0% found this document useful (0 votes)
192 views9 pages

Console Output CLI Console

The document contains log output from a FortiGate firewall. It shows the resetting of filters, clearing of filters, adding an IP address to a filter, enabling trace messages and function names. It then shows the configuration of timeouts and increasing the admin timeout. The majority of the log consists of trace messages related to receiving packets on an interface and processing and forwarding the packets based on existing sessions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views9 pages

Console Output CLI Console

The document contains log output from a FortiGate firewall. It shows the resetting of filters, clearing of filters, adding an IP address to a filter, enabling trace messages and function names. It then shows the configuration of timeouts and increasing the admin timeout. The majority of the log consists of trace messages related to receiving packets on an interface and processing and forwarding the packets based on existing sessions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 9

FGT100F-COSMOL # di de reset

FGT100F-COSMOL # di de fl filter clear

FGT100F-COSMOL # di de fl filter saddr 189.119.0.110

FGT100F-COSMOL # di de fl show iprope enable


show trace messages about iprope

FGT100F-COSMOL # di de fl sh function-name enable


show function name

FGT100F-COSMOL # di de fl trace start 2000

FGT100F-COSMOL # di de en

FGT100F-COSMOL #
FGT100F-COSMOL # config system global

FGT100F-COSMOL (global) # show full-configuration | grep timeout


set admin-console-timeout 0
set admintimeout 5
set device-idle-timeout 300
set ldapconntimeout 500
set proxy-auth-timeout 10
set remoteauthtimeout 5

FGT100F-COSMOL (global) # set admintimeout 15

FGT100F-COSMOL (global) # end

FGT100F-COSMOL # id=20085 trace_id=250 func=print_pkt_detail line=5746 msg="vd-


root:0 received a packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from
port12.
flag [S.], seq 3223911126, ack 1209343384, win 14480"
id=20085 trace_id=250 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=250 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=250 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=250 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=250 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=251 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from port12. flag [.], seq
322
3911127, ack 1209343484, win 114"
id=20085 trace_id=251 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=251 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=251 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=251 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=252 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from port12. flag [.], seq
322
3911127, ack 1209343484, win 114"
id=20085 trace_id=252 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=252 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=252 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=252 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=253 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from port12. flag [.], seq
322
3912575, ack 1209343484, win 114"
id=20085 trace_id=253 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=253 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=253 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=253 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=254 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from port12. flag [.], seq
322
3913175, ack 1209343484, win 114"
id=20085 trace_id=254 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=254 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=254 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=254 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=255 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from port12. flag [.], seq
322
3914623, ack 1209343484, win 114"
id=20085 trace_id=255 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=255 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=255 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=255 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=256 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36669) from port12. flag [F.],
seq 32
23915145, ack 1209343492, win 114"
id=20085 trace_id=256 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e36d6, reply direction"
id=20085 trace_id=256 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36669->10.129.1.4:36669"
id=20085 trace_id=256 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204 ses.np
u_state=0x04000000"
id=20085 trace_id=256 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=257 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36670) from port12. flag [S.],
seq 33
6470335, ack 1220302361, win 14480"
id=20085 trace_id=257 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3744, reply direction"
id=20085 trace_id=257 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36670->10.129.1.4:36670"
id=20085 trace_id=257 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=257 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=257 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=258 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36670) from port12. flag [.], seq
336
470336, ack 1220302461, win 114"
id=20085 trace_id=258 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3744, reply direction"
id=20085 trace_id=258 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36670->10.129.1.4:36670"
id=20085 trace_id=258 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=258 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=259 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36670) from port12. flag [.], seq
336
470336, ack 1220302461, win 114"
id=20085 trace_id=259 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3744, reply direction"
id=20085 trace_id=259 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36670->10.129.1.4:36670"
id=20085 trace_id=259 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=259 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=260 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36670) from port12. flag [.], seq
336
471784, ack 1220302461, win 114"
id=20085 trace_id=260 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3744, reply direction"
id=20085 trace_id=260 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36670->10.129.1.4:36670"
id=20085 trace_id=260 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=260 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=261 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36670) from port12. flag [.], seq
336
473232, ack 1220302461, win 114"
id=20085 trace_id=261 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3744, reply direction"
id=20085 trace_id=261 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36670->10.129.1.4:36670"
id=20085 trace_id=261 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=261 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=262 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36670) from port12. flag [F.],
seq 33
6474354, ack 1220302469, win 114"
id=20085 trace_id=262 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3744, reply direction"
id=20085 trace_id=262 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36670->10.129.1.4:36670"
id=20085 trace_id=262 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204 ses.np
u_state=0x04000000"
id=20085 trace_id=262 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=263 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [S.],
seq 41
23235609, ack 1222818878, win 14480"
id=20085 trace_id=263 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=263 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=263 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=263 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=263 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=264 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [.], seq
412
3235610, ack 1222818978, win 114"
id=20085 trace_id=264 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=264 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=264 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=264 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=265 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [.], seq
412
3235610, ack 1222818978, win 114"
id=20085 trace_id=265 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=265 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=265 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=265 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=266 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [.], seq
412
3237058, ack 1222818978, win 114"
id=20085 trace_id=266 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=266 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=266 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=266 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=267 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [.], seq
412
3237658, ack 1222818978, win 114"
id=20085 trace_id=267 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=267 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=267 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=267 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=268 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [.], seq
412
3239106, ack 1222818978, win 114"
id=20085 trace_id=268 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=268 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=268 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=268 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=269 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36671) from port12. flag [F.],
seq 41
23239628, ack 1222818986, win 114"
id=20085 trace_id=269 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3756, reply direction"
id=20085 trace_id=269 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36671->10.129.1.4:36671"
id=20085 trace_id=269 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204 ses.np
u_state=0x04000000"
id=20085 trace_id=269 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=270 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [S.],
seq 41
1550723, ack 1213949849, win 14480"
id=20085 trace_id=270 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=270 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=270 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=270 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=270 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=271 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [.], seq
411
550724, ack 1213949949, win 114"
id=20085 trace_id=271 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=271 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=271 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=271 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=272 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [.], seq
411
550724, ack 1213949949, win 114"
id=20085 trace_id=272 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=272 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=272 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=272 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=273 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [.], seq
411
552172, ack 1213949949, win 114"
id=20085 trace_id=273 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=273 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=273 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=273 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=274 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [.], seq
411
552772, ack 1213949949, win 114"
id=20085 trace_id=274 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=274 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=274 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=274 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=275 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [.], seq
411
554220, ack 1213949949, win 114"
id=20085 trace_id=275 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=275 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=275 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=275 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=276 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36672) from port12. flag [F.],
seq 41
1554742, ack 1213949957, win 114"
id=20085 trace_id=276 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e376a, reply direction"
id=20085 trace_id=276 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36672->10.129.1.4:36672"
id=20085 trace_id=276 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204 ses.np
u_state=0x04000000"
id=20085 trace_id=276 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=277 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [S.],
seq 37
12784882, ack 1225946226, win 14480"
id=20085 trace_id=277 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=277 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=277 func=vf_ip_route_input_common line=2615 msg="find a route:
flag=00000000 gw-10.129.1.4 via VLAN SERVER"
id=20085 trace_id=277 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=277 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=278 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [.], seq
371
2784883, ack 1225946326, win 114"
id=20085 trace_id=278 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=278 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=278 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=278 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=279 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [.], seq
371
2784883, ack 1225946326, win 114"
id=20085 trace_id=279 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=279 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=279 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=279 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=280 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [.], seq
371
2786331, ack 1225946326, win 114"
id=20085 trace_id=280 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=280 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=280 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=280 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=281 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [.], seq
371
2787779, ack 1225946326, win 114"
id=20085 trace_id=281 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=281 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=281 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000400 ses.state=00050204 ses.np
u_state=0x04000000"
id=20085 trace_id=281 func=fw_forward_dirty_handler line=394 msg="state=00050204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=282 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [F.],
seq 37
12788901, ack 1225946333, win 114"
id=20085 trace_id=282 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=282 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=282 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204 ses.np
u_state=0x04000000"
id=20085 trace_id=282 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"
id=20085 trace_id=283 func=print_pkt_detail line=5746 msg="vd-root:0 received a
packet(proto=6, 189.119.0.110:443->172.25.231.106:36673) from port12. flag [.], seq
371
2788902, ack 1225946334, win 114"
id=20085 trace_id=283 func=resolve_ip_tuple_fast line=5827 msg="Find an existing
session, id-013e3857, reply direction"
id=20085 trace_id=283 func=__ip_session_run_tuple line=3492 msg="DNAT
172.25.231.106:36673->10.129.1.4:36673"
id=20085 trace_id=283 func=npu_handle_session44 line=1184 msg="Trying to offloading
session from port12 to VLAN SERVER, skb.npu_flag=00000000 ses.state=00010204 ses.np
u_state=0x04000000"
id=20085 trace_id=283 func=fw_forward_dirty_handler line=394 msg="state=00010204,
state2=00000001, npu_state=04000000"

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy