1 1 2015-01-30 16:11:51.293880 IP (tos 0x0, ttl 55, id 5483, offset 0, flags [DF], proto TCP (6), length 60)
2 88.150.169.52.37044 > 109.74.202.168.6653: Flags [S], cksum 0x0576 (correct), seq 1216143989, win 14600, options [mss 1460,sackOK,TS val 50525982 ecr 0,nop,wscale 7], length 0
3 2 2015-01-30 16:11:51.293947 IP (tos 0x0, ttl 64, id 26571, offset 0, flags [DF], proto TCP (6), length 40)
4 109.74.202.168.6653 > 88.150.169.52.37044: Flags [R.], cksum 0xa06e (correct), seq 0, ack 1216143990, win 0, length 0
5 3 2015-01-30 16:11:53.295371 IP (tos 0x0, ttl 55, id 49495, offset 0, flags [DF], proto TCP (6), length 60)
6 88.150.169.52.4756 > 109.74.202.168.6653: Flags [S], cksum 0x4629 (correct), seq 774256709, win 14600, options [mss 1460,sackOK,TS val 50526482 ecr 0,nop,wscale 7], length 0
7 4 2015-01-30 16:11:53.295463 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
8 109.74.202.168.6653 > 88.150.169.52.4756: Flags [S.], cksum 0x39ec (incorrect -> 0x0c04), seq 3422281440, ack 774256710, win 28960, options [mss 1460,sackOK,TS val 590230513 ecr 50526482,nop,wscale 7], length 0
9 5 2015-01-30 16:11:53.298824 IP (tos 0x0, ttl 55, id 49496, offset 0, flags [DF], proto TCP (6), length 52)
10 88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab7c (correct), seq 1, ack 1, win 115, options [nop,nop,TS val 50526483 ecr 590230513], length 0
11 6 2015-01-30 16:11:53.305813 IP (tos 0x0, ttl 64, id 60691, offset 0, flags [DF], proto TCP (6), length 60)
12 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa9f0), seq 1:9, ack 1, win 227, options [nop,nop,TS val 590230516 ecr 50526483], length 8: OpenFlow
13 version 1.0, type HELLO, length 8, xid 0x00000001
14 7 2015-01-30 16:11:53.308458 IP (tos 0x0, ttl 55, id 49497, offset 0, flags [DF], proto TCP (6), length 52)
15 88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab6e (correct), seq 1, ack 9, win 115, options [nop,nop,TS val 50526486 ecr 590230516], length 0
16 8 2015-01-30 16:11:54.295523 IP (tos 0x0, ttl 55, id 49498, offset 0, flags [DF], proto TCP (6), length 60)
17 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x7b45 (correct), seq 1:9, ack 9, win 115, options [nop,nop,TS val 50526732 ecr 590230516], length 8: OpenFlow
18 version 1.0, type HELLO, length 8, xid 0x00002e1b
19 9 2015-01-30 16:11:54.295579 IP (tos 0x0, ttl 64, id 60692, offset 0, flags [DF], proto TCP (6), length 52)
20 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa8d7), seq 9, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 0
21 10 2015-01-30 16:11:54.295793 IP (tos 0x0, ttl 64, id 60693, offset 0, flags [DF], proto TCP (6), length 60)
22 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa7b8), seq 9:17, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 8: OpenFlow
23 version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
24 11 2015-01-30 16:11:54.298928 IP (tos 0x0, ttl 55, id 49499, offset 0, flags [DF], proto TCP (6), length 52)
25 88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xa93e (correct), seq 9, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 0
26 12 2015-01-30 16:11:54.299530 IP (tos 0x0, ttl 55, id 49500, offset 0, flags [DF], proto TCP (6), length 468)
27 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xff61 (correct), seq 9:425, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 416: OpenFlow
28 version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
29 dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
30 capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
31 actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
32 port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
33 config 0x00000001 (PORT_DOWN)
34 state 0x00000001 (STP_LISTEN, LINK_DOWN)
35 curr 0x00000040 (10GB_FD)
37 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
39 port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
40 config 0x00000001 (PORT_DOWN)
41 state 0x00000001 (STP_LISTEN, LINK_DOWN)
42 curr 0x00000040 (10GB_FD)
44 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
46 port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
47 config 0x00000001 (PORT_DOWN)
48 state 0x00000001 (STP_LISTEN, LINK_DOWN)
49 curr 0x00000040 (10GB_FD)
51 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
53 port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
54 config 0x00000001 (PORT_DOWN)
55 state 0x00000001 (STP_LISTEN, LINK_DOWN)
56 curr 0x00000040 (10GB_FD)
58 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
60 port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
61 config 0x00000001 (PORT_DOWN)
62 state 0x00000001 (STP_LISTEN, LINK_DOWN)
63 curr 0x00000040 (10GB_FD)
65 supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
67 port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
68 config 0x80000001 (PORT_DOWN) (bogus)
69 state 0x00000001 (STP_LISTEN, LINK_DOWN)
70 curr 0x00000040 (10GB_FD)
72 supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
74 port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
75 config 0x00000001 (PORT_DOWN)
76 state 0x00000001 (STP_LISTEN, LINK_DOWN)
77 curr 0x00000040 (10GB_FD)
79 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
81 port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
82 config 0x80000001 (PORT_DOWN) (bogus)
83 state 0x00000001 (STP_LISTEN, LINK_DOWN)
84 curr 0x00000040 (10GB_FD)
86 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
88 13 2015-01-30 16:11:54.303020 IP (tos 0x0, ttl 64, id 60694, offset 0, flags [DF], proto TCP (6), length 136)
89 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a38 (incorrect -> 0xa414), seq 17:101, ack 425, win 235, options [nop,nop,TS val 590230815 ecr 50526733], length 84: OpenFlow
90 version 1.0, type SET_CONFIG, length 12, xid 0x00000003
91 flags FRAG_NORMAL, miss_send_len 65535
92 version 1.0, type FLOW_MOD, length 72, xid 0x00000004
93 cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
94 14 2015-01-30 16:11:54.304964 IP (tos 0x0, ttl 64, id 60695, offset 0, flags [DF], proto TCP (6), length 60)
95 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa5a0), seq 101:109, ack 425, win 235, options [nop,nop,TS val 590230816 ecr 50526733], length 8: OpenFlow
96 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
97 15 2015-01-30 16:11:54.307353 IP (tos 0x0, ttl 55, id 49501, offset 0, flags [DF], proto TCP (6), length 140)
98 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8297 (correct), seq 425:513, ack 109, win 115, options [nop,nop,TS val 50526735 ecr 590230815], length 88: OpenFlow
99 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffd
101 cookie 0x0000000000000001, priority 33000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
102 16 2015-01-30 16:11:54.344876 IP (tos 0x0, ttl 64, id 60696, offset 0, flags [DF], proto TCP (6), length 52)
103 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa661), seq 109, ack 513, win 235, options [nop,nop,TS val 590230828 ecr 50526735], length 0
104 17 2015-01-30 16:11:54.350268 IP (tos 0x0, ttl 55, id 49502, offset 0, flags [DF], proto TCP (6), length 236)
105 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x6fdb (correct), seq 513:697, ack 109, win 115, options [nop,nop,TS val 50526745 ecr 590230828], length 184: OpenFlow
106 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffe
108 cookie 0x0000000000000002, priority 31000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
109 version 1.0, type FLOW_REMOVED, length 88, xid 0x00000fff
111 cookie 0x0000000000000003, priority 30000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
112 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
113 18 2015-01-30 16:11:54.350320 IP (tos 0x0, ttl 64, id 60697, offset 0, flags [DF], proto TCP (6), length 52)
114 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa596), seq 109, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 0
115 19 2015-01-30 16:11:54.351010 IP (tos 0x0, ttl 64, id 60698, offset 0, flags [DF], proto TCP (6), length 140)
116 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a3c (incorrect -> 0x41fa), seq 109:197, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 88: OpenFlow
117 version 1.0, type VENDOR, length 20, xid 0x00000006, vendor 0x005c16c7 (Big Switch Networks)
118 subtype SET_MIRRORING, report_mirror_ports ON
119 version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
120 subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
121 version 1.0, type VENDOR, length 20, xid 0x00000008, vendor 0x005c16c7 (Big Switch Networks)
122 subtype SET_MIRRORING, report_mirror_ports OFF
123 version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
124 subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
125 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
126 20 2015-01-30 16:11:54.354984 IP (tos 0x0, ttl 55, id 49503, offset 0, flags [DF], proto TCP (6), length 72)
127 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8c59 (correct), seq 697:717, ack 197, win 115, options [nop,nop,TS val 50526747 ecr 590230829], length 20: OpenFlow
128 version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
129 subtype GET_MIRRORING_REPLY, report_mirror_ports ON
130 21 2015-01-30 16:11:54.394872 IP (tos 0x0, ttl 64, id 60699, offset 0, flags [DF], proto TCP (6), length 52)
131 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa51a), seq 197, ack 717, win 243, options [nop,nop,TS val 590230843 ecr 50526747], length 0
132 22 2015-01-30 16:11:54.397140 IP (tos 0x0, ttl 55, id 49504, offset 0, flags [DF], proto TCP (6), length 80)
133 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8bfd (correct), seq 717:745, ack 197, win 115, options [nop,nop,TS val 50526758 ecr 590230843], length 28: OpenFlow
134 version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
135 subtype GET_MIRRORING_REPLY, report_mirror_ports OFF
136 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
137 23 2015-01-30 16:11:54.397175 IP (tos 0x0, ttl 64, id 60700, offset 0, flags [DF], proto TCP (6), length 52)
138 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa4f3), seq 197, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 0
139 24 2015-01-30 16:11:54.397593 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 80)
140 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a00 (incorrect -> 0xa165), seq 197:225, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 28: OpenFlow
141 version 1.0, type FEATURES_REQUEST, length 8, xid 0x0000000b
142 version 1.0, type STATS_REQUEST, length 12, xid 0x0000000c
143 type TABLE, flags 0x0000
144 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
145 25 2015-01-30 16:11:54.400666 IP (tos 0x0, ttl 55, id 49505, offset 0, flags [DF], proto TCP (6), length 468)
146 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xfb70 (correct), seq 745:1161, ack 225, win 115, options [nop,nop,TS val 50526759 ecr 590230843], length 416: OpenFlow
147 version 1.0, type FEATURES_REPLY, length 416, xid 0x0000000b
148 dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
149 capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
150 actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
151 port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
152 config 0x00000001 (PORT_DOWN)
153 state 0x00000001 (STP_LISTEN, LINK_DOWN)
154 curr 0x00000040 (10GB_FD)
155 advertised 0x00000000
156 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
158 port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
159 config 0x00000001 (PORT_DOWN)
160 state 0x00000001 (STP_LISTEN, LINK_DOWN)
161 curr 0x00000040 (10GB_FD)
162 advertised 0x00000000
163 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
165 port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
166 config 0x00000001 (PORT_DOWN)
167 state 0x00000001 (STP_LISTEN, LINK_DOWN)
168 curr 0x00000040 (10GB_FD)
169 advertised 0x00000000
170 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
172 port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
173 config 0x00000001 (PORT_DOWN)
174 state 0x00000001 (STP_LISTEN, LINK_DOWN)
175 curr 0x00000040 (10GB_FD)
176 advertised 0x00000000
177 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
179 port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
180 config 0x00000001 (PORT_DOWN)
181 state 0x00000001 (STP_LISTEN, LINK_DOWN)
182 curr 0x00000040 (10GB_FD)
183 advertised 0x00000000
184 supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
186 port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
187 config 0x80000001 (PORT_DOWN) (bogus)
188 state 0x00000001 (STP_LISTEN, LINK_DOWN)
189 curr 0x00000040 (10GB_FD)
190 advertised 0x00000000
191 supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
193 port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
194 config 0x00000001 (PORT_DOWN)
195 state 0x00000001 (STP_LISTEN, LINK_DOWN)
196 curr 0x00000040 (10GB_FD)
197 advertised 0x00000000
198 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
200 port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
201 config 0x80000001 (PORT_DOWN) (bogus)
202 state 0x00000001 (STP_LISTEN, LINK_DOWN)
203 curr 0x00000040 (10GB_FD)
204 advertised 0x00000000
205 supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
207 26 2015-01-30 16:11:54.438231 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 52)
208 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa320), seq 225, ack 1161, win 252, options [nop,nop,TS val 590230856 ecr 50526759], length 0
209 27 2015-01-30 16:11:54.442822 IP (tos 0x0, ttl 55, id 49506, offset 0, flags [DF], proto TCP (6), length 136)
210 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4ea6 (correct), seq 1161:1245, ack 225, win 115, options [nop,nop,TS val 50526769 ecr 590230856], length 84: OpenFlow
211 version 1.0, type STATS_REPLY, length 76, xid 0x0000000c
212 type TABLE, flags 0x0000
213 table_id 0, name 'Table 0'
214 wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
215 max_entries 1500, active_count 0, lookup_count 0, matched_count 0
216 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
217 28 2015-01-30 16:11:54.442855 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
218 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa2c1), seq 225, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 0
219 29 2015-01-30 16:11:54.443433 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
220 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa189), seq 225:233, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 8: OpenFlow
221 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000e
222 30 2015-01-30 16:11:54.445977 IP (tos 0x0, ttl 55, id 49507, offset 0, flags [DF], proto TCP (6), length 60)
223 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa208 (correct), seq 1245:1253, ack 233, win 115, options [nop,nop,TS val 50526770 ecr 590230857], length 8: OpenFlow
224 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000e
225 31 2015-01-30 16:11:54.446147 IP (tos 0x0, ttl 64, id 60705, offset 0, flags [DF], proto TCP (6), length 60)
226 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa176), seq 233:241, ack 1253, win 252, options [nop,nop,TS val 590230858 ecr 50526770], length 8: OpenFlow
227 version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000f
228 32 2015-01-30 16:11:54.448750 IP (tos 0x0, ttl 55, id 49508, offset 0, flags [DF], proto TCP (6), length 60)
229 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1f5 (correct), seq 1253:1261, ack 241, win 115, options [nop,nop,TS val 50526771 ecr 590230858], length 8: OpenFlow
230 version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000f
231 33 2015-01-30 16:11:54.448907 IP (tos 0x0, ttl 64, id 60706, offset 0, flags [DF], proto TCP (6), length 60)
232 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa163), seq 241:249, ack 1261, win 252, options [nop,nop,TS val 590230859 ecr 50526771], length 8: OpenFlow
233 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000010
234 34 2015-01-30 16:11:54.451413 IP (tos 0x0, ttl 55, id 49509, offset 0, flags [DF], proto TCP (6), length 60)
235 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1e3 (correct), seq 1261:1269, ack 249, win 115, options [nop,nop,TS val 50526771 ecr 590230859], length 8: OpenFlow
236 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000010
237 35 2015-01-30 16:11:54.451718 IP (tos 0x0, ttl 64, id 60707, offset 0, flags [DF], proto TCP (6), length 60)
238 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa151), seq 249:257, ack 1269, win 252, options [nop,nop,TS val 590230860 ecr 50526771], length 8: OpenFlow
239 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000011
240 36 2015-01-30 16:11:54.454979 IP (tos 0x0, ttl 55, id 49510, offset 0, flags [DF], proto TCP (6), length 60)
241 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1d0 (correct), seq 1269:1277, ack 257, win 115, options [nop,nop,TS val 50526772 ecr 590230860], length 8: OpenFlow
242 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000011
243 37 2015-01-30 16:11:54.455181 IP (tos 0x0, ttl 64, id 60708, offset 0, flags [DF], proto TCP (6), length 60)
244 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa13e), seq 257:265, ack 1277, win 252, options [nop,nop,TS val 590230861 ecr 50526772], length 8: OpenFlow
245 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000012
246 38 2015-01-30 16:11:54.458795 IP (tos 0x0, ttl 55, id 49511, offset 0, flags [DF], proto TCP (6), length 60)
247 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1bd (correct), seq 1277:1285, ack 265, win 115, options [nop,nop,TS val 50526773 ecr 590230861], length 8: OpenFlow
248 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000012
249 39 2015-01-30 16:11:54.459026 IP (tos 0x0, ttl 64, id 60709, offset 0, flags [DF], proto TCP (6), length 60)
250 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa12b), seq 265:273, ack 1285, win 252, options [nop,nop,TS val 590230862 ecr 50526773], length 8: OpenFlow
251 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000013
252 40 2015-01-30 16:11:54.461429 IP (tos 0x0, ttl 55, id 49512, offset 0, flags [DF], proto TCP (6), length 60)
253 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1aa (correct), seq 1285:1293, ack 273, win 115, options [nop,nop,TS val 50526774 ecr 590230862], length 8: OpenFlow
254 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000013
255 41 2015-01-30 16:11:54.461743 IP (tos 0x0, ttl 64, id 60710, offset 0, flags [DF], proto TCP (6), length 120)
256 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a28 (incorrect -> 0x9a6c), seq 273:341, ack 1293, win 252, options [nop,nop,TS val 590230863 ecr 50526774], length 68: OpenFlow
257 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000014
259 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000015
261 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000016
263 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000017
265 version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000018
267 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000019
268 42 2015-01-30 16:11:54.464033 IP (tos 0x0, ttl 55, id 49513, offset 0, flags [DF], proto TCP (6), length 68)
269 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa139 (correct), seq 1293:1309, ack 341, win 115, options [nop,nop,TS val 50526775 ecr 590230863], length 16: OpenFlow
270 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000014
272 43 2015-01-30 16:11:54.501564 IP (tos 0x0, ttl 64, id 60711, offset 0, flags [DF], proto TCP (6), length 52)
273 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1f5), seq 341, ack 1309, win 252, options [nop,nop,TS val 590230875 ecr 50526775], length 0
274 44 2015-01-30 16:11:54.504038 IP (tos 0x0, ttl 55, id 49514, offset 0, flags [DF], proto TCP (6), length 124)
275 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9bb5 (correct), seq 1309:1381, ack 341, win 115, options [nop,nop,TS val 50526785 ecr 590230875], length 72: OpenFlow
276 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000015
278 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000016
280 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000017
282 version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000018
284 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000019
285 45 2015-01-30 16:11:54.504155 IP (tos 0x0, ttl 64, id 60712, offset 0, flags [DF], proto TCP (6), length 52)
286 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1a3), seq 341, ack 1381, win 252, options [nop,nop,TS val 590230875 ecr 50526785], length 0
287 46 2015-01-30 16:11:54.505352 IP (tos 0x0, ttl 64, id 60713, offset 0, flags [DF], proto TCP (6), length 562)
288 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3be2 (incorrect -> 0x4d80), seq 341:851, ack 1381, win 252, options [nop,nop,TS val 590230876 ecr 50526785], length 510: OpenFlow
289 version 1.0, type VENDOR, length 24, xid 0x0000001a, vendor 0x005c16c7 (Big Switch Networks)
290 subtype SET_IP_MASK, index 1, mask 255.0.14.0
291 version 1.0, type VENDOR, length 24, xid 0x0000001b, vendor 0x005c16c7 (Big Switch Networks)
292 subtype SET_IP_MASK, index 2, mask 255.0.28.0
293 version 1.0, type VENDOR, length 24, xid 0x0000001c, vendor 0x005c16c7 (Big Switch Networks)
294 subtype SET_IP_MASK, index 3, mask 255.0.56.0
295 version 1.0, type VENDOR, length 24, xid 0x0000001d, vendor 0x005c16c7 (Big Switch Networks)
296 subtype SET_IP_MASK, index 4, mask 255.0.112.0
297 version 1.0, type VENDOR, length 24, xid 0x0000001e, vendor 0x005c16c7 (Big Switch Networks)
298 subtype SET_IP_MASK, index 5, mask 255.0.224.0
299 version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
300 subtype GET_IP_MASK_REQUEST, index 3
301 version 1.0, type VENDOR, length 30, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
302 subtype SHELL_COMMAND, service 0, data 'show clock'
303 version 1.0, type FLOW_MOD, length 104, xid 0x00000021
305 cookie 0x0000000000000001, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
306 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
307 subtype MIRROR, dest_port 21, vlan_tag none, copy_stage INGRESS
308 action type OUTPUT, len 8, port 17
309 version 1.0, type FLOW_MOD, length 128, xid 0x00000022
311 cookie 0x0000000000000002, command ADD, priority 31000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
312 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
313 subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 2, p 4), copy_stage INGRESS
314 action type OUTPUT, len 8, port 19
315 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
316 subtype MIRROR, dest_port 23, vlan_tag 802.1Q (vlan 2748, p 5, DEI), copy_stage EGRESS
317 version 1.0, type FLOW_MOD, length 96, xid 0x00000023
319 cookie 0x0000000000000003, command ADD, priority 30000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
320 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
321 subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 0, p 1), copy_stage INGRESS
322 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000024
323 47 2015-01-30 16:11:54.508061 IP (tos 0x0, ttl 55, id 49515, offset 0, flags [DF], proto TCP (6), length 76)
324 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4da3 (correct), seq 1381:1405, ack 851, win 123, options [nop,nop,TS val 50526786 ecr 590230876], length 24: OpenFlow
325 version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
326 subtype GET_IP_MASK_REPLY, index 3, mask 255.0.56.0
327 48 2015-01-30 16:11:54.544912 IP (tos 0x0, ttl 64, id 60714, offset 0, flags [DF], proto TCP (6), length 52)
328 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f7f), seq 851, ack 1405, win 252, options [nop,nop,TS val 590230888 ecr 50526786], length 0
329 49 2015-01-30 16:11:54.549108 IP (tos 0x0, ttl 55, id 49516, offset 0, flags [DF], proto TCP (6), length 80)
330 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8632 (correct), seq 1405:1433, ack 851, win 123, options [nop,nop,TS val 50526795 ecr 590230888], length 28: OpenFlow
331 version 1.0, type VENDOR, length 20, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
332 subtype SHELL_STATUS, status 0xfffffffe
333 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000024
334 50 2015-01-30 16:11:54.549207 IP (tos 0x0, ttl 64, id 60715, offset 0, flags [DF], proto TCP (6), length 52)
335 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f59), seq 851, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 0
336 51 2015-01-30 16:11:54.549472 IP (tos 0x0, ttl 64, id 60716, offset 0, flags [DF], proto TCP (6), length 60)
337 109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0x9e0a), seq 851:859, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 8: OpenFlow
338 version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000025
339 52 2015-01-30 16:11:54.552183 IP (tos 0x0, ttl 55, id 49517, offset 0, flags [DF], proto TCP (6), length 60)
340 88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9e80 (correct), seq 1433:1441, ack 859, win 123, options [nop,nop,TS val 50526797 ecr 590230889], length 8: OpenFlow
341 version 1.0, type BARRIER_REPLY, length 8, xid 0x00000025
342 53 2015-01-30 16:11:54.591537 IP (tos 0x0, ttl 64, id 60717, offset 0, flags [DF], proto TCP (6), length 52)
343 109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f3a), seq 859, ack 1441, win 252, options [nop,nop,TS val 590230902 ecr 50526797], length 0