]> The Tcpdump Group git mirrors - tcpdump/blob - tests/of10_s4810-vvvv.out
CVE-2017-13688/OLSR: Do bounds checks before we fetch data.
[tcpdump] / tests / of10_s4810-vvvv.out
1 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
2 10.0.0.81.56068 > 10.0.0.20.6633: Flags [S], cksum 0xa75a (correct), seq 469952923, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
4 10.0.0.20.6633 > 10.0.0.81.56068: Flags [S.], cksum 0x1493 (incorrect -> 0xa59a), seq 1198728146, ack 469952924, win 14480, options [mss 1460,sackOK,TS val 47836340 ecr 1,nop,wscale 7], length 0
5 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
6 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ec (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 0
7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
8 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x293c (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 8: OpenFlow
9 version 1.0, type HELLO, length 8, xid 0xf1c0ecd6
10 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52)
11 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x0c7c), seq 1, ack 9, win 114, options [nop,nop,TS val 47836341 ecr 1], length 0
12 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60)
13 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b5d), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47836347 ecr 1], length 8: OpenFlow
14 version 1.0, type HELLO, length 8, xid 0x00000001
15 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60)
16 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b4e), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47836348 ecr 1], length 8: OpenFlow
17 version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
18 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
19 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ce (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47836347], length 0
20 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180)
21 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x48dc (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47836347], length 128: OpenFlow
22 version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002
23 dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6
24 capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
25 actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
26 port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0'
27 config 0x00000000
28 state 0x00000000
29 curr 0x00000340 (10GB_FD, FIBER, AUTONEG)
30 advertised 0x00000340 (10GB_FD, FIBER, AUTONEG)
31 supported 0x00000340 (10GB_FD, FIBER, AUTONEG)
32 peer 0x00000000
33 port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1'
34 config 0x00000001 (PORT_DOWN)
35 state 0x00000001 (LINK_DOWN)
36 curr 0x00000300 (FIBER, AUTONEG)
37 advertised 0x00000300 (FIBER, AUTONEG)
38 supported 0x00000300 (FIBER, AUTONEG)
39 peer 0x00000000
40 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136)
41 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14df (incorrect -> 0x08c9), seq 17:101, ack 137, win 122, options [nop,nop,TS val 47836352 ecr 1], length 84: OpenFlow
42 version 1.0, type SET_CONFIG, length 12, xid 0x00000003
43 flags FRAG_NORMAL, miss_send_len 65535
44 version 1.0, type FLOW_MOD, length 72, xid 0x00000004
45 cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
46 IP (tos 0x0, ttl 64, id 53098, offset 0, flags [DF], proto TCP (6), length 60)
47 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0a54), seq 101:109, ack 137, win 122, options [nop,nop,TS val 47836354 ecr 1], length 8: OpenFlow
48 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
49 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
50 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x07ed (correct), seq 137, ack 109, win 1034, options [nop,nop,TS val 1 ecr 47836352], length 0
51 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
52 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x06bc (correct), seq 137:145, ack 109, win 1035, options [nop,nop,TS val 1 ecr 47836352], length 8: OpenFlow
53 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
54 IP (tos 0x0, ttl 64, id 53099, offset 0, flags [DF], proto TCP (6), length 80)
55 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14a7 (incorrect -> 0x07f3), seq 109:137, ack 145, win 122, options [nop,nop,TS val 47836355 ecr 1], length 28: OpenFlow
56 version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000006
57 version 1.0, type STATS_REQUEST, length 12, xid 0x00000007
58 type TABLE, flags 0x0000
59 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000008
60 IP (tos 0x0, ttl 64, id 53475, offset 0, flags [DF], proto TCP (6), length 180)
61 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x47d0 (correct), seq 145:273, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 128: OpenFlow
62 version 1.0, type FEATURES_REPLY, length 128, xid 0x00000006
63 dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6
64 capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
65 actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
66 port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0'
67 config 0x00000000
68 state 0x00000000
69 curr 0x00000340 (10GB_FD, FIBER, AUTONEG)
70 advertised 0x00000340 (10GB_FD, FIBER, AUTONEG)
71 supported 0x00000340 (10GB_FD, FIBER, AUTONEG)
72 peer 0x00000000
73 port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1'
74 config 0x00000001 (PORT_DOWN)
75 state 0x00000001 (LINK_DOWN)
76 curr 0x00000300 (FIBER, AUTONEG)
77 advertised 0x00000300 (FIBER, AUTONEG)
78 supported 0x00000300 (FIBER, AUTONEG)
79 peer 0x00000000
80 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
81 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0612 (correct), seq 273:281, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 8: OpenFlow
82 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000008
83 IP (tos 0x0, ttl 64, id 53476, offset 0, flags [DF], proto TCP (6), length 448)
84 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x2be8 (correct), seq 281:677, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 396: OpenFlow
85 version 1.0, type STATS_REPLY, length 396, xid 0x00000007
86 type TABLE, flags 0x0000
87 table_id 0, name 'VLAN Table'
88 wildcards 0x003ffffd (IN_PORT, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
89 max_entries 1024, active_count 0, lookup_count 0, matched_count 0
90 table_id 0, name 'MAC Table'
91 wildcards 0x003ffff5 (IN_PORT, DL_SRC, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
92 max_entries 49152, active_count 0, lookup_count 0, matched_count 0
93 table_id 0, name 'Route Table'
94 wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
95 max_entries 6144, active_count 0, lookup_count 0, matched_count 0
96 table_id 0, name 'ACL Table'
97 wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
98 max_entries 498, active_count 0, lookup_count 127028, matched_count 0
99 table_id 0, name 'Learning Switch Table'
100 wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
101 max_entries 24576, active_count 0, lookup_count 0, matched_count 0
102 table_id 0, name 'Egress Port Block Table'
103 wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
104 max_entries 256, active_count 0, lookup_count 0, matched_count 0
105 IP (tos 0x0, ttl 64, id 53100, offset 0, flags [DF], proto TCP (6), length 52)
106 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x088c), seq 137, ack 677, win 139, options [nop,nop,TS val 47836520 ecr 1], length 0
107 IP (tos 0x0, ttl 64, id 53101, offset 0, flags [DF], proto TCP (6), length 4156)
108 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x2493 (incorrect -> 0xa671), seq 137:4241, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 4104: OpenFlow
109 version 1.0, type FLOW_MOD, length 80, xid 0x00000009
110 match in_port 1
111 cookie 0x0000000000000001, command ADD, priority 35000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
112 action type OUTPUT, len 8, port CONTROLLER, max_len 65535
113 version 1.0, type FLOW_MOD, length 80, xid 0x0000000a
114 match in_port 1
115 cookie 0x0000000000000002, command ADD, priority 34999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
116 action type SET_VLAN_VID, len 8, vlan_vid 2
117 version 1.0, type FLOW_MOD, length 80, xid 0x0000000b
118 match in_port 1
119 cookie 0x0000000000000003, command ADD, priority 34998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
120 action type SET_VLAN_PCP, len 8, vlan_pcp 5
121 version 1.0, type FLOW_MOD, length 88, xid 0x0000000c
122 match in_port 1
123 cookie 0x0000000000000004, command ADD, priority 34997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
124 action type SET_VLAN_VID, len 8, vlan_vid 2
125 action type SET_VLAN_PCP, len 8, vlan_pcp 5
126 version 1.0, type FLOW_MOD, length 88, xid 0x0000000d
127 match in_port 1
128 cookie 0x0000000000000005, command ADD, priority 34996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
129 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
130 version 1.0, type FLOW_MOD, length 88, xid 0x0000000e
131 match in_port 1
132 cookie 0x0000000000000006, command ADD, priority 34995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
133 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
134 version 1.0, type FLOW_MOD, length 104, xid 0x0000000f
135 match in_port 1
136 cookie 0x0000000000000007, command ADD, priority 34994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
137 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
138 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
139 version 1.0, type FLOW_MOD, length 80, xid 0x00000010
140 match in_port 1
141 match dl_src 00:00:00:00:00:01
142 cookie 0x0000000000000008, command ADD, priority 34000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
143 action type OUTPUT, len 8, port 2
144 version 1.0, type FLOW_MOD, length 80, xid 0x00000011
145 match in_port 1
146 cookie 0x0000000000000009, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
147 action type SET_NW_TOS, len 8, nw_tos 0x28
148 version 1.0, type FLOW_MOD, length 80, xid 0x00000012
149 match dl_vlan 100
150 match dl_vlan_pcp 4
151 match dl_type 0x0800
152 cookie 0x000000000000000a, command ADD, priority 32000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
153 action type OUTPUT, len 8, port 2
154 version 1.0, type FLOW_MOD, length 80, xid 0x00000013
155 match dl_type 0x0800
156 match nw_src 10.11.12.0/24
157 match nw_dst 10.13.14.0/24
158 cookie 0x000000000000000b, command ADD, priority 31999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
159 action type OUTPUT, len 8, port 2
160 version 1.0, type FLOW_MOD, length 80, xid 0x00000014
161 match dl_type 0x0800
162 match nw_proto 17
163 match tp_src 68
164 match tp_dst 67
165 cookie 0x000000000000000c, command ADD, priority 31998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
166 action type OUTPUT, len 8, port 2
167 version 1.0, type FLOW_MOD, length 80, xid 0x00000015
168 match dl_type 0x0800
169 match nw_proto 1
170 match icmp_type 8
171 cookie 0x000000000000000d, command ADD, priority 31997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
172 action type OUTPUT, len 8, port 2
173 version 1.0, type FLOW_MOD, length 80, xid 0x00000016
174 match dl_type 0x0800
175 match nw_proto 1
176 match icmp_type 3
177 match icmp_code 13
178 cookie 0x000000000000000e, command ADD, priority 31996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
179 action type OUTPUT, len 8, port 2
180 version 1.0, type FLOW_MOD, length 80, xid 0x00000017
181 match dl_src aa:00:00:00:00:11
182 match dl_dst bb:00:00:00:00:22
183 cookie 0x000000000000000f, command ADD, priority 31995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
184 action type OUTPUT, len 8, port 2
185 version 1.0, type FLOW_MOD, length 80, xid 0x00000018
186 match dl_type 0x0800
187 match nw_tos 0x24
188 cookie 0x0000000000000010, command ADD, priority 31994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
189 action type OUTPUT, len 8, port 2
190 version 1.0, type FLOW_MOD, length 80, xid 0x00000019
191 match dl_type 0x0800
192 match nw_proto 6
193 match tp_src 80
194 match tp_dst 80
195 cookie 0x0000000000000011, command ADD, priority 31993, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
196 action type OUTPUT, len 8, port 2
197 version 1.0, type FLOW_MOD, length 112, xid 0x0000001a
198 match dl_dst 00:01:e8:8a:e0:e4
199 match dl_type 0x0800
200 match nw_dst 10.21.0.0/16
201 cookie 0x0000000000000012, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
202 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
203 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
204 action type OUTPUT, len 8, port 2
205 version 1.0, type FLOW_MOD, length 112, xid 0x0000001b
206 match dl_dst 00:01:e8:8a:e0:e4
207 match dl_type 0x0800
208 match nw_dst 10.22.0.0/16
209 cookie 0x0000000000000013, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
210 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
211 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
212 action type OUTPUT, len 8, port 2
213 version 1.0, type FLOW_MOD, length 112, xid 0x0000001c
214 match dl_dst 00:01:e8:8a:e0:e4
215 match dl_type 0x0800
216 match nw_dst 10.23.0.0/16
217 cookie 0x0000000000000014, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
218 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
219 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
220 action type OUTPUT, len 8, port 2
221 version 1.0, type FLOW_MOD, length 112, xid 0x0000001d
222 match dl_dst 00:01:e8:8a:e0:e4
223 match dl_type 0x0800
224 match nw_dst 10.24.0.0/16
225 cookie 0x0000000000000015, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
226 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
227 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
228 action type OUTPUT, len 8, port 2
229 version 1.0, type FLOW_MOD, length 112, xid 0x0000001e
230 match dl_dst 00:01:e8:8a:e0:e4
231 match dl_type 0x0800
232 match nw_dst 10.20.0.0/24
233 cookie 0x0000000000000016, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
234 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
235 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
236 action type OUTPUT, len 8, port 2
237 version 1.0, type FLOW_MOD, length 112, xid 0x0000001f
238 match dl_dst 00:01:e8:8a:e0:e4
239 match dl_type 0x0800
240 match nw_dst 10.20.1.0/24
241 cookie 0x0000000000000017, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
242 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
243 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
244 action type OUTPUT, len 8, port 2
245 version 1.0, type FLOW_MOD, length 112, xid 0x00000020
246 match dl_dst 00:01:e8:8a:e0:e4
247 match dl_type 0x0800
248 match nw_dst 10.20.2.0/24
249 cookie 0x0000000000000018, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
250 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
251 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
252 action type OUTPUT, len 8, port 2
253 version 1.0, type FLOW_MOD, length 112, xid 0x00000021
254 match dl_dst 00:01:e8:8a:e0:e4
255 match dl_type 0x0800
256 match nw_dst 10.20.3.0/24
257 cookie 0x0000000000000019, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
258 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
259 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
260 action type OUTPUT, len 8, port 2
261 version 1.0, type FLOW_MOD, length 112, xid 0x00000022
262 match dl_dst 00:01:e8:8a:e0:e4
263 match dl_type 0x0800
264 match nw_dst 10.20.4.0/24
265 cookie 0x000000000000001a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
266 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
267 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
268 action type OUTPUT, len 8, port 2
269 version 1.0, type FLOW_MOD, length 112, xid 0x00000023
270 match dl_dst 00:01:e8:8a:e0:e4
271 match dl_type 0x0800
272 match nw_dst 10.20.5.0/24
273 cookie 0x000000000000001b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
274 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
275 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
276 action type OUTPUT, len 8, port 2
277 version 1.0, type FLOW_MOD, length 112, xid 0x00000024
278 match dl_dst 00:01:e8:8a:e0:e4
279 match dl_type 0x0800
280 match nw_dst 10.20.6.0/24
281 cookie 0x000000000000001c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
282 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
283 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
284 action type OUTPUT, len 8, port 2
285 version 1.0, type FLOW_MOD, length 112, xid 0x00000025
286 match dl_dst 00:01:e8:8a:e0:e4
287 match dl_type 0x0800
288 match nw_dst 10.20.7.0/24
289 cookie 0x000000000000001d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
290 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
291 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
292 action type OUTPUT, len 8, port 2
293 version 1.0, type FLOW_MOD, length 112, xid 0x00000026
294 match dl_dst 00:01:e8:8a:e0:e4
295 match dl_type 0x0800
296 cookie 0x000000000000001e, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
297 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
298 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
299 action type OUTPUT, len 8, port 2
300 version 1.0, type FLOW_MOD, length 80, xid 0x00000027
301 match dl_dst 00:11:22:33:00:32
302 match dl_vlan 50
303 cookie 0x000000000000001f, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
304 action type OUTPUT, len 8, port 1
305 version 1.0, type FLOW_MOD, length 80, xid 0x00000028
306 match dl_dst 00:11:22:33:00:33
307 match dl_vlan 51
308 cookie 0x0000000000000020, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
309 action type OUTPUT, len 8, port 1
310 version 1.0, type FLOW_MOD, length 80, xid 0x00000029
311 match dl_dst 00:11:22:33:00:34
312 match dl_vlan 52
313 cookie 0x0000000000000021, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
314 action type OUTPUT, len 8, port 1
315 version 1.0, type FLOW_MOD, length 80, xid 0x0000002a
316 match dl_dst 00:11:22:33:00:35
317 match dl_vlan 53
318 cookie 0x0000000000000022, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
319 action type OUTPUT, len 8, port 1
320 version 1.0, type FLOW_MOD, length 80, xid 0x0000002b
321 match dl_dst 00:11:22:33:00:36
322 match dl_vlan 54
323 cookie 0x0000000000000023, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
324 action type OUTPUT, len 8, port 1
325 version 1.0, type FLOW_MOD, length 80, xid 0x0000002c
326 match dl_dst 00:11:22:33:00:37
327 match dl_vlan 55
328 cookie 0x0000000000000024, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
329 action type OUTPUT, len 8, port 1
330 version 1.0, type FLOW_MOD, length 80, xid 0x0000002d
331 match dl_dst 00:11:22:33:00:38
332 match dl_vlan 56
333 cookie 0x0000000000000025, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
334 action type OUTPUT, len 8, port 1
335 version 1.0, type FLOW_MOD, length 80, xid 0x0000002e
336 match dl_dst 00:11:22:33:00:39
337 match dl_vlan 57
338 cookie 0x0000000000000026, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
339 action type OUTPUT, len 8, port 1
340 version 1.0, type FLOW_MOD, length 80, xid 0x0000002f
341 match dl_src 00:11:22:33:00:0a
342 match dl_dst 00:11:22:33:00:14
343 cookie 0x0000000000000027, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
344 action type OUTPUT, len 8, port 1
345 version 1.0, type FLOW_MOD, length 80, xid 0x00000030
346 match dl_src 00:11:22:33:00:0a
347 match dl_dst 00:11:22:33:00:15
348 cookie 0x0000000000000028, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
349 action type OUTPUT, len 8, port 1
350 version 1.0, type FLOW_MOD, length 80, xid 0x00000031
351 match dl_src 00:11:22:33:00:0a
352 match dl_dst 00:11:22:33:00:16
353 cookie 0x0000000000000029, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
354 action type OUTPUT, len 8, port 1
355 version 1.0, type FLOW_MOD, length 80, xid 0x00000032
356 match dl_src 00:11:22:33:00:0b
357 match dl_dst 00:11:22:33:00:14
358 cookie 0x000000000000002a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
359 action type OUTPUT, len 8, port 1
360 version 1.0, type FLOW_MOD, length 80, xid 0x00000033
361 match dl_src 00:11:22:33:00:0b
362 match dl_dst 00:11:22:33:00:15
363 cookie 0x000000000000002b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
364 action type OUTPUT, len 8, port 1
365 version 1.0, type FLOW_MOD, length 80, xid 0x00000034
366 match dl_src 00:11:22:33:00:0b
367 match dl_dst 00:11:22:33:00:16
368 cookie 0x000000000000002c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
369 action type OUTPUT, len 8, port 1
370 version 1.0, type FLOW_MOD, length 80, xid 0x00000035
371 match dl_src 00:11:22:33:00:0c
372 match dl_dst 00:11:22:33:00:14
373 cookie 0x000000000000002d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
374 action type OUTPUT, len 8, port 1
375 version 1.0, type FLOW_MOD, length 80, xid 0x00000036
376 match dl_src 00:11:22:33:00:0c
377 match dl_dst 00:11:22:33:00:15 [|openflow]
378 IP (tos 0x0, ttl 64, id 53104, offset 0, flags [DF], proto TCP (6), length 180)
379 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x150b (incorrect -> 0x8ec7), seq 4241:4369, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 128: OpenFlow
380 version unknown (0x00), type 0x00, length 0, xid 0x00000000 (invalid)
381 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
382 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xfaa7 (correct), seq 677, ack 2873, win 952, options [nop,nop,TS val 1 ecr 47836527], length 0
383 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
384 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4fe (correct), seq 677, ack 4369, win 905, options [nop,nop,TS val 1 ecr 47836527], length 0
385 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
386 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4a7 (correct), seq 677, ack 4369, win 992, options [nop,nop,TS val 1 ecr 47836527], length 0
387 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
388 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf318 (correct), seq 677:685, ack 4369, win 1035, options [nop,nop,TS val 2 ecr 47836527], length 8: OpenFlow
389 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000038
390 IP (tos 0x0, ttl 64, id 53105, offset 0, flags [DF], proto TCP (6), length 228)
391 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x153b (incorrect -> 0x165f), seq 4369:4545, ack 685, win 139, options [nop,nop,TS val 47836757 ecr 2], length 176: OpenFlow
392 version 1.0, type STATS_REQUEST, length 56, xid 0x00000039
393 type FLOW, flags 0x0000
394 table_id ALL, out_port NONE
395 version 1.0, type STATS_REQUEST, length 56, xid 0x0000003a
396 type FLOW, flags 0x0000
397 table_id 0, out_port NONE
398 version 1.0, type STATS_REQUEST, length 56, xid 0x0000003b
399 type FLOW, flags 0x0000
400 match dl_src 00:00:00:00:77:77
401 table_id 0, out_port CONTROLLER
402 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000003c
403 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
404 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf2dd (correct), seq 685, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 0
405 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
406 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf170 (correct), seq 685:697, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 12: OpenFlow
407 version 1.0, type STATS_REPLY, length 12, xid 0x0000003b
408 type FLOW, flags 0x0000
409 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
410 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf16a (correct), seq 697:705, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 8: OpenFlow
411 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000003c
412 IP (tos 0x0, ttl 64, id 53106, offset 0, flags [DF], proto TCP (6), length 52)
413 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xf556), seq 4545, ack 705, win 139, options [nop,nop,TS val 47837000 ecr 2], length 0
414 IP (tos 0x0, ttl 64, id 53575, offset 0, flags [DF], proto TCP (6), length 1216)
415 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x39b4 (correct), seq 705:1869, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1164: OpenFlow
416 version 1.0, type STATS_REPLY, length 1164, xid 0x00000039
417 type FLOW, flags 0x0001 (MORE)
418 length 128, table_id 30
419 match dl_dst 00:01:e8:8a:e0:e4
420 match dl_type 0x0800
421 match nw_dst 10.21.0.0/16
422 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000012, packet_count 0, byte_count 0
423 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
424 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
425 action type OUTPUT, len 8, port 2
426 length 128, table_id 30
427 match dl_dst 00:01:e8:8a:e0:e4
428 match dl_type 0x0800
429 match nw_dst 10.22.0.0/16
430 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000013, packet_count 0, byte_count 0
431 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
432 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
433 action type OUTPUT, len 8, port 2
434 length 128, table_id 30
435 match dl_dst 00:01:e8:8a:e0:e4
436 match dl_type 0x0800
437 match nw_dst 10.23.0.0/16
438 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000014, packet_count 0, byte_count 0
439 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
440 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
441 action type OUTPUT, len 8, port 2
442 length 128, table_id 30
443 match dl_dst 00:01:e8:8a:e0:e4
444 match dl_type 0x0800
445 match nw_dst 10.24.0.0/16
446 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000015, packet_count 0, byte_count 0
447 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
448 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
449 action type OUTPUT, len 8, port 2
450 length 128, table_id 30
451 match dl_dst 00:01:e8:8a:e0:e4
452 match dl_type 0x0800
453 match nw_dst 10.20.0.0/24
454 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000016, packet_count 0, byte_count 0
455 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
456 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
457 action type OUTPUT, len 8, port 2
458 length 128, table_id 30
459 match dl_dst 00:01:e8:8a:e0:e4
460 match dl_type 0x0800
461 match nw_dst 10.20.1.0/24
462 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000017, packet_count 0, byte_count 0
463 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
464 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
465 action type OUTPUT, len 8, port 2
466 length 128, table_id 30
467 match dl_dst 00:01:e8:8a:e0:e4
468 match dl_type 0x0800
469 match nw_dst 10.20.2.0/24
470 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000018, packet_count 0, byte_count 0
471 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
472 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
473 action type OUTPUT, len 8, port 2
474 length 128, table_id 30
475 match dl_dst 00:01:e8:8a:e0:e4
476 match dl_type 0x0800
477 match nw_dst 10.20.3.0/24
478 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000019, packet_count 0, byte_count 0
479 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
480 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
481 action type OUTPUT, len 8, port 2
482 length 128, table_id 30
483 match dl_dst 00:01:e8:8a:e0:e4
484 match dl_type 0x0800
485 match nw_dst 10.20.4.0/24
486 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001a, packet_count 0, byte_count 0
487 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
488 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
489 action type OUTPUT, len 8, port 2
490 IP (tos 0x0, ttl 64, id 53576, offset 0, flags [DF], proto TCP (6), length 1176)
491 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6b64 (correct), seq 1869:2993, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1124: OpenFlow
492 version 1.0, type STATS_REPLY, length 1124, xid 0x00000039
493 type FLOW, flags 0x0001 (MORE)
494 length 128, table_id 30
495 match dl_dst 00:01:e8:8a:e0:e4
496 match dl_type 0x0800
497 match nw_dst 10.20.5.0/24
498 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001b, packet_count 0, byte_count 0
499 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
500 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
501 action type OUTPUT, len 8, port 2
502 length 128, table_id 30
503 match dl_dst 00:01:e8:8a:e0:e4
504 match dl_type 0x0800
505 match nw_dst 10.20.6.0/24
506 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001c, packet_count 0, byte_count 0
507 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
508 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
509 action type OUTPUT, len 8, port 2
510 length 128, table_id 30
511 match dl_dst 00:01:e8:8a:e0:e4
512 match dl_type 0x0800
513 match nw_dst 10.20.7.0/24
514 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001d, packet_count 0, byte_count 0
515 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
516 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
517 action type OUTPUT, len 8, port 2
518 length 128, table_id 30
519 match dl_dst 00:01:e8:8a:e0:e4
520 match dl_type 0x0800
521 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001e, packet_count 0, byte_count 0
522 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
523 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
524 action type OUTPUT, len 8, port 2
525 length 96, table_id 40
526 match in_port 1
527 duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
528 action type OUTPUT, len 8, port CONTROLLER, max_len 65535
529 length 96, table_id 40
530 match in_port 1
531 duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
532 action type SET_VLAN_VID, len 8, vlan_vid 2
533 length 96, table_id 40
534 match in_port 1
535 duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
536 action type SET_VLAN_PCP, len 8, vlan_pcp 5
537 length 104, table_id 40
538 match in_port 1
539 duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
540 action type SET_VLAN_VID, len 8, vlan_vid 2
541 action type SET_VLAN_PCP, len 8, vlan_pcp 5
542 length 104, table_id 40
543 match in_port 1
544 duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
545 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
546 length 104, table_id 40
547 match in_port 1
548 duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
549 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
550 IP (tos 0x0, ttl 64, id 53107, offset 0, flags [DF], proto TCP (6), length 52)
551 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xec39), seq 4545, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 0
552 IP (tos 0x0, ttl 64, id 53108, offset 0, flags [DF], proto TCP (6), length 148)
553 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14eb (incorrect -> 0xc5f7), seq 4545:4641, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 96: OpenFlow
554 version 1.0, type STATS_REQUEST, length 12, xid 0x0000003d
555 type DESC, flags 0x0000
556 version 1.0, type STATS_REQUEST, length 56, xid 0x0000003e
557 type AGGREGATE, flags 0x0000
558 table_id ALL, out_port NONE
559 version 1.0, type STATS_REQUEST, length 20, xid 0x0000003f
560 type PORT, flags 0x0000
561 port_no NONE
562 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000040
563 IP (tos 0x0, ttl 64, id 53577, offset 0, flags [DF], proto TCP (6), length 1048)
564 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x29df (correct), seq 2993:3989, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 996: OpenFlow
565 version 1.0, type STATS_REPLY, length 996, xid 0x00000039
566 type FLOW, flags 0x0001 (MORE)
567 length 120, table_id 40
568 match in_port 1
569 duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
570 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
571 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
572 length 96, table_id 40
573 match in_port 1
574 match dl_src 00:00:00:00:00:01
575 duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
576 action type OUTPUT, len 8, port 2
577 length 96, table_id 40
578 match in_port 1
579 duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0
580 action type SET_NW_TOS, len 8, nw_tos 0x28
581 length 96, table_id 40
582 match dl_vlan 100
583 match dl_vlan_pcp 4
584 match dl_type 0x0800
585 duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0
586 action type OUTPUT, len 8, port 2
587 length 96, table_id 40
588 match dl_type 0x0800
589 match nw_src 10.11.12.0/24
590 match nw_dst 10.13.14.0/24
591 duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0
592 action type OUTPUT, len 8, port 2
593 length 96, table_id 40
594 match dl_type 0x0800
595 match nw_proto 17
596 match tp_src 68
597 match tp_dst 67
598 duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0
599 action type OUTPUT, len 8, port 2
600 length 96, table_id 40
601 match dl_type 0x0800
602 match nw_proto 1
603 match icmp_type 8
604 duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0
605 action type OUTPUT, len 8, port 2
606 length 96, table_id 40
607 match dl_type 0x0800
608 match nw_proto 1
609 match icmp_type 3
610 match icmp_code 13
611 duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0
612 action type OUTPUT, len 8, port 2
613 length 96, table_id 40
614 match dl_src aa:00:00:00:00:11
615 match dl_dst bb:00:00:00:00:22
616 duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0
617 action type OUTPUT, len 8, port 2
618 length 96, table_id 40
619 match dl_type 0x0800
620 match nw_tos 0x24
621 duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0
622 action type OUTPUT, len 8, port 2
623 IP (tos 0x0, ttl 64, id 53578, offset 0, flags [DF], proto TCP (6), length 1024)
624 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x45c0 (correct), seq 3989:4961, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 972: OpenFlow
625 version 1.0, type STATS_REPLY, length 972, xid 0x00000039
626 type FLOW, flags 0x0001 (MORE)
627 length 96, table_id 40
628 match dl_type 0x0800
629 match nw_proto 6
630 match tp_src 80
631 match tp_dst 80
632 duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0
633 action type OUTPUT, len 8, port 2
634 length 96, table_id 40
635 match dl_dst 00:11:22:33:00:32
636 match dl_vlan 50
637 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0
638 action type OUTPUT, len 8, port 1
639 length 96, table_id 40
640 match dl_dst 00:11:22:33:00:33
641 match dl_vlan 51
642 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0
643 action type OUTPUT, len 8, port 1
644 length 96, table_id 40
645 match dl_dst 00:11:22:33:00:34
646 match dl_vlan 52
647 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0
648 action type OUTPUT, len 8, port 1
649 length 96, table_id 40
650 match dl_dst 00:11:22:33:00:35
651 match dl_vlan 53
652 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0
653 action type OUTPUT, len 8, port 1
654 length 96, table_id 40
655 match dl_dst 00:11:22:33:00:36
656 match dl_vlan 54
657 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0
658 action type OUTPUT, len 8, port 1
659 length 96, table_id 40
660 match dl_dst 00:11:22:33:00:37
661 match dl_vlan 55
662 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0
663 action type OUTPUT, len 8, port 1
664 length 96, table_id 40
665 match dl_dst 00:11:22:33:00:38
666 match dl_vlan 56
667 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0, byte_count 0
668 action type OUTPUT, len 8, port 1
669 length 96, table_id 40
670 match dl_dst 00:11:22:33:00:39
671 match dl_vlan 57
672 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000026, packet_count 0, byte_count 0
673 action type OUTPUT, len 8, port 1
674 length 96, table_id 40
675 match dl_src 00:11:22:33:00:0a
676 match dl_dst 00:11:22:33:00:14
677 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000027, packet_count 0, byte_count 0
678 action type OUTPUT, len 8, port 1
679 IP (tos 0x0, ttl 64, id 53109, offset 0, flags [DF], proto TCP (6), length 52)
680 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xe405), seq 4641, ack 4961, win 220, options [nop,nop,TS val 47837000 ecr 2], length 0
681 IP (tos 0x0, ttl 64, id 53579, offset 0, flags [DF], proto TCP (6), length 832)
682 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6f3d (correct), seq 4961:5741, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 780: OpenFlow
683 version 1.0, type STATS_REPLY, length 780, xid 0x00000039
684 type FLOW, flags 0x0000
685 length 96, table_id 40
686 match dl_src 00:11:22:33:00:0a
687 match dl_dst 00:11:22:33:00:15
688 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000028, packet_count 0, byte_count 0
689 action type OUTPUT, len 8, port 1
690 length 96, table_id 40
691 match dl_src 00:11:22:33:00:0a
692 match dl_dst 00:11:22:33:00:16
693 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000029, packet_count 0, byte_count 0
694 action type OUTPUT, len 8, port 1
695 length 96, table_id 40
696 match dl_src 00:11:22:33:00:0b
697 match dl_dst 00:11:22:33:00:14
698 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002a, packet_count 0, byte_count 0
699 action type OUTPUT, len 8, port 1
700 length 96, table_id 40
701 match dl_src 00:11:22:33:00:0b
702 match dl_dst 00:11:22:33:00:15
703 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002b, packet_count 0, byte_count 0
704 action type OUTPUT, len 8, port 1
705 length 96, table_id 40
706 match dl_src 00:11:22:33:00:0b
707 match dl_dst 00:11:22:33:00:16
708 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002c, packet_count 0, byte_count 0
709 action type OUTPUT, len 8, port 1
710 length 96, table_id 40
711 match dl_src 00:11:22:33:00:0c
712 match dl_dst 00:11:22:33:00:14
713 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002d, packet_count 0, byte_count 0
714 action type OUTPUT, len 8, port 1
715 length 96, table_id 40
716 match dl_src 00:11:22:33:00:0c
717 match dl_dst 00:11:22:33:00:15
718 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002e, packet_count 0, byte_count 0
719 action type OUTPUT, len 8, port 1
720 length 96, table_id 40
721 match dl_src 00:11:22:33:00:0c
722 match dl_dst 00:11:22:33:00:16
723 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002f, packet_count 0, byte_count 0
724 action type OUTPUT, len 8, port 1
725 IP (tos 0x0, ttl 64, id 53580, offset 0, flags [DF], proto TCP (6), length 976)
726 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0dbb (correct), seq 5741:6665, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 924: OpenFlow
727 version 1.0, type STATS_REPLY, length 924, xid 0x0000003a
728 type FLOW, flags 0x0001 (MORE)
729 length 96, table_id 0
730 match in_port 1
731 duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
732 action type OUTPUT, len 8, port CONTROLLER, max_len 65535
733 length 96, table_id 0
734 match in_port 1
735 duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
736 action type SET_VLAN_VID, len 8, vlan_vid 2
737 length 96, table_id 0
738 match in_port 1
739 duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
740 action type SET_VLAN_PCP, len 8, vlan_pcp 5
741 length 104, table_id 0
742 match in_port 1
743 duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
744 action type SET_VLAN_VID, len 8, vlan_vid 2
745 action type SET_VLAN_PCP, len 8, vlan_pcp 5
746 length 104, table_id 0
747 match in_port 1
748 duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
749 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
750 length 104, table_id 0
751 match in_port 1
752 duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
753 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
754 length 120, table_id 0
755 match in_port 1
756 duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
757 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
758 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
759 length 96, table_id 0
760 match in_port 1
761 match dl_src 00:00:00:00:00:01
762 duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
763 action type OUTPUT, len 8, port 2
764 length 96, table_id 0
765 match in_port 1
766 duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0
767 action type SET_NW_TOS, len 8, nw_tos 0x28
768 IP (tos 0x0, ttl 64, id 53110, offset 0, flags [DF], proto TCP (6), length 52)
769 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xdd38), seq 4641, ack 6665, win 257, options [nop,nop,TS val 47837000 ecr 2], length 0
770 IP (tos 0x0, ttl 64, id 53581, offset 0, flags [DF], proto TCP (6), length 1500)
771 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x2501 (correct), seq 6665:8113, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 1448: OpenFlow
772 version 1.0, type STATS_REPLY, length 972, xid 0x0000003a
773 type FLOW, flags 0x0001 (MORE)
774 length 96, table_id 0
775 match dl_vlan 100
776 match dl_vlan_pcp 4
777 match dl_type 0x0800
778 duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0
779 action type OUTPUT, len 8, port 2
780 length 96, table_id 0
781 match dl_type 0x0800
782 match nw_src 10.11.12.0/24
783 match nw_dst 10.13.14.0/24
784 duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0
785 action type OUTPUT, len 8, port 2
786 length 96, table_id 0
787 match dl_type 0x0800
788 match nw_proto 17
789 match tp_src 68
790 match tp_dst 67
791 duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0
792 action type OUTPUT, len 8, port 2
793 length 96, table_id 0
794 match dl_type 0x0800
795 match nw_proto 1
796 match icmp_type 8
797 duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0
798 action type OUTPUT, len 8, port 2
799 length 96, table_id 0
800 match dl_type 0x0800
801 match nw_proto 1
802 match icmp_type 3
803 match icmp_code 13
804 duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0
805 action type OUTPUT, len 8, port 2
806 length 96, table_id 0
807 match dl_src aa:00:00:00:00:11
808 match dl_dst bb:00:00:00:00:22
809 duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0
810 action type OUTPUT, len 8, port 2
811 length 96, table_id 0
812 match dl_type 0x0800
813 match nw_tos 0x24
814 duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0
815 action type OUTPUT, len 8, port 2
816 length 96, table_id 0
817 match dl_type 0x0800
818 match nw_proto 6
819 match tp_src 80
820 match tp_dst 80
821 duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0
822 action type OUTPUT, len 8, port 2
823 length 96, table_id 0
824 match dl_dst 00:11:22:33:00:32
825 match dl_vlan 50
826 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0
827 action type OUTPUT, len 8, port 1
828 length 96, table_id 0
829 match dl_dst 00:11:22:33:00:33
830 match dl_vlan 51
831 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0
832 action type OUTPUT, len 8, port 1
833 version 1.0, type STATS_REPLY, length 972, xid 0x0000003a
834 type FLOW, flags 0x0001 (MORE)
835 length 96, table_id 0
836 match dl_dst 00:11:22:33:00:34
837 match dl_vlan 52
838 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0
839 action type OUTPUT, len 8, port 1
840 length 96, table_id 0
841 match dl_dst 00:11:22:33:00:35
842 match dl_vlan 53
843 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0
844 action type OUTPUT, len 8, port 1
845 length 96, table_id 0
846 match dl_dst 00:11:22:33:00:36
847 match dl_vlan 54
848 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0
849 action type OUTPUT, len 8, port 1
850 length 96, table_id 0
851 match dl_dst 00:11:22:33:00:37
852 match dl_vlan 55
853 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0
854 action type OUTPUT, len 8, port 1
855 length 96, table_id 0
856 match dl_dst 00:11:22:33:00:38
857 match dl_vlan 56
858 duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0 [|openflow]
859 IP (tos 0x0, ttl 64, id 53582, offset 0, flags [DF], proto TCP (6), length 1040)
860 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x395e (correct), seq 8113:9101, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 988: OpenFlow
861 version unknown (0x00), type 0x00, length 0, xid 0x00000000 (invalid)
862 IP (tos 0x0, ttl 64, id 53111, offset 0, flags [DF], proto TCP (6), length 52)
863 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xd387), seq 4641, ack 9101, win 302, options [nop,nop,TS val 47837000 ecr 2], length 0
864 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
865 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xd0aa (correct), seq 9101, ack 4641, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 0
866 IP (tos 0x0, ttl 64, id 53602, offset 0, flags [DF], proto TCP (6), length 1120)
867 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x141f (correct), seq 9101:10169, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 1068: OpenFlow
868 version 1.0, type STATS_REPLY, length 1068, xid 0x0000003d
869 type DESC, flags 0x0000
870 mfr_desc 'Dell Force 10'
871 hw_desc 'OpenFlow switch HW ver. 1.0'
872 sw_desc 'OpenFlow switch SW ver. 1.0'
873 serial_num '02132012'
874 dp_desc 'Dell-Switch: 00:01:e8:8a:e0:e2; instance: 1'
875 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
876 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcb12 (correct), seq 10169:10177, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 8: OpenFlow
877 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000040
878 IP (tos 0x0, ttl 64, id 53603, offset 0, flags [DF], proto TCP (6), length 88)
879 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcaa5 (correct), seq 10177:10213, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 36: OpenFlow
880 version 1.0, type STATS_REPLY, length 36, xid 0x0000003e
881 type AGGREGATE, flags 0x0000
882 packet_count 0, byte_count 0, flow_count 47
883 IP (tos 0x0, ttl 64, id 53604, offset 0, flags [DF], proto TCP (6), length 189)
884 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x03e7 (correct), seq 10213:10350, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 137: OpenFlow
885 version 1.0, type PACKET_IN, length 137, xid 0x00000000
886 buffer_id NONE, total_len 119, in_port 1, reason ACTION
887 data (119 octets), frame decoding below
888 STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102
889 port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0
890 CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034,
891 message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s
892 v3len 64, MCID Name pica8, rev 0,
893 digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0,
894 CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20
895 IP (tos 0x0, ttl 64, id 53605, offset 0, flags [DF], proto TCP (6), length 168)
896 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x4a03 (correct), seq 10350:10466, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow
897 version 1.0, type STATS_REPLY, length 116, xid 0x0000003f
898 type PORT, flags 0x0001 (MORE)
899 port_no 1, rx_packets 129437, tx_packets 8061, rx_bytes 16090662, tx_bytes 515904, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0
900 IP (tos 0x0, ttl 64, id 53606, offset 0, flags [DF], proto TCP (6), length 168)
901 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc90e (correct), seq 10466:10582, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow
902 version 1.0, type STATS_REPLY, length 116, xid 0x0000003f
903 type PORT, flags 0x0000
904 port_no 2, rx_packets 0, tx_packets 0, rx_bytes 0, tx_bytes 0, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0
905 IP (tos 0x0, ttl 64, id 53112, offset 0, flags [DF], proto TCP (6), length 52)
906 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xcccd), seq 4641, ack 10582, win 331, options [nop,nop,TS val 47837211 ecr 3], length 0
907 IP (tos 0x0, ttl 64, id 53113, offset 0, flags [DF], proto TCP (6), length 132)
908 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14db (incorrect -> 0xc93e), seq 4641:4721, ack 10582, win 331, options [nop,nop,TS val 47837212 ecr 3], length 80: OpenFlow
909 version 1.0, type FLOW_MOD, length 72, xid 0x00000041
910 cookie 0x0000000000000000, command DELETE, priority 65535, out_port NONE, flags 0x0001 (SEND_FLOW_REM)
911 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000042
912 IP (tos 0x0, ttl 64, id 53707, offset 0, flags [DF], proto TCP (6), length 140)
913 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc92c (correct), seq 10582:10670, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
914 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001a
915 match dl_dst 00:01:e8:8a:e0:e4
916 match dl_type 0x0800
917 match nw_dst 10.21.0.0/16
918 cookie 0x0000000000000012, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
919 IP (tos 0x0, ttl 64, id 53708, offset 0, flags [DF], proto TCP (6), length 140)
920 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc8d1 (correct), seq 10670:10758, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
921 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001b
922 match dl_dst 00:01:e8:8a:e0:e4
923 match dl_type 0x0800
924 match nw_dst 10.22.0.0/16
925 cookie 0x0000000000000013, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
926 IP (tos 0x0, ttl 64, id 53709, offset 0, flags [DF], proto TCP (6), length 140)
927 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc876 (correct), seq 10758:10846, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
928 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001c
929 match dl_dst 00:01:e8:8a:e0:e4
930 match dl_type 0x0800
931 match nw_dst 10.23.0.0/16
932 cookie 0x0000000000000014, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
933 IP (tos 0x0, ttl 64, id 53710, offset 0, flags [DF], proto TCP (6), length 140)
934 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc81b (correct), seq 10846:10934, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
935 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001d
936 match dl_dst 00:01:e8:8a:e0:e4
937 match dl_type 0x0800
938 match nw_dst 10.24.0.0/16
939 cookie 0x0000000000000015, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
940 IP (tos 0x0, ttl 64, id 53711, offset 0, flags [DF], proto TCP (6), length 140)
941 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc7c7 (correct), seq 10934:11022, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
942 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001e
943 match dl_dst 00:01:e8:8a:e0:e4
944 match dl_type 0x0800
945 match nw_dst 10.20.0.0/24
946 cookie 0x0000000000000016, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
947 IP (tos 0x0, ttl 64, id 53712, offset 0, flags [DF], proto TCP (6), length 140)
948 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc66d (correct), seq 11022:11110, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
949 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001f
950 match dl_dst 00:01:e8:8a:e0:e4
951 match dl_type 0x0800
952 match nw_dst 10.20.1.0/24
953 cookie 0x0000000000000017, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
954 IP (tos 0x0, ttl 64, id 53713, offset 0, flags [DF], proto TCP (6), length 140)
955 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc513 (correct), seq 11110:11198, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
956 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000020
957 match dl_dst 00:01:e8:8a:e0:e4
958 match dl_type 0x0800
959 match nw_dst 10.20.2.0/24
960 cookie 0x0000000000000018, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
961 IP (tos 0x0, ttl 64, id 53714, offset 0, flags [DF], proto TCP (6), length 140)
962 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc3b9 (correct), seq 11198:11286, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
963 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000021
964 match dl_dst 00:01:e8:8a:e0:e4
965 match dl_type 0x0800
966 match nw_dst 10.20.3.0/24
967 cookie 0x0000000000000019, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
968 IP (tos 0x0, ttl 64, id 53114, offset 0, flags [DF], proto TCP (6), length 52)
969 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc900), seq 4721, ack 11286, win 331, options [nop,nop,TS val 47837400 ecr 3], length 0
970 IP (tos 0x0, ttl 64, id 53715, offset 0, flags [DF], proto TCP (6), length 140)
971 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc25f (correct), seq 11286:11374, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
972 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000022
973 match dl_dst 00:01:e8:8a:e0:e4
974 match dl_type 0x0800
975 match nw_dst 10.20.4.0/24
976 cookie 0x000000000000001a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
977 IP (tos 0x0, ttl 64, id 53716, offset 0, flags [DF], proto TCP (6), length 140)
978 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc105 (correct), seq 11374:11462, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
979 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000023
980 match dl_dst 00:01:e8:8a:e0:e4
981 match dl_type 0x0800
982 match nw_dst 10.20.5.0/24
983 cookie 0x000000000000001b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
984 IP (tos 0x0, ttl 64, id 53717, offset 0, flags [DF], proto TCP (6), length 140)
985 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbfab (correct), seq 11462:11550, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
986 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000024
987 match dl_dst 00:01:e8:8a:e0:e4
988 match dl_type 0x0800
989 match nw_dst 10.20.6.0/24
990 cookie 0x000000000000001c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
991 IP (tos 0x0, ttl 64, id 53718, offset 0, flags [DF], proto TCP (6), length 140)
992 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbe51 (correct), seq 11550:11638, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
993 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000025
994 match dl_dst 00:01:e8:8a:e0:e4
995 match dl_type 0x0800
996 match nw_dst 10.20.7.0/24
997 cookie 0x000000000000001d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
998 IP (tos 0x0, ttl 64, id 53719, offset 0, flags [DF], proto TCP (6), length 140)
999 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcf05 (correct), seq 11638:11726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
1000 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000026
1001 match dl_dst 00:01:e8:8a:e0:e4
1002 match dl_type 0x0800
1003 cookie 0x000000000000001e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1004 IP (tos 0x0, ttl 64, id 53720, offset 0, flags [DF], proto TCP (6), length 140)
1005 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x37c4 (correct), seq 11726:11814, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1006 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000009
1007 match in_port 1
1008 cookie 0x0000000000000001, priority 35000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1009 IP (tos 0x0, ttl 64, id 53721, offset 0, flags [DF], proto TCP (6), length 140)
1010 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x376b (correct), seq 11814:11902, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1011 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000a
1012 match in_port 1
1013 cookie 0x0000000000000002, priority 34999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1014 IP (tos 0x0, ttl 64, id 53115, offset 0, flags [DF], proto TCP (6), length 52)
1015 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc697), seq 4721, ack 11902, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
1016 IP (tos 0x0, ttl 64, id 53722, offset 0, flags [DF], proto TCP (6), length 140)
1017 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3712 (correct), seq 11902:11990, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1018 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000b
1019 match in_port 1
1020 cookie 0x0000000000000003, priority 34998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1021 IP (tos 0x0, ttl 64, id 53723, offset 0, flags [DF], proto TCP (6), length 140)
1022 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x36b9 (correct), seq 11990:12078, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1023 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000c
1024 match in_port 1
1025 cookie 0x0000000000000004, priority 34997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1026 IP (tos 0x0, ttl 64, id 53724, offset 0, flags [DF], proto TCP (6), length 140)
1027 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3660 (correct), seq 12078:12166, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1028 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000d
1029 match in_port 1
1030 cookie 0x0000000000000005, priority 34996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1031 IP (tos 0x0, ttl 64, id 53725, offset 0, flags [DF], proto TCP (6), length 140)
1032 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3607 (correct), seq 12166:12254, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1033 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000e
1034 match in_port 1
1035 cookie 0x0000000000000006, priority 34995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1036 IP (tos 0x0, ttl 64, id 53726, offset 0, flags [DF], proto TCP (6), length 140)
1037 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x35ae (correct), seq 12254:12342, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
1038 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000f
1039 match in_port 1
1040 cookie 0x0000000000000007, priority 34994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1041 IP (tos 0x0, ttl 64, id 53727, offset 0, flags [DF], proto TCP (6), length 140)
1042 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3938 (correct), seq 12342:12430, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1043 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000010
1044 match in_port 1
1045 match dl_src 00:00:00:00:00:01
1046 cookie 0x0000000000000008, priority 34000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1047 IP (tos 0x0, ttl 64, id 53728, offset 0, flags [DF], proto TCP (6), length 140)
1048 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3cc3 (correct), seq 12430:12518, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1049 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000011
1050 match in_port 1
1051 cookie 0x0000000000000009, priority 33000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1052 IP (tos 0x0, ttl 64, id 53116, offset 0, flags [DF], proto TCP (6), length 52)
1053 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc42f), seq 4721, ack 12518, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
1054 IP (tos 0x0, ttl 64, id 53729, offset 0, flags [DF], proto TCP (6), length 140)
1055 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1317 (correct), seq 12518:12606, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1056 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000012
1057 match dl_vlan 100
1058 match dl_vlan_pcp 4
1059 match dl_type 0x0800
1060 cookie 0x000000000000000a, priority 32000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1061 IP (tos 0x0, ttl 64, id 53730, offset 0, flags [DF], proto TCP (6), length 140)
1062 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x00fe (correct), seq 12606:12694, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1063 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000013
1064 match dl_type 0x0800
1065 match nw_src 10.11.12.0/24
1066 match nw_dst 10.13.14.0/24
1067 cookie 0x000000000000000b, priority 31999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1068 IP (tos 0x0, ttl 64, id 53731, offset 0, flags [DF], proto TCP (6), length 140)
1069 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16ff (correct), seq 12694:12782, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1070 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000014
1071 match dl_type 0x0800
1072 match nw_proto 17
1073 match tp_src 68
1074 match tp_dst 67
1075 cookie 0x000000000000000c, priority 31998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1076 IP (tos 0x0, ttl 64, id 53732, offset 0, flags [DF], proto TCP (6), length 140)
1077 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16b5 (correct), seq 12782:12870, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1078 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000015
1079 match dl_type 0x0800
1080 match nw_proto 1
1081 match icmp_type 8
1082 cookie 0x000000000000000d, priority 31997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1083 IP (tos 0x0, ttl 64, id 53733, offset 0, flags [DF], proto TCP (6), length 140)
1084 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16d4 (correct), seq 12870:12958, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1085 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000016
1086 match dl_type 0x0800
1087 match nw_proto 1
1088 match icmp_type 3
1089 match icmp_code 13
1090 cookie 0x000000000000000e, priority 31996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1091 IP (tos 0x0, ttl 64, id 53117, offset 0, flags [DF], proto TCP (6), length 52)
1092 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc37f), seq 4721, ack 12694, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
1093 IP (tos 0x0, ttl 64, id 53734, offset 0, flags [DF], proto TCP (6), length 140)
1094 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xd96b (correct), seq 12958:13046, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1095 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000017
1096 match dl_src aa:00:00:00:00:11
1097 match dl_dst bb:00:00:00:00:22
1098 cookie 0x000000000000000f, priority 31995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1099 IP (tos 0x0, ttl 64, id 53735, offset 0, flags [DF], proto TCP (6), length 140)
1100 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf172 (correct), seq 13046:13134, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1101 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000018
1102 match dl_type 0x0800
1103 match nw_tos 0x24
1104 cookie 0x0000000000000010, priority 31994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1105 IP (tos 0x0, ttl 64, id 53736, offset 0, flags [DF], proto TCP (6), length 140)
1106 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1534 (correct), seq 13134:13222, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1107 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000019
1108 match dl_type 0x0800
1109 match nw_proto 6
1110 match tp_src 80
1111 match tp_dst 80
1112 cookie 0x0000000000000011, priority 31993, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1113 IP (tos 0x0, ttl 64, id 53118, offset 0, flags [DF], proto TCP (6), length 52)
1114 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc16f), seq 4721, ack 13222, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
1115 IP (tos 0x0, ttl 64, id 53737, offset 0, flags [DF], proto TCP (6), length 140)
1116 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x97c9 (correct), seq 13222:13310, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1117 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000027
1118 match dl_dst 00:11:22:33:00:32
1119 match dl_vlan 50
1120 cookie 0x000000000000001f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1121 IP (tos 0x0, ttl 64, id 53738, offset 0, flags [DF], proto TCP (6), length 140)
1122 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x976d (correct), seq 13310:13398, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1123 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000028
1124 match dl_dst 00:11:22:33:00:33
1125 match dl_vlan 51
1126 cookie 0x0000000000000020, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1127 IP (tos 0x0, ttl 64, id 53739, offset 0, flags [DF], proto TCP (6), length 140)
1128 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9711 (correct), seq 13398:13486, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1129 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000029
1130 match dl_dst 00:11:22:33:00:34
1131 match dl_vlan 52
1132 cookie 0x0000000000000021, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1133 IP (tos 0x0, ttl 64, id 53740, offset 0, flags [DF], proto TCP (6), length 140)
1134 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x96b5 (correct), seq 13486:13574, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1135 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002a
1136 match dl_dst 00:11:22:33:00:35
1137 match dl_vlan 53
1138 cookie 0x0000000000000022, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1139 IP (tos 0x0, ttl 64, id 53741, offset 0, flags [DF], proto TCP (6), length 140)
1140 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9659 (correct), seq 13574:13662, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1141 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002b
1142 match dl_dst 00:11:22:33:00:36
1143 match dl_vlan 54
1144 cookie 0x0000000000000023, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1145 IP (tos 0x0, ttl 64, id 53742, offset 0, flags [DF], proto TCP (6), length 140)
1146 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95fd (correct), seq 13662:13750, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1147 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002c
1148 match dl_dst 00:11:22:33:00:37
1149 match dl_vlan 55
1150 cookie 0x0000000000000024, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1151 IP (tos 0x0, ttl 64, id 53743, offset 0, flags [DF], proto TCP (6), length 140)
1152 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95a1 (correct), seq 13750:13838, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1153 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002d
1154 match dl_dst 00:11:22:33:00:38
1155 match dl_vlan 56
1156 cookie 0x0000000000000025, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1157 IP (tos 0x0, ttl 64, id 53119, offset 0, flags [DF], proto TCP (6), length 52)
1158 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbf07), seq 4721, ack 13838, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
1159 IP (tos 0x0, ttl 64, id 53744, offset 0, flags [DF], proto TCP (6), length 140)
1160 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9545 (correct), seq 13838:13926, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1161 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002e
1162 match dl_dst 00:11:22:33:00:39
1163 match dl_vlan 57
1164 cookie 0x0000000000000026, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1165 IP (tos 0x0, ttl 64, id 53745, offset 0, flags [DF], proto TCP (6), length 140)
1166 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72fd (correct), seq 13926:14014, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1167 version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002f
1168 match dl_src 00:11:22:33:00:0a
1169 match dl_dst 00:11:22:33:00:14
1170 cookie 0x0000000000000027, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1171 IP (tos 0x0, ttl 64, id 53746, offset 0, flags [DF], proto TCP (6), length 140)
1172 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72a2 (correct), seq 14014:14102, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1173 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000030
1174 match dl_src 00:11:22:33:00:0a
1175 match dl_dst 00:11:22:33:00:15
1176 cookie 0x0000000000000028, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1177 IP (tos 0x0, ttl 64, id 53747, offset 0, flags [DF], proto TCP (6), length 140)
1178 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7247 (correct), seq 14102:14190, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1179 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000031
1180 match dl_src 00:11:22:33:00:0a
1181 match dl_dst 00:11:22:33:00:16
1182 cookie 0x0000000000000029, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1183 IP (tos 0x0, ttl 64, id 53748, offset 0, flags [DF], proto TCP (6), length 140)
1184 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x71ee (correct), seq 14190:14278, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1185 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000032
1186 match dl_src 00:11:22:33:00:0b
1187 match dl_dst 00:11:22:33:00:14
1188 cookie 0x000000000000002a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1189 IP (tos 0x0, ttl 64, id 53120, offset 0, flags [DF], proto TCP (6), length 52)
1190 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbd4e), seq 4721, ack 14278, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0
1191 IP (tos 0x0, ttl 64, id 53749, offset 0, flags [DF], proto TCP (6), length 140)
1192 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7193 (correct), seq 14278:14366, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1193 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000033
1194 match dl_src 00:11:22:33:00:0b
1195 match dl_dst 00:11:22:33:00:15
1196 cookie 0x000000000000002b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1197 IP (tos 0x0, ttl 64, id 53750, offset 0, flags [DF], proto TCP (6), length 140)
1198 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7138 (correct), seq 14366:14454, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1199 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000034
1200 match dl_src 00:11:22:33:00:0b
1201 match dl_dst 00:11:22:33:00:16
1202 cookie 0x000000000000002c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1203 IP (tos 0x0, ttl 64, id 53751, offset 0, flags [DF], proto TCP (6), length 140)
1204 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x70df (correct), seq 14454:14542, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1205 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000035
1206 match dl_src 00:11:22:33:00:0c
1207 match dl_dst 00:11:22:33:00:14
1208 cookie 0x000000000000002d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1209 IP (tos 0x0, ttl 64, id 53752, offset 0, flags [DF], proto TCP (6), length 140)
1210 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7084 (correct), seq 14542:14630, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
1211 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000036
1212 match dl_src 00:11:22:33:00:0c
1213 match dl_dst 00:11:22:33:00:15
1214 cookie 0x000000000000002e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1215 IP (tos 0x0, ttl 64, id 53753, offset 0, flags [DF], proto TCP (6), length 140)
1216 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7028 (correct), seq 14630:14718, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 88: OpenFlow
1217 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000037
1218 match dl_src 00:11:22:33:00:0c
1219 match dl_dst 00:11:22:33:00:16
1220 cookie 0x000000000000002f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
1221 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1222 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb769 (correct), seq 14718:14726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow
1223 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000042
1224 IP (tos 0x0, ttl 64, id 53121, offset 0, flags [DF], proto TCP (6), length 52)
1225 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbb8e), seq 4721, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0
1226 IP (tos 0x0, ttl 64, id 53122, offset 0, flags [DF], proto TCP (6), length 60)
1227 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xba21), seq 4721:4729, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 8: OpenFlow
1228 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000043
1229 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1230 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb758 (correct), seq 14726:14734, ack 4729, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow
1231 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000043
1232 IP (tos 0x0, ttl 64, id 53123, offset 0, flags [DF], proto TCP (6), length 144)
1233 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14e7 (incorrect -> 0x2671), seq 4729:4821, ack 14734, win 331, options [nop,nop,TS val 47837403 ecr 3], length 92: OpenFlow
1234 version 1.0, type PACKET_OUT, length 84, xid 0x00000044
1235 buffer_id 0xffffffff, in_port CONTROLLER
1236 action type OUTPUT, len 8, port 1
1237 data (60 octets), frame decoding below
1238 67:68:00:00:00:00 > 61:62:63:64:65:66 Null Information, send seq 0, rcv seq 0, Flags [Command], length 46
1239 0x0000: 0000 0000 0000 0000 0000 0000 0000 0000 ................
1240 0x0010: 0000 0000 0000 0000 0000 0000 0000 0000 ................
1241 0x0020: 0000 0000 0000 0000 0000 0000 0000 0112 ................
1242 0x0030: 0008 0000 0045 .....E
1243 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000045
1244 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1245 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6f1 (correct), seq 14734:14742, ack 4821, win 1035, options [nop,nop,TS val 3 ecr 47837403], length 8: OpenFlow
1246 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000045
1247 IP (tos 0x0, ttl 64, id 53124, offset 0, flags [DF], proto TCP (6), length 60)
1248 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb9a7), seq 4821:4829, ack 14742, win 331, options [nop,nop,TS val 47837405 ecr 3], length 8: OpenFlow
1249 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000046
1250 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1251 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6de (correct), seq 14742:14750, ack 4829, win 1035, options [nop,nop,TS val 3 ecr 47837405], length 8: OpenFlow
1252 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000046
1253 IP (tos 0x0, ttl 64, id 53125, offset 0, flags [DF], proto TCP (6), length 60)
1254 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb995), seq 4829:4837, ack 14750, win 331, options [nop,nop,TS val 47837406 ecr 3], length 8: OpenFlow
1255 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000047
1256 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1257 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6cc (correct), seq 14750:14758, ack 4837, win 1035, options [nop,nop,TS val 3 ecr 47837406], length 8: OpenFlow
1258 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000047
1259 IP (tos 0x0, ttl 64, id 53126, offset 0, flags [DF], proto TCP (6), length 72)
1260 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x149f (incorrect -> 0xb819), seq 4837:4857, ack 14758, win 331, options [nop,nop,TS val 47837407 ecr 3], length 20: OpenFlow
1261 version 1.0, type SET_CONFIG, length 12, xid 0x00000048
1262 flags FRAG_NORMAL, miss_send_len 65535
1263 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000049
1264 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1265 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6ad (correct), seq 14758:14766, ack 4857, win 1035, options [nop,nop,TS val 3 ecr 47837407], length 8: OpenFlow
1266 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000049
1267 IP (tos 0x0, ttl 64, id 53127, offset 0, flags [DF], proto TCP (6), length 52)
1268 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbab1), seq 4857, ack 14766, win 331, options [nop,nop,TS val 47837447 ecr 3], length 0
1269 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
1270 10.0.0.81.55442 > 10.0.0.20.6633: Flags [S], cksum 0xb924 (correct), seq 553833795, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0
1271 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1272 10.0.0.20.6633 > 10.0.0.81.55442: Flags [S.], cksum 0x1493 (incorrect -> 0x6111), seq 845973340, ack 553833796, win 14480, options [mss 1460,sackOK,TS val 47838340 ecr 1,nop,wscale 7], length 0
1273 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1274 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc462 (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 0
1275 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
1276 10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x3724 (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 8: OpenFlow
1277 version 1.0, type HELLO, length 8, xid 0x95e1f644
1278 IP (tos 0x0, ttl 64, id 29656, offset 0, flags [DF], proto TCP (6), length 52)
1279 10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0x148b (incorrect -> 0xc7f2), seq 1, ack 9, win 114, options [nop,nop,TS val 47838341 ecr 1], length 0
1280 IP (tos 0x0, ttl 64, id 29657, offset 0, flags [DF], proto TCP (6), length 60)
1281 10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6d3), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47838347 ecr 1], length 8: OpenFlow
1282 version 1.0, type HELLO, length 8, xid 0x00000001
1283 IP (tos 0x0, ttl 64, id 29658, offset 0, flags [DF], proto TCP (6), length 60)
1284 10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6c4), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47838348 ecr 1], length 8: OpenFlow
1285 version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
1286 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1287 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc444 (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47838347], length 0
1288 IP (tos 0x0, ttl 64, id 53761, offset 0, flags [DF], proto TCP (6), length 180)
1289 10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x1df1 (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47838347], length 128: OpenFlow
1290 version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002
1291 dpid 0x00050001e88ae0e2, n_buffers 0, n_tables 6
1292 capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
1293 actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
1294 port_no 13, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/12'
1295 config 0x00000001 (PORT_DOWN)
1296 state 0x00000001 (LINK_DOWN)
1297 curr 0x00000300 (FIBER, AUTONEG)
1298 advertised 0x00000300 (FIBER, AUTONEG)
1299 supported 0x00000300 (FIBER, AUTONEG)
1300 peer 0x00000000
1301 port_no 16, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/15'
1302 config 0x00008001 (PORT_DOWN) (bogus)
1303 state 0x00000001 (LINK_DOWN)
1304 curr 0x00000300 (FIBER, AUTONEG)
1305 advertised 0x00000300 (FIBER, AUTONEG)
1306 supported 0x00000300 (FIBER, AUTONEG)
1307 peer 0x00000000
1308 IP (tos 0x0, ttl 64, id 29659, offset 0, flags [DF], proto TCP (6), length 52)
1309 10.0.0.20.6633 > 10.0.0.81.55442: Flags [F.], cksum 0x148b (incorrect -> 0xc74d), seq 17, ack 137, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0
1310 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1311 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc3bc (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0
1312 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1313 10.0.0.81.55442 > 10.0.0.20.6633: Flags [F.], cksum 0xc3bb (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0
1314 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1315 10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0xc74c (correct), seq 18, ack 138, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0
1316 IP (tos 0x0, ttl 64, id 53775, offset 0, flags [DF], proto TCP (6), length 189)
1317 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf083 (correct), seq 14766:14903, ack 4857, win 1035, options [nop,nop,TS val 6 ecr 47837447], length 137: OpenFlow
1318 version 1.0, type PACKET_IN, length 137, xid 0x00000000
1319 buffer_id NONE, total_len 119, in_port 1, reason NO_MATCH
1320 data (119 octets), frame decoding below
1321 STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102
1322 port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0
1323 CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034,
1324 message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s
1325 v3len 64, MCID Name pica8, rev 0,
1326 digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0,
1327 CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20
1328 IP (tos 0x0, ttl 64, id 53128, offset 0, flags [DF], proto TCP (6), length 52)
1329 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xb3e0), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47839052 ecr 6], length 0
1330 IP (tos 0x0, ttl 64, id 53129, offset 0, flags [DF], proto TCP (6), length 52)
1331 10.0.0.20.6633 > 10.0.0.81.56068: Flags [F.], cksum 0x148b (incorrect -> 0xac31), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47841018 ecr 6], length 0
1332 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1333 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xa96d (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0
1334 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1335 10.0.0.81.56068 > 10.0.0.20.6633: Flags [F.], cksum 0xa96c (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0
1336 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
1337 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0xac2b (correct), seq 4858, ack 14904, win 331, options [nop,nop,TS val 47841019 ecr 10], length 0