of10_pf5240-vv.out 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428
  1. IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60)
  2. 172.16.1.101.62224 > 172.16.1.51.6633: Flags [S], cksum 0x6dd0 (correct), seq 2446711727, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
  3. IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  4. 172.16.1.51.6633 > 172.16.1.101.62224: Flags [R.], cksum 0xda97 (correct), seq 0, ack 2446711728, win 0, length 0
  5. IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60)
  6. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [S], cksum 0xa14c (correct), seq 2619186670, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
  7. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  8. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [S.], cksum 0x5ae7 (incorrect -> 0x3c7c), seq 3998019188, ack 2619186671, win 14480, options [mss 1460,nop,nop,TS val 2256457959 ecr 0,nop,wscale 7], length 0
  9. IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52)
  10. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x956f (correct), seq 1, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 0
  11. IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60)
  12. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xb6f9 (correct), seq 1:9, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 8: OpenFlow
  13. version 1.0, type HELLO, length 8, xid 0x000cdd51
  14. IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52)
  15. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0xa05b), seq 1, ack 9, win 114, options [nop,nop,TS val 2256457961 ecr 0], length 0
  16. IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60)
  17. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f29), seq 1:9, ack 9, win 114, options [nop,nop,TS val 2256457986 ecr 0], length 8: OpenFlow
  18. version 1.0, type HELLO, length 8, xid 0x00000001
  19. IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60)
  20. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f13), seq 9:17, ack 9, win 114, options [nop,nop,TS val 2256457994 ecr 0], length 8: OpenFlow
  21. version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
  22. IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52)
  23. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x9544 (correct), seq 9, ack 17, win 2912, options [nop,nop,TS val 0 ecr 2256457986], length 0
  24. IP (tos 0xa0, ttl 64, id 10679, offset 0, flags [DF], proto TCP (6), length 468)
  25. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xcacf (correct), seq 9:425, ack 17, win 2920, options [nop,nop,TS val 0 ecr 2256457986], length 416: OpenFlow
  26. version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
  27. dpid 0x000100255cab0c07, n_buffers 544, n_tables 11
  28. capabilities 0x00000087 (FLOW_STATS, TABLE_STATS, PORT_STATS, ARP_MATCH_IP)
  29. actions 0x00000fff (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, STRIP_VLAN, SET_DL_SRC, SET_DL_DST, SET_NW_SRC, SET_NW_DST, SET_NW_TOS, SET_TP_SRC, SET_TP_DST, ENQUEUE)
  30. port_no 1, hw_addr 00:25:5c:ab:0c:87, name 'GBE0/1'
  31. config 0x00000002 (NO_STP)
  32. state 0x00000200 (STP_FORWARD, STP_BLOCK)
  33. curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
  34. advertised 0x00000000
  35. supported 0x00000000
  36. peer 0x00000000
  37. port_no 2, hw_addr 00:25:5c:ab:0c:47, name 'GBE0/2'
  38. config 0x00000002 (NO_STP)
  39. state 0x00000200 (STP_FORWARD, STP_BLOCK)
  40. curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
  41. advertised 0x00000000
  42. supported 0x00000000
  43. peer 0x00000000
  44. port_no 3, hw_addr 00:25:5c:ab:0c:c7, name 'GBE0/3'
  45. config 0x00000002 (NO_STP)
  46. state 0x00000200 (STP_FORWARD, STP_BLOCK)
  47. curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
  48. advertised 0x00000000
  49. supported 0x00000000
  50. peer 0x00000000
  51. port_no 4, hw_addr 00:25:5c:ab:0c:27, name 'GBE0/4'
  52. config 0x00000002 (NO_STP)
  53. state 0x00000201 (LINK_DOWN, STP_FORWARD, STP_BLOCK)
  54. curr 0x00000000
  55. advertised 0x00000000
  56. supported 0x00000000
  57. peer 0x00000000
  58. port_no 5, hw_addr 00:25:5c:ab:0c:a7, name 'GBE0/5'
  59. config 0x00000002 (NO_STP)
  60. state 0x00000201 (LINK_DOWN, STP_FORWARD, STP_BLOCK)
  61. curr 0x00000000
  62. advertised 0x00000000
  63. supported 0x00000000
  64. peer 0x00000000
  65. port_no 6, hw_addr 00:25:5c:ab:0c:67, name 'GBE0/6'
  66. config 0x00000002 (NO_STP)
  67. state 0x00000201 (LINK_DOWN, STP_FORWARD, STP_BLOCK)
  68. curr 0x00000000
  69. advertised 0x00000000
  70. supported 0x00000000
  71. peer 0x00000000
  72. port_no 7, hw_addr 00:25:5c:ab:0c:e7, name 'GBE0/7'
  73. config 0x00000002 (NO_STP)
  74. state 0x00000201 (LINK_DOWN, STP_FORWARD, STP_BLOCK)
  75. curr 0x00000000
  76. advertised 0x00000000
  77. supported 0x00000000
  78. peer 0x00000000
  79. port_no 8, hw_addr 00:25:5c:ab:0c:17, name 'GBE0/8'
  80. config 0x00000002 (NO_STP)
  81. state 0x00000201 (LINK_DOWN, STP_FORWARD, STP_BLOCK)
  82. curr 0x00000000
  83. advertised 0x00000000
  84. supported 0x00000000
  85. peer 0x00000000
  86. IP (tos 0x0, ttl 64, id 16031, offset 0, flags [DF], proto TCP (6), length 136)
  87. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b33 (incorrect -> 0x9b62), seq 17:101, ack 425, win 122, options [nop,nop,TS val 2256458010 ecr 0], length 84: OpenFlow
  88. version 1.0, type SET_CONFIG, length 12, xid 0x00000003
  89. flags FRAG_NORMAL, miss_send_len 65535
  90. version 1.0, type FLOW_MOD, length 72, xid 0x00000004
  91. cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
  92. IP (tos 0x0, ttl 64, id 16032, offset 0, flags [DF], proto TCP (6), length 60)
  93. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9ceb), seq 101:109, ack 425, win 122, options [nop,nop,TS val 2256458014 ecr 0], length 8: OpenFlow
  94. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
  95. IP (tos 0xa0, ttl 64, id 10680, offset 0, flags [DF], proto TCP (6), length 52)
  96. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x932f (correct), seq 425, ack 109, win 2912, options [nop,nop,TS val 1 ecr 2256458010], length 0
  97. IP (tos 0xa0, ttl 64, id 10681, offset 0, flags [DF], proto TCP (6), length 60)
  98. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x91f7 (correct), seq 425:433, ack 109, win 2920, options [nop,nop,TS val 1 ecr 2256458010], length 8: OpenFlow
  99. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
  100. IP (tos 0x0, ttl 64, id 16033, offset 0, flags [DF], proto TCP (6), length 72)
  101. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x9ba7), seq 109:129, ack 433, win 122, options [nop,nop,TS val 2256458017 ecr 1], length 20: OpenFlow
  102. version 1.0, type STATS_REQUEST, length 12, xid 0x00000006
  103. type DESC, flags 0x0000
  104. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000007
  105. IP (tos 0xa0, ttl 64, id 10682, offset 0, flags [DF], proto TCP (6), length 1120)
  106. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x7324 (correct), seq 433:1501, ack 129, win 2912, options [nop,nop,TS val 1 ecr 2256458017], length 1068: OpenFlow
  107. version 1.0, type STATS_REPLY, length 1068, xid 0x00000006
  108. type DESC, flags 0x0000
  109. mfr_desc 'NEC Corporation'
  110. hw_desc 'PF5240F-48T4XW-AX(L1L2)'
  111. sw_desc 'OS-F3PA Ver. V4.0.1.0'
  112. serial_num 'Y1252CFA0000S4068C8N004'
  113. dp_desc 'PFS1'
  114. IP (tos 0x0, ttl 64, id 16034, offset 0, flags [DF], proto TCP (6), length 52)
  115. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x998b), seq 129, ack 1501, win 139, options [nop,nop,TS val 2256458059 ecr 1], length 0
  116. IP (tos 0xa0, ttl 64, id 10686, offset 0, flags [DF], proto TCP (6), length 60)
  117. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8da6 (correct), seq 1501:1509, ack 129, win 2920, options [nop,nop,TS val 1 ecr 2256458017], length 8: OpenFlow
  118. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000007
  119. IP (tos 0x0, ttl 64, id 16035, offset 0, flags [DF], proto TCP (6), length 52)
  120. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9982), seq 129, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 0
  121. IP (tos 0x0, ttl 64, id 16036, offset 0, flags [DF], proto TCP (6), length 84)
  122. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5aff (incorrect -> 0x95e2), seq 129:161, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 32: OpenFlow
  123. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000008
  124. port_no 1
  125. version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000009
  126. port_no 2
  127. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
  128. IP (tos 0xa0, ttl 64, id 10687, offset 0, flags [DF], proto TCP (6), length 196)
  129. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b77 (correct), seq 1509:1653, ack 161, win 2900, options [nop,nop,TS val 1 ecr 2256458060], length 144: OpenFlow
  130. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000008
  131. port_no 1
  132. queue_id 0, len 16
  133. property NONE, len 8
  134. queue_id 1, len 16
  135. property NONE, len 8
  136. queue_id 2, len 16
  137. property NONE, len 8
  138. queue_id 3, len 16
  139. property NONE, len 8
  140. queue_id 4, len 16
  141. property NONE, len 8
  142. queue_id 5, len 16
  143. property NONE, len 8
  144. queue_id 6, len 16
  145. property NONE, len 8
  146. queue_id 7, len 16
  147. property NONE, len 8
  148. IP (tos 0x0, ttl 64, id 16037, offset 0, flags [DF], proto TCP (6), length 52)
  149. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9899), seq 161, ack 1653, win 155, options [nop,nop,TS val 2256458101 ecr 1], length 0
  150. IP (tos 0xa0, ttl 64, id 10688, offset 0, flags [DF], proto TCP (6), length 204)
  151. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x89a4 (correct), seq 1653:1805, ack 161, win 2920, options [nop,nop,TS val 1 ecr 2256458060], length 152: OpenFlow
  152. version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000009
  153. port_no 2
  154. queue_id 0, len 16
  155. property NONE, len 8
  156. queue_id 1, len 16
  157. property NONE, len 8
  158. queue_id 2, len 16
  159. property NONE, len 8
  160. queue_id 3, len 16
  161. property NONE, len 8
  162. queue_id 4, len 16
  163. property NONE, len 8
  164. queue_id 5, len 16
  165. property NONE, len 8
  166. queue_id 6, len 16
  167. property NONE, len 8
  168. queue_id 7, len 16
  169. property NONE, len 8
  170. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
  171. IP (tos 0x0, ttl 64, id 16038, offset 0, flags [DF], proto TCP (6), length 52)
  172. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x97ef), seq 161, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 0
  173. IP (tos 0x0, ttl 64, id 16039, offset 0, flags [DF], proto TCP (6), length 100)
  174. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b0f (incorrect -> 0x9424), seq 161:209, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 48: OpenFlow
  175. version 1.0, type STATS_REQUEST, length 20, xid 0x0000000b
  176. type QUEUE, flags 0x0000
  177. port_no 1, queue_id ALL
  178. version 1.0, type STATS_REQUEST, length 20, xid 0x0000000c
  179. type QUEUE, flags 0x0000
  180. port_no 2, queue_id ALL
  181. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
  182. IP (tos 0xa0, ttl 64, id 10689, offset 0, flags [DF], proto TCP (6), length 96)
  183. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b9c (correct), seq 1805:1849, ack 209, win 2892, options [nop,nop,TS val 1 ecr 2256458102], length 44: OpenFlow
  184. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  185. type QUEUE, flags 0x0001 (MORE)
  186. port_no 1, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  187. IP (tos 0x0, ttl 64, id 16040, offset 0, flags [DF], proto TCP (6), length 52)
  188. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9769), seq 209, ack 1849, win 172, options [nop,nop,TS val 2256458144 ecr 1], length 0
  189. IP (tos 0xa0, ttl 64, id 10690, offset 0, flags [DF], proto TCP (6), length 744)
  190. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x72af (correct), seq 1849:2541, ack 209, win 2920, options [nop,nop,TS val 1 ecr 2256458102], length 692: OpenFlow
  191. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  192. type QUEUE, flags 0x0001 (MORE)
  193. port_no 1, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  194. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  195. type QUEUE, flags 0x0001 (MORE)
  196. port_no 1, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  197. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  198. type QUEUE, flags 0x0001 (MORE)
  199. port_no 1, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  200. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  201. type QUEUE, flags 0x0001 (MORE)
  202. port_no 1, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  203. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  204. type QUEUE, flags 0x0001 (MORE)
  205. port_no 1, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  206. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  207. type QUEUE, flags 0x0001 (MORE)
  208. port_no 1, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  209. version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
  210. type QUEUE, flags 0x0001 (MORE)
  211. port_no 1, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  212. version 1.0, type STATS_REPLY, length 12, xid 0x0000000b
  213. type QUEUE, flags 0x0000
  214. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  215. type QUEUE, flags 0x0001 (MORE)
  216. port_no 2, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  217. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  218. type QUEUE, flags 0x0001 (MORE)
  219. port_no 2, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  220. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  221. type QUEUE, flags 0x0001 (MORE)
  222. port_no 2, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  223. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  224. type QUEUE, flags 0x0001 (MORE)
  225. port_no 2, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  226. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  227. type QUEUE, flags 0x0001 (MORE)
  228. port_no 2, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  229. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  230. type QUEUE, flags 0x0001 (MORE)
  231. port_no 2, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  232. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  233. type QUEUE, flags 0x0001 (MORE)
  234. port_no 2, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  235. version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
  236. type QUEUE, flags 0x0001 (MORE)
  237. port_no 2, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
  238. version 1.0, type STATS_REPLY, length 12, xid 0x0000000c
  239. type QUEUE, flags 0x0000
  240. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
  241. IP (tos 0x0, ttl 64, id 16041, offset 0, flags [DF], proto TCP (6), length 52)
  242. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x94a3), seq 209, ack 2541, win 189, options [nop,nop,TS val 2256458145 ecr 1], length 0
  243. IP (tos 0x0, ttl 64, id 16042, offset 0, flags [DF], proto TCP (6), length 700)
  244. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5d67 (incorrect -> 0xa5e9), seq 209:857, ack 2541, win 189, options [nop,nop,TS val 2256458147 ecr 1], length 648: OpenFlow
  245. version 1.0, type FLOW_MOD, length 80, xid 0x0000000e
  246. match in_port 1
  247. cookie 0x0000000000000001, command ADD, priority 24100, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  248. action type OUTPUT, len 8, port 4
  249. version 1.0, type FLOW_MOD, length 80, xid 0x0000000f
  250. match in_port 2
  251. cookie 0x0000000000000002, command ADD, priority 24200, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  252. action type OUTPUT, len 8, port 4
  253. version 1.0, type FLOW_MOD, length 80, xid 0x00000010
  254. match in_port 3
  255. cookie 0x0000000000000003, command ADD, priority 24300, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  256. action type OUTPUT, len 8, port 4
  257. version 1.0, type FLOW_MOD, length 80, xid 0x00000011
  258. match in_port 5
  259. cookie 0x0000000000000004, command ADD, priority 20500, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  260. action type OUTPUT, len 8, port 8
  261. version 1.0, type FLOW_MOD, length 80, xid 0x00000012
  262. match in_port 6
  263. cookie 0x0000000000000005, command ADD, priority 20600, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  264. action type OUTPUT, len 8, port 8
  265. version 1.0, type FLOW_MOD, length 80, xid 0x00000013
  266. match in_port 7
  267. cookie 0x0000000000000006, command ADD, priority 20700, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  268. action type OUTPUT, len 8, port 8
  269. version 1.0, type FLOW_MOD, length 80, xid 0x00000014
  270. match in_port 4
  271. cookie 0x0000000000000007, command ADD, priority 25400, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
  272. action type OUTPUT, len 8, port 8
  273. version 1.0, type FLOW_MOD, length 80, xid 0x00000015
  274. match in_port 8
  275. cookie 0x0000000000000008, command ADD, priority 25800, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
  276. action type OUTPUT, len 8, port 4
  277. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000016
  278. IP (tos 0xa0, ttl 64, id 10691, offset 0, flags [DF], proto TCP (6), length 60)
  279. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x862d (correct), seq 2541:2549, ack 857, win 2920, options [nop,nop,TS val 1 ecr 2256458147], length 8: OpenFlow
  280. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000016
  281. IP (tos 0x0, ttl 64, id 16043, offset 0, flags [DF], proto TCP (6), length 116)
  282. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b1f (incorrect -> 0x6ef4), seq 857:921, ack 2549, win 189, options [nop,nop,TS val 2256458158 ecr 1], length 64: OpenFlow
  283. version 1.0, type STATS_REQUEST, length 56, xid 0x00000017
  284. type FLOW, flags 0x0000
  285. table_id ALL, out_port NONE
  286. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000018
  287. IP (tos 0xa0, ttl 64, id 10692, offset 0, flags [DF], proto TCP (6), length 160)
  288. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x0485 (correct), seq 2549:2657, ack 921, win 2912, options [nop,nop,TS val 1 ecr 2256458158], length 108: OpenFlow
  289. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  290. type FLOW, flags 0x0001 (MORE)
  291. length 96, table_id 0
  292. match in_port 3
  293. duration_sec 0, duration_nsec 0, priority 24300, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
  294. action type OUTPUT, len 8, port 4
  295. IP (tos 0x0, ttl 64, id 16044, offset 0, flags [DF], proto TCP (6), length 52)
  296. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9131), seq 921, ack 2657, win 189, options [nop,nop,TS val 2256458199 ecr 1], length 0
  297. IP (tos 0xa0, ttl 64, id 10693, offset 0, flags [DF], proto TCP (6), length 828)
  298. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x1544 (correct), seq 2657:3433, ack 921, win 2920, options [nop,nop,TS val 1 ecr 2256458158], length 776: OpenFlow
  299. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  300. type FLOW, flags 0x0001 (MORE)
  301. length 96, table_id 0
  302. match in_port 2
  303. duration_sec 0, duration_nsec 0, priority 24200, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
  304. action type OUTPUT, len 8, port 4
  305. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  306. type FLOW, flags 0x0001 (MORE)
  307. length 96, table_id 0
  308. match in_port 1
  309. duration_sec 0, duration_nsec 0, priority 24100, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
  310. action type OUTPUT, len 8, port 4
  311. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  312. type FLOW, flags 0x0001 (MORE)
  313. length 96, table_id 1
  314. match in_port 7
  315. duration_sec 0, duration_nsec 0, priority 20700, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
  316. action type OUTPUT, len 8, port 8
  317. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  318. type FLOW, flags 0x0001 (MORE)
  319. length 96, table_id 1
  320. match in_port 6
  321. duration_sec 0, duration_nsec 0, priority 20600, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
  322. action type OUTPUT, len 8, port 8
  323. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  324. type FLOW, flags 0x0001 (MORE)
  325. length 96, table_id 1
  326. match in_port 5
  327. duration_sec 0, duration_nsec 0, priority 20500, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
  328. action type OUTPUT, len 8, port 8
  329. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  330. type FLOW, flags 0x0001 (MORE)
  331. length 96, table_id EMERG
  332. match in_port 8
  333. duration_sec 0, duration_nsec 0, priority 25800, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
  334. action type OUTPUT, len 8, port 4
  335. version 1.0, type STATS_REPLY, length 108, xid 0x00000017
  336. type FLOW, flags 0x0001 (MORE)
  337. length 96, table_id EMERG
  338. match in_port 4
  339. duration_sec 0, duration_nsec 0, priority 25400, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
  340. action type OUTPUT, len 8, port 8
  341. version 1.0, type STATS_REPLY, length 12, xid 0x00000017
  342. type FLOW, flags 0x0000
  343. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000018
  344. IP (tos 0x0, ttl 64, id 16045, offset 0, flags [DF], proto TCP (6), length 52)
  345. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8e18), seq 921, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 0
  346. IP (tos 0x0, ttl 64, id 16046, offset 0, flags [DF], proto TCP (6), length 72)
  347. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x8b90), seq 921:941, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 20: OpenFlow
  348. version 1.0, type STATS_REQUEST, length 12, xid 0x00000019
  349. type TABLE, flags 0x0000
  350. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000001a
  351. IP (tos 0xa0, ttl 64, id 10694, offset 0, flags [DF], proto TCP (6), length 128)
  352. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xe84a (correct), seq 3433:3509, ack 941, win 2912, options [nop,nop,TS val 1 ecr 2256458200], length 76: OpenFlow
  353. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  354. type TABLE, flags 0x0001 (MORE)
  355. table_id 0, name 'Normal 1 Flow Table'
  356. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  357. max_entries 5632, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
  358. IP (tos 0x0, ttl 64, id 16047, offset 0, flags [DF], proto TCP (6), length 52)
  359. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8d8f), seq 941, ack 3509, win 205, options [nop,nop,TS val 2256458241 ecr 1], length 0
  360. IP (tos 0xa0, ttl 64, id 10695, offset 0, flags [DF], proto TCP (6), length 832)
  361. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x198c (correct), seq 3509:4289, ack 941, win 2920, options [nop,nop,TS val 1 ecr 2256458200], length 780: OpenFlow
  362. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  363. type TABLE, flags 0x0001 (MORE)
  364. table_id 1, name 'Expanded Flow Table'
  365. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  366. max_entries 163840, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
  367. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  368. type TABLE, flags 0x0001 (MORE)
  369. table_id 20, name 'Normal 2 Flow Table'
  370. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  371. max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  372. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  373. type TABLE, flags 0x0001 (MORE)
  374. table_id 50, name 'Mpls 1 Flow Table'
  375. wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  376. max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  377. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  378. type TABLE, flags 0x0001 (MORE)
  379. table_id 51, name 'Mpls 2 Flow Table'
  380. wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  381. max_entries 16384, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  382. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  383. type TABLE, flags 0x0001 (MORE)
  384. table_id 99, name 'Software Flow Table'
  385. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  386. max_entries 2048, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  387. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  388. type TABLE, flags 0x0001 (MORE)
  389. table_id 100, name 'V-Normal 1 Flow Table'
  390. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  391. max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  392. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  393. type TABLE, flags 0x0001 (MORE)
  394. table_id 101, name 'V-Expanded Flow Table'
  395. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  396. max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  397. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  398. type TABLE, flags 0x0001 (MORE)
  399. table_id 120, name 'V-Normal 2 Flow Table'
  400. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  401. max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  402. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  403. type TABLE, flags 0x0001 (MORE)
  404. table_id 140, name 'Q-Normal 1 Flow Table'
  405. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  406. max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
  407. version 1.0, type STATS_REPLY, length 76, xid 0x00000019
  408. type TABLE, flags 0x0001 (MORE)
  409. table_id EMERG, name 'Emergency Flow Cache'
  410. wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  411. max_entries 5632, active_count 2, lookup_count 18446744073709551615, matched_count 18446744073709551615
  412. version 1.0, type STATS_REPLY, length 12, xid 0x00000019
  413. type TABLE, flags 0x0000
  414. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000001a
  415. IP (tos 0x0, ttl 64, id 16048, offset 0, flags [DF], proto TCP (6), length 52)
  416. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8a72), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458241 ecr 1], length 0
  417. IP (tos 0x0, ttl 64, id 16049, offset 0, flags [DF], proto TCP (6), length 52)
  418. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [F.], cksum 0x5adf (incorrect -> 0x895d), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458517 ecr 1], length 0
  419. IP (tos 0xa0, ttl 64, id 10696, offset 0, flags [DF], proto TCP (6), length 52)
  420. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x7ed2 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
  421. IP (tos 0xa0, ttl 64, id 10697, offset 0, flags [DF], proto TCP (6), length 52)
  422. 172.16.1.101.62221 > 172.16.1.51.6633: Flags [F.], cksum 0x7ed1 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
  423. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  424. 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x8958 (correct), seq 942, ack 4290, win 222, options [nop,nop,TS val 2256458520 ecr 2], length 0
  425. IP (tos 0xa0, ttl 64, id 10710, offset 0, flags [DF], proto TCP (6), length 60)
  426. 172.16.1.101.62216 > 172.16.1.51.6633: Flags [S], cksum 0xf0a4 (correct), seq 2928426028, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
  427. IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  428. 172.16.1.51.6633 > 172.16.1.101.62216: Flags [R.], cksum 0x5d6c (correct), seq 0, ack 2928426029, win 0, length 0