summaryrefslogtreecommitdiffstats
path: root/tests/of10_s4810-vvvv.out
blob: d1bd2885ab30314935320852b75ea82385c354c9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
    1  12:51:39.368191 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [S], cksum 0xa75a (correct), seq 469952923, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0
    2  12:51:39.368246 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [S.], cksum 0x1493 (incorrect -> 0xa59a), seq 1198728146, ack 469952924, win 14480, options [mss 1460,sackOK,TS val 47836340 ecr 1,nop,wscale 7], length 0
    3  12:51:39.368494 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ec (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 0
    4  12:51:39.368546 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x293c (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 8: OpenFlow
	version 1.0, type HELLO, length 8, xid 0xf1c0ecd6
    5  12:51:39.368557 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x0c7c), seq 1, ack 9, win 114, options [nop,nop,TS val 47836341 ecr 1], length 0
    6  12:51:39.374809 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b5d), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47836347 ecr 1], length 8: OpenFlow
	version 1.0, type HELLO, length 8, xid 0x00000001
    7  12:51:39.375581 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b4e), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47836348 ecr 1], length 8: OpenFlow
	version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
    8  12:51:39.375846 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ce (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47836347], length 0
    9  12:51:39.377715 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x48dc (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47836347], length 128: OpenFlow
	version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002
	 dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6
	 capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
	 actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
	  port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0'
	   config 0x00000000
	   state 0x00000000 (STP_LISTEN)
	   curr 0x00000340 (10GB_FD, FIBER, AUTONEG)
	   advertised 0x00000340 (10GB_FD, FIBER, AUTONEG)
	   supported 0x00000340 (10GB_FD, FIBER, AUTONEG)
	   peer 0x00000000
	  port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000300 (FIBER, AUTONEG)
	   advertised 0x00000300 (FIBER, AUTONEG)
	   supported 0x00000300 (FIBER, AUTONEG)
	   peer 0x00000000
   10  12:51:39.380053 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14df (incorrect -> 0x08c9), seq 17:101, ack 137, win 122, options [nop,nop,TS val 47836352 ecr 1], length 84: OpenFlow
	version 1.0, type SET_CONFIG, length 12, xid 0x00000003
	 flags FRAG_NORMAL, miss_send_len 65535
	version 1.0, type FLOW_MOD, length 72, xid 0x00000004
	 cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
   11  12:51:39.381338 IP (tos 0x0, ttl 64, id 53098, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0a54), seq 101:109, ack 137, win 122, options [nop,nop,TS val 47836354 ecr 1], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
   12  12:51:39.381649 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x07ed (correct), seq 137, ack 109, win 1034, options [nop,nop,TS val 1 ecr 47836352], length 0
   13  12:51:39.382259 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x06bc (correct), seq 137:145, ack 109, win 1035, options [nop,nop,TS val 1 ecr 47836352], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
   14  12:51:39.382655 IP (tos 0x0, ttl 64, id 53099, offset 0, flags [DF], proto TCP (6), length 80)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14a7 (incorrect -> 0x07f3), seq 109:137, ack 145, win 122, options [nop,nop,TS val 47836355 ecr 1], length 28: OpenFlow
	version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000006
	version 1.0, type STATS_REQUEST, length 12, xid 0x00000007
	 type TABLE, flags 0x0000
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000008
   15  12:51:39.547412 IP (tos 0x0, ttl 64, id 53475, offset 0, flags [DF], proto TCP (6), length 180)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x47d0 (correct), seq 145:273, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 128: OpenFlow
	version 1.0, type FEATURES_REPLY, length 128, xid 0x00000006
	 dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6
	 capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
	 actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
	  port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0'
	   config 0x00000000
	   state 0x00000000 (STP_LISTEN)
	   curr 0x00000340 (10GB_FD, FIBER, AUTONEG)
	   advertised 0x00000340 (10GB_FD, FIBER, AUTONEG)
	   supported 0x00000340 (10GB_FD, FIBER, AUTONEG)
	   peer 0x00000000
	  port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000300 (FIBER, AUTONEG)
	   advertised 0x00000300 (FIBER, AUTONEG)
	   supported 0x00000300 (FIBER, AUTONEG)
	   peer 0x00000000
   16  12:51:39.547442 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0612 (correct), seq 273:281, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000008
   17  12:51:39.547448 IP (tos 0x0, ttl 64, id 53476, offset 0, flags [DF], proto TCP (6), length 448)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x2be8 (correct), seq 281:677, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 396: OpenFlow
	version 1.0, type STATS_REPLY, length 396, xid 0x00000007
	 type TABLE, flags 0x0000
	 table_id 0, name 'VLAN Table'
	  wildcards 0x003ffffd (IN_PORT, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 1024, active_count 0, lookup_count 0, matched_count 0
	 table_id 0, name 'MAC Table'
	  wildcards 0x003ffff5 (IN_PORT, DL_SRC, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 49152, active_count 0, lookup_count 0, matched_count 0
	 table_id 0, name 'Route Table'
	  wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 6144, active_count 0, lookup_count 0, matched_count 0
	 table_id 0, name 'ACL Table'
	  wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 498, active_count 0, lookup_count 127028, matched_count 0
	 table_id 0, name 'Learning Switch Table'
	  wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 24576, active_count 0, lookup_count 0, matched_count 0
	 table_id 0, name 'Egress Port Block Table'
	  wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 256, active_count 0, lookup_count 0, matched_count 0
   18  12:51:39.547502 IP (tos 0x0, ttl 64, id 53100, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x088c), seq 137, ack 677, win 139, options [nop,nop,TS val 47836520 ecr 1], length 0
   19  12:51:39.554378 IP (tos 0x0, ttl 64, id 53101, offset 0, flags [DF], proto TCP (6), length 4156)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x2493 (incorrect -> 0xa671), seq 137:4241, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 4104: OpenFlow
	version 1.0, type FLOW_MOD, length 80, xid 0x00000009
	 match in_port 1
	 cookie 0x0000000000000001, command ADD, priority 35000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port CONTROLLER, max_len 65535
	version 1.0, type FLOW_MOD, length 80, xid 0x0000000a
	 match in_port 1
	 cookie 0x0000000000000002, command ADD, priority 34999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_VLAN_VID, len 8, vlan_vid 2
	version 1.0, type FLOW_MOD, length 80, xid 0x0000000b
	 match in_port 1
	 cookie 0x0000000000000003, command ADD, priority 34998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_VLAN_PCP, len 8, vlan_pcp 5
	version 1.0, type FLOW_MOD, length 88, xid 0x0000000c
	 match in_port 1
	 cookie 0x0000000000000004, command ADD, priority 34997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_VLAN_VID, len 8, vlan_vid 2
	 action type SET_VLAN_PCP, len 8, vlan_pcp 5
	version 1.0, type FLOW_MOD, length 88, xid 0x0000000d
	 match in_port 1
	 cookie 0x0000000000000005, command ADD, priority 34996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
	version 1.0, type FLOW_MOD, length 88, xid 0x0000000e
	 match in_port 1
	 cookie 0x0000000000000006, command ADD, priority 34995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
	version 1.0, type FLOW_MOD, length 104, xid 0x0000000f
	 match in_port 1
	 cookie 0x0000000000000007, command ADD, priority 34994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
	 action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
	version 1.0, type FLOW_MOD, length 80, xid 0x00000010
	 match in_port 1
	 match dl_src 00:00:00:00:00:01
	 cookie 0x0000000000000008, command ADD, priority 34000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000011
	 match in_port 1
	 cookie 0x0000000000000009, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_NW_TOS, len 8, nw_tos 0x28
	version 1.0, type FLOW_MOD, length 80, xid 0x00000012
	 match dl_vlan 100
	 match dl_vlan_pcp 4
	 match dl_type 0x0800
	 cookie 0x000000000000000a, command ADD, priority 32000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000013
	 match dl_type 0x0800
	 match nw_src 10.11.12.0/24
	 match nw_dst 10.13.14.0/24
	 cookie 0x000000000000000b, command ADD, priority 31999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000014
	 match dl_type 0x0800
	 match nw_proto 17
	 match tp_src 68
	 match tp_dst 67
	 cookie 0x000000000000000c, command ADD, priority 31998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000015
	 match dl_type 0x0800
	 match nw_proto 1
	 match icmp_type 8
	 cookie 0x000000000000000d, command ADD, priority 31997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000016
	 match dl_type 0x0800
	 match nw_proto 1
	 match icmp_type 3
	 match icmp_code 13
	 cookie 0x000000000000000e, command ADD, priority 31996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000017
	 match dl_src aa:00:00:00:00:11
	 match dl_dst bb:00:00:00:00:22
	 cookie 0x000000000000000f, command ADD, priority 31995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000018
	 match dl_type 0x0800
	 match nw_tos 0x24
	 cookie 0x0000000000000010, command ADD, priority 31994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000019
	 match dl_type 0x0800
	 match nw_proto 6
	 match tp_src 80
	 match tp_dst 80
	 cookie 0x0000000000000011, command ADD, priority 31993, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x0000001a
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.21.0.0/16
	 cookie 0x0000000000000012, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x0000001b
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.22.0.0/16
	 cookie 0x0000000000000013, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x0000001c
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.23.0.0/16
	 cookie 0x0000000000000014, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x0000001d
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.24.0.0/16
	 cookie 0x0000000000000015, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x0000001e
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.0.0/24
	 cookie 0x0000000000000016, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x0000001f
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.1.0/24
	 cookie 0x0000000000000017, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000020
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.2.0/24
	 cookie 0x0000000000000018, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000021
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.3.0/24
	 cookie 0x0000000000000019, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000022
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.4.0/24
	 cookie 0x000000000000001a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000023
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.5.0/24
	 cookie 0x000000000000001b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000024
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.6.0/24
	 cookie 0x000000000000001c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000025
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.7.0/24
	 cookie 0x000000000000001d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 112, xid 0x00000026
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 cookie 0x000000000000001e, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	 action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	 action type OUTPUT, len 8, port 2
	version 1.0, type FLOW_MOD, length 80, xid 0x00000027
	 match dl_dst 00:11:22:33:00:32
	 match dl_vlan 50
	 cookie 0x000000000000001f, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000028
	 match dl_dst 00:11:22:33:00:33
	 match dl_vlan 51
	 cookie 0x0000000000000020, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000029
	 match dl_dst 00:11:22:33:00:34
	 match dl_vlan 52
	 cookie 0x0000000000000021, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x0000002a
	 match dl_dst 00:11:22:33:00:35
	 match dl_vlan 53
	 cookie 0x0000000000000022, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x0000002b
	 match dl_dst 00:11:22:33:00:36
	 match dl_vlan 54
	 cookie 0x0000000000000023, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x0000002c
	 match dl_dst 00:11:22:33:00:37
	 match dl_vlan 55
	 cookie 0x0000000000000024, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x0000002d
	 match dl_dst 00:11:22:33:00:38
	 match dl_vlan 56
	 cookie 0x0000000000000025, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x0000002e
	 match dl_dst 00:11:22:33:00:39
	 match dl_vlan 57
	 cookie 0x0000000000000026, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x0000002f
	 match dl_src 00:11:22:33:00:0a
	 match dl_dst 00:11:22:33:00:14
	 cookie 0x0000000000000027, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000030
	 match dl_src 00:11:22:33:00:0a
	 match dl_dst 00:11:22:33:00:15
	 cookie 0x0000000000000028, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000031
	 match dl_src 00:11:22:33:00:0a
	 match dl_dst 00:11:22:33:00:16
	 cookie 0x0000000000000029, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000032
	 match dl_src 00:11:22:33:00:0b
	 match dl_dst 00:11:22:33:00:14
	 cookie 0x000000000000002a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000033
	 match dl_src 00:11:22:33:00:0b
	 match dl_dst 00:11:22:33:00:15
	 cookie 0x000000000000002b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000034
	 match dl_src 00:11:22:33:00:0b
	 match dl_dst 00:11:22:33:00:16
	 cookie 0x000000000000002c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000035
	 match dl_src 00:11:22:33:00:0c
	 match dl_dst 00:11:22:33:00:14
	 cookie 0x000000000000002d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type OUTPUT, len 8, port 1
	version 1.0, type FLOW_MOD, length 80, xid 0x00000036
	 match dl_src 00:11:22:33:00:0c
	 match dl_dst 00:11:22:33:00:15 [|openflow]
   20  12:51:39.554402 IP (tos 0x0, ttl 64, id 53104, offset 0, flags [DF], proto TCP (6), length 180)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x150b (incorrect -> 0x8ec7), seq 4241:4369, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 128: OpenFlow
	version unknown (0x00), type unknown (0x00), length 0 (too short!), xid 0x00000000 (invalid)
   21  12:51:39.555118 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xfaa7 (correct), seq 677, ack 2873, win 952, options [nop,nop,TS val 1 ecr 47836527], length 0
   22  12:51:39.555156 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4fe (correct), seq 677, ack 4369, win 905, options [nop,nop,TS val 1 ecr 47836527], length 0
   23  12:51:39.556280 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4a7 (correct), seq 677, ack 4369, win 992, options [nop,nop,TS val 1 ecr 47836527], length 0
   24  12:51:39.784172 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf318 (correct), seq 677:685, ack 4369, win 1035, options [nop,nop,TS val 2 ecr 47836527], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000038
   25  12:51:39.784835 IP (tos 0x0, ttl 64, id 53105, offset 0, flags [DF], proto TCP (6), length 228)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x153b (incorrect -> 0x165f), seq 4369:4545, ack 685, win 139, options [nop,nop,TS val 47836757 ecr 2], length 176: OpenFlow
	version 1.0, type STATS_REQUEST, length 56, xid 0x00000039
	 type FLOW, flags 0x0000
	 table_id ALL, out_port NONE
	version 1.0, type STATS_REQUEST, length 56, xid 0x0000003a
	 type FLOW, flags 0x0000
	 table_id 0, out_port NONE
	version 1.0, type STATS_REQUEST, length 56, xid 0x0000003b
	 type FLOW, flags 0x0000
	 match dl_src 00:00:00:00:77:77
	 table_id 0, out_port CONTROLLER
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000003c
   26  12:51:39.976677 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf2dd (correct), seq 685, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 0
   27  12:51:40.027155 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf170 (correct), seq 685:697, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 12: OpenFlow
	version 1.0, type STATS_REPLY, length 12, xid 0x0000003b
	 type FLOW, flags 0x0000
   28  12:51:40.027186 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf16a (correct), seq 697:705, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x0000003c
   29  12:51:40.027264 IP (tos 0x0, ttl 64, id 53106, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xf556), seq 4545, ack 705, win 139, options [nop,nop,TS val 47837000 ecr 2], length 0
   30  12:51:40.027413 IP (tos 0x0, ttl 64, id 53575, offset 0, flags [DF], proto TCP (6), length 1216)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x39b4 (correct), seq 705:1869, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1164: OpenFlow
	version 1.0, type STATS_REPLY, length 1164, xid 0x00000039
	 type FLOW, flags 0x0001 (MORE)
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.21.0.0/16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000012, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.22.0.0/16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000013, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.23.0.0/16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000014, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.24.0.0/16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000015, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.0.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000016, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.1.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000017, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.2.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000018, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.3.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000019, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.4.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001a, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
   31  12:51:40.027426 IP (tos 0x0, ttl 64, id 53576, offset 0, flags [DF], proto TCP (6), length 1176)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6b64 (correct), seq 1869:2993, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1124: OpenFlow
	version 1.0, type STATS_REPLY, length 1124, xid 0x00000039
	 type FLOW, flags 0x0001 (MORE)
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.5.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001b, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.6.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001c, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  match nw_dst 10.20.7.0/24
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001d, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 128, table_id 30
	  match dl_dst 00:01:e8:8a:e0:e4
	  match dl_type 0x0800
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001e, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4
	  action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port CONTROLLER, max_len 65535
	 length 96, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
	  action type SET_VLAN_VID, len 8, vlan_vid 2
	 length 96, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
	  action type SET_VLAN_PCP, len 8, vlan_pcp 5
	 length 104, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
	  action type SET_VLAN_VID, len 8, vlan_vid 2
	  action type SET_VLAN_PCP, len 8, vlan_pcp 5
	 length 104, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
	 length 104, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
	  action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
   32  12:51:40.027435 IP (tos 0x0, ttl 64, id 53107, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xec39), seq 4545, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 0
   33  12:51:40.027603 IP (tos 0x0, ttl 64, id 53108, offset 0, flags [DF], proto TCP (6), length 148)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14eb (incorrect -> 0xc5f7), seq 4545:4641, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 96: OpenFlow
	version 1.0, type STATS_REQUEST, length 12, xid 0x0000003d
	 type DESC, flags 0x0000
	version 1.0, type STATS_REQUEST, length 56, xid 0x0000003e
	 type AGGREGATE, flags 0x0000
	 table_id ALL, out_port NONE
	version 1.0, type STATS_REQUEST, length 20, xid 0x0000003f
	 type PORT, flags 0x0000
	 port_no NONE
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000040
   34  12:51:40.027663 IP (tos 0x0, ttl 64, id 53577, offset 0, flags [DF], proto TCP (6), length 1048)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x29df (correct), seq 2993:3989, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 996: OpenFlow
	version 1.0, type STATS_REPLY, length 996, xid 0x00000039
	 type FLOW, flags 0x0001 (MORE)
	 length 120, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
	  action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
	 length 96, table_id 40
	  match in_port 1
	  match dl_src 00:00:00:00:00:01
	  duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0
	  action type SET_NW_TOS, len 8, nw_tos 0x28
	 length 96, table_id 40
	  match dl_vlan 100
	  match dl_vlan_pcp 4
	  match dl_type 0x0800
	  duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_type 0x0800
	  match nw_src 10.11.12.0/24
	  match nw_dst 10.13.14.0/24
	  duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_type 0x0800
	  match nw_proto 17
	  match tp_src 68
	  match tp_dst 67
	  duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_type 0x0800
	  match nw_proto 1
	  match icmp_type 8
	  duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_type 0x0800
	  match nw_proto 1
	  match icmp_type 3
	  match icmp_code 13
	  duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_src aa:00:00:00:00:11
	  match dl_dst bb:00:00:00:00:22
	  duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_type 0x0800
	  match nw_tos 0x24
	  duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
   35  12:51:40.027680 IP (tos 0x0, ttl 64, id 53578, offset 0, flags [DF], proto TCP (6), length 1024)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x45c0 (correct), seq 3989:4961, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 972: OpenFlow
	version 1.0, type STATS_REPLY, length 972, xid 0x00000039
	 type FLOW, flags 0x0001 (MORE)
	 length 96, table_id 40
	  match dl_type 0x0800
	  match nw_proto 6
	  match tp_src 80
	  match tp_dst 80
	  duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:32
	  match dl_vlan 50
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:33
	  match dl_vlan 51
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:34
	  match dl_vlan 52
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:35
	  match dl_vlan 53
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:36
	  match dl_vlan 54
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:37
	  match dl_vlan 55
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:38
	  match dl_vlan 56
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_dst 00:11:22:33:00:39
	  match dl_vlan 57
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000026, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0a
	  match dl_dst 00:11:22:33:00:14
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000027, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
   36  12:51:40.027715 IP (tos 0x0, ttl 64, id 53109, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xe405), seq 4641, ack 4961, win 220, options [nop,nop,TS val 47837000 ecr 2], length 0
   37  12:51:40.027722 IP (tos 0x0, ttl 64, id 53579, offset 0, flags [DF], proto TCP (6), length 832)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6f3d (correct), seq 4961:5741, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 780: OpenFlow
	version 1.0, type STATS_REPLY, length 780, xid 0x00000039
	 type FLOW, flags 0x0000
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0a
	  match dl_dst 00:11:22:33:00:15
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000028, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0a
	  match dl_dst 00:11:22:33:00:16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000029, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0b
	  match dl_dst 00:11:22:33:00:14
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002a, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0b
	  match dl_dst 00:11:22:33:00:15
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002b, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0b
	  match dl_dst 00:11:22:33:00:16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002c, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0c
	  match dl_dst 00:11:22:33:00:14
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002d, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0c
	  match dl_dst 00:11:22:33:00:15
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002e, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 40
	  match dl_src 00:11:22:33:00:0c
	  match dl_dst 00:11:22:33:00:16
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002f, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
   38  12:51:40.027911 IP (tos 0x0, ttl 64, id 53580, offset 0, flags [DF], proto TCP (6), length 976)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0dbb (correct), seq 5741:6665, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 924: OpenFlow
	version 1.0, type STATS_REPLY, length 924, xid 0x0000003a
	 type FLOW, flags 0x0001 (MORE)
	 length 96, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port CONTROLLER, max_len 65535
	 length 96, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
	  action type SET_VLAN_VID, len 8, vlan_vid 2
	 length 96, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
	  action type SET_VLAN_PCP, len 8, vlan_pcp 5
	 length 104, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
	  action type SET_VLAN_VID, len 8, vlan_vid 2
	  action type SET_VLAN_PCP, len 8, vlan_pcp 5
	 length 104, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
	 length 104, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
	  action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
	 length 120, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
	  action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66
	  action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc
	 length 96, table_id 0
	  match in_port 1
	  match dl_src 00:00:00:00:00:01
	  duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match in_port 1
	  duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0
	  action type SET_NW_TOS, len 8, nw_tos 0x28
   39  12:51:40.027920 IP (tos 0x0, ttl 64, id 53110, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xdd38), seq 4641, ack 6665, win 257, options [nop,nop,TS val 47837000 ecr 2], length 0
   40  12:51:40.027928 IP (tos 0x0, ttl 64, id 53581, offset 0, flags [DF], proto TCP (6), length 1500)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x2501 (correct), seq 6665:8113, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 1448: OpenFlow
	version 1.0, type STATS_REPLY, length 972, xid 0x0000003a
	 type FLOW, flags 0x0001 (MORE)
	 length 96, table_id 0
	  match dl_vlan 100
	  match dl_vlan_pcp 4
	  match dl_type 0x0800
	  duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_type 0x0800
	  match nw_src 10.11.12.0/24
	  match nw_dst 10.13.14.0/24
	  duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_type 0x0800
	  match nw_proto 17
	  match tp_src 68
	  match tp_dst 67
	  duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_type 0x0800
	  match nw_proto 1
	  match icmp_type 8
	  duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_type 0x0800
	  match nw_proto 1
	  match icmp_type 3
	  match icmp_code 13
	  duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_src aa:00:00:00:00:11
	  match dl_dst bb:00:00:00:00:22
	  duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_type 0x0800
	  match nw_tos 0x24
	  duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_type 0x0800
	  match nw_proto 6
	  match tp_src 80
	  match tp_dst 80
	  duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 2
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:32
	  match dl_vlan 50
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:33
	  match dl_vlan 51
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	version 1.0, type STATS_REPLY, length 972, xid 0x0000003a
	 type FLOW, flags 0x0001 (MORE)
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:34
	  match dl_vlan 52
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:35
	  match dl_vlan 53
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:36
	  match dl_vlan 54
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:37
	  match dl_vlan 55
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0
	  action type OUTPUT, len 8, port 1
	 length 96, table_id 0
	  match dl_dst 00:11:22:33:00:38
	  match dl_vlan 56
	  duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0 [|openflow]
   41  12:51:40.028159 IP (tos 0x0, ttl 64, id 53582, offset 0, flags [DF], proto TCP (6), length 1040)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x395e (correct), seq 8113:9101, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 988: OpenFlow
	version unknown (0x00), type unknown (0x00), length 0 (too short!), xid 0x00000000 (invalid)
   42  12:51:40.028172 IP (tos 0x0, ttl 64, id 53111, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xd387), seq 4641, ack 9101, win 302, options [nop,nop,TS val 47837000 ecr 2], length 0
   43  12:51:40.226408 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xd0aa (correct), seq 9101, ack 4641, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 0
   44  12:51:40.239219 IP (tos 0x0, ttl 64, id 53602, offset 0, flags [DF], proto TCP (6), length 1120)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x141f (correct), seq 9101:10169, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 1068: OpenFlow
	version 1.0, type STATS_REPLY, length 1068, xid 0x0000003d
	 type DESC, flags 0x0000
	  mfr_desc 'Dell Force 10'
	  hw_desc 'OpenFlow switch HW ver. 1.0'
	  sw_desc 'OpenFlow switch SW ver. 1.0'
	  serial_num '02132012'
	  dp_desc 'Dell-Switch: 00:01:e8:8a:e0:e2; instance: 1'
   45  12:51:40.239258 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcb12 (correct), seq 10169:10177, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000040
   46  12:51:40.239264 IP (tos 0x0, ttl 64, id 53603, offset 0, flags [DF], proto TCP (6), length 88)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcaa5 (correct), seq 10177:10213, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 36: OpenFlow
	version 1.0, type STATS_REPLY, length 36, xid 0x0000003e
	 type AGGREGATE, flags 0x0000
	 packet_count 0, byte_count 0, flow_count 47
   47  12:51:40.239267 IP (tos 0x0, ttl 64, id 53604, offset 0, flags [DF], proto TCP (6), length 189)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x03e7 (correct), seq 10213:10350, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 137: OpenFlow
	version 1.0, type PACKET_IN, length 137, xid 0x00000000
	 buffer_id NONE, total_len 119, in_port 1, reason ACTION
	 data (119 octets), frame decoding below
STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102
	port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0
	CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034,
	message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s
	v3len 64, MCID Name pica8, rev 0,
		digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0,
	CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20
   48  12:51:40.239273 IP (tos 0x0, ttl 64, id 53605, offset 0, flags [DF], proto TCP (6), length 168)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x4a03 (correct), seq 10350:10466, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow
	version 1.0, type STATS_REPLY, length 116, xid 0x0000003f
	 type PORT, flags 0x0001 (MORE)
	  port_no 1, rx_packets 129437, tx_packets 8061, rx_bytes 16090662, tx_bytes 515904, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0
   49  12:51:40.239276 IP (tos 0x0, ttl 64, id 53606, offset 0, flags [DF], proto TCP (6), length 168)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc90e (correct), seq 10466:10582, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow
	version 1.0, type STATS_REPLY, length 116, xid 0x0000003f
	 type PORT, flags 0x0000
	  port_no 2, rx_packets 0, tx_packets 0, rx_bytes 0, tx_bytes 0, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0
   50  12:51:40.239287 IP (tos 0x0, ttl 64, id 53112, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xcccd), seq 4641, ack 10582, win 331, options [nop,nop,TS val 47837211 ecr 3], length 0
   51  12:51:40.239984 IP (tos 0x0, ttl 64, id 53113, offset 0, flags [DF], proto TCP (6), length 132)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14db (incorrect -> 0xc93e), seq 4641:4721, ack 10582, win 331, options [nop,nop,TS val 47837212 ecr 3], length 80: OpenFlow
	version 1.0, type FLOW_MOD, length 72, xid 0x00000041
	 cookie 0x0000000000000000, command DELETE, priority 65535, out_port NONE, flags 0x0001 (SEND_FLOW_REM)
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000042
   52  12:51:40.427977 IP (tos 0x0, ttl 64, id 53707, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc92c (correct), seq 10582:10670, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001a
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.21.0.0/16
	 cookie 0x0000000000000012, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   53  12:51:40.428016 IP (tos 0x0, ttl 64, id 53708, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc8d1 (correct), seq 10670:10758, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001b
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.22.0.0/16
	 cookie 0x0000000000000013, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   54  12:51:40.428024 IP (tos 0x0, ttl 64, id 53709, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc876 (correct), seq 10758:10846, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001c
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.23.0.0/16
	 cookie 0x0000000000000014, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   55  12:51:40.428028 IP (tos 0x0, ttl 64, id 53710, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc81b (correct), seq 10846:10934, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001d
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.24.0.0/16
	 cookie 0x0000000000000015, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   56  12:51:40.428031 IP (tos 0x0, ttl 64, id 53711, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc7c7 (correct), seq 10934:11022, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001e
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.0.0/24
	 cookie 0x0000000000000016, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   57  12:51:40.428033 IP (tos 0x0, ttl 64, id 53712, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc66d (correct), seq 11022:11110, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001f
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.1.0/24
	 cookie 0x0000000000000017, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   58  12:51:40.428035 IP (tos 0x0, ttl 64, id 53713, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc513 (correct), seq 11110:11198, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000020
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.2.0/24
	 cookie 0x0000000000000018, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   59  12:51:40.428039 IP (tos 0x0, ttl 64, id 53714, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc3b9 (correct), seq 11198:11286, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000021
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.3.0/24
	 cookie 0x0000000000000019, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   60  12:51:40.428072 IP (tos 0x0, ttl 64, id 53114, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc900), seq 4721, ack 11286, win 331, options [nop,nop,TS val 47837400 ecr 3], length 0
   61  12:51:40.428267 IP (tos 0x0, ttl 64, id 53715, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc25f (correct), seq 11286:11374, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000022
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.4.0/24
	 cookie 0x000000000000001a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   62  12:51:40.428284 IP (tos 0x0, ttl 64, id 53716, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc105 (correct), seq 11374:11462, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000023
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.5.0/24
	 cookie 0x000000000000001b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   63  12:51:40.428289 IP (tos 0x0, ttl 64, id 53717, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbfab (correct), seq 11462:11550, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000024
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.6.0/24
	 cookie 0x000000000000001c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   64  12:51:40.428292 IP (tos 0x0, ttl 64, id 53718, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbe51 (correct), seq 11550:11638, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000025
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 match nw_dst 10.20.7.0/24
	 cookie 0x000000000000001d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   65  12:51:40.428295 IP (tos 0x0, ttl 64, id 53719, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcf05 (correct), seq 11638:11726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000026
	 match dl_dst 00:01:e8:8a:e0:e4
	 match dl_type 0x0800
	 cookie 0x000000000000001e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   66  12:51:40.428298 IP (tos 0x0, ttl 64, id 53720, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x37c4 (correct), seq 11726:11814, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000009
	 match in_port 1
	 cookie 0x0000000000000001, priority 35000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   67  12:51:40.428301 IP (tos 0x0, ttl 64, id 53721, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x376b (correct), seq 11814:11902, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000a
	 match in_port 1
	 cookie 0x0000000000000002, priority 34999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   68  12:51:40.428343 IP (tos 0x0, ttl 64, id 53115, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc697), seq 4721, ack 11902, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
   69  12:51:40.428502 IP (tos 0x0, ttl 64, id 53722, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3712 (correct), seq 11902:11990, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000b
	 match in_port 1
	 cookie 0x0000000000000003, priority 34998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   70  12:51:40.428515 IP (tos 0x0, ttl 64, id 53723, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x36b9 (correct), seq 11990:12078, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000c
	 match in_port 1
	 cookie 0x0000000000000004, priority 34997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   71  12:51:40.428519 IP (tos 0x0, ttl 64, id 53724, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3660 (correct), seq 12078:12166, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000d
	 match in_port 1
	 cookie 0x0000000000000005, priority 34996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   72  12:51:40.428521 IP (tos 0x0, ttl 64, id 53725, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3607 (correct), seq 12166:12254, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000e
	 match in_port 1
	 cookie 0x0000000000000006, priority 34995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   73  12:51:40.428524 IP (tos 0x0, ttl 64, id 53726, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x35ae (correct), seq 12254:12342, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000f
	 match in_port 1
	 cookie 0x0000000000000007, priority 34994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   74  12:51:40.428526 IP (tos 0x0, ttl 64, id 53727, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3938 (correct), seq 12342:12430, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000010
	 match in_port 1
	 match dl_src 00:00:00:00:00:01
	 cookie 0x0000000000000008, priority 34000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   75  12:51:40.428529 IP (tos 0x0, ttl 64, id 53728, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3cc3 (correct), seq 12430:12518, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000011
	 match in_port 1
	 cookie 0x0000000000000009, priority 33000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   76  12:51:40.428553 IP (tos 0x0, ttl 64, id 53116, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc42f), seq 4721, ack 12518, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
   77  12:51:40.428793 IP (tos 0x0, ttl 64, id 53729, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1317 (correct), seq 12518:12606, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000012
	 match dl_vlan 100
	 match dl_vlan_pcp 4
	 match dl_type 0x0800
	 cookie 0x000000000000000a, priority 32000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   78  12:51:40.428810 IP (tos 0x0, ttl 64, id 53730, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x00fe (correct), seq 12606:12694, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000013
	 match dl_type 0x0800
	 match nw_src 10.11.12.0/24
	 match nw_dst 10.13.14.0/24
	 cookie 0x000000000000000b, priority 31999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   79  12:51:40.428814 IP (tos 0x0, ttl 64, id 53731, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16ff (correct), seq 12694:12782, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000014
	 match dl_type 0x0800
	 match nw_proto 17
	 match tp_src 68
	 match tp_dst 67
	 cookie 0x000000000000000c, priority 31998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   80  12:51:40.428818 IP (tos 0x0, ttl 64, id 53732, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16b5 (correct), seq 12782:12870, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000015
	 match dl_type 0x0800
	 match nw_proto 1
	 match icmp_type 8
	 cookie 0x000000000000000d, priority 31997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   81  12:51:40.428821 IP (tos 0x0, ttl 64, id 53733, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16d4 (correct), seq 12870:12958, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000016
	 match dl_type 0x0800
	 match nw_proto 1
	 match icmp_type 3
	 match icmp_code 13
	 cookie 0x000000000000000e, priority 31996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   82  12:51:40.428821 IP (tos 0x0, ttl 64, id 53117, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc37f), seq 4721, ack 12694, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
   83  12:51:40.428823 IP (tos 0x0, ttl 64, id 53734, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xd96b (correct), seq 12958:13046, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000017
	 match dl_src aa:00:00:00:00:11
	 match dl_dst bb:00:00:00:00:22
	 cookie 0x000000000000000f, priority 31995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   84  12:51:40.428825 IP (tos 0x0, ttl 64, id 53735, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf172 (correct), seq 13046:13134, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000018
	 match dl_type 0x0800
	 match nw_tos 0x24
	 cookie 0x0000000000000010, priority 31994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   85  12:51:40.428830 IP (tos 0x0, ttl 64, id 53736, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1534 (correct), seq 13134:13222, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000019
	 match dl_type 0x0800
	 match nw_proto 6
	 match tp_src 80
	 match tp_dst 80
	 cookie 0x0000000000000011, priority 31993, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   86  12:51:40.428852 IP (tos 0x0, ttl 64, id 53118, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc16f), seq 4721, ack 13222, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
   87  12:51:40.429052 IP (tos 0x0, ttl 64, id 53737, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x97c9 (correct), seq 13222:13310, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000027
	 match dl_dst 00:11:22:33:00:32
	 match dl_vlan 50
	 cookie 0x000000000000001f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   88  12:51:40.429071 IP (tos 0x0, ttl 64, id 53738, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x976d (correct), seq 13310:13398, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000028
	 match dl_dst 00:11:22:33:00:33
	 match dl_vlan 51
	 cookie 0x0000000000000020, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   89  12:51:40.429076 IP (tos 0x0, ttl 64, id 53739, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9711 (correct), seq 13398:13486, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000029
	 match dl_dst 00:11:22:33:00:34
	 match dl_vlan 52
	 cookie 0x0000000000000021, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   90  12:51:40.429079 IP (tos 0x0, ttl 64, id 53740, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x96b5 (correct), seq 13486:13574, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002a
	 match dl_dst 00:11:22:33:00:35
	 match dl_vlan 53
	 cookie 0x0000000000000022, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   91  12:51:40.429082 IP (tos 0x0, ttl 64, id 53741, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9659 (correct), seq 13574:13662, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002b
	 match dl_dst 00:11:22:33:00:36
	 match dl_vlan 54
	 cookie 0x0000000000000023, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   92  12:51:40.429085 IP (tos 0x0, ttl 64, id 53742, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95fd (correct), seq 13662:13750, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002c
	 match dl_dst 00:11:22:33:00:37
	 match dl_vlan 55
	 cookie 0x0000000000000024, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   93  12:51:40.429088 IP (tos 0x0, ttl 64, id 53743, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95a1 (correct), seq 13750:13838, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002d
	 match dl_dst 00:11:22:33:00:38
	 match dl_vlan 56
	 cookie 0x0000000000000025, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   94  12:51:40.429104 IP (tos 0x0, ttl 64, id 53119, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbf07), seq 4721, ack 13838, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0
   95  12:51:40.429275 IP (tos 0x0, ttl 64, id 53744, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9545 (correct), seq 13838:13926, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002e
	 match dl_dst 00:11:22:33:00:39
	 match dl_vlan 57
	 cookie 0x0000000000000026, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   96  12:51:40.429284 IP (tos 0x0, ttl 64, id 53745, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72fd (correct), seq 13926:14014, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002f
	 match dl_src 00:11:22:33:00:0a
	 match dl_dst 00:11:22:33:00:14
	 cookie 0x0000000000000027, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   97  12:51:40.429287 IP (tos 0x0, ttl 64, id 53746, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72a2 (correct), seq 14014:14102, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000030
	 match dl_src 00:11:22:33:00:0a
	 match dl_dst 00:11:22:33:00:15
	 cookie 0x0000000000000028, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   98  12:51:40.429290 IP (tos 0x0, ttl 64, id 53747, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7247 (correct), seq 14102:14190, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000031
	 match dl_src 00:11:22:33:00:0a
	 match dl_dst 00:11:22:33:00:16
	 cookie 0x0000000000000029, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
   99  12:51:40.429292 IP (tos 0x0, ttl 64, id 53748, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x71ee (correct), seq 14190:14278, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000032
	 match dl_src 00:11:22:33:00:0b
	 match dl_dst 00:11:22:33:00:14
	 cookie 0x000000000000002a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  100  12:51:40.429321 IP (tos 0x0, ttl 64, id 53120, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbd4e), seq 4721, ack 14278, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0
  101  12:51:40.429558 IP (tos 0x0, ttl 64, id 53749, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7193 (correct), seq 14278:14366, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000033
	 match dl_src 00:11:22:33:00:0b
	 match dl_dst 00:11:22:33:00:15
	 cookie 0x000000000000002b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  102  12:51:40.429594 IP (tos 0x0, ttl 64, id 53750, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7138 (correct), seq 14366:14454, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000034
	 match dl_src 00:11:22:33:00:0b
	 match dl_dst 00:11:22:33:00:16
	 cookie 0x000000000000002c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  103  12:51:40.429598 IP (tos 0x0, ttl 64, id 53751, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x70df (correct), seq 14454:14542, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000035
	 match dl_src 00:11:22:33:00:0c
	 match dl_dst 00:11:22:33:00:14
	 cookie 0x000000000000002d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  104  12:51:40.429601 IP (tos 0x0, ttl 64, id 53752, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7084 (correct), seq 14542:14630, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000036
	 match dl_src 00:11:22:33:00:0c
	 match dl_dst 00:11:22:33:00:15
	 cookie 0x000000000000002e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  105  12:51:40.429603 IP (tos 0x0, ttl 64, id 53753, offset 0, flags [DF], proto TCP (6), length 140)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7028 (correct), seq 14630:14718, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000037
	 match dl_src 00:11:22:33:00:0c
	 match dl_dst 00:11:22:33:00:16
	 cookie 0x000000000000002f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0
  106  12:51:40.429605 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb769 (correct), seq 14718:14726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000042
  107  12:51:40.429648 IP (tos 0x0, ttl 64, id 53121, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbb8e), seq 4721, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0
  108  12:51:40.429929 IP (tos 0x0, ttl 64, id 53122, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xba21), seq 4721:4729, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000043
  109  12:51:40.430694 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb758 (correct), seq 14726:14734, ack 4729, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000043
  110  12:51:40.431060 IP (tos 0x0, ttl 64, id 53123, offset 0, flags [DF], proto TCP (6), length 144)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14e7 (incorrect -> 0x2671), seq 4729:4821, ack 14734, win 331, options [nop,nop,TS val 47837403 ecr 3], length 92: OpenFlow
	version 1.0, type PACKET_OUT, length 84, xid 0x00000044
	 buffer_id 0xffffffff, in_port CONTROLLER
	 action type OUTPUT, len 8, port 1
	 data (60 octets), frame decoding below
 [|llc]
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000045
  111  12:51:40.432275 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6f1 (correct), seq 14734:14742, ack 4821, win 1035, options [nop,nop,TS val 3 ecr 47837403], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000045
  112  12:51:40.432599 IP (tos 0x0, ttl 64, id 53124, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb9a7), seq 4821:4829, ack 14742, win 331, options [nop,nop,TS val 47837405 ecr 3], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000046
  113  12:51:40.433290 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6de (correct), seq 14742:14750, ack 4829, win 1035, options [nop,nop,TS val 3 ecr 47837405], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000046
  114  12:51:40.433594 IP (tos 0x0, ttl 64, id 53125, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb995), seq 4829:4837, ack 14750, win 331, options [nop,nop,TS val 47837406 ecr 3], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000047
  115  12:51:40.434261 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6cc (correct), seq 14750:14758, ack 4837, win 1035, options [nop,nop,TS val 3 ecr 47837406], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000047
  116  12:51:40.434511 IP (tos 0x0, ttl 64, id 53126, offset 0, flags [DF], proto TCP (6), length 72)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x149f (incorrect -> 0xb819), seq 4837:4857, ack 14758, win 331, options [nop,nop,TS val 47837407 ecr 3], length 20: OpenFlow
	version 1.0, type SET_CONFIG, length 12, xid 0x00000048
	 flags FRAG_NORMAL, miss_send_len 65535
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000049
  117  12:51:40.435172 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6ad (correct), seq 14758:14766, ack 4857, win 1035, options [nop,nop,TS val 3 ecr 47837407], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000049
  118  12:51:40.474288 IP (tos 0x0, ttl 64, id 53127, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbab1), seq 4857, ack 14766, win 331, options [nop,nop,TS val 47837447 ecr 3], length 0
  119  12:51:41.367956 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [S], cksum 0xb924 (correct), seq 553833795, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0
  120  12:51:41.368013 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.55442: Flags [S.], cksum 0x1493 (incorrect -> 0x6111), seq 845973340, ack 553833796, win 14480, options [mss 1460,sackOK,TS val 47838340 ecr 1,nop,wscale 7], length 0
  121  12:51:41.368292 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc462 (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 0
  122  12:51:41.368326 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x3724 (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 8: OpenFlow
	version 1.0, type HELLO, length 8, xid 0x95e1f644
  123  12:51:41.368336 IP (tos 0x0, ttl 64, id 29656, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0x148b (incorrect -> 0xc7f2), seq 1, ack 9, win 114, options [nop,nop,TS val 47838341 ecr 1], length 0
  124  12:51:41.374647 IP (tos 0x0, ttl 64, id 29657, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6d3), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47838347 ecr 1], length 8: OpenFlow
	version 1.0, type HELLO, length 8, xid 0x00000001
  125  12:51:41.375407 IP (tos 0x0, ttl 64, id 29658, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6c4), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47838348 ecr 1], length 8: OpenFlow
	version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
  126  12:51:41.375690 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc444 (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47838347], length 0
  127  12:51:41.378993 IP (tos 0x0, ttl 64, id 53761, offset 0, flags [DF], proto TCP (6), length 180)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x1df1 (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47838347], length 128: OpenFlow
	version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002
	 dpid 0x00050001e88ae0e2, n_buffers 0, n_tables 6
	 capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS)
	 actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS)
	  port_no 13, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/12'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000300 (FIBER, AUTONEG)
	   advertised 0x00000300 (FIBER, AUTONEG)
	   supported 0x00000300 (FIBER, AUTONEG)
	   peer 0x00000000
	  port_no 16, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/15'
	   config 0x00008001 (PORT_DOWN) (bogus)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000300 (FIBER, AUTONEG)
	   advertised 0x00000300 (FIBER, AUTONEG)
	   supported 0x00000300 (FIBER, AUTONEG)
	   peer 0x00000000
  128  12:51:41.380457 IP (tos 0x0, ttl 64, id 29659, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.55442: Flags [F.], cksum 0x148b (incorrect -> 0xc74d), seq 17, ack 137, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0
  129  12:51:41.380660 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc3bc (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0
  130  12:51:41.380991 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.55442 > 10.0.0.20.6633: Flags [F.], cksum 0xc3bb (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0
  131  12:51:41.381041 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0xc74c (correct), seq 18, ack 138, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0
  132  12:51:42.080078 IP (tos 0x0, ttl 64, id 53775, offset 0, flags [DF], proto TCP (6), length 189)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf083 (correct), seq 14766:14903, ack 4857, win 1035, options [nop,nop,TS val 6 ecr 47837447], length 137: OpenFlow
	version 1.0, type PACKET_IN, length 137, xid 0x00000000
	 buffer_id NONE, total_len 119, in_port 1, reason NO_MATCH
	 data (119 octets), frame decoding below
STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102
	port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0
	CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034,
	message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s
	v3len 64, MCID Name pica8, rev 0,
		digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0,
	CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20
  133  12:51:42.080120 IP (tos 0x0, ttl 64, id 53128, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xb3e0), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47839052 ecr 6], length 0
  134  12:51:44.046180 IP (tos 0x0, ttl 64, id 53129, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [F.], cksum 0x148b (incorrect -> 0xac31), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47841018 ecr 6], length 0
  135  12:51:44.046638 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xa96d (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0
  136  12:51:44.046956 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.81.56068 > 10.0.0.20.6633: Flags [F.], cksum 0xa96c (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0
  137  12:51:44.046986 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0xac2b (correct), seq 4858, ack 14904, win 331, options [nop,nop,TS val 47841019 ecr 10], length 0