(dax:18:46)# ifconfig gre0 gre0: flags=9051 metric 0 mtu 1280 tunnel inet 10.3.4.6 --> 10.3.4.21 inet6 fe80::219:dbff:fe4a:9b62%gre0 prefixlen 64 scopeid 0x12 inet 10.3.7.209 --> 10.3.7.210 netmask 0xfffffffc (dax:18:46)# route -n get 10.3.4.21 route to: 10.3.4.21 destination: 10.3.4.21 gateway: 10.3.254.17 interface: tun0 flags: recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire 0 0 0 0 0 0 1456 0 (dax:18:48)# route -n get 10.3.7.210 route to: 10.3.7.210 destination: 10.3.7.210 interface: gre0 flags: recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire 0 0 0 0 0 0 1280 0 (dax:18:48)# tcpdump -i pflog0 -ns0 host 10.3.4.21 & [1] 88166 (dax:18:48)# tcpdump: WARNING: pflog0: no IPv4 address assigned tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on pflog0, link-type PFLOG (OpenBSD pflog file), capture size 65535 bytes ping 10.3.7.210 PING 10.3.7.210 (10.3.7.210): 56 data bytes ping: sendto: Operation not permitted 18:48:36.063693 IP 69.9.189.182 > 10.3.4.21: GREv0, length 88: IP 10.3.7.209 > 10.3.7.210: ICMP echo request, id 26456, seq 0, length 64 ping: sendto: Operation not permitted 18:48:37.097960 IP 69.9.189.182 > 10.3.4.21: GREv0, length 88: IP 10.3.7.209 > 10.3.7.210: ICMP echo request, id 26456, seq 1, length 64 ping: sendto: Operation not permitted 18:48:38.139617 IP 69.9.189.182 > 10.3.4.21: GREv0, length 88: IP 10.3.7.209 > 10.3.7.210: ICMP echo request, id 26456, seq 2, length 64 ping: sendto: Operation not permitted 18:48:39.181454 IP 69.9.189.182 > 10.3.4.21: GREv0, length 88: IP 10.3.7.209 > 10.3.7.210: ICMP echo request, id 26456, seq 3, length 64 ^C --- 10.3.7.210 ping statistics --- 4 packets transmitted, 0 packets received, 100.0% packet loss (dax:18:48)# fg [1] + running tcpdump -i pflog0 -ns0 host 10.3.4.21 ^C 4 packets captured 9 packets received by filter 0 packets dropped by kernel (dax:18:48)# (dax:18:48)# (dax:18:48)# (dax:18:48)# tcpdump -i tun0 -ns0 host 10.3.4.21 & [1] 88173 (dax:18:48)# tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on tun0, link-type NULL (BSD loopback), capture size 65535 bytes ping 10.3.4.21 PING 10.3.4.21 (10.3.4.21): 56 data bytes 64 bytes from 10.3.4.21: icmp_seq=0 ttl=63 time=38.272 ms 18:48:55.739481 IP 10.3.254.18 > 10.3.4.21: ICMP echo request, id 28248, seq 0, length 64 18:48:55.777709 IP 10.3.4.21 > 10.3.254.18: ICMP echo reply, id 28248, seq 0, length 64 64 bytes from 10.3.4.21: icmp_seq=1 ttl=63 time=42.334 ms 18:48:56.761455 IP 10.3.254.18 > 10.3.4.21: ICMP echo request, id 28248, seq 1, length 64 18:48:56.803755 IP 10.3.4.21 > 10.3.254.18: ICMP echo reply, id 28248, seq 1, length 64 64 bytes from 10.3.4.21: icmp_seq=2 ttl=63 time=35.921 ms 18:48:57.800352 IP 10.3.254.18 > 10.3.4.21: ICMP echo request, id 28248, seq 2, length 64 18:48:57.836236 IP 10.3.4.21 > 10.3.254.18: ICMP echo reply, id 28248, seq 2, length 64 ^C --- 10.3.4.21 ping statistics --- 3 packets transmitted, 3 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 35.921/38.842/42.334/2.649 ms (dax:18:48)# fg [1] + running tcpdump -i tun0 -ns0 host 10.3.4.21 ^C 6 packets captured 82 packets received by filter 0 packets dropped by kernel (dax:18:49)#