0% found this document useful (0 votes)
121 views

Console Output CLI Console

The document contains log output from a FortiGate firewall. It shows the details of a TCP connection between an internal host at 10.129.1.4 and an external host at 189.119.0.110 port 443. The connection involved source NAT of the internal host IP to 172.25.231.106. The logs trace the packet flows and firewall processing as the connection is established and data is exchanged in both directions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views

Console Output CLI Console

The document contains log output from a FortiGate firewall. It shows the details of a TCP connection between an internal host at 10.129.1.4 and an external host at 189.119.0.110 port 443. The connection involved source NAT of the internal host IP to 172.25.231.106. The logs trace the packet flows and firewall processing as the connection is established and data is exchanged in both directions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 24

FGT100F-COSMOL # di de reset

FGT100F-COSMOL # di de flow filter clear

FGT100F-COSMOL # di de flow filter addr 189.119.0.110

FGT100F-COSMOL # di de fl show iprope enable


show trace messages about iprope

FGT100F-COSMOL # di de fl sh function-name enable


show function name

FGT100F-COSMOL # di de fl trace start 20000

FGT100F-COSMOL # di de en

FGT100F-COSMOL # id=20085 trace_id=1 func=print_pkt_detail line=5746 msg="vd-root:0


received a packet(proto=6, 189.119.0.110:443->172.25.231.106:53448) from port12. fl
ag [R], seq 3605850345, ack 0, win 0"
id=20085 trace_id=1 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013ae716, reply direction"
id=20085 trace_id=1 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:53448->10.129.1.7:53448"
id=20085 trace_id=1 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu_
state=0x04000c00"
id=20085 trace_id=1 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000c00"
id=20085 trace_id=2 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [S],
seq 2623
20926, ack 0, win 5840"
id=20085 trace_id=2 func=init_ip_session_common line=5918 msg="allocate a new
session-013b52ff"
id=20085 trace_id=2 func=iprope_dnat_check line=5191 msg="in-[VLAN SERVER], out-[]"
id=20085 trace_id=2 func=iprope_dnat_tree_check line=830 msg="len=0"
id=20085 trace_id=2 func=iprope_dnat_check line=5204 msg="result: skb_flags-
02000000, vid-0, ret-no-match, act-accept, flag-00000000"
id=20085 trace_id=2 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=04000000 gw-172.25.231.105 via port12"
id=20085 trace_id=2 func=iprope_fwd_check line=789 msg="in-[VLAN SERVER], out-
[port12], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
id=20085 trace_id=2 func=__iprope_tree_check line=561 msg="gnum-100004, use
addr/intf hash, len=4"
id=20085 trace_id=2 func=__iprope_check_one_policy line=1994 msg="checked gnum-
100004 policy-5, ret-matched, act-accept"
id=20085 trace_id=2 func=__iprope_user_identity_check line=1815 msg="ret-matched"
id=20085 trace_id=2 func=__iprope_check line=2253 msg="gnum-4e20, check-
ffffffbffc028140"
id=20085 trace_id=2 func=__iprope_check_one_policy line=1994 msg="checked gnum-4e20
policy-6, ret-no-match, act-accept"
id=20085 trace_id=2 func=__iprope_check_one_policy line=1994 msg="checked gnum-4e20
policy-6, ret-no-match, act-accept"
id=20085 trace_id=2 func=__iprope_check_one_policy line=1994 msg="checked gnum-4e20
policy-6, ret-no-match, act-accept"
id=20085 trace_id=2 func=__iprope_check line=2272 msg="gnum-4e20 check result: ret-
no-match, act-accept, flag-00000000, flag2-00000000"
id=20085 trace_id=2 func=get_new_addr line=1229 msg="find SNAT: IP-
172.25.231.106(from IPPOOL), port-57372"
id=20085 trace_id=2 func=__iprope_check_one_policy line=2224 msg="policy-5 is
matched, act-accept"
id=20085 trace_id=2 func=iprope_fwd_check line=826 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=2 func=iprope_fwd_auth_check line=845 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=2 func=iprope_reverse_dnat_check line=1306 msg="in-[VLAN SERVER],
out-[port12], skb_flags-02000000, vid-0"
id=20085 trace_id=2 func=iprope_reverse_dnat_tree_check line=923 msg="len=0"
id=20085 trace_id=2 func=fw_forward_handler line=853 msg="Allowed by Policy-5:
SNAT"
id=20085 trace_id=2 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=3 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57372) from port12. flag [S.],
seq 2164
650399, ack 262320927, win 14480"
id=20085 trace_id=3 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, reply direction"
id=20085 trace_id=3 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57372->10.129.1.4:57372"
id=20085 trace_id=3 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=3 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=3 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=4 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 2623
20927, ack 2164650400, win 46"
id=20085 trace_id=4 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=4 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=4 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=4 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=5 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 2623
20927, ack 2164650400, win 46"
id=20085 trace_id=5 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=5 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=5 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=5 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=6 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57372) from port12. flag [.], seq
21646
50400, ack 262321027, win 114"
id=20085 trace_id=6 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, reply direction"
id=20085 trace_id=6 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57372->10.129.1.4:57372"
id=20085 trace_id=6 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=6 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=7 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57372) from port12. flag [.], seq
21646
50400, ack 262321027, win 114"
id=20085 trace_id=7 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, reply direction"
id=20085 trace_id=7 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57372->10.129.1.4:57372"
id=20085 trace_id=7 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=7 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=8 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57372) from port12. flag [.], seq
21646
51848, ack 262321027, win 114"
id=20085 trace_id=8 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, reply direction"
id=20085 trace_id=8 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57372->10.129.1.4:57372"
id=20085 trace_id=8 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=8 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=9 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57372) from port12. flag [.], seq
21646
53296, ack 262321027, win 114"
id=20085 trace_id=9 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, reply direction"
id=20085 trace_id=9 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57372->10.129.1.4:57372"
id=20085 trace_id=9 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu_
state=0x04000000"
id=20085 trace_id=9 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=10 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
321027, ack 2164651848, win 69"
id=20085 trace_id=10 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=10 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=10 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=10 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=11 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
321027, ack 2164653296, win 91"
id=20085 trace_id=11 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=11 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=11 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=11 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=12 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
321027, ack 2164654418, win 114"
id=20085 trace_id=12 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=12 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=12 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=12 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=13 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
321027, ack 2164654418, win 114"
id=20085 trace_id=13 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=13 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=13 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=13 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=14 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [F.],
seq 26
2321034, ack 2164654418, win 114"
id=20085 trace_id=14 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=14 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=14 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=14 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=15 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57372) from port12. flag [F.],
seq 216
4654418, ack 262321035, win 114"
id=20085 trace_id=15 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, reply direction"
id=20085 trace_id=15 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57372->10.129.1.4:57372"
id=20085 trace_id=15 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=15 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=16 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57372->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
321035, ack 2164654419, win 114"
id=20085 trace_id=16 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b52ff, original direction"
id=20085 trace_id=16 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=16 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=16 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57372"
id=20085 trace_id=17 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [S],
seq 261
425355, ack 0, win 5840"
id=20085 trace_id=17 func=init_ip_session_common line=5918 msg="allocate a new
session-013b53a8"
id=20085 trace_id=17 func=iprope_dnat_check line=5191 msg="in-[VLAN SERVER], out-
[]"
id=20085 trace_id=17 func=iprope_dnat_tree_check line=830 msg="len=0"
id=20085 trace_id=17 func=iprope_dnat_check line=5204 msg="result: skb_flags-
02000000, vid-0, ret-no-match, act-accept, flag-00000000"
id=20085 trace_id=17 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=04000000 gw-172.25.231.105 via port12"
id=20085 trace_id=17 func=iprope_fwd_check line=789 msg="in-[VLAN SERVER], out-
[port12], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
id=20085 trace_id=17 func=__iprope_tree_check line=561 msg="gnum-100004, use
addr/intf hash, len=4"
id=20085 trace_id=17 func=__iprope_check_one_policy line=1994 msg="checked gnum-
100004 policy-5, ret-matched, act-accept"
id=20085 trace_id=17 func=__iprope_user_identity_check line=1815 msg="ret-matched"
id=20085 trace_id=17 func=__iprope_check line=2253 msg="gnum-4e20, check-
ffffffbffc028140"
id=20085 trace_id=17 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=17 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=17 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=17 func=__iprope_check line=2272 msg="gnum-4e20 check result:
ret-no-match, act-accept, flag-00000000, flag2-00000000"
id=20085 trace_id=17 func=get_new_addr line=1229 msg="find SNAT: IP-
172.25.231.106(from IPPOOL), port-57373"
id=20085 trace_id=17 func=__iprope_check_one_policy line=2224 msg="policy-5 is
matched, act-accept"
id=20085 trace_id=17 func=iprope_fwd_check line=826 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=17 func=iprope_fwd_auth_check line=845 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=17 func=iprope_reverse_dnat_check line=1306 msg="in-[VLAN
SERVER], out-[port12], skb_flags-02000000, vid-0"
id=20085 trace_id=17 func=iprope_reverse_dnat_tree_check line=923 msg="len=0"
id=20085 trace_id=17 func=fw_forward_handler line=853 msg="Allowed by Policy-5:
SNAT"
id=20085 trace_id=17 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=18 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57373) from port12. flag [S.],
seq 396
7454291, ack 261425356, win 14480"
id=20085 trace_id=18 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, reply direction"
id=20085 trace_id=18 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57373->10.129.1.4:57373"
id=20085 trace_id=18 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=18 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=18 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=19 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425356, ack 3967454292, win 46"
id=20085 trace_id=19 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=19 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=19 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=19 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=20 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425356, ack 3967454292, win 46"
id=20085 trace_id=20 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=20 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=20 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=20 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=21 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57373) from port12. flag [.], seq
3967
454292, ack 261425456, win 114"
id=20085 trace_id=21 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, reply direction"
id=20085 trace_id=21 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57373->10.129.1.4:57373"
id=20085 trace_id=21 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=21 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=22 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57373) from port12. flag [.], seq
3967
454292, ack 261425456, win 114"
id=20085 trace_id=22 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, reply direction"
id=20085 trace_id=22 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57373->10.129.1.4:57373"
id=20085 trace_id=22 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=22 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=23 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57373) from port12. flag [.], seq
3967
455740, ack 261425456, win 114"
id=20085 trace_id=23 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, reply direction"
id=20085 trace_id=23 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57373->10.129.1.4:57373"
id=20085 trace_id=23 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=23 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=24 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57373) from port12. flag [.], seq
3967
457188, ack 261425456, win 114"
id=20085 trace_id=24 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, reply direction"
id=20085 trace_id=24 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57373->10.129.1.4:57373"
id=20085 trace_id=24 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=24 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=25 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425456, ack 3967455740, win 69"
id=20085 trace_id=25 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=25 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=25 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=25 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=26 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425456, ack 3967457188, win 91"
id=20085 trace_id=26 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=26 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=26 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=26 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=27 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425456, ack 3967458310, win 114"
id=20085 trace_id=27 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=27 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=27 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=27 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=28 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425456, ack 3967458310, win 114"
id=20085 trace_id=28 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=28 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=28 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=28 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=29 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [F.],
seq 26
1425463, ack 3967458310, win 114"
id=20085 trace_id=29 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=29 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=29 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=29 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=30 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57373) from port12. flag [F.],
seq 396
7458310, ack 261425464, win 114"
id=20085 trace_id=30 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, reply direction"
id=20085 trace_id=30 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57373->10.129.1.4:57373"
id=20085 trace_id=30 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=30 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=31 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57373->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 261
425464, ack 3967458311, win 114"
id=20085 trace_id=31 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53a8, original direction"
id=20085 trace_id=31 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=31 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=31 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57373"
id=20085 trace_id=32 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [S],
seq 262
880256, ack 0, win 5840"
id=20085 trace_id=32 func=init_ip_session_common line=5918 msg="allocate a new
session-013b53bd"
id=20085 trace_id=32 func=iprope_dnat_check line=5191 msg="in-[VLAN SERVER], out-
[]"
id=20085 trace_id=32 func=iprope_dnat_tree_check line=830 msg="len=0"
id=20085 trace_id=32 func=iprope_dnat_check line=5204 msg="result: skb_flags-
02000000, vid-0, ret-no-match, act-accept, flag-00000000"
id=20085 trace_id=32 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=04000000 gw-172.25.231.105 via port12"
id=20085 trace_id=32 func=iprope_fwd_check line=789 msg="in-[VLAN SERVER], out-
[port12], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
id=20085 trace_id=32 func=__iprope_tree_check line=561 msg="gnum-100004, use
addr/intf hash, len=4"
id=20085 trace_id=32 func=__iprope_check_one_policy line=1994 msg="checked gnum-
100004 policy-5, ret-matched, act-accept"
id=20085 trace_id=32 func=__iprope_user_identity_check line=1815 msg="ret-matched"
id=20085 trace_id=32 func=__iprope_check line=2253 msg="gnum-4e20, check-
ffffffbffc028140"
id=20085 trace_id=32 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=32 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=32 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=32 func=__iprope_check line=2272 msg="gnum-4e20 check result:
ret-no-match, act-accept, flag-00000000, flag2-00000000"
id=20085 trace_id=32 func=get_new_addr line=1229 msg="find SNAT: IP-
172.25.231.106(from IPPOOL), port-57374"
id=20085 trace_id=32 func=__iprope_check_one_policy line=2224 msg="policy-5 is
matched, act-accept"
id=20085 trace_id=32 func=iprope_fwd_check line=826 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=32 func=iprope_fwd_auth_check line=845 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=32 func=iprope_reverse_dnat_check line=1306 msg="in-[VLAN
SERVER], out-[port12], skb_flags-02000000, vid-0"
id=20085 trace_id=32 func=iprope_reverse_dnat_tree_check line=923 msg="len=0"
id=20085 trace_id=32 func=fw_forward_handler line=853 msg="Allowed by Policy-5:
SNAT"
id=20085 trace_id=32 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=33 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [S.],
seq 396
94244, ack 262880257, win 14480"
id=20085 trace_id=33 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=33 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=33 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=33 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=33 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=34 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880257, ack 39694245, win 46"
id=20085 trace_id=34 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=34 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=34 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=34 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=35 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880257, ack 39694245, win 46"
id=20085 trace_id=35 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=35 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=35 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=35 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=36 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [.], seq
3969
4245, ack 262880357, win 114"
id=20085 trace_id=36 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=36 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=36 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=36 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=37 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [.], seq
3969
4245, ack 262880357, win 114"
id=20085 trace_id=37 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=37 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=37 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=37 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=38 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [.], seq
3969
5693, ack 262880357, win 114"
id=20085 trace_id=38 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=38 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=38 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=38 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=39 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [.], seq
3969
6293, ack 262880357, win 114"
id=20085 trace_id=39 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=39 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=39 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=39 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=40 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880357, ack 39695693, win 69"
id=20085 trace_id=40 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=40 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=40 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=40 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=41 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880357, ack 39696293, win 91"
id=20085 trace_id=41 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=41 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=41 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=41 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=42 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880357, ack 39697741, win 114"
id=20085 trace_id=42 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=42 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=42 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=42 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=43 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [.], seq
3969
7741, ack 262880357, win 114"
id=20085 trace_id=43 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=43 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=43 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=43 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=44 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880357, ack 39698263, win 137"
id=20085 trace_id=44 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=44 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=44 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=44 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=45 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880357, ack 39698263, win 137"
id=20085 trace_id=45 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=45 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=45 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=45 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=46 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [F.],
seq 26
2880364, ack 39698263, win 137"
id=20085 trace_id=46 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=46 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=46 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=46 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=47 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57374) from port12. flag [F.],
seq 396
98263, ack 262880365, win 114"
id=20085 trace_id=47 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, reply direction"
id=20085 trace_id=47 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57374->10.129.1.4:57374"
id=20085 trace_id=47 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=47 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=48 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57374->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 262
880365, ack 39698264, win 137"
id=20085 trace_id=48 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53bd, original direction"
id=20085 trace_id=48 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=48 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=48 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57374"
id=20085 trace_id=49 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [S],
seq 274
643200, ack 0, win 5840"
id=20085 trace_id=49 func=init_ip_session_common line=5918 msg="allocate a new
session-013b53d5"
id=20085 trace_id=49 func=iprope_dnat_check line=5191 msg="in-[VLAN SERVER], out-
[]"
id=20085 trace_id=49 func=iprope_dnat_tree_check line=830 msg="len=0"
id=20085 trace_id=49 func=iprope_dnat_check line=5204 msg="result: skb_flags-
02000000, vid-0, ret-no-match, act-accept, flag-00000000"
id=20085 trace_id=49 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=04000000 gw-172.25.231.105 via port12"
id=20085 trace_id=49 func=iprope_fwd_check line=789 msg="in-[VLAN SERVER], out-
[port12], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
id=20085 trace_id=49 func=__iprope_tree_check line=561 msg="gnum-100004, use
addr/intf hash, len=4"
id=20085 trace_id=49 func=__iprope_check_one_policy line=1994 msg="checked gnum-
100004 policy-5, ret-matched, act-accept"
id=20085 trace_id=49 func=__iprope_user_identity_check line=1815 msg="ret-matched"
id=20085 trace_id=49 func=__iprope_check line=2253 msg="gnum-4e20, check-
ffffffbffc028140"
id=20085 trace_id=49 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=49 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=49 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=49 func=__iprope_check line=2272 msg="gnum-4e20 check result:
ret-no-match, act-accept, flag-00000000, flag2-00000000"
id=20085 trace_id=49 func=get_new_addr line=1229 msg="find SNAT: IP-
172.25.231.106(from IPPOOL), port-57375"
id=20085 trace_id=49 func=__iprope_check_one_policy line=2224 msg="policy-5 is
matched, act-accept"
id=20085 trace_id=49 func=iprope_fwd_check line=826 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=49 func=iprope_fwd_auth_check line=845 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=49 func=iprope_reverse_dnat_check line=1306 msg="in-[VLAN
SERVER], out-[port12], skb_flags-02000000, vid-0"
id=20085 trace_id=49 func=iprope_reverse_dnat_tree_check line=923 msg="len=0"
id=20085 trace_id=49 func=fw_forward_handler line=853 msg="Allowed by Policy-5:
SNAT"
id=20085 trace_id=49 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=50 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57375) from port12. flag [S.],
seq 320
2919116, ack 274643201, win 14480"
id=20085 trace_id=50 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, reply direction"
id=20085 trace_id=50 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57375->10.129.1.4:57375"
id=20085 trace_id=50 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=50 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=50 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=51 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643201, ack 3202919117, win 46"
id=20085 trace_id=51 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=51 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=51 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=51 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=52 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643201, ack 3202919117, win 46"
id=20085 trace_id=52 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=52 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=52 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=52 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=53 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57375) from port12. flag [.], seq
3202
919117, ack 274643301, win 114"
id=20085 trace_id=53 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, reply direction"
id=20085 trace_id=53 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57375->10.129.1.4:57375"
id=20085 trace_id=53 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=53 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=54 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57375) from port12. flag [.], seq
3202
919117, ack 274643301, win 114"
id=20085 trace_id=54 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, reply direction"
id=20085 trace_id=54 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57375->10.129.1.4:57375"
id=20085 trace_id=54 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=54 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=55 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57375) from port12. flag [.], seq
3202
920565, ack 274643301, win 114"
id=20085 trace_id=55 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, reply direction"
id=20085 trace_id=55 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57375->10.129.1.4:57375"
id=20085 trace_id=55 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=55 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=56 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643301, ack 3202920565, win 69"
id=20085 trace_id=56 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=56 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=56 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=56 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=57 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643301, ack 3202922013, win 91"
id=20085 trace_id=57 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=57 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=57 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=57 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=58 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57375) from port12. flag [.], seq
3202
922013, ack 274643301, win 114"
id=20085 trace_id=58 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, reply direction"
id=20085 trace_id=58 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57375->10.129.1.4:57375"
id=20085 trace_id=58 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=58 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=59 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643301, ack 3202923135, win 114"
id=20085 trace_id=59 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=59 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=59 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=59 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=60 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643301, ack 3202923135, win 114"
id=20085 trace_id=60 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=60 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=60 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=60 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=61 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [F.],
seq 27
4643308, ack 3202923135, win 114"
id=20085 trace_id=61 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=61 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=61 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=61 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=62 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57375) from port12. flag [F.],
seq 320
2923135, ack 274643309, win 114"
id=20085 trace_id=62 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, reply direction"
id=20085 trace_id=62 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57375->10.129.1.4:57375"
id=20085 trace_id=62 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=62 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=63 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57375->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 274
643309, ack 3202923136, win 114"
id=20085 trace_id=63 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b53d5, original direction"
id=20085 trace_id=63 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=63 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=63 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57375"
id=20085 trace_id=64 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [S],
seq 264
696311, ack 0, win 5840"
id=20085 trace_id=64 func=init_ip_session_common line=5918 msg="allocate a new
session-013b54c9"
id=20085 trace_id=64 func=iprope_dnat_check line=5191 msg="in-[VLAN SERVER], out-
[]"
id=20085 trace_id=64 func=iprope_dnat_tree_check line=830 msg="len=0"
id=20085 trace_id=64 func=iprope_dnat_check line=5204 msg="result: skb_flags-
02000000, vid-0, ret-no-match, act-accept, flag-00000000"
id=20085 trace_id=64 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=04000000 gw-172.25.231.105 via port12"
id=20085 trace_id=64 func=iprope_fwd_check line=789 msg="in-[VLAN SERVER], out-
[port12], skb_flags-02000000, vid-0, app_id: 0, url_cat_id: 0"
id=20085 trace_id=64 func=__iprope_tree_check line=561 msg="gnum-100004, use
addr/intf hash, len=4"
id=20085 trace_id=64 func=__iprope_check_one_policy line=1994 msg="checked gnum-
100004 policy-5, ret-matched, act-accept"
id=20085 trace_id=64 func=__iprope_user_identity_check line=1815 msg="ret-matched"
id=20085 trace_id=64 func=__iprope_check line=2253 msg="gnum-4e20, check-
ffffffbffc028140"
id=20085 trace_id=64 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=64 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=64 func=__iprope_check_one_policy line=1994 msg="checked gnum-
4e20 policy-6, ret-no-match, act-accept"
id=20085 trace_id=64 func=__iprope_check line=2272 msg="gnum-4e20 check result:
ret-no-match, act-accept, flag-00000000, flag2-00000000"
id=20085 trace_id=64 func=get_new_addr line=1229 msg="find SNAT: IP-
172.25.231.106(from IPPOOL), port-57376"
id=20085 trace_id=64 func=__iprope_check_one_policy line=2224 msg="policy-5 is
matched, act-accept"
id=20085 trace_id=64 func=iprope_fwd_check line=826 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=64 func=iprope_fwd_auth_check line=845 msg="after
iprope_captive_check(): is_captive-0, ret-matched, act-accept, idx-5"
id=20085 trace_id=64 func=iprope_reverse_dnat_check line=1306 msg="in-[VLAN
SERVER], out-[port12], skb_flags-02000000, vid-0"
id=20085 trace_id=64 func=iprope_reverse_dnat_tree_check line=923 msg="len=0"
id=20085 trace_id=64 func=fw_forward_handler line=853 msg="Allowed by Policy-5:
SNAT"
id=20085 trace_id=64 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=65 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [S.],
seq 856
762074, ack 264696312, win 14480"
id=20085 trace_id=65 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=65 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=65 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=65 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=65 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=66 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696312, ack 856762075, win 46"
id=20085 trace_id=66 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=66 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=66 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=66 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=67 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696312, ack 856762075, win 46"
id=20085 trace_id=67 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=67 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=67 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=67 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=68 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [.], seq
8567
62075, ack 264696412, win 114"
id=20085 trace_id=68 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=68 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=68 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=68 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=69 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [.], seq
8567
62075, ack 264696412, win 114"
id=20085 trace_id=69 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=69 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=69 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=69 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=70 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [.], seq
8567
63523, ack 264696412, win 114"
id=20085 trace_id=70 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=70 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=70 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=70 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=71 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [.], seq
8567
64123, ack 264696412, win 114"
id=20085 trace_id=71 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=71 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=71 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=71 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=72 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696412, ack 856763523, win 69"
id=20085 trace_id=72 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=72 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=72 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=72 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=73 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696412, ack 856764123, win 91"
id=20085 trace_id=73 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=73 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=73 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=73 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=74 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696412, ack 856765571, win 114"
id=20085 trace_id=74 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=74 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=74 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=74 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=75 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [.], seq
8567
65571, ack 264696412, win 114"
id=20085 trace_id=75 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=75 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=75 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=75 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=76 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696412, ack 856766093, win 137"
id=20085 trace_id=76 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=76 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=76 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=76 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=77 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696412, ack 856766093, win 137"
id=20085 trace_id=77 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=77 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000400 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=77 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=77 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=78 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [F.],
seq 26
4696419, ack 856766093, win 137"
id=20085 trace_id=78 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=78 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00050204
ses.npu
_state=0x04000000"
id=20085 trace_id=78 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=78 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=79 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:57376) from port12. flag [F.],
seq 856
766093, ack 264696420, win 114"
id=20085 trace_id=79 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, reply direction"
id=20085 trace_id=79 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:57376->10.129.1.4:57376"
id=20085 trace_id=79 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=79 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=80 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.4:57376->189.119.0.110:443) from VLAN SERVER. flag [.],
seq 264
696420, ack 856766094, win 137"
id=20085 trace_id=80 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013b54c9, original direction"
id=20085 trace_id=80 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000000"
id=20085 trace_id=80 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=80 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.4-
>172.25.231.106:57376"
id=20085 trace_id=81 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.7:53447->189.119.0.110:443) from VLAN SERVER. flag [F.],
seq 31
50149575, ack 2044296792, win 1026"
id=20085 trace_id=81 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013ae715, original direction"
id=20085 trace_id=81 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000c00"
id=20085 trace_id=81 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000c00"
id=20085 trace_id=81 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.7-
>172.25.231.106:53447"
id=20085 trace_id=82 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:53447) from port12. flag [F.],
seq 204
4296823, ack 3150149576, win 131"
id=20085 trace_id=82 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013ae715, reply direction"
id=20085 trace_id=82 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:53447->10.129.1.7:53447"
id=20085 trace_id=82 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000c00"
id=20085 trace_id=82 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000c00"
id=20085 trace_id=83 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.7:53447->189.119.0.110:443) from VLAN SERVER. flag [R.],
seq 31
50149576, ack 2044296823, win 0"
id=20085 trace_id=83 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013ae715, original direction"
id=20085 trace_id=83 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000c00"
id=20085 trace_id=83 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000c00"
id=20085 trace_id=83 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.7-
>172.25.231.106:53447"
id=20085 trace_id=84 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 10.129.1.7:53447->189.119.0.110:443) from VLAN SERVER. flag [R],
seq 315
0149576, ack 3150149576, win 0"
id=20085 trace_id=84 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013ae715, original direction"
id=20085 trace_id=84 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from VLAN SERVER to port12, skb.npu_flag=00000000 ses.state=00010204
ses.npu
_state=0x04000c00"
id=20085 trace_id=84 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000c00"
id=20085 trace_id=84 func=__ip_session_run_tuple line=3478 msg="SNAT 10.129.1.7-
>172.25.231.106:53447"
Timeout
Connection lost. Press Enter to start a new session.

You might also like