Advertisement
possebon

Untitled

Sep 17th, 2020
3,365
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. BNG-FG100E01 # 2020-09-17 09:08:42 id=20085 trace_id=2859 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  3. 2020-09-17 09:08:42 id=20085 trace_id=2859 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  4. 2020-09-17 09:08:42 id=20085 trace_id=2859 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  5. 2020-09-17 09:08:42 id=20085 trace_id=2859 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  6. 2020-09-17 09:08:42 id=20085 trace_id=2859 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  7. 2020-09-17 09:08:42 id=20085 trace_id=2859 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  8. 2020-09-17 09:08:42 id=20085 trace_id=2859 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  9. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=1."
  10. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=init_ip_session_common line=5666 msg="allocate a new session-1ec2637f"
  11. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650946: to 10.30.121.2 via ifindex-68"
  12. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-172.27.27.16 via Pacaembu_2"
  13. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=fw_forward_handler line=771 msg="Allowed by Policy-31: SNAT"
  14. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  15. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  16. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  17. 2020-09-17 09:08:51 id=20085 trace_id=2860 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  18. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=2."
  19. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  20. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Pacaembu_2, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x01000000"
  21. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  22. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=fw_forward_dirty_handler line=449 msg="state=00010204, state2=00010001, npu_state=01000400"
  23. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  24. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  25. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  26. 2020-09-17 09:08:52 id=20085 trace_id=2861 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  27. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  28. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  29. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  30. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  31. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  32. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  33. 2020-09-17 09:09:38 id=20085 trace_id=2862 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  34. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=48."
  35. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  36. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650946: to 10.30.121.2 via ifindex-68"
  37. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-172.27.27.16 via Pacaembu_2"
  38. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  39. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  40. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  41. 2020-09-17 09:09:38 id=20085 trace_id=2863 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  42. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=49."
  43. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  44. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Pacaembu_2, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x01000400"
  45. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  46. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=fw_forward_dirty_handler line=449 msg="state=00010204, state2=00010001, npu_state=01000400"
  47. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  48. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  49. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  50. 2020-09-17 09:09:39 id=20085 trace_id=2864 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  51. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=62."
  52. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  53. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650946: to 10.30.121.2 via ifindex-68"
  54. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-172.27.27.16 via Pacaembu_2"
  55. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  56. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  57. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  58. 2020-09-17 09:09:52 id=20085 trace_id=2865 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  59. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=63."
  60. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  61. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Pacaembu_2, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x01000400"
  62. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  63. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=fw_forward_dirty_handler line=449 msg="state=00010204, state2=00010001, npu_state=01000400"
  64. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  65. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  66. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  67. 2020-09-17 09:09:53 id=20085 trace_id=2866 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  68. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  69. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  70. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  71. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  72. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  73. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  74. 2020-09-17 09:09:55 id=20085 trace_id=2867 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  75. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  76. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  77. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  78. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  79. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  80. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  81. 2020-09-17 09:09:56 id=20085 trace_id=2868 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  82. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=67."
  83. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  84. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650946: to 10.30.121.2 via ifindex-68"
  85. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-172.27.27.16 via Pacaembu_2"
  86. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  87. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  88. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  89. 2020-09-17 09:09:57 id=20085 trace_id=2869 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  90. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=1, 10.10.121.2:46132->10.30.121.2:2048) from VLAN 121. type=8, code=0, id=46132, seq=68."
  91. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-1ec2637f, original direction"
  92. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Pacaembu_2, skb.npu_flag=00000400 ses.state=00010204 ses.npu_state=0x01000400"
  93. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  94. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=fw_forward_dirty_handler line=449 msg="state=00010204, state2=00010001, npu_state=01000400"
  95. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=__ip_session_run_tuple line=3286 msg="SNAT 10.10.121.2->172.27.27.15:46132"
  96. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=ipsecdev_hard_start_xmit line=777 msg="enter IPsec interface-Pacaembu_2"
  97. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=esp_output4 line=904 msg="IPsec encrypt/auth"
  98. 2020-09-17 09:09:58 id=20085 trace_id=2870 func=ipsec_output_finish line=622 msg="send to 187.0.5.49 via intf-Vlan0200"
  99. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  100. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  101. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  102. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  103. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  104. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  105. 2020-09-17 09:10:19 id=20085 trace_id=2871 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  106. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  107. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  108. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  109. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  110. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  111. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  112. 2020-09-17 09:10:32 id=20085 trace_id=2872 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  113. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  114. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  115. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  116. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  117. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  118. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  119. 2020-09-17 09:10:50 id=20085 trace_id=2873 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  120. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  121. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  122. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  123. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  124. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  125. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  126. 2020-09-17 09:11:14 id=20085 trace_id=2874 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  127. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  128. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  129. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  130. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  131. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  132. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  133. 2020-09-17 09:11:27 id=20085 trace_id=2875 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  134. diag debug d2020-09-17 09:11:45 id=20085 trace_id=2876 func=print_pkt_detail line=5501 msg="vd-root:0 received a packet(proto=17, 10.10.121.2:4569->10.30.121.2:4569) from VLAN 121. "
  135. 2020-09-17 09:11:45 id=20085 trace_id=2876 func=resolve_ip_tuple_fast line=5581 msg="Find an existing session, id-109fdc15, reply direction"
  136. 2020-09-17 09:11:45 id=20085 trace_id=2876 func=vf_ip_route_input_common line=2581 msg="Match policy routing id=2141650950: to 10.30.121.2 via ifindex-35"
  137. 2020-09-17 09:11:45 id=20085 trace_id=2876 func=vf_ip_route_input_common line=2596 msg="find a route: flag=04000000 gw-200.185.223.57 via Bitcom_1"
  138. 2020-09-17 09:11:45 id=20085 trace_id=2876 func=npu_handle_session44 line=1139 msg="Trying to offloading session from VLAN 121 to Bitcom_1, skb.npu_flag=00000400 ses.state=00010284 ses.npu_state=0x03000c00"
  139. 2020-09-17 09:11:45 id=20085 trace_id=2876 func=ip_session_install_npu_session line=348 msg="npu session installation succeeded"
  140. 2020-09-17 09:11:45 id=20085 trace_id=2876 func=fw_forward_dirty_handler line=449 msg="state=00010284, state2=00010005, npu_state=03000c00"
  141. isable
  142.  
  143. BNG-FG100E01 #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement