1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428
|
1 2013-08-28 12:21:09.940811 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62224 > 172.16.1.51.6633: Flags [S], cksum 0x6dd0 (correct), seq 2446711727, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
2 2013-08-28 12:21:09.940894 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
172.16.1.51.6633 > 172.16.1.101.62224: Flags [R.], cksum 0xda97 (correct), seq 0, ack 2446711728, win 0, length 0
3 2013-08-28 12:21:13.928916 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [S], cksum 0xa14c (correct), seq 2619186670, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
4 2013-08-28 12:21:13.929013 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [S.], cksum 0x5ae7 (incorrect -> 0x3c7c), seq 3998019188, ack 2619186671, win 14480, options [mss 1460,nop,nop,TS val 2256457959 ecr 0,nop,wscale 7], length 0
5 2013-08-28 12:21:13.930368 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x956f (correct), seq 1, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 0
6 2013-08-28 12:21:13.930613 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xb6f9 (correct), seq 1:9, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 8: OpenFlow
version 1.0, type HELLO, length 8, xid 0x000cdd51
7 2013-08-28 12:21:13.930635 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0xa05b), seq 1, ack 9, win 114, options [nop,nop,TS val 2256457961 ecr 0], length 0
8 2013-08-28 12:21:13.955911 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f29), seq 1:9, ack 9, win 114, options [nop,nop,TS val 2256457986 ecr 0], length 8: OpenFlow
version 1.0, type HELLO, length 8, xid 0x00000001
9 2013-08-28 12:21:13.963832 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f13), seq 9:17, ack 9, win 114, options [nop,nop,TS val 2256457994 ecr 0], length 8: OpenFlow
version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
10 2013-08-28 12:21:13.964871 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x9544 (correct), seq 9, ack 17, win 2912, options [nop,nop,TS val 0 ecr 2256457986], length 0
11 2013-08-28 12:21:13.972093 IP (tos 0xa0, ttl 64, id 10679, offset 0, flags [DF], proto TCP (6), length 468)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xcacf (correct), seq 9:425, ack 17, win 2920, options [nop,nop,TS val 0 ecr 2256457986], length 416: OpenFlow
version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
dpid 0x000100255cab0c07, n_buffers 544, n_tables 11
capabilities 0x00000087 (FLOW_STATS, TABLE_STATS, PORT_STATS, ARP_MATCH_IP)
actions 0x00000fff (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, STRIP_VLAN, SET_DL_SRC, SET_DL_DST, SET_NW_SRC, SET_NW_DST, SET_NW_TOS, SET_TP_SRC, SET_TP_DST, ENQUEUE)
port_no 1, hw_addr 00:25:5c:ab:0c:87, name 'GBE0/1'
config 0x00000002 (NO_STP)
state 0x00000200 (STP_FORWARD)
curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 2, hw_addr 00:25:5c:ab:0c:47, name 'GBE0/2'
config 0x00000002 (NO_STP)
state 0x00000200 (STP_FORWARD)
curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 3, hw_addr 00:25:5c:ab:0c:c7, name 'GBE0/3'
config 0x00000002 (NO_STP)
state 0x00000200 (STP_FORWARD)
curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 4, hw_addr 00:25:5c:ab:0c:27, name 'GBE0/4'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 5, hw_addr 00:25:5c:ab:0c:a7, name 'GBE0/5'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 6, hw_addr 00:25:5c:ab:0c:67, name 'GBE0/6'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 7, hw_addr 00:25:5c:ab:0c:e7, name 'GBE0/7'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 8, hw_addr 00:25:5c:ab:0c:17, name 'GBE0/8'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
12 2013-08-28 12:21:13.979465 IP (tos 0x0, ttl 64, id 16031, offset 0, flags [DF], proto TCP (6), length 136)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b33 (incorrect -> 0x9b62), seq 17:101, ack 425, win 122, options [nop,nop,TS val 2256458010 ecr 0], length 84: OpenFlow
version 1.0, type SET_CONFIG, length 12, xid 0x00000003
flags FRAG_NORMAL, miss_send_len 65535
version 1.0, type FLOW_MOD, length 72, xid 0x00000004
cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
13 2013-08-28 12:21:13.983645 IP (tos 0x0, ttl 64, id 16032, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9ceb), seq 101:109, ack 425, win 122, options [nop,nop,TS val 2256458014 ecr 0], length 8: OpenFlow
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
14 2013-08-28 12:21:13.984861 IP (tos 0xa0, ttl 64, id 10680, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x932f (correct), seq 425, ack 109, win 2912, options [nop,nop,TS val 1 ecr 2256458010], length 0
15 2013-08-28 12:21:13.985088 IP (tos 0xa0, ttl 64, id 10681, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x91f7 (correct), seq 425:433, ack 109, win 2920, options [nop,nop,TS val 1 ecr 2256458010], length 8: OpenFlow
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
16 2013-08-28 12:21:13.986563 IP (tos 0x0, ttl 64, id 16033, offset 0, flags [DF], proto TCP (6), length 72)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x9ba7), seq 109:129, ack 433, win 122, options [nop,nop,TS val 2256458017 ecr 1], length 20: OpenFlow
version 1.0, type STATS_REQUEST, length 12, xid 0x00000006
type DESC, flags 0x0000
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000007
17 2013-08-28 12:21:13.988086 IP (tos 0xa0, ttl 64, id 10682, offset 0, flags [DF], proto TCP (6), length 1120)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x7324 (correct), seq 433:1501, ack 129, win 2912, options [nop,nop,TS val 1 ecr 2256458017], length 1068: OpenFlow
version 1.0, type STATS_REPLY, length 1068, xid 0x00000006
type DESC, flags 0x0000
mfr_desc 'NEC Corporation'
hw_desc 'PF5240F-48T4XW-AX(L1L2)'
sw_desc 'OS-F3PA Ver. V4.0.1.0'
serial_num 'Y1252CFA0000S4068C8N004'
dp_desc 'PFS1'
18 2013-08-28 12:21:14.028020 IP (tos 0x0, ttl 64, id 16034, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x998b), seq 129, ack 1501, win 139, options [nop,nop,TS val 2256458059 ecr 1], length 0
19 2013-08-28 12:21:14.029070 IP (tos 0xa0, ttl 64, id 10686, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8da6 (correct), seq 1501:1509, ack 129, win 2920, options [nop,nop,TS val 1 ecr 2256458017], length 8: OpenFlow
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000007
20 2013-08-28 12:21:14.029095 IP (tos 0x0, ttl 64, id 16035, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9982), seq 129, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 0
21 2013-08-28 12:21:14.029852 IP (tos 0x0, ttl 64, id 16036, offset 0, flags [DF], proto TCP (6), length 84)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5aff (incorrect -> 0x95e2), seq 129:161, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 32: OpenFlow
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000008
port 1
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000009
port 2
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
22 2013-08-28 12:21:14.030813 IP (tos 0xa0, ttl 64, id 10687, offset 0, flags [DF], proto TCP (6), length 196)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b77 (correct), seq 1509:1653, ack 161, win 2900, options [nop,nop,TS val 1 ecr 2256458060], length 144: OpenFlow
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000008
port 1
queue_id 0, len 16
property NONE, len 8
queue_id 1, len 16
property NONE, len 8
queue_id 2, len 16
property NONE, len 8
queue_id 3, len 16
property NONE, len 8
queue_id 4, len 16
property NONE, len 8
queue_id 5, len 16
property NONE, len 8
queue_id 6, len 16
property NONE, len 8
queue_id 7, len 16
property NONE, len 8
23 2013-08-28 12:21:14.070016 IP (tos 0x0, ttl 64, id 16037, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9899), seq 161, ack 1653, win 155, options [nop,nop,TS val 2256458101 ecr 1], length 0
24 2013-08-28 12:21:14.071040 IP (tos 0xa0, ttl 64, id 10688, offset 0, flags [DF], proto TCP (6), length 204)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x89a4 (correct), seq 1653:1805, ack 161, win 2920, options [nop,nop,TS val 1 ecr 2256458060], length 152: OpenFlow
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000009
port 2
queue_id 0, len 16
property NONE, len 8
queue_id 1, len 16
property NONE, len 8
queue_id 2, len 16
property NONE, len 8
queue_id 3, len 16
property NONE, len 8
queue_id 4, len 16
property NONE, len 8
queue_id 5, len 16
property NONE, len 8
queue_id 6, len 16
property NONE, len 8
queue_id 7, len 16
property NONE, len 8
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
25 2013-08-28 12:21:14.071062 IP (tos 0x0, ttl 64, id 16038, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x97ef), seq 161, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 0
26 2013-08-28 12:21:14.071697 IP (tos 0x0, ttl 64, id 16039, offset 0, flags [DF], proto TCP (6), length 100)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b0f (incorrect -> 0x9424), seq 161:209, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 48: OpenFlow
version 1.0, type STATS_REQUEST, length 20, xid 0x0000000b
type QUEUE, flags 0x0000
port_no 1, queue_id ALL
version 1.0, type STATS_REQUEST, length 20, xid 0x0000000c
type QUEUE, flags 0x0000
port_no 2, queue_id ALL
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
27 2013-08-28 12:21:14.073035 IP (tos 0xa0, ttl 64, id 10689, offset 0, flags [DF], proto TCP (6), length 96)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b9c (correct), seq 1805:1849, ack 209, win 2892, options [nop,nop,TS val 1 ecr 2256458102], length 44: OpenFlow
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
28 2013-08-28 12:21:14.113015 IP (tos 0x0, ttl 64, id 16040, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9769), seq 209, ack 1849, win 172, options [nop,nop,TS val 2256458144 ecr 1], length 0
29 2013-08-28 12:21:14.114014 IP (tos 0xa0, ttl 64, id 10690, offset 0, flags [DF], proto TCP (6), length 744)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x72af (correct), seq 1849:2541, ack 209, win 2920, options [nop,nop,TS val 1 ecr 2256458102], length 692: OpenFlow
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 12, xid 0x0000000b
type QUEUE, flags 0x0000
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 12, xid 0x0000000c
type QUEUE, flags 0x0000
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
30 2013-08-28 12:21:14.114038 IP (tos 0x0, ttl 64, id 16041, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x94a3), seq 209, ack 2541, win 189, options [nop,nop,TS val 2256458145 ecr 1], length 0
31 2013-08-28 12:21:14.116167 IP (tos 0x0, ttl 64, id 16042, offset 0, flags [DF], proto TCP (6), length 700)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5d67 (incorrect -> 0xa5e9), seq 209:857, ack 2541, win 189, options [nop,nop,TS val 2256458147 ecr 1], length 648: OpenFlow
version 1.0, type FLOW_MOD, length 80, xid 0x0000000e
match in_port 1
cookie 0x0000000000000001, command ADD, priority 24100, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 4
version 1.0, type FLOW_MOD, length 80, xid 0x0000000f
match in_port 2
cookie 0x0000000000000002, command ADD, priority 24200, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 4
version 1.0, type FLOW_MOD, length 80, xid 0x00000010
match in_port 3
cookie 0x0000000000000003, command ADD, priority 24300, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 4
version 1.0, type FLOW_MOD, length 80, xid 0x00000011
match in_port 5
cookie 0x0000000000000004, command ADD, priority 20500, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000012
match in_port 6
cookie 0x0000000000000005, command ADD, priority 20600, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000013
match in_port 7
cookie 0x0000000000000006, command ADD, priority 20700, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000014
match in_port 4
cookie 0x0000000000000007, command ADD, priority 25400, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000015
match in_port 8
cookie 0x0000000000000008, command ADD, priority 25800, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
action type OUTPUT, len 8, port 4
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000016
32 2013-08-28 12:21:14.125259 IP (tos 0xa0, ttl 64, id 10691, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x862d (correct), seq 2541:2549, ack 857, win 2920, options [nop,nop,TS val 1 ecr 2256458147], length 8: OpenFlow
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000016
33 2013-08-28 12:21:14.127411 IP (tos 0x0, ttl 64, id 16043, offset 0, flags [DF], proto TCP (6), length 116)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b1f (incorrect -> 0x6ef4), seq 857:921, ack 2549, win 189, options [nop,nop,TS val 2256458158 ecr 1], length 64: OpenFlow
version 1.0, type STATS_REQUEST, length 56, xid 0x00000017
type FLOW, flags 0x0000
table_id ALL, out_port NONE
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000018
34 2013-08-28 12:21:14.128774 IP (tos 0xa0, ttl 64, id 10692, offset 0, flags [DF], proto TCP (6), length 160)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x0485 (correct), seq 2549:2657, ack 921, win 2912, options [nop,nop,TS val 1 ecr 2256458158], length 108: OpenFlow
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 0
match in_port 3
duration_sec 0, duration_nsec 0, priority 24300, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
35 2013-08-28 12:21:14.168017 IP (tos 0x0, ttl 64, id 16044, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9131), seq 921, ack 2657, win 189, options [nop,nop,TS val 2256458199 ecr 1], length 0
36 2013-08-28 12:21:14.168997 IP (tos 0xa0, ttl 64, id 10693, offset 0, flags [DF], proto TCP (6), length 828)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x1544 (correct), seq 2657:3433, ack 921, win 2920, options [nop,nop,TS val 1 ecr 2256458158], length 776: OpenFlow
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 0
match in_port 2
duration_sec 0, duration_nsec 0, priority 24200, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 0
match in_port 1
duration_sec 0, duration_nsec 0, priority 24100, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 1
match in_port 7
duration_sec 0, duration_nsec 0, priority 20700, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 1
match in_port 6
duration_sec 0, duration_nsec 0, priority 20600, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 1
match in_port 5
duration_sec 0, duration_nsec 0, priority 20500, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id EMERG
match in_port 8
duration_sec 0, duration_nsec 0, priority 25800, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id EMERG
match in_port 4
duration_sec 0, duration_nsec 0, priority 25400, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 12, xid 0x00000017
type FLOW, flags 0x0000
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000018
37 2013-08-28 12:21:14.169020 IP (tos 0x0, ttl 64, id 16045, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8e18), seq 921, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 0
38 2013-08-28 12:21:14.169616 IP (tos 0x0, ttl 64, id 16046, offset 0, flags [DF], proto TCP (6), length 72)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x8b90), seq 921:941, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 20: OpenFlow
version 1.0, type STATS_REQUEST, length 12, xid 0x00000019
type TABLE, flags 0x0000
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000001a
39 2013-08-28 12:21:14.170981 IP (tos 0xa0, ttl 64, id 10694, offset 0, flags [DF], proto TCP (6), length 128)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xe84a (correct), seq 3433:3509, ack 941, win 2912, options [nop,nop,TS val 1 ecr 2256458200], length 76: OpenFlow
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 0, name 'Normal 1 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 5632, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
40 2013-08-28 12:21:14.210016 IP (tos 0x0, ttl 64, id 16047, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8d8f), seq 941, ack 3509, win 205, options [nop,nop,TS val 2256458241 ecr 1], length 0
41 2013-08-28 12:21:14.210954 IP (tos 0xa0, ttl 64, id 10695, offset 0, flags [DF], proto TCP (6), length 832)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x198c (correct), seq 3509:4289, ack 941, win 2920, options [nop,nop,TS val 1 ecr 2256458200], length 780: OpenFlow
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 1, name 'Expanded Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 163840, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 20, name 'Normal 2 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 50, name 'Mpls 1 Flow Table'
wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 51, name 'Mpls 2 Flow Table'
wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 16384, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 99, name 'Software Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 2048, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 100, name 'V-Normal 1 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 101, name 'V-Expanded Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 120, name 'V-Normal 2 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 140, name 'Q-Normal 1 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id EMERG, name 'Emergency Flow Cache'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 5632, active_count 2, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 12, xid 0x00000019
type TABLE, flags 0x0000
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000001a
42 2013-08-28 12:21:14.210982 IP (tos 0x0, ttl 64, id 16048, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8a72), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458241 ecr 1], length 0
43 2013-08-28 12:21:14.486208 IP (tos 0x0, ttl 64, id 16049, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [F.], cksum 0x5adf (incorrect -> 0x895d), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458517 ecr 1], length 0
44 2013-08-28 12:21:14.489079 IP (tos 0xa0, ttl 64, id 10696, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x7ed2 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
45 2013-08-28 12:21:14.489301 IP (tos 0xa0, ttl 64, id 10697, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [F.], cksum 0x7ed1 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
46 2013-08-28 12:21:14.489341 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x8958 (correct), seq 942, ack 4290, win 222, options [nop,nop,TS val 2256458520 ecr 2], length 0
47 2013-08-28 12:21:20.463722 IP (tos 0xa0, ttl 64, id 10710, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62216 > 172.16.1.51.6633: Flags [S], cksum 0xf0a4 (correct), seq 2928426028, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
48 2013-08-28 12:21:20.463750 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
172.16.1.51.6633 > 172.16.1.101.62216: Flags [R.], cksum 0x5d6c (correct), seq 0, ack 2928426029, win 0, length 0
|