of10_7050sx_bsn-vv.out 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343
  1. IP (tos 0x0, ttl 55, id 5483, offset 0, flags [DF], proto TCP (6), length 60)
  2. 88.150.169.52.37044 > 109.74.202.168.6653: Flags [S], cksum 0x0576 (correct), seq 1216143989, win 14600, options [mss 1460,sackOK,TS val 50525982 ecr 0,nop,wscale 7], length 0
  3. IP (tos 0x0, ttl 64, id 26571, offset 0, flags [DF], proto TCP (6), length 40)
  4. 109.74.202.168.6653 > 88.150.169.52.37044: Flags [R.], cksum 0xa06e (correct), seq 0, ack 1216143990, win 0, length 0
  5. IP (tos 0x0, ttl 55, id 49495, offset 0, flags [DF], proto TCP (6), length 60)
  6. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [S], cksum 0x4629 (correct), seq 774256709, win 14600, options [mss 1460,sackOK,TS val 50526482 ecr 0,nop,wscale 7], length 0
  7. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  8. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [S.], cksum 0x39ec (incorrect -> 0x0c04), seq 3422281440, ack 774256710, win 28960, options [mss 1460,sackOK,TS val 590230513 ecr 50526482,nop,wscale 7], length 0
  9. IP (tos 0x0, ttl 55, id 49496, offset 0, flags [DF], proto TCP (6), length 52)
  10. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab7c (correct), seq 1, ack 1, win 115, options [nop,nop,TS val 50526483 ecr 590230513], length 0
  11. IP (tos 0x0, ttl 64, id 60691, offset 0, flags [DF], proto TCP (6), length 60)
  12. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa9f0), seq 1:9, ack 1, win 227, options [nop,nop,TS val 590230516 ecr 50526483], length 8: OpenFlow
  13. version 1.0, type HELLO, length 8, xid 0x00000001
  14. IP (tos 0x0, ttl 55, id 49497, offset 0, flags [DF], proto TCP (6), length 52)
  15. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab6e (correct), seq 1, ack 9, win 115, options [nop,nop,TS val 50526486 ecr 590230516], length 0
  16. IP (tos 0x0, ttl 55, id 49498, offset 0, flags [DF], proto TCP (6), length 60)
  17. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x7b45 (correct), seq 1:9, ack 9, win 115, options [nop,nop,TS val 50526732 ecr 590230516], length 8: OpenFlow
  18. version 1.0, type HELLO, length 8, xid 0x00002e1b
  19. IP (tos 0x0, ttl 64, id 60692, offset 0, flags [DF], proto TCP (6), length 52)
  20. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa8d7), seq 9, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 0
  21. IP (tos 0x0, ttl 64, id 60693, offset 0, flags [DF], proto TCP (6), length 60)
  22. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa7b8), seq 9:17, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 8: OpenFlow
  23. version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
  24. IP (tos 0x0, ttl 55, id 49499, offset 0, flags [DF], proto TCP (6), length 52)
  25. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xa93e (correct), seq 9, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 0
  26. IP (tos 0x0, ttl 55, id 49500, offset 0, flags [DF], proto TCP (6), length 468)
  27. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xff61 (correct), seq 9:425, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 416: OpenFlow
  28. version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
  29. dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
  30. capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
  31. actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
  32. port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
  33. config 0x00000001 (PORT_DOWN)
  34. state 0x00000001 (LINK_DOWN)
  35. curr 0x00000040 (10GB_FD)
  36. advertised 0x00000000
  37. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  38. peer 0x00000000
  39. port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
  40. config 0x00000001 (PORT_DOWN)
  41. state 0x00000001 (LINK_DOWN)
  42. curr 0x00000040 (10GB_FD)
  43. advertised 0x00000000
  44. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  45. peer 0x00000000
  46. port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
  47. config 0x00000001 (PORT_DOWN)
  48. state 0x00000001 (LINK_DOWN)
  49. curr 0x00000040 (10GB_FD)
  50. advertised 0x00000000
  51. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  52. peer 0x00000000
  53. port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
  54. config 0x00000001 (PORT_DOWN)
  55. state 0x00000001 (LINK_DOWN)
  56. curr 0x00000040 (10GB_FD)
  57. advertised 0x00000000
  58. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  59. peer 0x00000000
  60. port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
  61. config 0x00000001 (PORT_DOWN)
  62. state 0x00000001 (LINK_DOWN)
  63. curr 0x00000040 (10GB_FD)
  64. advertised 0x00000000
  65. supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
  66. peer 0x00000000
  67. port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
  68. config 0x80000001 (PORT_DOWN) (bogus)
  69. state 0x00000001 (LINK_DOWN)
  70. curr 0x00000040 (10GB_FD)
  71. advertised 0x00000000
  72. supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
  73. peer 0x00000000
  74. port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
  75. config 0x00000001 (PORT_DOWN)
  76. state 0x00000001 (LINK_DOWN)
  77. curr 0x00000040 (10GB_FD)
  78. advertised 0x00000000
  79. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  80. peer 0x00000000
  81. port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
  82. config 0x80000001 (PORT_DOWN) (bogus)
  83. state 0x00000001 (LINK_DOWN)
  84. curr 0x00000040 (10GB_FD)
  85. advertised 0x00000000
  86. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  87. peer 0x00000000
  88. IP (tos 0x0, ttl 64, id 60694, offset 0, flags [DF], proto TCP (6), length 136)
  89. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a38 (incorrect -> 0xa414), seq 17:101, ack 425, win 235, options [nop,nop,TS val 590230815 ecr 50526733], length 84: OpenFlow
  90. version 1.0, type SET_CONFIG, length 12, xid 0x00000003
  91. flags FRAG_NORMAL, miss_send_len 65535
  92. version 1.0, type FLOW_MOD, length 72, xid 0x00000004
  93. cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
  94. IP (tos 0x0, ttl 64, id 60695, offset 0, flags [DF], proto TCP (6), length 60)
  95. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa5a0), seq 101:109, ack 425, win 235, options [nop,nop,TS val 590230816 ecr 50526733], length 8: OpenFlow
  96. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
  97. IP (tos 0x0, ttl 55, id 49501, offset 0, flags [DF], proto TCP (6), length 140)
  98. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8297 (correct), seq 425:513, ack 109, win 115, options [nop,nop,TS val 50526735 ecr 590230815], length 88: OpenFlow
  99. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffd
  100. match in_port 16
  101. cookie 0x0000000000000001, priority 33000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
  102. IP (tos 0x0, ttl 64, id 60696, offset 0, flags [DF], proto TCP (6), length 52)
  103. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa661), seq 109, ack 513, win 235, options [nop,nop,TS val 590230828 ecr 50526735], length 0
  104. IP (tos 0x0, ttl 55, id 49502, offset 0, flags [DF], proto TCP (6), length 236)
  105. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x6fdb (correct), seq 513:697, ack 109, win 115, options [nop,nop,TS val 50526745 ecr 590230828], length 184: OpenFlow
  106. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffe
  107. match in_port 18
  108. cookie 0x0000000000000002, priority 31000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
  109. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000fff
  110. match in_port 22
  111. cookie 0x0000000000000003, priority 30000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
  112. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
  113. IP (tos 0x0, ttl 64, id 60697, offset 0, flags [DF], proto TCP (6), length 52)
  114. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa596), seq 109, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 0
  115. IP (tos 0x0, ttl 64, id 60698, offset 0, flags [DF], proto TCP (6), length 140)
  116. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a3c (incorrect -> 0x41fa), seq 109:197, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 88: OpenFlow
  117. version 1.0, type VENDOR, length 20, xid 0x00000006, vendor 0x005c16c7 (Big Switch Networks)
  118. subtype SET_MIRRORING, report_mirror_ports ON
  119. version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
  120. subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
  121. version 1.0, type VENDOR, length 20, xid 0x00000008, vendor 0x005c16c7 (Big Switch Networks)
  122. subtype SET_MIRRORING, report_mirror_ports OFF
  123. version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
  124. subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
  125. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
  126. IP (tos 0x0, ttl 55, id 49503, offset 0, flags [DF], proto TCP (6), length 72)
  127. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8c59 (correct), seq 697:717, ack 197, win 115, options [nop,nop,TS val 50526747 ecr 590230829], length 20: OpenFlow
  128. version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
  129. subtype GET_MIRRORING_REPLY, report_mirror_ports ON
  130. IP (tos 0x0, ttl 64, id 60699, offset 0, flags [DF], proto TCP (6), length 52)
  131. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa51a), seq 197, ack 717, win 243, options [nop,nop,TS val 590230843 ecr 50526747], length 0
  132. IP (tos 0x0, ttl 55, id 49504, offset 0, flags [DF], proto TCP (6), length 80)
  133. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8bfd (correct), seq 717:745, ack 197, win 115, options [nop,nop,TS val 50526758 ecr 590230843], length 28: OpenFlow
  134. version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
  135. subtype GET_MIRRORING_REPLY, report_mirror_ports OFF
  136. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
  137. IP (tos 0x0, ttl 64, id 60700, offset 0, flags [DF], proto TCP (6), length 52)
  138. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa4f3), seq 197, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 0
  139. IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 80)
  140. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a00 (incorrect -> 0xa165), seq 197:225, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 28: OpenFlow
  141. version 1.0, type FEATURES_REQUEST, length 8, xid 0x0000000b
  142. version 1.0, type STATS_REQUEST, length 12, xid 0x0000000c
  143. type TABLE, flags 0x0000
  144. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
  145. IP (tos 0x0, ttl 55, id 49505, offset 0, flags [DF], proto TCP (6), length 468)
  146. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xfb70 (correct), seq 745:1161, ack 225, win 115, options [nop,nop,TS val 50526759 ecr 590230843], length 416: OpenFlow
  147. version 1.0, type FEATURES_REPLY, length 416, xid 0x0000000b
  148. dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
  149. capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
  150. actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
  151. port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
  152. config 0x00000001 (PORT_DOWN)
  153. state 0x00000001 (LINK_DOWN)
  154. curr 0x00000040 (10GB_FD)
  155. advertised 0x00000000
  156. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  157. peer 0x00000000
  158. port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
  159. config 0x00000001 (PORT_DOWN)
  160. state 0x00000001 (LINK_DOWN)
  161. curr 0x00000040 (10GB_FD)
  162. advertised 0x00000000
  163. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  164. peer 0x00000000
  165. port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
  166. config 0x00000001 (PORT_DOWN)
  167. state 0x00000001 (LINK_DOWN)
  168. curr 0x00000040 (10GB_FD)
  169. advertised 0x00000000
  170. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  171. peer 0x00000000
  172. port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
  173. config 0x00000001 (PORT_DOWN)
  174. state 0x00000001 (LINK_DOWN)
  175. curr 0x00000040 (10GB_FD)
  176. advertised 0x00000000
  177. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  178. peer 0x00000000
  179. port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
  180. config 0x00000001 (PORT_DOWN)
  181. state 0x00000001 (LINK_DOWN)
  182. curr 0x00000040 (10GB_FD)
  183. advertised 0x00000000
  184. supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
  185. peer 0x00000000
  186. port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
  187. config 0x80000001 (PORT_DOWN) (bogus)
  188. state 0x00000001 (LINK_DOWN)
  189. curr 0x00000040 (10GB_FD)
  190. advertised 0x00000000
  191. supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
  192. peer 0x00000000
  193. port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
  194. config 0x00000001 (PORT_DOWN)
  195. state 0x00000001 (LINK_DOWN)
  196. curr 0x00000040 (10GB_FD)
  197. advertised 0x00000000
  198. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  199. peer 0x00000000
  200. port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
  201. config 0x80000001 (PORT_DOWN) (bogus)
  202. state 0x00000001 (LINK_DOWN)
  203. curr 0x00000040 (10GB_FD)
  204. advertised 0x00000000
  205. supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
  206. peer 0x00000000
  207. IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 52)
  208. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa320), seq 225, ack 1161, win 252, options [nop,nop,TS val 590230856 ecr 50526759], length 0
  209. IP (tos 0x0, ttl 55, id 49506, offset 0, flags [DF], proto TCP (6), length 136)
  210. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4ea6 (correct), seq 1161:1245, ack 225, win 115, options [nop,nop,TS val 50526769 ecr 590230856], length 84: OpenFlow
  211. version 1.0, type STATS_REPLY, length 76, xid 0x0000000c
  212. type TABLE, flags 0x0000
  213. table_id 0, name 'Table 0'
  214. wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  215. max_entries 1500, active_count 0, lookup_count 0, matched_count 0
  216. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
  217. IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
  218. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa2c1), seq 225, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 0
  219. IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
  220. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa189), seq 225:233, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 8: OpenFlow
  221. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000e
  222. IP (tos 0x0, ttl 55, id 49507, offset 0, flags [DF], proto TCP (6), length 60)
  223. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa208 (correct), seq 1245:1253, ack 233, win 115, options [nop,nop,TS val 50526770 ecr 590230857], length 8: OpenFlow
  224. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000e
  225. IP (tos 0x0, ttl 64, id 60705, offset 0, flags [DF], proto TCP (6), length 60)
  226. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa176), seq 233:241, ack 1253, win 252, options [nop,nop,TS val 590230858 ecr 50526770], length 8: OpenFlow
  227. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000f
  228. IP (tos 0x0, ttl 55, id 49508, offset 0, flags [DF], proto TCP (6), length 60)
  229. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1f5 (correct), seq 1253:1261, ack 241, win 115, options [nop,nop,TS val 50526771 ecr 590230858], length 8: OpenFlow
  230. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000f
  231. IP (tos 0x0, ttl 64, id 60706, offset 0, flags [DF], proto TCP (6), length 60)
  232. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa163), seq 241:249, ack 1261, win 252, options [nop,nop,TS val 590230859 ecr 50526771], length 8: OpenFlow
  233. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000010
  234. IP (tos 0x0, ttl 55, id 49509, offset 0, flags [DF], proto TCP (6), length 60)
  235. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1e3 (correct), seq 1261:1269, ack 249, win 115, options [nop,nop,TS val 50526771 ecr 590230859], length 8: OpenFlow
  236. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000010
  237. IP (tos 0x0, ttl 64, id 60707, offset 0, flags [DF], proto TCP (6), length 60)
  238. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa151), seq 249:257, ack 1269, win 252, options [nop,nop,TS val 590230860 ecr 50526771], length 8: OpenFlow
  239. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000011
  240. IP (tos 0x0, ttl 55, id 49510, offset 0, flags [DF], proto TCP (6), length 60)
  241. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1d0 (correct), seq 1269:1277, ack 257, win 115, options [nop,nop,TS val 50526772 ecr 590230860], length 8: OpenFlow
  242. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000011
  243. IP (tos 0x0, ttl 64, id 60708, offset 0, flags [DF], proto TCP (6), length 60)
  244. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa13e), seq 257:265, ack 1277, win 252, options [nop,nop,TS val 590230861 ecr 50526772], length 8: OpenFlow
  245. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000012
  246. IP (tos 0x0, ttl 55, id 49511, offset 0, flags [DF], proto TCP (6), length 60)
  247. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1bd (correct), seq 1277:1285, ack 265, win 115, options [nop,nop,TS val 50526773 ecr 590230861], length 8: OpenFlow
  248. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000012
  249. IP (tos 0x0, ttl 64, id 60709, offset 0, flags [DF], proto TCP (6), length 60)
  250. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa12b), seq 265:273, ack 1285, win 252, options [nop,nop,TS val 590230862 ecr 50526773], length 8: OpenFlow
  251. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000013
  252. IP (tos 0x0, ttl 55, id 49512, offset 0, flags [DF], proto TCP (6), length 60)
  253. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1aa (correct), seq 1285:1293, ack 273, win 115, options [nop,nop,TS val 50526774 ecr 590230862], length 8: OpenFlow
  254. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000013
  255. IP (tos 0x0, ttl 64, id 60710, offset 0, flags [DF], proto TCP (6), length 120)
  256. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a28 (incorrect -> 0x9a6c), seq 273:341, ack 1293, win 252, options [nop,nop,TS val 590230863 ecr 50526774], length 68: OpenFlow
  257. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000014
  258. port_no 16
  259. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000015
  260. port_no 20
  261. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000016
  262. port_no 18
  263. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000017
  264. port_no 22
  265. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000018
  266. port_no 17
  267. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000019
  268. IP (tos 0x0, ttl 55, id 49513, offset 0, flags [DF], proto TCP (6), length 68)
  269. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa139 (correct), seq 1293:1309, ack 341, win 115, options [nop,nop,TS val 50526775 ecr 590230863], length 16: OpenFlow
  270. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000014
  271. port_no 16
  272. IP (tos 0x0, ttl 64, id 60711, offset 0, flags [DF], proto TCP (6), length 52)
  273. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1f5), seq 341, ack 1309, win 252, options [nop,nop,TS val 590230875 ecr 50526775], length 0
  274. IP (tos 0x0, ttl 55, id 49514, offset 0, flags [DF], proto TCP (6), length 124)
  275. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9bb5 (correct), seq 1309:1381, ack 341, win 115, options [nop,nop,TS val 50526785 ecr 590230875], length 72: OpenFlow
  276. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000015
  277. port_no 20
  278. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000016
  279. port_no 18
  280. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000017
  281. port_no 22
  282. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000018
  283. port_no 17
  284. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000019
  285. IP (tos 0x0, ttl 64, id 60712, offset 0, flags [DF], proto TCP (6), length 52)
  286. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1a3), seq 341, ack 1381, win 252, options [nop,nop,TS val 590230875 ecr 50526785], length 0
  287. IP (tos 0x0, ttl 64, id 60713, offset 0, flags [DF], proto TCP (6), length 562)
  288. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3be2 (incorrect -> 0x4d80), seq 341:851, ack 1381, win 252, options [nop,nop,TS val 590230876 ecr 50526785], length 510: OpenFlow
  289. version 1.0, type VENDOR, length 24, xid 0x0000001a, vendor 0x005c16c7 (Big Switch Networks)
  290. subtype SET_IP_MASK, index 1, mask 255.0.14.0
  291. version 1.0, type VENDOR, length 24, xid 0x0000001b, vendor 0x005c16c7 (Big Switch Networks)
  292. subtype SET_IP_MASK, index 2, mask 255.0.28.0
  293. version 1.0, type VENDOR, length 24, xid 0x0000001c, vendor 0x005c16c7 (Big Switch Networks)
  294. subtype SET_IP_MASK, index 3, mask 255.0.56.0
  295. version 1.0, type VENDOR, length 24, xid 0x0000001d, vendor 0x005c16c7 (Big Switch Networks)
  296. subtype SET_IP_MASK, index 4, mask 255.0.112.0
  297. version 1.0, type VENDOR, length 24, xid 0x0000001e, vendor 0x005c16c7 (Big Switch Networks)
  298. subtype SET_IP_MASK, index 5, mask 255.0.224.0
  299. version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
  300. subtype GET_IP_MASK_REQUEST, index 3
  301. version 1.0, type VENDOR, length 30, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
  302. subtype SHELL_COMMAND, service 0, data 'show clock'
  303. version 1.0, type FLOW_MOD, length 104, xid 0x00000021
  304. match in_port 16
  305. cookie 0x0000000000000001, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  306. action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
  307. subtype MIRROR, dest_port 21, vlan_tag none, copy_stage INGRESS
  308. action type OUTPUT, len 8, port 17
  309. version 1.0, type FLOW_MOD, length 128, xid 0x00000022
  310. match in_port 18
  311. cookie 0x0000000000000002, command ADD, priority 31000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  312. action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
  313. subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 2, p 4), copy_stage INGRESS
  314. action type OUTPUT, len 8, port 19
  315. action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
  316. subtype MIRROR, dest_port 23, vlan_tag 802.1Q (vlan 2748, p 5, DEI), copy_stage EGRESS
  317. version 1.0, type FLOW_MOD, length 96, xid 0x00000023
  318. match in_port 22
  319. cookie 0x0000000000000003, command ADD, priority 30000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  320. action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
  321. subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 0, p 1), copy_stage INGRESS
  322. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000024
  323. IP (tos 0x0, ttl 55, id 49515, offset 0, flags [DF], proto TCP (6), length 76)
  324. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4da3 (correct), seq 1381:1405, ack 851, win 123, options [nop,nop,TS val 50526786 ecr 590230876], length 24: OpenFlow
  325. version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
  326. subtype GET_IP_MASK_REPLY, index 3, mask 255.0.56.0
  327. IP (tos 0x0, ttl 64, id 60714, offset 0, flags [DF], proto TCP (6), length 52)
  328. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f7f), seq 851, ack 1405, win 252, options [nop,nop,TS val 590230888 ecr 50526786], length 0
  329. IP (tos 0x0, ttl 55, id 49516, offset 0, flags [DF], proto TCP (6), length 80)
  330. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8632 (correct), seq 1405:1433, ack 851, win 123, options [nop,nop,TS val 50526795 ecr 590230888], length 28: OpenFlow
  331. version 1.0, type VENDOR, length 20, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
  332. subtype SHELL_STATUS, status 0xfffffffe
  333. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000024
  334. IP (tos 0x0, ttl 64, id 60715, offset 0, flags [DF], proto TCP (6), length 52)
  335. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f59), seq 851, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 0
  336. IP (tos 0x0, ttl 64, id 60716, offset 0, flags [DF], proto TCP (6), length 60)
  337. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0x9e0a), seq 851:859, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 8: OpenFlow
  338. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000025
  339. IP (tos 0x0, ttl 55, id 49517, offset 0, flags [DF], proto TCP (6), length 60)
  340. 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9e80 (correct), seq 1433:1441, ack 859, win 123, options [nop,nop,TS val 50526797 ecr 590230889], length 8: OpenFlow
  341. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000025
  342. IP (tos 0x0, ttl 64, id 60717, offset 0, flags [DF], proto TCP (6), length 52)
  343. 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f3a), seq 859, ack 1441, win 252, options [nop,nop,TS val 590230902 ecr 50526797], length 0