Use built-in packet capture tool (ESP and IKEv1/v2 in both plaintext and ciphertext) [PCAP].


- Version: 0.2.b1-022 or later



You can capture ESP and IKEv1/v2 packets handled by Rockhopper and save them in both plaintext and ciphertext as a PCAP file on the Management tab of Web console.

By using a protocol analyzer like Wireshark, you can open the file and view the captured packets.


- Management[Tab] > Packet Capture[Tab]

  1. Click Start button to begin to capture packets.

  2. Click Stop and Save button to quit.

  3. Click a shown link and save a PCAP file (rockhopper.pcap) on Web browser.


You can specify the following settings.

- Capture Configuration:


  • Max amount of caputured packets (bytes)
  • Max numbers of caputured packets
  • Capture interval (seconds): '0' means 'unspecifed'.
  • VPN Realm ID: '0' means 'all'.

- Captured Traffic:


  • ESP packets
  • ESP packets (plaintext)
  • IKE packets
  • IKE packets (plaintext)
  • RADIUS
  • Packets received and sent via VPN Tunnel/TAP Interface (plaintext)
  • Unchecked ESP packets (plaintext)


Ethernet headers, L3 headers (e.g. IP) and L4 headers (e.g. UDP) of captured packets are pseudo headers by Rockhopper. Therefore, they may be different from actual headers by kernel's network stack or network nodes.


Back to Top