5694, ack 3954, win 513, length 28
18:09:23.563145 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [P.], seq 5694:5810, ack 3954, win 513, length 116
18:09:23.589178 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5638, win 8190, length 0
18:09:23.594464 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5666, win 8189, length 0
18:09:23.599228 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5694, win 8191, length 0
18:09:23.603471 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5810, win 8188, length 0
18:09:23.603495 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3954:3982, ack 5810, win 8192, length 28
18:09:23.603539 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 3982, win 513, length 0
18:09:23.603546 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [P.], seq 3982:4042, ack 5810, win 8192, length 60
18:09:23.603581 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 4042, win 512, length 0
18:09:23.603588 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [F.], seq 4042, ack 5810, win 8192, length 0
18:09:23.603617 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [.], ack 4043, win 512, length 0
18:09:23.606671 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [F.], seq 5810, ack 4043, win 513, length 0
18:09:23.641976 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [F.], seq 4042, ack 5810, win 8192, length 0
18:09:23.642049 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [F.], seq 5810, ack 4043, win 513, length 0
18:09:23.642059 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [F.], seq 4042, ack 5810, win 8192, length 0
18:09:23.642085 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [F.], seq 5810, ack 4043, win 513, length 0
18:09:23.650084 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5810, win 8192, length 0
18:09:23.650224 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5811, win 8191, length 0
18:09:23.679974 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5811, win 8191, length 0
18:09:23.680023 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [R], seq 2831653650, win 0, length 0
18:09:23.680146 IP 196.222.21.93.rev.sfr.net.51615 > 192.168.101.254.2223: 
Flags [.], ack 5811, win 8191, length 0
18:09:23.680186 IP 192.168.101.254.2223 > 196.222.21.93.rev.sfr.net.51615: 
Flags [R], seq 2831653650, win 0, length 0
^C
152 packets captured
580 packets received by filter
0 packets dropped by kernel
[2.3.1-RELEASE][r...@pfsense.concorde-pereire.loc]/root: 

4- From the client point of view to the working WAN access from the begining 
until the end (connexion then a few commands and deconnexion) :

root@MacBook-de-Jean-Laurent:~$ tcpdump -i en0 port 2223
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en0, link-type EN10MB (Ethernet), capture size 262144 bytes
18:09:12.626154 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [S], seq 4029864830, win 65535, 
options [mss 1460,nop,wscale 5,nop,nop,TS val 334217159 ecr 0,sackOK,eol], 
length 0
18:09:12.666015 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [S.], seq 2831647839, ack 4029864831, win 65535, 
options [mss 1460,wscale 8,sackOK,eol], length 0
18:09:12.666099 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 1, win 8192, length 0
18:09:12.666537 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 1:22, ack 1, win 
8192, length 21
18:09:12.705914 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 22, win 513, length 0
18:09:12.754171 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 1:22, ack 22, win 513, length 21
18:09:12.754270 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 22, win 8191, length 0
18:09:12.755830 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], seq 22:1482, ack 22, win 
8192, length 1460
18:09:12.755832 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 1482:1990, ack 22, 
win 8192, length 508
18:09:12.792639 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 22:910, ack 22, win 513, length 888
18:09:12.792784 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 910, win 8164, length 0
18:09:12.795833 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 1482, win 501, length 0
18:09:12.795842 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 1990, win 509, length 0
18:09:12.798736 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 1990:2038, ack 910, 
win 8192, length 48
18:09:12.835905 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 2038, win 512, length 0
18:09:12.882431 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 910:1190, ack 2038, win 513, length 280
18:09:12.882526 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 1190, win 8183, length 0
18:09:12.891665 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 2038:2054, ack 1190, 
win 8192, length 16
18:09:12.933940 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 2054, win 513, length 0
18:09:12.934030 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 2054:2098, ack 1190, 
win 8192, length 44
18:09:12.972214 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 2098, win 512, length 0
18:09:12.976302 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 1190:1234, ack 2098, win 513, length 44
18:09:12.976394 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 1234, win 8190, length 0
18:09:12.976863 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 2098:2158, ack 1234, 
win 8192, length 60
18:09:13.015934 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 2158, win 512, length 0
18:09:13.020196 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 1234:1278, ack 2158, win 513, length 44
18:09:13.020316 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 1278, win 8190, length 0
18:09:13.020432 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 2158:2522, ack 1278, 
win 8192, length 364
18:09:13.062135 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 2522, win 510, length 0
18:09:13.066241 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 1278:1594, ack 2522, win 513, length 316
18:09:13.066367 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 1594, win 8182, length 0
18:09:13.069228 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 2522:3158, ack 1594, 
win 8192, length 636
18:09:13.111871 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3158, win 508, length 0
18:09:13.115988 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 1594:1622, ack 3158, win 513, length 28
18:09:13.116081 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 1622, win 8191, length 0
18:09:13.116583 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3158:3262, ack 1622, 
win 8192, length 104
18:09:13.154137 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 1622:2114, ack 3158, win 513, length 492
18:09:13.154239 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2114, win 8176, length 0
18:09:13.157745 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3262, win 512, length 0
18:09:13.191996 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2114:2158, ack 3262, win 513, length 44
18:09:13.192090 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2158, win 8190, length 0
18:09:13.192443 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3262:3758, ack 2158, 
win 8192, length 496
18:09:13.233953 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3758, win 509, length 0
18:09:13.241797 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2158:2242, ack 3758, win 513, length 84
18:09:13.241902 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2242, win 8189, length 0
18:09:13.937063 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2242:2350, ack 3758, win 513, length 108
18:09:13.937199 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2350, win 8188, length 0
18:09:13.937472 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2350:2426, ack 3758, win 513, length 76
18:09:13.937479 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2426:2486, ack 3758, win 513, length 60
18:09:13.937481 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2486:2562, ack 3758, win 513, length 76
18:09:13.937485 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2562:2622, ack 3758, win 513, length 60
18:09:13.937487 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2622:2698, ack 3758, win 513, length 76
18:09:13.937489 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2698:2758, ack 3758, win 513, length 60
18:09:13.937679 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2426, win 8189, length 0
18:09:13.937680 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2486, win 8190, length 0
18:09:13.937681 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2562, win 8187, length 0
18:09:13.937681 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2622, win 8185, length 0
18:09:13.937682 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2698, win 8183, length 0
18:09:13.937683 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2758, win 8190, length 0
18:09:14.240484 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2758:2786, ack 3758, win 513, length 28
18:09:14.240572 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 2786, win 8191, length 0
18:09:14.241455 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 2786:3326, ack 3758, win 513, length 540
18:09:14.241461 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3326:3370, ack 3758, win 513, length 44
18:09:14.241462 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3370:3414, ack 3758, win 513, length 44
18:09:14.241555 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3326, win 8175, length 0
18:09:14.241556 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3370, win 8173, length 0
18:09:14.241557 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3414, win 8172, length 0
18:09:16.765219 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3758:3786, ack 3414, 
win 8192, length 28
18:09:16.802566 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3786, win 513, length 0
18:09:16.806442 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3414:3442, ack 3786, win 513, length 28
18:09:16.806570 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3442, win 8191, length 0
18:09:17.318973 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3786:3814, ack 3442, 
win 8192, length 28
18:09:17.356730 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3814, win 513, length 0
18:09:17.360735 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3442:3470, ack 3814, win 513, length 28
18:09:17.360742 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3470:3498, ack 3814, win 513, length 28
18:09:17.360862 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3470, win 8191, length 0
18:09:17.360862 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3498, win 8190, length 0
18:09:17.455550 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3498:3718, ack 3814, win 513, length 220
18:09:17.455661 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3718, win 8185, length 0
18:09:18.434231 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3814:3842, ack 3718, 
win 8192, length 28
18:09:18.472925 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3842, win 513, length 0
18:09:18.476789 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3718:3746, ack 3842, win 513, length 28
18:09:18.476888 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3746, win 8191, length 0
18:09:18.589308 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3842:3870, ack 3746, 
win 8192, length 28
18:09:18.626886 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3870, win 513, length 0
18:09:18.631018 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3746:3774, ack 3870, win 513, length 28
18:09:18.631134 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3774, win 8191, length 0
18:09:18.841037 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3870:3898, ack 3774, 
win 8192, length 28
18:09:18.881591 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3898, win 513, length 0
18:09:18.886831 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3774:3818, ack 3898, win 513, length 44
18:09:18.886935 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3818, win 8190, length 0
18:09:18.891385 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3818:3942, ack 3898, win 513, length 124
18:09:18.891392 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 3942:4114, ack 3898, win 513, length 172
18:09:18.891393 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4114:4334, ack 3898, win 513, length 220
18:09:18.891518 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 3942, win 8188, length 0
18:09:18.891519 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4114, win 8182, length 0
18:09:18.891519 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4334, win 8175, length 0
18:09:21.873276 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3898:3926, ack 4334, 
win 8192, length 28
18:09:21.911777 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3926, win 513, length 0
18:09:21.915835 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4334:4378, ack 3926, win 513, length 44
18:09:21.915842 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4378:4422, ack 3926, win 513, length 44
18:09:21.915948 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4378, win 8190, length 0
18:09:21.915949 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4422, win 8189, length 0
18:09:22.539578 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4422:4530, ack 3926, win 513, length 108
18:09:22.539688 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4530, win 8188, length 0
18:09:22.542421 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4530:4606, ack 3926, win 513, length 76
18:09:22.542427 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4606:4666, ack 3926, win 513, length 60
18:09:22.542429 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4666:4742, ack 3926, win 513, length 76
18:09:22.542430 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4742:4802, ack 3926, win 513, length 60
18:09:22.542431 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4802:4878, ack 3926, win 513, length 76
18:09:22.542433 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4878:4938, ack 3926, win 513, length 60
18:09:22.542553 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4606, win 8189, length 0
18:09:22.542554 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4666, win 8187, length 0
18:09:22.542554 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4742, win 8185, length 0
18:09:22.542650 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4802, win 8183, length 0
18:09:22.542650 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4878, win 8181, length 0
18:09:22.542651 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4938, win 8190, length 0
18:09:22.825882 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4938:4966, ack 3926, win 513, length 28
18:09:22.825987 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 4966, win 8191, length 0
18:09:22.830602 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 4966:5298, ack 3926, win 513, length 332
18:09:22.830609 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 5298:5550, ack 3926, win 513, length 252
18:09:22.830612 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 5550:5594, ack 3926, win 513, length 44
18:09:22.830734 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5298, win 8181, length 0
18:09:22.830735 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5550, win 8173, length 0
18:09:22.830853 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5594, win 8190, length 0
18:09:23.529071 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3926:3954, ack 5594, 
win 8192, length 28
18:09:23.565690 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3954, win 513, length 0
18:09:23.569395 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 5594:5638, ack 3954, win 513, length 44
18:09:23.569401 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 5638:5666, ack 3954, win 513, length 28
18:09:23.569518 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5638, win 8190, length 0
18:09:23.569519 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5666, win 8189, length 0
18:09:23.577566 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 5666:5694, ack 3954, win 513, length 28
18:09:23.577656 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5694, win 8191, length 0
18:09:23.581478 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [P.], seq 5694:5810, ack 3954, win 513, length 116
18:09:23.581574 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5810, win 8188, length 0
18:09:23.581784 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3954:3982, ack 5810, 
win 8192, length 28
18:09:23.581785 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [P.], seq 3982:4042, ack 5810, 
win 8192, length 60
18:09:23.581851 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [F.], seq 4042, ack 5810, win 
8192, length 0
18:09:23.621789 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 3982, win 513, length 0
18:09:23.621794 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 4042, win 512, length 0
18:09:23.621881 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [F.], seq 4042, ack 5810, win 
8192, length 0
18:09:23.621882 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [F.], seq 4042, ack 5810, win 
8192, length 0
18:09:23.625551 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [.], ack 4043, win 512, length 0
18:09:23.625556 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [F.], seq 5810, ack 4043, win 513, length 0
18:09:23.625631 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5810, win 8192, length 0
18:09:23.625719 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5811, win 8191, length 0
18:09:23.659832 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [F.], seq 5810, ack 4043, win 513, length 0
18:09:23.659838 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [F.], seq 5810, ack 4043, win 513, length 0
18:09:23.659966 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5811, win 8191, length 0
18:09:23.659967 IP 192.168.10.50.51615 > 
184.196.154.77.rev.sfr.net.rockwell-csp3: Flags [.], ack 5811, win 8191, length 0
18:09:23.697351 IP 184.196.154.77.rev.sfr.net.rockwell-csp3 > 
192.168.10.50.51615: Flags [R], seq 2831653650, win 0, length 0
^C
151 packets captured
865 packets received by filter
0 packets dropped by kernel
root@MacBook-de-Jean-Laurent:~$


I hope these complete captures can tell you more what’s happening ?

I have no special packages installed, had only iperf and nmap for testing 
purposes… and just uninstalled but it changed nothing :(

I have absolutely not any exotic or special configuration like limiters/shapers 
and absolutely no VPN at the moment, no IPSEC, OPENVPN nor anything else… on 
the other pfsense box I have openvpn installed but the symptoms aren’t 
different so I don’t think it’s related.

I really don’t understand what’s happening here but the fact that on both my 
pfsenses I have some WAN redirections or DMZ that are working and that are not 
the only factor that changes here is the internet provider and maybe it’s not 
hardware related but I would think that it’s some kind of network setting 
somewhere that could help me. And we should not forget that before the upgrade 
on the version 2.3 it was working on one of the box for sure ! (the other 
wasn’t installed at the moment)

In my opinion it’s something silly like mtu for exemple but making my life a 
hell !

I know it’s a long long mail with a lot of informations but if someone can help 
me with that I would be so much grateful !!!

Thank you for those who are reading :)
Best regards, 

        
Jean-Laurent Ivars 
Responsable Technique | Technical Manager
22, rue Robert - 13007 Marseille 
Tel: 09 84 56 64 30 - Mobile: 06.52.60.86.47 
Linkedin <http://fr.linkedin.com/in/jlivars/>   |  Viadeo 
<http://www.viadeo.com/fr/profile/jean-laurent.ivars>   |  www.ipgenius.fr 
<https://www.ipgenius.fr/>
> Le 25 juin 2016 à 16:47, PiBa <pba_...@yahoo.com> a écrit :
> 
> Hi Jean-Laurent,
> 
> Op 25-6-2016 om 10:37 schreef Jean-Laurent Ivars:
>> This is logs generated by tcpdump from the same client machine when I try to 
>> access the firewall thru working internet access provider :
>> 
>> port 2223
>> 16:55:04.501509 IP 46.105.230.225.39304 > 192.168.101.254.2223: Flags [P.], 
>> seq 29:701, ack 22, win 32844, length 672
>> 16:55:04.501652 IP 192.168.101.254.2223 > 46.105.230.225.39304: Flags [P.], 
>> seq 22:910, ack 701, win 508, length 888
>> port 10000
>> 16:58:51.821691 IP 192.168.101.254.10000 > 46.105.230.225.5829: Flags [P.], 
>> seq 209411:210119, ack 2393, win 513, length 708
>> 16:58:52.058014 IP 46.105.230.225.5829 > 192.168.101.254.10000: Flags [.], 
>> ack 210119, win 32673, length 0
> Both these captures are in the 'middle' of a already working connection, but 
> does show it 'works' at that time.. To compare it to the capture below better 
> start capturing before initiation the connection :) .
>> And there the same command output when I try to access from one that is not 
>> working :
>> 
>> Port 2223
>> 16:53:13.240166 IP 46.105.230.225.19480 > 192.168.101.254.2223: Flags [S], 
>> seq 3864438539, win 8192, options [mss 1460,nop,nop,sackOK], length 0
>> 16:53:13.240306 IP 192.168.101.254.2223 > 46.105.230.225.19480: Flags [S.], 
>> seq 2492220538, ack 3864438540, win 65228, options [mss 1460,nop,wscale 
>> 7,sackOK,eol], length 0
>> Port 10000
>> 16:56:39.864021 IP 46.105.230.225.41932 > 192.168.101.254.10000: Flags [S], 
>> seq 2837326484, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], 
>> length 0
>> 16:56:39.864169 IP 192.168.101.254.10000 > 46.105.230.225.41932: Flags [S.], 
>> seq 1993261464, ack 2837326485, win 65228, options [mss 1460,nop,wscale 
>> 7,sackOK,eol], length 0
> These SYN [S] and SYN-ACK [S.] packets are the normal start of a tcp 
> connection. Sofar nothing strange during connection initiation, there should 
> follow a 3rd ACK [.] packet after which there would follow some useful data 
> exchange like in the first working captures.. But i guess you keep seeing 
> these same two [S] and [S.] packets repeating.?
> You have performed these captures on the LAN interface, could you repeat them 
> on the WAN interface to confirm that the [S.] is properly send back on that 
> same interface the client send the request on? Also if its possible to 
> capture on the client device it would be interesting to see if the [S.] 
> arrives there properly.
>> I use pcengine APU system, the model is AMD G-T40E Processor with 3 NIC ( I 
>> believe It could be something related to a NIC setting somewhere but really 
>> don’t know)
>> 
>> Is someone encounter the same issue than me ? maybe it’s just a setting in 
>> the NIC driver ?
> I don't expect it to be hardware/driver related at this moment..
> 
> Do you have any packages installed? Snort or Suricata can sometimes 
> unexpectedly block traffic you do want.. Or other configurations like 
> limiters/shapers or openvpn/ipsec networks can possibly interfere..
> 
> Regards,
> PiBa-NL
> _______________________________________________
> pfSense mailing list
> https://lists.pfsense.org/mailman/listinfo/list
> Support the project with Gold! https://pfsense.org/gold

_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Reply via email to