of10_s4810-vvvv.out 88 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337
  1. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
  2. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [S], cksum 0xa75a (correct), seq 469952923, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0
  3. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  4. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [S.], cksum 0x1493 (incorrect -> 0xa59a), seq 1198728146, ack 469952924, win 14480, options [mss 1460,sackOK,TS val 47836340 ecr 1,nop,wscale 7], length 0
  5. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  6. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ec (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 0
  7. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  8. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x293c (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 8: OpenFlow
  9. version 1.0, type HELLO, length 8, xid 0xf1c0ecd6
  10. IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52)
  11. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x0c7c), seq 1, ack 9, win 114, options [nop,nop,TS val 47836341 ecr 1], length 0
  12. IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60)
  13. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b5d), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47836347 ecr 1], length 8: OpenFlow
  14. version 1.0, type HELLO, length 8, xid 0x00000001
  15. IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60)
  16. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b4e), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47836348 ecr 1], length 8: OpenFlow
  17. version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
  18. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  19. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ce (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47836347], length 0
  20. IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180)
  21. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x48dc (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47836347], length 128: OpenFlow
  22. version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002
  23. dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6
  24. capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
  25. actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
  26. port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0'
  27. config 0x00000000
  28. state 0x00000000
  29. curr 0x00000340 (10GB_FD, FIBER, AUTONEG)
  30. advertised 0x00000340 (10GB_FD, FIBER, AUTONEG)
  31. supported 0x00000340 (10GB_FD, FIBER, AUTONEG)
  32. peer 0x00000000
  33. port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1'
  34. config 0x00000001 (PORT_DOWN)
  35. state 0x00000001 (LINK_DOWN)
  36. curr 0x00000300 (FIBER, AUTONEG)
  37. advertised 0x00000300 (FIBER, AUTONEG)
  38. supported 0x00000300 (FIBER, AUTONEG)
  39. peer 0x00000000
  40. IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136)
  41. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14df (incorrect -> 0x08c9), seq 17:101, ack 137, win 122, options [nop,nop,TS val 47836352 ecr 1], length 84: OpenFlow
  42. version 1.0, type SET_CONFIG, length 12, xid 0x00000003
  43. flags FRAG_NORMAL, miss_send_len 65535
  44. version 1.0, type FLOW_MOD, length 72, xid 0x00000004
  45. cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
  46. IP (tos 0x0, ttl 64, id 53098, offset 0, flags [DF], proto TCP (6), length 60)
  47. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0a54), seq 101:109, ack 137, win 122, options [nop,nop,TS val 47836354 ecr 1], length 8: OpenFlow
  48. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
  49. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  50. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x07ed (correct), seq 137, ack 109, win 1034, options [nop,nop,TS val 1 ecr 47836352], length 0
  51. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  52. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x06bc (correct), seq 137:145, ack 109, win 1035, options [nop,nop,TS val 1 ecr 47836352], length 8: OpenFlow
  53. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
  54. IP (tos 0x0, ttl 64, id 53099, offset 0, flags [DF], proto TCP (6), length 80)
  55. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14a7 (incorrect -> 0x07f3), seq 109:137, ack 145, win 122, options [nop,nop,TS val 47836355 ecr 1], length 28: OpenFlow
  56. version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000006
  57. version 1.0, type STATS_REQUEST, length 12, xid 0x00000007
  58. type TABLE, flags 0x0000
  59. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000008
  60. IP (tos 0x0, ttl 64, id 53475, offset 0, flags [DF], proto TCP (6), length 180)
  61. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x47d0 (correct), seq 145:273, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 128: OpenFlow
  62. version 1.0, type FEATURES_REPLY, length 128, xid 0x00000006
  63. dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6
  64. capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
  65. actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
  66. port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0'
  67. config 0x00000000
  68. state 0x00000000
  69. curr 0x00000340 (10GB_FD, FIBER, AUTONEG)
  70. advertised 0x00000340 (10GB_FD, FIBER, AUTONEG)
  71. supported 0x00000340 (10GB_FD, FIBER, AUTONEG)
  72. peer 0x00000000
  73. port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1'
  74. config 0x00000001 (PORT_DOWN)
  75. state 0x00000001 (LINK_DOWN)
  76. curr 0x00000300 (FIBER, AUTONEG)
  77. advertised 0x00000300 (FIBER, AUTONEG)
  78. supported 0x00000300 (FIBER, AUTONEG)
  79. peer 0x00000000
  80. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  81. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0612 (correct), seq 273:281, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 8: OpenFlow
  82. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000008
  83. IP (tos 0x0, ttl 64, id 53476, offset 0, flags [DF], proto TCP (6), length 448)
  84. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x2be8 (correct), seq 281:677, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 396: OpenFlow
  85. version 1.0, type STATS_REPLY, length 396, xid 0x00000007
  86. type TABLE, flags 0x0000
  87. table_id 0, name 'VLAN Table'
  88. wildcards 0x003ffffd (IN_PORT, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  89. max_entries 1024, active_count 0, lookup_count 0, matched_count 0
  90. table_id 0, name 'MAC Table'
  91. wildcards 0x003ffff5 (IN_PORT, DL_SRC, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  92. max_entries 49152, active_count 0, lookup_count 0, matched_count 0
  93. table_id 0, name 'Route Table'
  94. wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  95. max_entries 6144, active_count 0, lookup_count 0, matched_count 0
  96. table_id 0, name 'ACL Table'
  97. wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  98. max_entries 498, active_count 0, lookup_count 127028, matched_count 0
  99. table_id 0, name 'Learning Switch Table'
  100. wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  101. max_entries 24576, active_count 0, lookup_count 0, matched_count 0
  102. table_id 0, name 'Egress Port Block Table'
  103. wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
  104. max_entries 256, active_count 0, lookup_count 0, matched_count 0
  105. IP (tos 0x0, ttl 64, id 53100, offset 0, flags [DF], proto TCP (6), length 52)
  106. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x088c), seq 137, ack 677, win 139, options [nop,nop,TS val 47836520 ecr 1], length 0
  107. IP (tos 0x0, ttl 64, id 53101, offset 0, flags [DF], proto TCP (6), length 4156)
  108. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x2493 (incorrect -> 0xa671), seq 137:4241, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 4104: OpenFlow
  109. version 1.0, type FLOW_MOD, length 80, xid 0x00000009
  110. match in_port 1
  111. cookie 0x0000000000000001, command ADD, priority 35000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  112. action type OUTPUT, len 8, port CONTROLLER, max_len 65535
  113. version 1.0, type FLOW_MOD, length 80, xid 0x0000000a
  114. match in_port 1
  115. cookie 0x0000000000000002, command ADD, priority 34999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  116. action type SET_VLAN_VID, len 8, vlan_vid 2
  117. version 1.0, type FLOW_MOD, length 80, xid 0x0000000b
  118. match in_port 1
  119. cookie 0x0000000000000003, command ADD, priority 34998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  120. action type SET_VLAN_PCP, len 8, vlan_pcp 5
  121. version 1.0, type FLOW_MOD, length 88, xid 0x0000000c
  122. match in_port 1
  123. cookie 0x0000000000000004, command ADD, priority 34997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  124. action type SET_VLAN_VID, len 8, vlan_vid 2
  125. action type SET_VLAN_PCP, len 8, vlan_pcp 5
  126. version 1.0, type FLOW_MOD, length 88, xid 0x0000000d
  127. match in_port 1
  128. cookie 0x0000000000000005, command ADD, priority 34996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  129. action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
  130. version 1.0, type FLOW_MOD, length 88, xid 0x0000000e
  131. match in_port 1
  132. cookie 0x0000000000000006, command ADD, priority 34995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  133. action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
  134. version 1.0, type FLOW_MOD, length 104, xid 0x0000000f
  135. match in_port 1
  136. cookie 0x0000000000000007, command ADD, priority 34994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  137. action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
  138. action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
  139. version 1.0, type FLOW_MOD, length 80, xid 0x00000010
  140. match in_port 1
  141. match dl_src 00:00:00:00:00:01
  142. cookie 0x0000000000000008, command ADD, priority 34000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  143. action type OUTPUT, len 8, port 2
  144. version 1.0, type FLOW_MOD, length 80, xid 0x00000011
  145. match in_port 1
  146. cookie 0x0000000000000009, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  147. action type SET_NW_TOS, len 8, nw_tos 0x28
  148. version 1.0, type FLOW_MOD, length 80, xid 0x00000012
  149. match dl_vlan 100
  150. match dl_vlan_pcp 4
  151. match dl_type 0x0800
  152. cookie 0x000000000000000a, command ADD, priority 32000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  153. action type OUTPUT, len 8, port 2
  154. version 1.0, type FLOW_MOD, length 80, xid 0x00000013
  155. match dl_type 0x0800
  156. match nw_src 10.11.12.0/24
  157. match nw_dst 10.13.14.0/24
  158. cookie 0x000000000000000b, command ADD, priority 31999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  159. action type OUTPUT, len 8, port 2
  160. version 1.0, type FLOW_MOD, length 80, xid 0x00000014
  161. match dl_type 0x0800
  162. match nw_proto 17
  163. match tp_src 68
  164. match tp_dst 67
  165. cookie 0x000000000000000c, command ADD, priority 31998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  166. action type OUTPUT, len 8, port 2
  167. version 1.0, type FLOW_MOD, length 80, xid 0x00000015
  168. match dl_type 0x0800
  169. match nw_proto 1
  170. match icmp_type 8
  171. cookie 0x000000000000000d, command ADD, priority 31997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  172. action type OUTPUT, len 8, port 2
  173. version 1.0, type FLOW_MOD, length 80, xid 0x00000016
  174. match dl_type 0x0800
  175. match nw_proto 1
  176. match icmp_type 3
  177. match icmp_code 13
  178. cookie 0x000000000000000e, command ADD, priority 31996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  179. action type OUTPUT, len 8, port 2
  180. version 1.0, type FLOW_MOD, length 80, xid 0x00000017
  181. match dl_src aa:00:00:00:00:11
  182. match dl_dst bb:00:00:00:00:22
  183. cookie 0x000000000000000f, command ADD, priority 31995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  184. action type OUTPUT, len 8, port 2
  185. version 1.0, type FLOW_MOD, length 80, xid 0x00000018
  186. match dl_type 0x0800
  187. match nw_tos 0x24
  188. cookie 0x0000000000000010, command ADD, priority 31994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  189. action type OUTPUT, len 8, port 2
  190. version 1.0, type FLOW_MOD, length 80, xid 0x00000019
  191. match dl_type 0x0800
  192. match nw_proto 6
  193. match tp_src 80
  194. match tp_dst 80
  195. cookie 0x0000000000000011, command ADD, priority 31993, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  196. action type OUTPUT, len 8, port 2
  197. version 1.0, type FLOW_MOD, length 112, xid 0x0000001a
  198. match dl_dst 00:01:e8:8a:e0:e4
  199. match dl_type 0x0800
  200. match nw_dst 10.21.0.0/16
  201. cookie 0x0000000000000012, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  202. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  203. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  204. action type OUTPUT, len 8, port 2
  205. version 1.0, type FLOW_MOD, length 112, xid 0x0000001b
  206. match dl_dst 00:01:e8:8a:e0:e4
  207. match dl_type 0x0800
  208. match nw_dst 10.22.0.0/16
  209. cookie 0x0000000000000013, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  210. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  211. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  212. action type OUTPUT, len 8, port 2
  213. version 1.0, type FLOW_MOD, length 112, xid 0x0000001c
  214. match dl_dst 00:01:e8:8a:e0:e4
  215. match dl_type 0x0800
  216. match nw_dst 10.23.0.0/16
  217. cookie 0x0000000000000014, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  218. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  219. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  220. action type OUTPUT, len 8, port 2
  221. version 1.0, type FLOW_MOD, length 112, xid 0x0000001d
  222. match dl_dst 00:01:e8:8a:e0:e4
  223. match dl_type 0x0800
  224. match nw_dst 10.24.0.0/16
  225. cookie 0x0000000000000015, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  226. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  227. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  228. action type OUTPUT, len 8, port 2
  229. version 1.0, type FLOW_MOD, length 112, xid 0x0000001e
  230. match dl_dst 00:01:e8:8a:e0:e4
  231. match dl_type 0x0800
  232. match nw_dst 10.20.0.0/24
  233. cookie 0x0000000000000016, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  234. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  235. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  236. action type OUTPUT, len 8, port 2
  237. version 1.0, type FLOW_MOD, length 112, xid 0x0000001f
  238. match dl_dst 00:01:e8:8a:e0:e4
  239. match dl_type 0x0800
  240. match nw_dst 10.20.1.0/24
  241. cookie 0x0000000000000017, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  242. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  243. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  244. action type OUTPUT, len 8, port 2
  245. version 1.0, type FLOW_MOD, length 112, xid 0x00000020
  246. match dl_dst 00:01:e8:8a:e0:e4
  247. match dl_type 0x0800
  248. match nw_dst 10.20.2.0/24
  249. cookie 0x0000000000000018, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  250. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  251. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  252. action type OUTPUT, len 8, port 2
  253. version 1.0, type FLOW_MOD, length 112, xid 0x00000021
  254. match dl_dst 00:01:e8:8a:e0:e4
  255. match dl_type 0x0800
  256. match nw_dst 10.20.3.0/24
  257. cookie 0x0000000000000019, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  258. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  259. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  260. action type OUTPUT, len 8, port 2
  261. version 1.0, type FLOW_MOD, length 112, xid 0x00000022
  262. match dl_dst 00:01:e8:8a:e0:e4
  263. match dl_type 0x0800
  264. match nw_dst 10.20.4.0/24
  265. cookie 0x000000000000001a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  266. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  267. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  268. action type OUTPUT, len 8, port 2
  269. version 1.0, type FLOW_MOD, length 112, xid 0x00000023
  270. match dl_dst 00:01:e8:8a:e0:e4
  271. match dl_type 0x0800
  272. match nw_dst 10.20.5.0/24
  273. cookie 0x000000000000001b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  274. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  275. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  276. action type OUTPUT, len 8, port 2
  277. version 1.0, type FLOW_MOD, length 112, xid 0x00000024
  278. match dl_dst 00:01:e8:8a:e0:e4
  279. match dl_type 0x0800
  280. match nw_dst 10.20.6.0/24
  281. cookie 0x000000000000001c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  282. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  283. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  284. action type OUTPUT, len 8, port 2
  285. version 1.0, type FLOW_MOD, length 112, xid 0x00000025
  286. match dl_dst 00:01:e8:8a:e0:e4
  287. match dl_type 0x0800
  288. match nw_dst 10.20.7.0/24
  289. cookie 0x000000000000001d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  290. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  291. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  292. action type OUTPUT, len 8, port 2
  293. version 1.0, type FLOW_MOD, length 112, xid 0x00000026
  294. match dl_dst 00:01:e8:8a:e0:e4
  295. match dl_type 0x0800
  296. cookie 0x000000000000001e, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  297. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  298. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  299. action type OUTPUT, len 8, port 2
  300. version 1.0, type FLOW_MOD, length 80, xid 0x00000027
  301. match dl_dst 00:11:22:33:00:32
  302. match dl_vlan 50
  303. cookie 0x000000000000001f, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  304. action type OUTPUT, len 8, port 1
  305. version 1.0, type FLOW_MOD, length 80, xid 0x00000028
  306. match dl_dst 00:11:22:33:00:33
  307. match dl_vlan 51
  308. cookie 0x0000000000000020, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  309. action type OUTPUT, len 8, port 1
  310. version 1.0, type FLOW_MOD, length 80, xid 0x00000029
  311. match dl_dst 00:11:22:33:00:34
  312. match dl_vlan 52
  313. cookie 0x0000000000000021, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  314. action type OUTPUT, len 8, port 1
  315. version 1.0, type FLOW_MOD, length 80, xid 0x0000002a
  316. match dl_dst 00:11:22:33:00:35
  317. match dl_vlan 53
  318. cookie 0x0000000000000022, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  319. action type OUTPUT, len 8, port 1
  320. version 1.0, type FLOW_MOD, length 80, xid 0x0000002b
  321. match dl_dst 00:11:22:33:00:36
  322. match dl_vlan 54
  323. cookie 0x0000000000000023, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  324. action type OUTPUT, len 8, port 1
  325. version 1.0, type FLOW_MOD, length 80, xid 0x0000002c
  326. match dl_dst 00:11:22:33:00:37
  327. match dl_vlan 55
  328. cookie 0x0000000000000024, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  329. action type OUTPUT, len 8, port 1
  330. version 1.0, type FLOW_MOD, length 80, xid 0x0000002d
  331. match dl_dst 00:11:22:33:00:38
  332. match dl_vlan 56
  333. cookie 0x0000000000000025, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  334. action type OUTPUT, len 8, port 1
  335. version 1.0, type FLOW_MOD, length 80, xid 0x0000002e
  336. match dl_dst 00:11:22:33:00:39
  337. match dl_vlan 57
  338. cookie 0x0000000000000026, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  339. action type OUTPUT, len 8, port 1
  340. version 1.0, type FLOW_MOD, length 80, xid 0x0000002f
  341. match dl_src 00:11:22:33:00:0a
  342. match dl_dst 00:11:22:33:00:14
  343. cookie 0x0000000000000027, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  344. action type OUTPUT, len 8, port 1
  345. version 1.0, type FLOW_MOD, length 80, xid 0x00000030
  346. match dl_src 00:11:22:33:00:0a
  347. match dl_dst 00:11:22:33:00:15
  348. cookie 0x0000000000000028, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  349. action type OUTPUT, len 8, port 1
  350. version 1.0, type FLOW_MOD, length 80, xid 0x00000031
  351. match dl_src 00:11:22:33:00:0a
  352. match dl_dst 00:11:22:33:00:16
  353. cookie 0x0000000000000029, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  354. action type OUTPUT, len 8, port 1
  355. version 1.0, type FLOW_MOD, length 80, xid 0x00000032
  356. match dl_src 00:11:22:33:00:0b
  357. match dl_dst 00:11:22:33:00:14
  358. cookie 0x000000000000002a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  359. action type OUTPUT, len 8, port 1
  360. version 1.0, type FLOW_MOD, length 80, xid 0x00000033
  361. match dl_src 00:11:22:33:00:0b
  362. match dl_dst 00:11:22:33:00:15
  363. cookie 0x000000000000002b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  364. action type OUTPUT, len 8, port 1
  365. version 1.0, type FLOW_MOD, length 80, xid 0x00000034
  366. match dl_src 00:11:22:33:00:0b
  367. match dl_dst 00:11:22:33:00:16
  368. cookie 0x000000000000002c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  369. action type OUTPUT, len 8, port 1
  370. version 1.0, type FLOW_MOD, length 80, xid 0x00000035
  371. match dl_src 00:11:22:33:00:0c
  372. match dl_dst 00:11:22:33:00:14
  373. cookie 0x000000000000002d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
  374. action type OUTPUT, len 8, port 1
  375. version 1.0, type FLOW_MOD, length 80, xid 0x00000036
  376. match dl_src 00:11:22:33:00:0c
  377. match dl_dst 00:11:22:33:00:15 [|openflow]
  378. IP (tos 0x0, ttl 64, id 53104, offset 0, flags [DF], proto TCP (6), length 180)
  379. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x150b (incorrect -> 0x8ec7), seq 4241:4369, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 128: OpenFlow
  380. version unknown (0x00), type 0x00, length 0, xid 0x00000000 (invalid)
  381. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  382. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xfaa7 (correct), seq 677, ack 2873, win 952, options [nop,nop,TS val 1 ecr 47836527], length 0
  383. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  384. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4fe (correct), seq 677, ack 4369, win 905, options [nop,nop,TS val 1 ecr 47836527], length 0
  385. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  386. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4a7 (correct), seq 677, ack 4369, win 992, options [nop,nop,TS val 1 ecr 47836527], length 0
  387. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  388. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf318 (correct), seq 677:685, ack 4369, win 1035, options [nop,nop,TS val 2 ecr 47836527], length 8: OpenFlow
  389. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000038
  390. IP (tos 0x0, ttl 64, id 53105, offset 0, flags [DF], proto TCP (6), length 228)
  391. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x153b (incorrect -> 0x165f), seq 4369:4545, ack 685, win 139, options [nop,nop,TS val 47836757 ecr 2], length 176: OpenFlow
  392. version 1.0, type STATS_REQUEST, length 56, xid 0x00000039
  393. type FLOW, flags 0x0000
  394. table_id ALL, out_port NONE
  395. version 1.0, type STATS_REQUEST, length 56, xid 0x0000003a
  396. type FLOW, flags 0x0000
  397. table_id 0, out_port NONE
  398. version 1.0, type STATS_REQUEST, length 56, xid 0x0000003b
  399. type FLOW, flags 0x0000
  400. match dl_src 00:00:00:00:77:77
  401. table_id 0, out_port CONTROLLER
  402. version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000003c
  403. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  404. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf2dd (correct), seq 685, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 0
  405. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
  406. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf170 (correct), seq 685:697, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 12: OpenFlow
  407. version 1.0, type STATS_REPLY, length 12, xid 0x0000003b
  408. type FLOW, flags 0x0000
  409. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  410. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf16a (correct), seq 697:705, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 8: OpenFlow
  411. version 1.0, type BARRIER_REPLY, length 8, xid 0x0000003c
  412. IP (tos 0x0, ttl 64, id 53106, offset 0, flags [DF], proto TCP (6), length 52)
  413. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xf556), seq 4545, ack 705, win 139, options [nop,nop,TS val 47837000 ecr 2], length 0
  414. IP (tos 0x0, ttl 64, id 53575, offset 0, flags [DF], proto TCP (6), length 1216)
  415. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x39b4 (correct), seq 705:1869, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1164: OpenFlow
  416. version 1.0, type STATS_REPLY, length 1164, xid 0x00000039
  417. type FLOW, flags 0x0001 (MORE)
  418. length 128, table_id 30
  419. match dl_dst 00:01:e8:8a:e0:e4
  420. match dl_type 0x0800
  421. match nw_dst 10.21.0.0/16
  422. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000012, packet_count 0, byte_count 0
  423. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  424. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  425. action type OUTPUT, len 8, port 2
  426. length 128, table_id 30
  427. match dl_dst 00:01:e8:8a:e0:e4
  428. match dl_type 0x0800
  429. match nw_dst 10.22.0.0/16
  430. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000013, packet_count 0, byte_count 0
  431. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  432. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  433. action type OUTPUT, len 8, port 2
  434. length 128, table_id 30
  435. match dl_dst 00:01:e8:8a:e0:e4
  436. match dl_type 0x0800
  437. match nw_dst 10.23.0.0/16
  438. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000014, packet_count 0, byte_count 0
  439. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  440. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  441. action type OUTPUT, len 8, port 2
  442. length 128, table_id 30
  443. match dl_dst 00:01:e8:8a:e0:e4
  444. match dl_type 0x0800
  445. match nw_dst 10.24.0.0/16
  446. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000015, packet_count 0, byte_count 0
  447. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  448. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  449. action type OUTPUT, len 8, port 2
  450. length 128, table_id 30
  451. match dl_dst 00:01:e8:8a:e0:e4
  452. match dl_type 0x0800
  453. match nw_dst 10.20.0.0/24
  454. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000016, packet_count 0, byte_count 0
  455. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  456. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  457. action type OUTPUT, len 8, port 2
  458. length 128, table_id 30
  459. match dl_dst 00:01:e8:8a:e0:e4
  460. match dl_type 0x0800
  461. match nw_dst 10.20.1.0/24
  462. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000017, packet_count 0, byte_count 0
  463. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  464. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  465. action type OUTPUT, len 8, port 2
  466. length 128, table_id 30
  467. match dl_dst 00:01:e8:8a:e0:e4
  468. match dl_type 0x0800
  469. match nw_dst 10.20.2.0/24
  470. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000018, packet_count 0, byte_count 0
  471. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  472. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  473. action type OUTPUT, len 8, port 2
  474. length 128, table_id 30
  475. match dl_dst 00:01:e8:8a:e0:e4
  476. match dl_type 0x0800
  477. match nw_dst 10.20.3.0/24
  478. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000019, packet_count 0, byte_count 0
  479. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  480. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  481. action type OUTPUT, len 8, port 2
  482. length 128, table_id 30
  483. match dl_dst 00:01:e8:8a:e0:e4
  484. match dl_type 0x0800
  485. match nw_dst 10.20.4.0/24
  486. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001a, packet_count 0, byte_count 0
  487. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  488. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  489. action type OUTPUT, len 8, port 2
  490. IP (tos 0x0, ttl 64, id 53576, offset 0, flags [DF], proto TCP (6), length 1176)
  491. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6b64 (correct), seq 1869:2993, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1124: OpenFlow
  492. version 1.0, type STATS_REPLY, length 1124, xid 0x00000039
  493. type FLOW, flags 0x0001 (MORE)
  494. length 128, table_id 30
  495. match dl_dst 00:01:e8:8a:e0:e4
  496. match dl_type 0x0800
  497. match nw_dst 10.20.5.0/24
  498. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001b, packet_count 0, byte_count 0
  499. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  500. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  501. action type OUTPUT, len 8, port 2
  502. length 128, table_id 30
  503. match dl_dst 00:01:e8:8a:e0:e4
  504. match dl_type 0x0800
  505. match nw_dst 10.20.6.0/24
  506. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001c, packet_count 0, byte_count 0
  507. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  508. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  509. action type OUTPUT, len 8, port 2
  510. length 128, table_id 30
  511. match dl_dst 00:01:e8:8a:e0:e4
  512. match dl_type 0x0800
  513. match nw_dst 10.20.7.0/24
  514. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001d, packet_count 0, byte_count 0
  515. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  516. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  517. action type OUTPUT, len 8, port 2
  518. length 128, table_id 30
  519. match dl_dst 00:01:e8:8a:e0:e4
  520. match dl_type 0x0800
  521. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001e, packet_count 0, byte_count 0
  522. action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
  523. action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
  524. action type OUTPUT, len 8, port 2
  525. length 96, table_id 40
  526. match in_port 1
  527. duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
  528. action type OUTPUT, len 8, port CONTROLLER, max_len 65535
  529. length 96, table_id 40
  530. match in_port 1
  531. duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
  532. action type SET_VLAN_VID, len 8, vlan_vid 2
  533. length 96, table_id 40
  534. match in_port 1
  535. duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
  536. action type SET_VLAN_PCP, len 8, vlan_pcp 5
  537. length 104, table_id 40
  538. match in_port 1
  539. duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
  540. action type SET_VLAN_VID, len 8, vlan_vid 2
  541. action type SET_VLAN_PCP, len 8, vlan_pcp 5
  542. length 104, table_id 40
  543. match in_port 1
  544. duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
  545. action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
  546. length 104, table_id 40
  547. match in_port 1
  548. duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
  549. action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
  550. IP (tos 0x0, ttl 64, id 53107, offset 0, flags [DF], proto TCP (6), length 52)
  551. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xec39), seq 4545, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 0
  552. IP (tos 0x0, ttl 64, id 53108, offset 0, flags [DF], proto TCP (6), length 148)
  553. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14eb (incorrect -> 0xc5f7), seq 4545:4641, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 96: OpenFlow
  554. version 1.0, type STATS_REQUEST, length 12, xid 0x0000003d
  555. type DESC, flags 0x0000
  556. version 1.0, type STATS_REQUEST, length 56, xid 0x0000003e
  557. type AGGREGATE, flags 0x0000
  558. table_id ALL, out_port NONE
  559. version 1.0, type STATS_REQUEST, length 20, xid 0x0000003f
  560. type PORT, flags 0x0000
  561. port_no NONE
  562. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000040
  563. IP (tos 0x0, ttl 64, id 53577, offset 0, flags [DF], proto TCP (6), length 1048)
  564. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x29df (correct), seq 2993:3989, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 996: OpenFlow
  565. version 1.0, type STATS_REPLY, length 996, xid 0x00000039
  566. type FLOW, flags 0x0001 (MORE)
  567. length 120, table_id 40
  568. match in_port 1
  569. duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
  570. action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
  571. action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
  572. length 96, table_id 40
  573. match in_port 1
  574. match dl_src 00:00:00:00:00:01
  575. duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
  576. action type OUTPUT, len 8, port 2
  577. length 96, table_id 40
  578. match in_port 1
  579. duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0
  580. action type SET_NW_TOS, len 8, nw_tos 0x28
  581. length 96, table_id 40
  582. match dl_vlan 100
  583. match dl_vlan_pcp 4
  584. match dl_type 0x0800
  585. duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0
  586. action type OUTPUT, len 8, port 2
  587. length 96, table_id 40
  588. match dl_type 0x0800
  589. match nw_src 10.11.12.0/24
  590. match nw_dst 10.13.14.0/24
  591. duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0
  592. action type OUTPUT, len 8, port 2
  593. length 96, table_id 40
  594. match dl_type 0x0800
  595. match nw_proto 17
  596. match tp_src 68
  597. match tp_dst 67
  598. duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0
  599. action type OUTPUT, len 8, port 2
  600. length 96, table_id 40
  601. match dl_type 0x0800
  602. match nw_proto 1
  603. match icmp_type 8
  604. duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0
  605. action type OUTPUT, len 8, port 2
  606. length 96, table_id 40
  607. match dl_type 0x0800
  608. match nw_proto 1
  609. match icmp_type 3
  610. match icmp_code 13
  611. duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0
  612. action type OUTPUT, len 8, port 2
  613. length 96, table_id 40
  614. match dl_src aa:00:00:00:00:11
  615. match dl_dst bb:00:00:00:00:22
  616. duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0
  617. action type OUTPUT, len 8, port 2
  618. length 96, table_id 40
  619. match dl_type 0x0800
  620. match nw_tos 0x24
  621. duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0
  622. action type OUTPUT, len 8, port 2
  623. IP (tos 0x0, ttl 64, id 53578, offset 0, flags [DF], proto TCP (6), length 1024)
  624. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x45c0 (correct), seq 3989:4961, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 972: OpenFlow
  625. version 1.0, type STATS_REPLY, length 972, xid 0x00000039
  626. type FLOW, flags 0x0001 (MORE)
  627. length 96, table_id 40
  628. match dl_type 0x0800
  629. match nw_proto 6
  630. match tp_src 80
  631. match tp_dst 80
  632. duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0
  633. action type OUTPUT, len 8, port 2
  634. length 96, table_id 40
  635. match dl_dst 00:11:22:33:00:32
  636. match dl_vlan 50
  637. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0
  638. action type OUTPUT, len 8, port 1
  639. length 96, table_id 40
  640. match dl_dst 00:11:22:33:00:33
  641. match dl_vlan 51
  642. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0
  643. action type OUTPUT, len 8, port 1
  644. length 96, table_id 40
  645. match dl_dst 00:11:22:33:00:34
  646. match dl_vlan 52
  647. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0
  648. action type OUTPUT, len 8, port 1
  649. length 96, table_id 40
  650. match dl_dst 00:11:22:33:00:35
  651. match dl_vlan 53
  652. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0
  653. action type OUTPUT, len 8, port 1
  654. length 96, table_id 40
  655. match dl_dst 00:11:22:33:00:36
  656. match dl_vlan 54
  657. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0
  658. action type OUTPUT, len 8, port 1
  659. length 96, table_id 40
  660. match dl_dst 00:11:22:33:00:37
  661. match dl_vlan 55
  662. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0
  663. action type OUTPUT, len 8, port 1
  664. length 96, table_id 40
  665. match dl_dst 00:11:22:33:00:38
  666. match dl_vlan 56
  667. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0, byte_count 0
  668. action type OUTPUT, len 8, port 1
  669. length 96, table_id 40
  670. match dl_dst 00:11:22:33:00:39
  671. match dl_vlan 57
  672. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000026, packet_count 0, byte_count 0
  673. action type OUTPUT, len 8, port 1
  674. length 96, table_id 40
  675. match dl_src 00:11:22:33:00:0a
  676. match dl_dst 00:11:22:33:00:14
  677. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000027, packet_count 0, byte_count 0
  678. action type OUTPUT, len 8, port 1
  679. IP (tos 0x0, ttl 64, id 53109, offset 0, flags [DF], proto TCP (6), length 52)
  680. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xe405), seq 4641, ack 4961, win 220, options [nop,nop,TS val 47837000 ecr 2], length 0
  681. IP (tos 0x0, ttl 64, id 53579, offset 0, flags [DF], proto TCP (6), length 832)
  682. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6f3d (correct), seq 4961:5741, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 780: OpenFlow
  683. version 1.0, type STATS_REPLY, length 780, xid 0x00000039
  684. type FLOW, flags 0x0000
  685. length 96, table_id 40
  686. match dl_src 00:11:22:33:00:0a
  687. match dl_dst 00:11:22:33:00:15
  688. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000028, packet_count 0, byte_count 0
  689. action type OUTPUT, len 8, port 1
  690. length 96, table_id 40
  691. match dl_src 00:11:22:33:00:0a
  692. match dl_dst 00:11:22:33:00:16
  693. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000029, packet_count 0, byte_count 0
  694. action type OUTPUT, len 8, port 1
  695. length 96, table_id 40
  696. match dl_src 00:11:22:33:00:0b
  697. match dl_dst 00:11:22:33:00:14
  698. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002a, packet_count 0, byte_count 0
  699. action type OUTPUT, len 8, port 1
  700. length 96, table_id 40
  701. match dl_src 00:11:22:33:00:0b
  702. match dl_dst 00:11:22:33:00:15
  703. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002b, packet_count 0, byte_count 0
  704. action type OUTPUT, len 8, port 1
  705. length 96, table_id 40
  706. match dl_src 00:11:22:33:00:0b
  707. match dl_dst 00:11:22:33:00:16
  708. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002c, packet_count 0, byte_count 0
  709. action type OUTPUT, len 8, port 1
  710. length 96, table_id 40
  711. match dl_src 00:11:22:33:00:0c
  712. match dl_dst 00:11:22:33:00:14
  713. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002d, packet_count 0, byte_count 0
  714. action type OUTPUT, len 8, port 1
  715. length 96, table_id 40
  716. match dl_src 00:11:22:33:00:0c
  717. match dl_dst 00:11:22:33:00:15
  718. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002e, packet_count 0, byte_count 0
  719. action type OUTPUT, len 8, port 1
  720. length 96, table_id 40
  721. match dl_src 00:11:22:33:00:0c
  722. match dl_dst 00:11:22:33:00:16
  723. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002f, packet_count 0, byte_count 0
  724. action type OUTPUT, len 8, port 1
  725. IP (tos 0x0, ttl 64, id 53580, offset 0, flags [DF], proto TCP (6), length 976)
  726. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0dbb (correct), seq 5741:6665, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 924: OpenFlow
  727. version 1.0, type STATS_REPLY, length 924, xid 0x0000003a
  728. type FLOW, flags 0x0001 (MORE)
  729. length 96, table_id 0
  730. match in_port 1
  731. duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
  732. action type OUTPUT, len 8, port CONTROLLER, max_len 65535
  733. length 96, table_id 0
  734. match in_port 1
  735. duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
  736. action type SET_VLAN_VID, len 8, vlan_vid 2
  737. length 96, table_id 0
  738. match in_port 1
  739. duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
  740. action type SET_VLAN_PCP, len 8, vlan_pcp 5
  741. length 104, table_id 0
  742. match in_port 1
  743. duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
  744. action type SET_VLAN_VID, len 8, vlan_vid 2
  745. action type SET_VLAN_PCP, len 8, vlan_pcp 5
  746. length 104, table_id 0
  747. match in_port 1
  748. duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
  749. action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
  750. length 104, table_id 0
  751. match in_port 1
  752. duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
  753. action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
  754. length 120, table_id 0
  755. match in_port 1
  756. duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
  757. action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
  758. action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
  759. length 96, table_id 0
  760. match in_port 1
  761. match dl_src 00:00:00:00:00:01
  762. duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
  763. action type OUTPUT, len 8, port 2
  764. length 96, table_id 0
  765. match in_port 1
  766. duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0
  767. action type SET_NW_TOS, len 8, nw_tos 0x28
  768. IP (tos 0x0, ttl 64, id 53110, offset 0, flags [DF], proto TCP (6), length 52)
  769. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xdd38), seq 4641, ack 6665, win 257, options [nop,nop,TS val 47837000 ecr 2], length 0
  770. IP (tos 0x0, ttl 64, id 53581, offset 0, flags [DF], proto TCP (6), length 1500)
  771. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x2501 (correct), seq 6665:8113, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 1448: OpenFlow
  772. version 1.0, type STATS_REPLY, length 972, xid 0x0000003a
  773. type FLOW, flags 0x0001 (MORE)
  774. length 96, table_id 0
  775. match dl_vlan 100
  776. match dl_vlan_pcp 4
  777. match dl_type 0x0800
  778. duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0
  779. action type OUTPUT, len 8, port 2
  780. length 96, table_id 0
  781. match dl_type 0x0800
  782. match nw_src 10.11.12.0/24
  783. match nw_dst 10.13.14.0/24
  784. duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0
  785. action type OUTPUT, len 8, port 2
  786. length 96, table_id 0
  787. match dl_type 0x0800
  788. match nw_proto 17
  789. match tp_src 68
  790. match tp_dst 67
  791. duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0
  792. action type OUTPUT, len 8, port 2
  793. length 96, table_id 0
  794. match dl_type 0x0800
  795. match nw_proto 1
  796. match icmp_type 8
  797. duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0
  798. action type OUTPUT, len 8, port 2
  799. length 96, table_id 0
  800. match dl_type 0x0800
  801. match nw_proto 1
  802. match icmp_type 3
  803. match icmp_code 13
  804. duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0
  805. action type OUTPUT, len 8, port 2
  806. length 96, table_id 0
  807. match dl_src aa:00:00:00:00:11
  808. match dl_dst bb:00:00:00:00:22
  809. duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0
  810. action type OUTPUT, len 8, port 2
  811. length 96, table_id 0
  812. match dl_type 0x0800
  813. match nw_tos 0x24
  814. duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0
  815. action type OUTPUT, len 8, port 2
  816. length 96, table_id 0
  817. match dl_type 0x0800
  818. match nw_proto 6
  819. match tp_src 80
  820. match tp_dst 80
  821. duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0
  822. action type OUTPUT, len 8, port 2
  823. length 96, table_id 0
  824. match dl_dst 00:11:22:33:00:32
  825. match dl_vlan 50
  826. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0
  827. action type OUTPUT, len 8, port 1
  828. length 96, table_id 0
  829. match dl_dst 00:11:22:33:00:33
  830. match dl_vlan 51
  831. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0
  832. action type OUTPUT, len 8, port 1
  833. version 1.0, type STATS_REPLY, length 972, xid 0x0000003a
  834. type FLOW, flags 0x0001 (MORE)
  835. length 96, table_id 0
  836. match dl_dst 00:11:22:33:00:34
  837. match dl_vlan 52
  838. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0
  839. action type OUTPUT, len 8, port 1
  840. length 96, table_id 0
  841. match dl_dst 00:11:22:33:00:35
  842. match dl_vlan 53
  843. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0
  844. action type OUTPUT, len 8, port 1
  845. length 96, table_id 0
  846. match dl_dst 00:11:22:33:00:36
  847. match dl_vlan 54
  848. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0
  849. action type OUTPUT, len 8, port 1
  850. length 96, table_id 0
  851. match dl_dst 00:11:22:33:00:37
  852. match dl_vlan 55
  853. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0
  854. action type OUTPUT, len 8, port 1
  855. length 96, table_id 0
  856. match dl_dst 00:11:22:33:00:38
  857. match dl_vlan 56
  858. duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0 [|openflow]
  859. IP (tos 0x0, ttl 64, id 53582, offset 0, flags [DF], proto TCP (6), length 1040)
  860. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x395e (correct), seq 8113:9101, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 988: OpenFlow
  861. version unknown (0x00), type 0x00, length 0, xid 0x00000000 (invalid)
  862. IP (tos 0x0, ttl 64, id 53111, offset 0, flags [DF], proto TCP (6), length 52)
  863. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xd387), seq 4641, ack 9101, win 302, options [nop,nop,TS val 47837000 ecr 2], length 0
  864. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  865. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xd0aa (correct), seq 9101, ack 4641, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 0
  866. IP (tos 0x0, ttl 64, id 53602, offset 0, flags [DF], proto TCP (6), length 1120)
  867. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x141f (correct), seq 9101:10169, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 1068: OpenFlow
  868. version 1.0, type STATS_REPLY, length 1068, xid 0x0000003d
  869. type DESC, flags 0x0000
  870. mfr_desc 'Dell Force 10'
  871. hw_desc 'OpenFlow switch HW ver. 1.0'
  872. sw_desc 'OpenFlow switch SW ver. 1.0'
  873. serial_num '02132012'
  874. dp_desc 'Dell-Switch: 00:01:e8:8a:e0:e2; instance: 1'
  875. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  876. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcb12 (correct), seq 10169:10177, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 8: OpenFlow
  877. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000040
  878. IP (tos 0x0, ttl 64, id 53603, offset 0, flags [DF], proto TCP (6), length 88)
  879. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcaa5 (correct), seq 10177:10213, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 36: OpenFlow
  880. version 1.0, type STATS_REPLY, length 36, xid 0x0000003e
  881. type AGGREGATE, flags 0x0000
  882. packet_count 0, byte_count 0, flow_count 47
  883. IP (tos 0x0, ttl 64, id 53604, offset 0, flags [DF], proto TCP (6), length 189)
  884. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x03e7 (correct), seq 10213:10350, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 137: OpenFlow
  885. version 1.0, type PACKET_IN, length 137, xid 0x00000000
  886. buffer_id NONE, total_len 119, in_port 1, reason ACTION
  887. data (119 octets), frame decoding below
  888. STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102
  889. port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0
  890. CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034,
  891. message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s
  892. v3len 64, MCID Name pica8, rev 0,
  893. digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0,
  894. CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20
  895. IP (tos 0x0, ttl 64, id 53605, offset 0, flags [DF], proto TCP (6), length 168)
  896. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x4a03 (correct), seq 10350:10466, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow
  897. version 1.0, type STATS_REPLY, length 116, xid 0x0000003f
  898. type PORT, flags 0x0001 (MORE)
  899. port_no 1, rx_packets 129437, tx_packets 8061, rx_bytes 16090662, tx_bytes 515904, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0
  900. IP (tos 0x0, ttl 64, id 53606, offset 0, flags [DF], proto TCP (6), length 168)
  901. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc90e (correct), seq 10466:10582, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow
  902. version 1.0, type STATS_REPLY, length 116, xid 0x0000003f
  903. type PORT, flags 0x0000
  904. port_no 2, rx_packets 0, tx_packets 0, rx_bytes 0, tx_bytes 0, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0
  905. IP (tos 0x0, ttl 64, id 53112, offset 0, flags [DF], proto TCP (6), length 52)
  906. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xcccd), seq 4641, ack 10582, win 331, options [nop,nop,TS val 47837211 ecr 3], length 0
  907. IP (tos 0x0, ttl 64, id 53113, offset 0, flags [DF], proto TCP (6), length 132)
  908. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14db (incorrect -> 0xc93e), seq 4641:4721, ack 10582, win 331, options [nop,nop,TS val 47837212 ecr 3], length 80: OpenFlow
  909. version 1.0, type FLOW_MOD, length 72, xid 0x00000041
  910. cookie 0x0000000000000000, command DELETE, priority 65535, out_port NONE, flags 0x0001 (SEND_FLOW_REM)
  911. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000042
  912. IP (tos 0x0, ttl 64, id 53707, offset 0, flags [DF], proto TCP (6), length 140)
  913. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc92c (correct), seq 10582:10670, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  914. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001a
  915. match dl_dst 00:01:e8:8a:e0:e4
  916. match dl_type 0x0800
  917. match nw_dst 10.21.0.0/16
  918. cookie 0x0000000000000012, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  919. IP (tos 0x0, ttl 64, id 53708, offset 0, flags [DF], proto TCP (6), length 140)
  920. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc8d1 (correct), seq 10670:10758, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  921. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001b
  922. match dl_dst 00:01:e8:8a:e0:e4
  923. match dl_type 0x0800
  924. match nw_dst 10.22.0.0/16
  925. cookie 0x0000000000000013, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  926. IP (tos 0x0, ttl 64, id 53709, offset 0, flags [DF], proto TCP (6), length 140)
  927. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc876 (correct), seq 10758:10846, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  928. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001c
  929. match dl_dst 00:01:e8:8a:e0:e4
  930. match dl_type 0x0800
  931. match nw_dst 10.23.0.0/16
  932. cookie 0x0000000000000014, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  933. IP (tos 0x0, ttl 64, id 53710, offset 0, flags [DF], proto TCP (6), length 140)
  934. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc81b (correct), seq 10846:10934, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  935. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001d
  936. match dl_dst 00:01:e8:8a:e0:e4
  937. match dl_type 0x0800
  938. match nw_dst 10.24.0.0/16
  939. cookie 0x0000000000000015, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  940. IP (tos 0x0, ttl 64, id 53711, offset 0, flags [DF], proto TCP (6), length 140)
  941. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc7c7 (correct), seq 10934:11022, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  942. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001e
  943. match dl_dst 00:01:e8:8a:e0:e4
  944. match dl_type 0x0800
  945. match nw_dst 10.20.0.0/24
  946. cookie 0x0000000000000016, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  947. IP (tos 0x0, ttl 64, id 53712, offset 0, flags [DF], proto TCP (6), length 140)
  948. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc66d (correct), seq 11022:11110, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  949. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001f
  950. match dl_dst 00:01:e8:8a:e0:e4
  951. match dl_type 0x0800
  952. match nw_dst 10.20.1.0/24
  953. cookie 0x0000000000000017, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  954. IP (tos 0x0, ttl 64, id 53713, offset 0, flags [DF], proto TCP (6), length 140)
  955. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc513 (correct), seq 11110:11198, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  956. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000020
  957. match dl_dst 00:01:e8:8a:e0:e4
  958. match dl_type 0x0800
  959. match nw_dst 10.20.2.0/24
  960. cookie 0x0000000000000018, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  961. IP (tos 0x0, ttl 64, id 53714, offset 0, flags [DF], proto TCP (6), length 140)
  962. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc3b9 (correct), seq 11198:11286, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  963. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000021
  964. match dl_dst 00:01:e8:8a:e0:e4
  965. match dl_type 0x0800
  966. match nw_dst 10.20.3.0/24
  967. cookie 0x0000000000000019, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  968. IP (tos 0x0, ttl 64, id 53114, offset 0, flags [DF], proto TCP (6), length 52)
  969. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc900), seq 4721, ack 11286, win 331, options [nop,nop,TS val 47837400 ecr 3], length 0
  970. IP (tos 0x0, ttl 64, id 53715, offset 0, flags [DF], proto TCP (6), length 140)
  971. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc25f (correct), seq 11286:11374, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  972. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000022
  973. match dl_dst 00:01:e8:8a:e0:e4
  974. match dl_type 0x0800
  975. match nw_dst 10.20.4.0/24
  976. cookie 0x000000000000001a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  977. IP (tos 0x0, ttl 64, id 53716, offset 0, flags [DF], proto TCP (6), length 140)
  978. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc105 (correct), seq 11374:11462, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  979. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000023
  980. match dl_dst 00:01:e8:8a:e0:e4
  981. match dl_type 0x0800
  982. match nw_dst 10.20.5.0/24
  983. cookie 0x000000000000001b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  984. IP (tos 0x0, ttl 64, id 53717, offset 0, flags [DF], proto TCP (6), length 140)
  985. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbfab (correct), seq 11462:11550, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  986. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000024
  987. match dl_dst 00:01:e8:8a:e0:e4
  988. match dl_type 0x0800
  989. match nw_dst 10.20.6.0/24
  990. cookie 0x000000000000001c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  991. IP (tos 0x0, ttl 64, id 53718, offset 0, flags [DF], proto TCP (6), length 140)
  992. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbe51 (correct), seq 11550:11638, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  993. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000025
  994. match dl_dst 00:01:e8:8a:e0:e4
  995. match dl_type 0x0800
  996. match nw_dst 10.20.7.0/24
  997. cookie 0x000000000000001d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  998. IP (tos 0x0, ttl 64, id 53719, offset 0, flags [DF], proto TCP (6), length 140)
  999. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcf05 (correct), seq 11638:11726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
  1000. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000026
  1001. match dl_dst 00:01:e8:8a:e0:e4
  1002. match dl_type 0x0800
  1003. cookie 0x000000000000001e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1004. IP (tos 0x0, ttl 64, id 53720, offset 0, flags [DF], proto TCP (6), length 140)
  1005. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x37c4 (correct), seq 11726:11814, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1006. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000009
  1007. match in_port 1
  1008. cookie 0x0000000000000001, priority 35000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1009. IP (tos 0x0, ttl 64, id 53721, offset 0, flags [DF], proto TCP (6), length 140)
  1010. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x376b (correct), seq 11814:11902, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1011. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000a
  1012. match in_port 1
  1013. cookie 0x0000000000000002, priority 34999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1014. IP (tos 0x0, ttl 64, id 53115, offset 0, flags [DF], proto TCP (6), length 52)
  1015. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc697), seq 4721, ack 11902, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
  1016. IP (tos 0x0, ttl 64, id 53722, offset 0, flags [DF], proto TCP (6), length 140)
  1017. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3712 (correct), seq 11902:11990, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1018. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000b
  1019. match in_port 1
  1020. cookie 0x0000000000000003, priority 34998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1021. IP (tos 0x0, ttl 64, id 53723, offset 0, flags [DF], proto TCP (6), length 140)
  1022. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x36b9 (correct), seq 11990:12078, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1023. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000c
  1024. match in_port 1
  1025. cookie 0x0000000000000004, priority 34997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1026. IP (tos 0x0, ttl 64, id 53724, offset 0, flags [DF], proto TCP (6), length 140)
  1027. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3660 (correct), seq 12078:12166, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1028. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000d
  1029. match in_port 1
  1030. cookie 0x0000000000000005, priority 34996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1031. IP (tos 0x0, ttl 64, id 53725, offset 0, flags [DF], proto TCP (6), length 140)
  1032. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3607 (correct), seq 12166:12254, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1033. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000e
  1034. match in_port 1
  1035. cookie 0x0000000000000006, priority 34995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1036. IP (tos 0x0, ttl 64, id 53726, offset 0, flags [DF], proto TCP (6), length 140)
  1037. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x35ae (correct), seq 12254:12342, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
  1038. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000f
  1039. match in_port 1
  1040. cookie 0x0000000000000007, priority 34994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1041. IP (tos 0x0, ttl 64, id 53727, offset 0, flags [DF], proto TCP (6), length 140)
  1042. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3938 (correct), seq 12342:12430, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1043. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000010
  1044. match in_port 1
  1045. match dl_src 00:00:00:00:00:01
  1046. cookie 0x0000000000000008, priority 34000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1047. IP (tos 0x0, ttl 64, id 53728, offset 0, flags [DF], proto TCP (6), length 140)
  1048. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3cc3 (correct), seq 12430:12518, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1049. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000011
  1050. match in_port 1
  1051. cookie 0x0000000000000009, priority 33000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1052. IP (tos 0x0, ttl 64, id 53116, offset 0, flags [DF], proto TCP (6), length 52)
  1053. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc42f), seq 4721, ack 12518, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
  1054. IP (tos 0x0, ttl 64, id 53729, offset 0, flags [DF], proto TCP (6), length 140)
  1055. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1317 (correct), seq 12518:12606, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1056. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000012
  1057. match dl_vlan 100
  1058. match dl_vlan_pcp 4
  1059. match dl_type 0x0800
  1060. cookie 0x000000000000000a, priority 32000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1061. IP (tos 0x0, ttl 64, id 53730, offset 0, flags [DF], proto TCP (6), length 140)
  1062. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x00fe (correct), seq 12606:12694, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1063. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000013
  1064. match dl_type 0x0800
  1065. match nw_src 10.11.12.0/24
  1066. match nw_dst 10.13.14.0/24
  1067. cookie 0x000000000000000b, priority 31999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1068. IP (tos 0x0, ttl 64, id 53731, offset 0, flags [DF], proto TCP (6), length 140)
  1069. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16ff (correct), seq 12694:12782, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1070. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000014
  1071. match dl_type 0x0800
  1072. match nw_proto 17
  1073. match tp_src 68
  1074. match tp_dst 67
  1075. cookie 0x000000000000000c, priority 31998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1076. IP (tos 0x0, ttl 64, id 53732, offset 0, flags [DF], proto TCP (6), length 140)
  1077. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16b5 (correct), seq 12782:12870, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1078. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000015
  1079. match dl_type 0x0800
  1080. match nw_proto 1
  1081. match icmp_type 8
  1082. cookie 0x000000000000000d, priority 31997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1083. IP (tos 0x0, ttl 64, id 53733, offset 0, flags [DF], proto TCP (6), length 140)
  1084. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16d4 (correct), seq 12870:12958, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1085. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000016
  1086. match dl_type 0x0800
  1087. match nw_proto 1
  1088. match icmp_type 3
  1089. match icmp_code 13
  1090. cookie 0x000000000000000e, priority 31996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1091. IP (tos 0x0, ttl 64, id 53117, offset 0, flags [DF], proto TCP (6), length 52)
  1092. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc37f), seq 4721, ack 12694, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
  1093. IP (tos 0x0, ttl 64, id 53734, offset 0, flags [DF], proto TCP (6), length 140)
  1094. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xd96b (correct), seq 12958:13046, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1095. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000017
  1096. match dl_src aa:00:00:00:00:11
  1097. match dl_dst bb:00:00:00:00:22
  1098. cookie 0x000000000000000f, priority 31995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1099. IP (tos 0x0, ttl 64, id 53735, offset 0, flags [DF], proto TCP (6), length 140)
  1100. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf172 (correct), seq 13046:13134, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1101. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000018
  1102. match dl_type 0x0800
  1103. match nw_tos 0x24
  1104. cookie 0x0000000000000010, priority 31994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1105. IP (tos 0x0, ttl 64, id 53736, offset 0, flags [DF], proto TCP (6), length 140)
  1106. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1534 (correct), seq 13134:13222, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1107. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000019
  1108. match dl_type 0x0800
  1109. match nw_proto 6
  1110. match tp_src 80
  1111. match tp_dst 80
  1112. cookie 0x0000000000000011, priority 31993, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1113. IP (tos 0x0, ttl 64, id 53118, offset 0, flags [DF], proto TCP (6), length 52)
  1114. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc16f), seq 4721, ack 13222, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
  1115. IP (tos 0x0, ttl 64, id 53737, offset 0, flags [DF], proto TCP (6), length 140)
  1116. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x97c9 (correct), seq 13222:13310, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1117. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000027
  1118. match dl_dst 00:11:22:33:00:32
  1119. match dl_vlan 50
  1120. cookie 0x000000000000001f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1121. IP (tos 0x0, ttl 64, id 53738, offset 0, flags [DF], proto TCP (6), length 140)
  1122. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x976d (correct), seq 13310:13398, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1123. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000028
  1124. match dl_dst 00:11:22:33:00:33
  1125. match dl_vlan 51
  1126. cookie 0x0000000000000020, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1127. IP (tos 0x0, ttl 64, id 53739, offset 0, flags [DF], proto TCP (6), length 140)
  1128. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9711 (correct), seq 13398:13486, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1129. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000029
  1130. match dl_dst 00:11:22:33:00:34
  1131. match dl_vlan 52
  1132. cookie 0x0000000000000021, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1133. IP (tos 0x0, ttl 64, id 53740, offset 0, flags [DF], proto TCP (6), length 140)
  1134. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x96b5 (correct), seq 13486:13574, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1135. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002a
  1136. match dl_dst 00:11:22:33:00:35
  1137. match dl_vlan 53
  1138. cookie 0x0000000000000022, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1139. IP (tos 0x0, ttl 64, id 53741, offset 0, flags [DF], proto TCP (6), length 140)
  1140. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9659 (correct), seq 13574:13662, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1141. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002b
  1142. match dl_dst 00:11:22:33:00:36
  1143. match dl_vlan 54
  1144. cookie 0x0000000000000023, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1145. IP (tos 0x0, ttl 64, id 53742, offset 0, flags [DF], proto TCP (6), length 140)
  1146. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95fd (correct), seq 13662:13750, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1147. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002c
  1148. match dl_dst 00:11:22:33:00:37
  1149. match dl_vlan 55
  1150. cookie 0x0000000000000024, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1151. IP (tos 0x0, ttl 64, id 53743, offset 0, flags [DF], proto TCP (6), length 140)
  1152. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95a1 (correct), seq 13750:13838, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1153. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002d
  1154. match dl_dst 00:11:22:33:00:38
  1155. match dl_vlan 56
  1156. cookie 0x0000000000000025, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1157. IP (tos 0x0, ttl 64, id 53119, offset 0, flags [DF], proto TCP (6), length 52)
  1158. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbf07), seq 4721, ack 13838, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
  1159. IP (tos 0x0, ttl 64, id 53744, offset 0, flags [DF], proto TCP (6), length 140)
  1160. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9545 (correct), seq 13838:13926, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1161. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002e
  1162. match dl_dst 00:11:22:33:00:39
  1163. match dl_vlan 57
  1164. cookie 0x0000000000000026, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1165. IP (tos 0x0, ttl 64, id 53745, offset 0, flags [DF], proto TCP (6), length 140)
  1166. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72fd (correct), seq 13926:14014, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1167. version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002f
  1168. match dl_src 00:11:22:33:00:0a
  1169. match dl_dst 00:11:22:33:00:14
  1170. cookie 0x0000000000000027, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1171. IP (tos 0x0, ttl 64, id 53746, offset 0, flags [DF], proto TCP (6), length 140)
  1172. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72a2 (correct), seq 14014:14102, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1173. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000030
  1174. match dl_src 00:11:22:33:00:0a
  1175. match dl_dst 00:11:22:33:00:15
  1176. cookie 0x0000000000000028, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1177. IP (tos 0x0, ttl 64, id 53747, offset 0, flags [DF], proto TCP (6), length 140)
  1178. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7247 (correct), seq 14102:14190, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1179. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000031
  1180. match dl_src 00:11:22:33:00:0a
  1181. match dl_dst 00:11:22:33:00:16
  1182. cookie 0x0000000000000029, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1183. IP (tos 0x0, ttl 64, id 53748, offset 0, flags [DF], proto TCP (6), length 140)
  1184. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x71ee (correct), seq 14190:14278, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1185. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000032
  1186. match dl_src 00:11:22:33:00:0b
  1187. match dl_dst 00:11:22:33:00:14
  1188. cookie 0x000000000000002a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1189. IP (tos 0x0, ttl 64, id 53120, offset 0, flags [DF], proto TCP (6), length 52)
  1190. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbd4e), seq 4721, ack 14278, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0
  1191. IP (tos 0x0, ttl 64, id 53749, offset 0, flags [DF], proto TCP (6), length 140)
  1192. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7193 (correct), seq 14278:14366, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1193. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000033
  1194. match dl_src 00:11:22:33:00:0b
  1195. match dl_dst 00:11:22:33:00:15
  1196. cookie 0x000000000000002b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1197. IP (tos 0x0, ttl 64, id 53750, offset 0, flags [DF], proto TCP (6), length 140)
  1198. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7138 (correct), seq 14366:14454, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1199. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000034
  1200. match dl_src 00:11:22:33:00:0b
  1201. match dl_dst 00:11:22:33:00:16
  1202. cookie 0x000000000000002c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1203. IP (tos 0x0, ttl 64, id 53751, offset 0, flags [DF], proto TCP (6), length 140)
  1204. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x70df (correct), seq 14454:14542, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1205. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000035
  1206. match dl_src 00:11:22:33:00:0c
  1207. match dl_dst 00:11:22:33:00:14
  1208. cookie 0x000000000000002d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1209. IP (tos 0x0, ttl 64, id 53752, offset 0, flags [DF], proto TCP (6), length 140)
  1210. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7084 (correct), seq 14542:14630, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
  1211. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000036
  1212. match dl_src 00:11:22:33:00:0c
  1213. match dl_dst 00:11:22:33:00:15
  1214. cookie 0x000000000000002e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1215. IP (tos 0x0, ttl 64, id 53753, offset 0, flags [DF], proto TCP (6), length 140)
  1216. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7028 (correct), seq 14630:14718, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 88: OpenFlow
  1217. version 1.0, type FLOW_REMOVED, length 88, xid 0x00000037
  1218. match dl_src 00:11:22:33:00:0c
  1219. match dl_dst 00:11:22:33:00:16
  1220. cookie 0x000000000000002f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  1221. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1222. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb769 (correct), seq 14718:14726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow
  1223. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000042
  1224. IP (tos 0x0, ttl 64, id 53121, offset 0, flags [DF], proto TCP (6), length 52)
  1225. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbb8e), seq 4721, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0
  1226. IP (tos 0x0, ttl 64, id 53122, offset 0, flags [DF], proto TCP (6), length 60)
  1227. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xba21), seq 4721:4729, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 8: OpenFlow
  1228. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000043
  1229. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1230. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb758 (correct), seq 14726:14734, ack 4729, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow
  1231. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000043
  1232. IP (tos 0x0, ttl 64, id 53123, offset 0, flags [DF], proto TCP (6), length 144)
  1233. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14e7 (incorrect -> 0x2671), seq 4729:4821, ack 14734, win 331, options [nop,nop,TS val 47837403 ecr 3], length 92: OpenFlow
  1234. version 1.0, type PACKET_OUT, length 84, xid 0x00000044
  1235. buffer_id 0xffffffff, in_port CONTROLLER
  1236. action type OUTPUT, len 8, port 1
  1237. data (60 octets), frame decoding below
  1238. 67:68:00:00:00:00 > 61:62:63:64:65:66 Null Information, send seq 0, rcv seq 0, Flags [Command], length 46
  1239. 0x0000: 0000 0000 0000 0000 0000 0000 0000 0000 ................
  1240. 0x0010: 0000 0000 0000 0000 0000 0000 0000 0000 ................
  1241. 0x0020: 0000 0000 0000 0000 0000 0000 0000 0112 ................
  1242. 0x0030: 0008 0000 0045 .....E
  1243. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000045
  1244. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1245. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6f1 (correct), seq 14734:14742, ack 4821, win 1035, options [nop,nop,TS val 3 ecr 47837403], length 8: OpenFlow
  1246. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000045
  1247. IP (tos 0x0, ttl 64, id 53124, offset 0, flags [DF], proto TCP (6), length 60)
  1248. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb9a7), seq 4821:4829, ack 14742, win 331, options [nop,nop,TS val 47837405 ecr 3], length 8: OpenFlow
  1249. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000046
  1250. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1251. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6de (correct), seq 14742:14750, ack 4829, win 1035, options [nop,nop,TS val 3 ecr 47837405], length 8: OpenFlow
  1252. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000046
  1253. IP (tos 0x0, ttl 64, id 53125, offset 0, flags [DF], proto TCP (6), length 60)
  1254. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb995), seq 4829:4837, ack 14750, win 331, options [nop,nop,TS val 47837406 ecr 3], length 8: OpenFlow
  1255. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000047
  1256. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1257. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6cc (correct), seq 14750:14758, ack 4837, win 1035, options [nop,nop,TS val 3 ecr 47837406], length 8: OpenFlow
  1258. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000047
  1259. IP (tos 0x0, ttl 64, id 53126, offset 0, flags [DF], proto TCP (6), length 72)
  1260. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x149f (incorrect -> 0xb819), seq 4837:4857, ack 14758, win 331, options [nop,nop,TS val 47837407 ecr 3], length 20: OpenFlow
  1261. version 1.0, type SET_CONFIG, length 12, xid 0x00000048
  1262. flags FRAG_NORMAL, miss_send_len 65535
  1263. version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000049
  1264. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1265. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6ad (correct), seq 14758:14766, ack 4857, win 1035, options [nop,nop,TS val 3 ecr 47837407], length 8: OpenFlow
  1266. version 1.0, type BARRIER_REPLY, length 8, xid 0x00000049
  1267. IP (tos 0x0, ttl 64, id 53127, offset 0, flags [DF], proto TCP (6), length 52)
  1268. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbab1), seq 4857, ack 14766, win 331, options [nop,nop,TS val 47837447 ecr 3], length 0
  1269. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
  1270. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [S], cksum 0xb924 (correct), seq 553833795, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0
  1271. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1272. 10.0.0.20.6633 > 10.0.0.81.55442: Flags [S.], cksum 0x1493 (incorrect -> 0x6111), seq 845973340, ack 553833796, win 14480, options [mss 1460,sackOK,TS val 47838340 ecr 1,nop,wscale 7], length 0
  1273. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1274. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc462 (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 0
  1275. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  1276. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x3724 (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 8: OpenFlow
  1277. version 1.0, type HELLO, length 8, xid 0x95e1f644
  1278. IP (tos 0x0, ttl 64, id 29656, offset 0, flags [DF], proto TCP (6), length 52)
  1279. 10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0x148b (incorrect -> 0xc7f2), seq 1, ack 9, win 114, options [nop,nop,TS val 47838341 ecr 1], length 0
  1280. IP (tos 0x0, ttl 64, id 29657, offset 0, flags [DF], proto TCP (6), length 60)
  1281. 10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6d3), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47838347 ecr 1], length 8: OpenFlow
  1282. version 1.0, type HELLO, length 8, xid 0x00000001
  1283. IP (tos 0x0, ttl 64, id 29658, offset 0, flags [DF], proto TCP (6), length 60)
  1284. 10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6c4), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47838348 ecr 1], length 8: OpenFlow
  1285. version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
  1286. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1287. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc444 (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47838347], length 0
  1288. IP (tos 0x0, ttl 64, id 53761, offset 0, flags [DF], proto TCP (6), length 180)
  1289. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x1df1 (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47838347], length 128: OpenFlow
  1290. version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002
  1291. dpid 0x00050001e88ae0e2, n_buffers 0, n_tables 6
  1292. capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
  1293. actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
  1294. port_no 13, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/12'
  1295. config 0x00000001 (PORT_DOWN)
  1296. state 0x00000001 (LINK_DOWN)
  1297. curr 0x00000300 (FIBER, AUTONEG)
  1298. advertised 0x00000300 (FIBER, AUTONEG)
  1299. supported 0x00000300 (FIBER, AUTONEG)
  1300. peer 0x00000000
  1301. port_no 16, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/15'
  1302. config 0x00008001 (PORT_DOWN) (bogus)
  1303. state 0x00000001 (LINK_DOWN)
  1304. curr 0x00000300 (FIBER, AUTONEG)
  1305. advertised 0x00000300 (FIBER, AUTONEG)
  1306. supported 0x00000300 (FIBER, AUTONEG)
  1307. peer 0x00000000
  1308. IP (tos 0x0, ttl 64, id 29659, offset 0, flags [DF], proto TCP (6), length 52)
  1309. 10.0.0.20.6633 > 10.0.0.81.55442: Flags [F.], cksum 0x148b (incorrect -> 0xc74d), seq 17, ack 137, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0
  1310. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1311. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc3bc (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0
  1312. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1313. 10.0.0.81.55442 > 10.0.0.20.6633: Flags [F.], cksum 0xc3bb (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0
  1314. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1315. 10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0xc74c (correct), seq 18, ack 138, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0
  1316. IP (tos 0x0, ttl 64, id 53775, offset 0, flags [DF], proto TCP (6), length 189)
  1317. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf083 (correct), seq 14766:14903, ack 4857, win 1035, options [nop,nop,TS val 6 ecr 47837447], length 137: OpenFlow
  1318. version 1.0, type PACKET_IN, length 137, xid 0x00000000
  1319. buffer_id NONE, total_len 119, in_port 1, reason NO_MATCH
  1320. data (119 octets), frame decoding below
  1321. STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102
  1322. port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0
  1323. CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034,
  1324. message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s
  1325. v3len 64, MCID Name pica8, rev 0,
  1326. digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0,
  1327. CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20
  1328. IP (tos 0x0, ttl 64, id 53128, offset 0, flags [DF], proto TCP (6), length 52)
  1329. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xb3e0), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47839052 ecr 6], length 0
  1330. IP (tos 0x0, ttl 64, id 53129, offset 0, flags [DF], proto TCP (6), length 52)
  1331. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [F.], cksum 0x148b (incorrect -> 0xac31), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47841018 ecr 6], length 0
  1332. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1333. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xa96d (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0
  1334. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1335. 10.0.0.81.56068 > 10.0.0.20.6633: Flags [F.], cksum 0xa96c (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0
  1336. IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
  1337. 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0xac2b (correct), seq 4858, ack 14904, win 331, options [nop,nop,TS val 47841019 ecr 10], length 0