]> The Tcpdump Group git mirrors - tcpdump/blob - tests/of10_pf5240-vv.out
rt6: parse TLV
[tcpdump] / tests / of10_pf5240-vv.out
1 1 12:21:09.940811 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60)
2 172.16.1.101.62224 > 172.16.1.51.6633: Flags [S], cksum 0x6dd0 (correct), seq 2446711727, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
3 2 12:21:09.940894 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
4 172.16.1.51.6633 > 172.16.1.101.62224: Flags [R.], cksum 0xda97 (correct), seq 0, ack 2446711728, win 0, length 0
5 3 12:21:13.928916 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60)
6 172.16.1.101.62221 > 172.16.1.51.6633: Flags [S], cksum 0xa14c (correct), seq 2619186670, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
7 4 12:21:13.929013 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
8 172.16.1.51.6633 > 172.16.1.101.62221: Flags [S.], cksum 0x5ae7 (incorrect -> 0x3c7c), seq 3998019188, ack 2619186671, win 14480, options [mss 1460,nop,nop,TS val 2256457959 ecr 0,nop,wscale 7], length 0
9 5 12:21:13.930368 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52)
10 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x956f (correct), seq 1, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 0
11 6 12:21:13.930613 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60)
12 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xb6f9 (correct), seq 1:9, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 8: OpenFlow
13 version 1.0, type HELLO, length 8, xid 0x000cdd51
14 7 12:21:13.930635 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52)
15 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0xa05b), seq 1, ack 9, win 114, options [nop,nop,TS val 2256457961 ecr 0], length 0
16 8 12:21:13.955911 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60)
17 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f29), seq 1:9, ack 9, win 114, options [nop,nop,TS val 2256457986 ecr 0], length 8: OpenFlow
18 version 1.0, type HELLO, length 8, xid 0x00000001
19 9 12:21:13.963832 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60)
20 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f13), seq 9:17, ack 9, win 114, options [nop,nop,TS val 2256457994 ecr 0], length 8: OpenFlow
21 version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
22 10 12:21:13.964871 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52)
23 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x9544 (correct), seq 9, ack 17, win 2912, options [nop,nop,TS val 0 ecr 2256457986], length 0
24 11 12:21:13.972093 IP (tos 0xa0, ttl 64, id 10679, offset 0, flags [DF], proto TCP (6), length 468)
25 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xcacf (correct), seq 9:425, ack 17, win 2920, options [nop,nop,TS val 0 ecr 2256457986], length 416: OpenFlow
26 version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
27 dpid 0x000100255cab0c07, n_buffers 544, n_tables 11
28 capabilities 0x00000087 (FLOW_STATS, TABLE_STATS, PORT_STATS, ARP_MATCH_IP)
29 actions 0x00000fff (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, STRIP_VLAN, SET_DL_SRC, SET_DL_DST, SET_NW_SRC, SET_NW_DST, SET_NW_TOS, SET_TP_SRC, SET_TP_DST, ENQUEUE)
30 port_no 1, hw_addr 00:25:5c:ab:0c:87, name 'GBE0/1'
31 config 0x00000002 (NO_STP)
32 state 0x00000200 (STP_FORWARD)
33 curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
34 advertised 0x00000000
35 supported 0x00000000
36 peer 0x00000000
37 port_no 2, hw_addr 00:25:5c:ab:0c:47, name 'GBE0/2'
38 config 0x00000002 (NO_STP)
39 state 0x00000200 (STP_FORWARD)
40 curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
41 advertised 0x00000000
42 supported 0x00000000
43 peer 0x00000000
44 port_no 3, hw_addr 00:25:5c:ab:0c:c7, name 'GBE0/3'
45 config 0x00000002 (NO_STP)
46 state 0x00000200 (STP_FORWARD)
47 curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
48 advertised 0x00000000
49 supported 0x00000000
50 peer 0x00000000
51 port_no 4, hw_addr 00:25:5c:ab:0c:27, name 'GBE0/4'
52 config 0x00000002 (NO_STP)
53 state 0x00000201 (STP_FORWARD, LINK_DOWN)
54 curr 0x00000000
55 advertised 0x00000000
56 supported 0x00000000
57 peer 0x00000000
58 port_no 5, hw_addr 00:25:5c:ab:0c:a7, name 'GBE0/5'
59 config 0x00000002 (NO_STP)
60 state 0x00000201 (STP_FORWARD, LINK_DOWN)
61 curr 0x00000000
62 advertised 0x00000000
63 supported 0x00000000
64 peer 0x00000000
65 port_no 6, hw_addr 00:25:5c:ab:0c:67, name 'GBE0/6'
66 config 0x00000002 (NO_STP)
67 state 0x00000201 (STP_FORWARD, LINK_DOWN)
68 curr 0x00000000
69 advertised 0x00000000
70 supported 0x00000000
71 peer 0x00000000
72 port_no 7, hw_addr 00:25:5c:ab:0c:e7, name 'GBE0/7'
73 config 0x00000002 (NO_STP)
74 state 0x00000201 (STP_FORWARD, LINK_DOWN)
75 curr 0x00000000
76 advertised 0x00000000
77 supported 0x00000000
78 peer 0x00000000
79 port_no 8, hw_addr 00:25:5c:ab:0c:17, name 'GBE0/8'
80 config 0x00000002 (NO_STP)
81 state 0x00000201 (STP_FORWARD, LINK_DOWN)
82 curr 0x00000000
83 advertised 0x00000000
84 supported 0x00000000
85 peer 0x00000000
86 12 12:21:13.979465 IP (tos 0x0, ttl 64, id 16031, offset 0, flags [DF], proto TCP (6), length 136)
87 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b33 (incorrect -> 0x9b62), seq 17:101, ack 425, win 122, options [nop,nop,TS val 2256458010 ecr 0], length 84: OpenFlow
88 version 1.0, type SET_CONFIG, length 12, xid 0x00000003
89 flags FRAG_NORMAL, miss_send_len 65535
90 version 1.0, type FLOW_MOD, length 72, xid 0x00000004
91 cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
92 13 12:21:13.983645 IP (tos 0x0, ttl 64, id 16032, offset 0, flags [DF], proto TCP (6), length 60)
93 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9ceb), seq 101:109, ack 425, win 122, options [nop,nop,TS val 2256458014 ecr 0], length 8: OpenFlow
94 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
95 14 12:21:13.984861 IP (tos 0xa0, ttl 64, id 10680, offset 0, flags [DF], proto TCP (6), length 52)
96 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x932f (correct), seq 425, ack 109, win 2912, options [nop,nop,TS val 1 ecr 2256458010], length 0
97 15 12:21:13.985088 IP (tos 0xa0, ttl 64, id 10681, offset 0, flags [DF], proto TCP (6), length 60)
98 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x91f7 (correct), seq 425:433, ack 109, win 2920, options [nop,nop,TS val 1 ecr 2256458010], length 8: OpenFlow
99 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
100 16 12:21:13.986563 IP (tos 0x0, ttl 64, id 16033, offset 0, flags [DF], proto TCP (6), length 72)
101 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x9ba7), seq 109:129, ack 433, win 122, options [nop,nop,TS val 2256458017 ecr 1], length 20: OpenFlow
102 version 1.0, type STATS_REQUEST, length 12, xid 0x00000006
103 type DESC, flags 0x0000
104 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000007
105 17 12:21:13.988086 IP (tos 0xa0, ttl 64, id 10682, offset 0, flags [DF], proto TCP (6), length 1120)
106 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x7324 (correct), seq 433:1501, ack 129, win 2912, options [nop,nop,TS val 1 ecr 2256458017], length 1068: OpenFlow
107 version 1.0, type STATS_REPLY, length 1068, xid 0x00000006
108 type DESC, flags 0x0000
109 mfr_desc 'NEC Corporation'
110 hw_desc 'PF5240F-48T4XW-AX(L1L2)'
111 sw_desc 'OS-F3PA Ver. V4.0.1.0'
112 serial_num 'Y1252CFA0000S4068C8N004'
113 dp_desc 'PFS1'
114 18 12:21:14.028020 IP (tos 0x0, ttl 64, id 16034, offset 0, flags [DF], proto TCP (6), length 52)
115 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x998b), seq 129, ack 1501, win 139, options [nop,nop,TS val 2256458059 ecr 1], length 0
116 19 12:21:14.029070 IP (tos 0xa0, ttl 64, id 10686, offset 0, flags [DF], proto TCP (6), length 60)
117 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8da6 (correct), seq 1501:1509, ack 129, win 2920, options [nop,nop,TS val 1 ecr 2256458017], length 8: OpenFlow
118 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000007
119 20 12:21:14.029095 IP (tos 0x0, ttl 64, id 16035, offset 0, flags [DF], proto TCP (6), length 52)
120 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9982), seq 129, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 0
121 21 12:21:14.029852 IP (tos 0x0, ttl 64, id 16036, offset 0, flags [DF], proto TCP (6), length 84)
122 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5aff (incorrect -> 0x95e2), seq 129:161, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 32: OpenFlow
123 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000008
124 port 1
125 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000009
126 port 2
127 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
128 22 12:21:14.030813 IP (tos 0xa0, ttl 64, id 10687, offset 0, flags [DF], proto TCP (6), length 196)
129 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b77 (correct), seq 1509:1653, ack 161, win 2900, options [nop,nop,TS val 1 ecr 2256458060], length 144: OpenFlow
130 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000008
131 port 1
132 queue_id 0, len 16
133 property NONE, len 8
134 queue_id 1, len 16
135 property NONE, len 8
136 queue_id 2, len 16
137 property NONE, len 8
138 queue_id 3, len 16
139 property NONE, len 8
140 queue_id 4, len 16
141 property NONE, len 8
142 queue_id 5, len 16
143 property NONE, len 8
144 queue_id 6, len 16
145 property NONE, len 8
146 queue_id 7, len 16
147 property NONE, len 8
148 23 12:21:14.070016 IP (tos 0x0, ttl 64, id 16037, offset 0, flags [DF], proto TCP (6), length 52)
149 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9899), seq 161, ack 1653, win 155, options [nop,nop,TS val 2256458101 ecr 1], length 0
150 24 12:21:14.071040 IP (tos 0xa0, ttl 64, id 10688, offset 0, flags [DF], proto TCP (6), length 204)
151 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x89a4 (correct), seq 1653:1805, ack 161, win 2920, options [nop,nop,TS val 1 ecr 2256458060], length 152: OpenFlow
152 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000009
153 port 2
154 queue_id 0, len 16
155 property NONE, len 8
156 queue_id 1, len 16
157 property NONE, len 8
158 queue_id 2, len 16
159 property NONE, len 8
160 queue_id 3, len 16
161 property NONE, len 8
162 queue_id 4, len 16
163 property NONE, len 8
164 queue_id 5, len 16
165 property NONE, len 8
166 queue_id 6, len 16
167 property NONE, len 8
168 queue_id 7, len 16
169 property NONE, len 8
170 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
171 25 12:21:14.071062 IP (tos 0x0, ttl 64, id 16038, offset 0, flags [DF], proto TCP (6), length 52)
172 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x97ef), seq 161, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 0
173 26 12:21:14.071697 IP (tos 0x0, ttl 64, id 16039, offset 0, flags [DF], proto TCP (6), length 100)
174 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b0f (incorrect -> 0x9424), seq 161:209, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 48: OpenFlow
175 version 1.0, type STATS_REQUEST, length 20, xid 0x0000000b
176 type QUEUE, flags 0x0000
177 port_no 1, queue_id ALL
178 version 1.0, type STATS_REQUEST, length 20, xid 0x0000000c
179 type QUEUE, flags 0x0000
180 port_no 2, queue_id ALL
181 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
182 27 12:21:14.073035 IP (tos 0xa0, ttl 64, id 10689, offset 0, flags [DF], proto TCP (6), length 96)
183 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b9c (correct), seq 1805:1849, ack 209, win 2892, options [nop,nop,TS val 1 ecr 2256458102], length 44: OpenFlow
184 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
185 type QUEUE, flags 0x0001 (MORE)
186 port_no 1, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
187 28 12:21:14.113015 IP (tos 0x0, ttl 64, id 16040, offset 0, flags [DF], proto TCP (6), length 52)
188 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9769), seq 209, ack 1849, win 172, options [nop,nop,TS val 2256458144 ecr 1], length 0
189 29 12:21:14.114014 IP (tos 0xa0, ttl 64, id 10690, offset 0, flags [DF], proto TCP (6), length 744)
190 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x72af (correct), seq 1849:2541, ack 209, win 2920, options [nop,nop,TS val 1 ecr 2256458102], length 692: OpenFlow
191 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
192 type QUEUE, flags 0x0001 (MORE)
193 port_no 1, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
194 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
195 type QUEUE, flags 0x0001 (MORE)
196 port_no 1, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
197 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
198 type QUEUE, flags 0x0001 (MORE)
199 port_no 1, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
200 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
201 type QUEUE, flags 0x0001 (MORE)
202 port_no 1, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
203 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
204 type QUEUE, flags 0x0001 (MORE)
205 port_no 1, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
206 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
207 type QUEUE, flags 0x0001 (MORE)
208 port_no 1, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
209 version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
210 type QUEUE, flags 0x0001 (MORE)
211 port_no 1, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
212 version 1.0, type STATS_REPLY, length 12, xid 0x0000000b
213 type QUEUE, flags 0x0000
214 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
215 type QUEUE, flags 0x0001 (MORE)
216 port_no 2, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
217 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
218 type QUEUE, flags 0x0001 (MORE)
219 port_no 2, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
220 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
221 type QUEUE, flags 0x0001 (MORE)
222 port_no 2, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
223 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
224 type QUEUE, flags 0x0001 (MORE)
225 port_no 2, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
226 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
227 type QUEUE, flags 0x0001 (MORE)
228 port_no 2, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
229 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
230 type QUEUE, flags 0x0001 (MORE)
231 port_no 2, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
232 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
233 type QUEUE, flags 0x0001 (MORE)
234 port_no 2, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
235 version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
236 type QUEUE, flags 0x0001 (MORE)
237 port_no 2, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
238 version 1.0, type STATS_REPLY, length 12, xid 0x0000000c
239 type QUEUE, flags 0x0000
240 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
241 30 12:21:14.114038 IP (tos 0x0, ttl 64, id 16041, offset 0, flags [DF], proto TCP (6), length 52)
242 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x94a3), seq 209, ack 2541, win 189, options [nop,nop,TS val 2256458145 ecr 1], length 0
243 31 12:21:14.116167 IP (tos 0x0, ttl 64, id 16042, offset 0, flags [DF], proto TCP (6), length 700)
244 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5d67 (incorrect -> 0xa5e9), seq 209:857, ack 2541, win 189, options [nop,nop,TS val 2256458147 ecr 1], length 648: OpenFlow
245 version 1.0, type FLOW_MOD, length 80, xid 0x0000000e
246 match in_port 1
247 cookie 0x0000000000000001, command ADD, priority 24100, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
248 action type OUTPUT, len 8, port 4
249 version 1.0, type FLOW_MOD, length 80, xid 0x0000000f
250 match in_port 2
251 cookie 0x0000000000000002, command ADD, priority 24200, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
252 action type OUTPUT, len 8, port 4
253 version 1.0, type FLOW_MOD, length 80, xid 0x00000010
254 match in_port 3
255 cookie 0x0000000000000003, command ADD, priority 24300, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
256 action type OUTPUT, len 8, port 4
257 version 1.0, type FLOW_MOD, length 80, xid 0x00000011
258 match in_port 5
259 cookie 0x0000000000000004, command ADD, priority 20500, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
260 action type OUTPUT, len 8, port 8
261 version 1.0, type FLOW_MOD, length 80, xid 0x00000012
262 match in_port 6
263 cookie 0x0000000000000005, command ADD, priority 20600, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
264 action type OUTPUT, len 8, port 8
265 version 1.0, type FLOW_MOD, length 80, xid 0x00000013
266 match in_port 7
267 cookie 0x0000000000000006, command ADD, priority 20700, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
268 action type OUTPUT, len 8, port 8
269 version 1.0, type FLOW_MOD, length 80, xid 0x00000014
270 match in_port 4
271 cookie 0x0000000000000007, command ADD, priority 25400, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
272 action type OUTPUT, len 8, port 8
273 version 1.0, type FLOW_MOD, length 80, xid 0x00000015
274 match in_port 8
275 cookie 0x0000000000000008, command ADD, priority 25800, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
276 action type OUTPUT, len 8, port 4
277 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000016
278 32 12:21:14.125259 IP (tos 0xa0, ttl 64, id 10691, offset 0, flags [DF], proto TCP (6), length 60)
279 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x862d (correct), seq 2541:2549, ack 857, win 2920, options [nop,nop,TS val 1 ecr 2256458147], length 8: OpenFlow
280 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000016
281 33 12:21:14.127411 IP (tos 0x0, ttl 64, id 16043, offset 0, flags [DF], proto TCP (6), length 116)
282 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b1f (incorrect -> 0x6ef4), seq 857:921, ack 2549, win 189, options [nop,nop,TS val 2256458158 ecr 1], length 64: OpenFlow
283 version 1.0, type STATS_REQUEST, length 56, xid 0x00000017
284 type FLOW, flags 0x0000
285 table_id ALL, out_port NONE
286 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000018
287 34 12:21:14.128774 IP (tos 0xa0, ttl 64, id 10692, offset 0, flags [DF], proto TCP (6), length 160)
288 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x0485 (correct), seq 2549:2657, ack 921, win 2912, options [nop,nop,TS val 1 ecr 2256458158], length 108: OpenFlow
289 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
290 type FLOW, flags 0x0001 (MORE)
291 length 96, table_id 0
292 match in_port 3
293 duration_sec 0, duration_nsec 0, priority 24300, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
294 action type OUTPUT, len 8, port 4
295 35 12:21:14.168017 IP (tos 0x0, ttl 64, id 16044, offset 0, flags [DF], proto TCP (6), length 52)
296 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9131), seq 921, ack 2657, win 189, options [nop,nop,TS val 2256458199 ecr 1], length 0
297 36 12:21:14.168997 IP (tos 0xa0, ttl 64, id 10693, offset 0, flags [DF], proto TCP (6), length 828)
298 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x1544 (correct), seq 2657:3433, ack 921, win 2920, options [nop,nop,TS val 1 ecr 2256458158], length 776: OpenFlow
299 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
300 type FLOW, flags 0x0001 (MORE)
301 length 96, table_id 0
302 match in_port 2
303 duration_sec 0, duration_nsec 0, priority 24200, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
304 action type OUTPUT, len 8, port 4
305 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
306 type FLOW, flags 0x0001 (MORE)
307 length 96, table_id 0
308 match in_port 1
309 duration_sec 0, duration_nsec 0, priority 24100, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
310 action type OUTPUT, len 8, port 4
311 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
312 type FLOW, flags 0x0001 (MORE)
313 length 96, table_id 1
314 match in_port 7
315 duration_sec 0, duration_nsec 0, priority 20700, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
316 action type OUTPUT, len 8, port 8
317 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
318 type FLOW, flags 0x0001 (MORE)
319 length 96, table_id 1
320 match in_port 6
321 duration_sec 0, duration_nsec 0, priority 20600, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
322 action type OUTPUT, len 8, port 8
323 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
324 type FLOW, flags 0x0001 (MORE)
325 length 96, table_id 1
326 match in_port 5
327 duration_sec 0, duration_nsec 0, priority 20500, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
328 action type OUTPUT, len 8, port 8
329 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
330 type FLOW, flags 0x0001 (MORE)
331 length 96, table_id EMERG
332 match in_port 8
333 duration_sec 0, duration_nsec 0, priority 25800, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
334 action type OUTPUT, len 8, port 4
335 version 1.0, type STATS_REPLY, length 108, xid 0x00000017
336 type FLOW, flags 0x0001 (MORE)
337 length 96, table_id EMERG
338 match in_port 4
339 duration_sec 0, duration_nsec 0, priority 25400, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
340 action type OUTPUT, len 8, port 8
341 version 1.0, type STATS_REPLY, length 12, xid 0x00000017
342 type FLOW, flags 0x0000
343 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000018
344 37 12:21:14.169020 IP (tos 0x0, ttl 64, id 16045, offset 0, flags [DF], proto TCP (6), length 52)
345 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8e18), seq 921, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 0
346 38 12:21:14.169616 IP (tos 0x0, ttl 64, id 16046, offset 0, flags [DF], proto TCP (6), length 72)
347 172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x8b90), seq 921:941, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 20: OpenFlow
348 version 1.0, type STATS_REQUEST, length 12, xid 0x00000019
349 type TABLE, flags 0x0000
350 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000001a
351 39 12:21:14.170981 IP (tos 0xa0, ttl 64, id 10694, offset 0, flags [DF], proto TCP (6), length 128)
352 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xe84a (correct), seq 3433:3509, ack 941, win 2912, options [nop,nop,TS val 1 ecr 2256458200], length 76: OpenFlow
353 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
354 type TABLE, flags 0x0001 (MORE)
355 table_id 0, name 'Normal 1 Flow Table'
356 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
357 max_entries 5632, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
358 40 12:21:14.210016 IP (tos 0x0, ttl 64, id 16047, offset 0, flags [DF], proto TCP (6), length 52)
359 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8d8f), seq 941, ack 3509, win 205, options [nop,nop,TS val 2256458241 ecr 1], length 0
360 41 12:21:14.210954 IP (tos 0xa0, ttl 64, id 10695, offset 0, flags [DF], proto TCP (6), length 832)
361 172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x198c (correct), seq 3509:4289, ack 941, win 2920, options [nop,nop,TS val 1 ecr 2256458200], length 780: OpenFlow
362 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
363 type TABLE, flags 0x0001 (MORE)
364 table_id 1, name 'Expanded Flow Table'
365 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
366 max_entries 163840, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
367 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
368 type TABLE, flags 0x0001 (MORE)
369 table_id 20, name 'Normal 2 Flow Table'
370 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
371 max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
372 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
373 type TABLE, flags 0x0001 (MORE)
374 table_id 50, name 'Mpls 1 Flow Table'
375 wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
376 max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
377 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
378 type TABLE, flags 0x0001 (MORE)
379 table_id 51, name 'Mpls 2 Flow Table'
380 wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
381 max_entries 16384, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
382 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
383 type TABLE, flags 0x0001 (MORE)
384 table_id 99, name 'Software Flow Table'
385 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
386 max_entries 2048, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
387 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
388 type TABLE, flags 0x0001 (MORE)
389 table_id 100, name 'V-Normal 1 Flow Table'
390 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
391 max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
392 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
393 type TABLE, flags 0x0001 (MORE)
394 table_id 101, name 'V-Expanded Flow Table'
395 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
396 max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
397 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
398 type TABLE, flags 0x0001 (MORE)
399 table_id 120, name 'V-Normal 2 Flow Table'
400 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
401 max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
402 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
403 type TABLE, flags 0x0001 (MORE)
404 table_id 140, name 'Q-Normal 1 Flow Table'
405 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
406 max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
407 version 1.0, type STATS_REPLY, length 76, xid 0x00000019
408 type TABLE, flags 0x0001 (MORE)
409 table_id EMERG, name 'Emergency Flow Cache'
410 wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
411 max_entries 5632, active_count 2, lookup_count 18446744073709551615, matched_count 18446744073709551615
412 version 1.0, type STATS_REPLY, length 12, xid 0x00000019
413 type TABLE, flags 0x0000
414 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000001a
415 42 12:21:14.210982 IP (tos 0x0, ttl 64, id 16048, offset 0, flags [DF], proto TCP (6), length 52)
416 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8a72), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458241 ecr 1], length 0
417 43 12:21:14.486208 IP (tos 0x0, ttl 64, id 16049, offset 0, flags [DF], proto TCP (6), length 52)
418 172.16.1.51.6633 > 172.16.1.101.62221: Flags [F.], cksum 0x5adf (incorrect -> 0x895d), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458517 ecr 1], length 0
419 44 12:21:14.489079 IP (tos 0xa0, ttl 64, id 10696, offset 0, flags [DF], proto TCP (6), length 52)
420 172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x7ed2 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
421 45 12:21:14.489301 IP (tos 0xa0, ttl 64, id 10697, offset 0, flags [DF], proto TCP (6), length 52)
422 172.16.1.101.62221 > 172.16.1.51.6633: Flags [F.], cksum 0x7ed1 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
423 46 12:21:14.489341 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
424 172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x8958 (correct), seq 942, ack 4290, win 222, options [nop,nop,TS val 2256458520 ecr 2], length 0
425 47 12:21:20.463722 IP (tos 0xa0, ttl 64, id 10710, offset 0, flags [DF], proto TCP (6), length 60)
426 172.16.1.101.62216 > 172.16.1.51.6633: Flags [S], cksum 0xf0a4 (correct), seq 2928426028, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
427 48 12:21:20.463750 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
428 172.16.1.51.6633 > 172.16.1.101.62216: Flags [R.], cksum 0x5d6c (correct), seq 0, ack 2928426029, win 0, length 0