Advertisement
possebon

Untitled

Aug 25th, 2020
1,717
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 8.50 KB | None | 0 0
  1. BNG-FG100E01 # id=20085 trace_id=1334 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61139->200.201.170.59:443) from Aggregate. flag [S], seq 1606913187, ack 0, win 64240"
  2. id=20085 trace_id=1334 func=init_ip_session_common line=5666 msg="allocate a new session-181160a8"
  3. id=20085 trace_id=1334 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  4. id=20085 trace_id=1334 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  5. id=20085 trace_id=1334 func=fw_forward_handler line=771 msg="Allowed by Policy-20: SNAT"
  6. id=20085 trace_id=1334 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61139"
  7. id=20085 trace_id=1335 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61140->200.201.170.59:443) from Aggregate. flag [S], seq 2901123387, ack 0, win 64240"
  8. id=20085 trace_id=1335 func=init_ip_session_common line=5666 msg="allocate a new session-181160b6"
  9. id=20085 trace_id=1335 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  10. id=20085 trace_id=1335 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  11. id=20085 trace_id=1335 func=fw_forward_handler line=771 msg="Allowed by Policy-20: SNAT"
  12. id=20085 trace_id=1335 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61140"
  13. id=20085 trace_id=1336 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61139->200.201.170.59:443) from Aggregate. flag [S], seq 1606913187, ack 0, win 64240"
  14. id=20085 trace_id=1336 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-181160a8, original direction"
  15. id=20085 trace_id=1336 func=npu_handle_session44 line=1139 msg="Trying to offloading session from Aggregate to Adylnet_2, skb.npu_flag=00000000 ses.state=02050204 ses.npu_state=0x00000000"
  16. id=20085 trace_id=1336 func=fw_forward_dirty_handler line=449 msg="state=02050204, state2=00010001, npu_state=00000000"
  17. id=20085 trace_id=1336 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61139"
  18. id=20085 trace_id=1337 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61140->200.201.170.59:443) from Aggregate. flag [S], seq 2901123387, ack 0, win 64240"
  19. id=20085 trace_id=1337 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-181160b6, original direction"
  20. id=20085 trace_id=1337 func=npu_handle_session44 line=1139 msg="Trying to offloading session from Aggregate to Adylnet_2, skb.npu_flag=00000000 ses.state=02050204 ses.npu_state=0x00000000"
  21. id=20085 trace_id=1337 func=fw_forward_dirty_handler line=449 msg="state=02050204, state2=00010001, npu_state=00000000"
  22. id=20085 trace_id=1337 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61140"
  23. id=20085 trace_id=1338 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61139->200.201.170.59:443) from Aggregate. flag [S], seq 1606913187, ack 0, win 64240"
  24. id=20085 trace_id=1338 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-181160a8, original direction"
  25. id=20085 trace_id=1338 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  26. id=20085 trace_id=1338 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  27. id=20085 trace_id=1338 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61139"
  28. id=20085 trace_id=1339 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61140->200.201.170.59:443) from Aggregate. flag [S], seq 2901123387, ack 0, win 64240"
  29. id=20085 trace_id=1339 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-181160b6, original direction"
  30. id=20085 trace_id=1339 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  31. id=20085 trace_id=1339 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  32. id=20085 trace_id=1339 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61140"
  33. id=20085 trace_id=1340 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61141->200.201.170.59:443) from Aggregate. flag [S], seq 3285674705, ack 0, win 64240"
  34. id=20085 trace_id=1340 func=init_ip_session_common line=5666 msg="allocate a new session-18116714"
  35. id=20085 trace_id=1340 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  36. id=20085 trace_id=1340 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  37. id=20085 trace_id=1340 func=fw_forward_handler line=771 msg="Allowed by Policy-20: SNAT"
  38. id=20085 trace_id=1340 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61141"
  39. id=20085 trace_id=1341 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61142->200.201.170.59:443) from Aggregate. flag [S], seq 4068468739, ack 0, win 64240"
  40. id=20085 trace_id=1341 func=init_ip_session_common line=5666 msg="allocate a new session-18116726"
  41. id=20085 trace_id=1341 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  42. id=20085 trace_id=1341 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  43. id=20085 trace_id=1341 func=fw_forward_handler line=771 msg="Allowed by Policy-20: SNAT"
  44. id=20085 trace_id=1341 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61142"
  45. id=20085 trace_id=1342 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61141->200.201.170.59:443) from Aggregate. flag [S], seq 3285674705, ack 0, win 64240"
  46. id=20085 trace_id=1342 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-18116714, original direction"
  47. id=20085 trace_id=1342 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  48. id=20085 trace_id=1342 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  49. id=20085 trace_id=1342 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61141"
  50. id=20085 trace_id=1343 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61142->200.201.170.59:443) from Aggregate. flag [S], seq 4068468739, ack 0, win 64240"
  51. id=20085 trace_id=1343 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-18116726, original direction"
  52. id=20085 trace_id=1343 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  53. id=20085 trace_id=1343 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  54. id=20085 trace_id=1343 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61142"
  55. id=20085 trace_id=1344 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61141->200.201.170.59:443) from Aggregate. flag [S], seq 3285674705, ack 0, win 64240"
  56. id=20085 trace_id=1344 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-18116714, original direction"
  57. id=20085 trace_id=1344 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  58. id=20085 trace_id=1344 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  59. id=20085 trace_id=1344 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61141"
  60. id=20085 trace_id=1345 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=6, 10.0.1.62:61142->200.201.170.59:443) from Aggregate. flag [S], seq 4068468739, ack 0, win 64240"
  61. id=20085 trace_id=1345 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-18116726, original direction"
  62. id=20085 trace_id=1345 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2139947012: to 200.201.170.59 via ifindex-34"
  63. id=20085 trace_id=1345 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-187.103.250.161 via Adylnet_2"
  64. id=20085 trace_id=1345 func=__ip_session_run_tuple line=3286 msg="SNAT 10.0.1.62->187.103.250.162:61142"
  65.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement