diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 17:13:01 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 17:13:01 +0000 |
commit | 7adcb5b605cc1328a3084c334f4697ec9771936c (patch) | |
tree | 03e681bfda053978ba896745828e09cb056ad156 /tests/of10_s4810-vvvv.out | |
parent | Initial commit. (diff) | |
download | tcpdump-upstream/4.99.4.tar.xz tcpdump-upstream/4.99.4.zip |
Adding upstream version 4.99.4.upstream/4.99.4
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | tests/of10_s4810-vvvv.out | 1333 |
1 files changed, 1333 insertions, 0 deletions
diff --git a/tests/of10_s4810-vvvv.out b/tests/of10_s4810-vvvv.out new file mode 100644 index 0000000..d1bd288 --- /dev/null +++ b/tests/of10_s4810-vvvv.out @@ -0,0 +1,1333 @@ + 1 12:51:39.368191 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [S], cksum 0xa75a (correct), seq 469952923, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0 + 2 12:51:39.368246 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [S.], cksum 0x1493 (incorrect -> 0xa59a), seq 1198728146, ack 469952924, win 14480, options [mss 1460,sackOK,TS val 47836340 ecr 1,nop,wscale 7], length 0 + 3 12:51:39.368494 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ec (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 0 + 4 12:51:39.368546 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x293c (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47836340], length 8: OpenFlow + version 1.0, type HELLO, length 8, xid 0xf1c0ecd6 + 5 12:51:39.368557 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x0c7c), seq 1, ack 9, win 114, options [nop,nop,TS val 47836341 ecr 1], length 0 + 6 12:51:39.374809 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b5d), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47836347 ecr 1], length 8: OpenFlow + version 1.0, type HELLO, length 8, xid 0x00000001 + 7 12:51:39.375581 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0b4e), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47836348 ecr 1], length 8: OpenFlow + version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002 + 8 12:51:39.375846 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x08ce (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47836347], length 0 + 9 12:51:39.377715 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x48dc (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47836347], length 128: OpenFlow + version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002 + dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6 + capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS) + actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS) + port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0' + config 0x00000000 + state 0x00000000 (STP_LISTEN) + curr 0x00000340 (10GB_FD, FIBER, AUTONEG) + advertised 0x00000340 (10GB_FD, FIBER, AUTONEG) + supported 0x00000340 (10GB_FD, FIBER, AUTONEG) + peer 0x00000000 + port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1' + config 0x00000001 (PORT_DOWN) + state 0x00000001 (STP_LISTEN, LINK_DOWN) + curr 0x00000300 (FIBER, AUTONEG) + advertised 0x00000300 (FIBER, AUTONEG) + supported 0x00000300 (FIBER, AUTONEG) + peer 0x00000000 + 10 12:51:39.380053 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14df (incorrect -> 0x08c9), seq 17:101, ack 137, win 122, options [nop,nop,TS val 47836352 ecr 1], length 84: OpenFlow + version 1.0, type SET_CONFIG, length 12, xid 0x00000003 + flags FRAG_NORMAL, miss_send_len 65535 + version 1.0, type FLOW_MOD, length 72, xid 0x00000004 + cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000 + 11 12:51:39.381338 IP (tos 0x0, ttl 64, id 53098, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0x0a54), seq 101:109, ack 137, win 122, options [nop,nop,TS val 47836354 ecr 1], length 8: OpenFlow + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005 + 12 12:51:39.381649 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x07ed (correct), seq 137, ack 109, win 1034, options [nop,nop,TS val 1 ecr 47836352], length 0 + 13 12:51:39.382259 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x06bc (correct), seq 137:145, ack 109, win 1035, options [nop,nop,TS val 1 ecr 47836352], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005 + 14 12:51:39.382655 IP (tos 0x0, ttl 64, id 53099, offset 0, flags [DF], proto TCP (6), length 80) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14a7 (incorrect -> 0x07f3), seq 109:137, ack 145, win 122, options [nop,nop,TS val 47836355 ecr 1], length 28: OpenFlow + version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000006 + version 1.0, type STATS_REQUEST, length 12, xid 0x00000007 + type TABLE, flags 0x0000 + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000008 + 15 12:51:39.547412 IP (tos 0x0, ttl 64, id 53475, offset 0, flags [DF], proto TCP (6), length 180) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x47d0 (correct), seq 145:273, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 128: OpenFlow + version 1.0, type FEATURES_REPLY, length 128, xid 0x00000006 + dpid 0x00010001e88ae0e2, n_buffers 0, n_tables 6 + capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS) + actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS) + port_no 1, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/0' + config 0x00000000 + state 0x00000000 (STP_LISTEN) + curr 0x00000340 (10GB_FD, FIBER, AUTONEG) + advertised 0x00000340 (10GB_FD, FIBER, AUTONEG) + supported 0x00000340 (10GB_FD, FIBER, AUTONEG) + peer 0x00000000 + port_no 2, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/1' + config 0x00000001 (PORT_DOWN) + state 0x00000001 (STP_LISTEN, LINK_DOWN) + curr 0x00000300 (FIBER, AUTONEG) + advertised 0x00000300 (FIBER, AUTONEG) + supported 0x00000300 (FIBER, AUTONEG) + peer 0x00000000 + 16 12:51:39.547442 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0612 (correct), seq 273:281, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000008 + 17 12:51:39.547448 IP (tos 0x0, ttl 64, id 53476, offset 0, flags [DF], proto TCP (6), length 448) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x2be8 (correct), seq 281:677, ack 137, win 1035, options [nop,nop,TS val 1 ecr 47836355], length 396: OpenFlow + version 1.0, type STATS_REPLY, length 396, xid 0x00000007 + type TABLE, flags 0x0000 + table_id 0, name 'VLAN Table' + wildcards 0x003ffffd (IN_PORT, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS) + max_entries 1024, active_count 0, lookup_count 0, matched_count 0 + table_id 0, name 'MAC Table' + wildcards 0x003ffff5 (IN_PORT, DL_SRC, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS) + max_entries 49152, active_count 0, lookup_count 0, matched_count 0 + table_id 0, name 'Route Table' + wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS) + max_entries 6144, active_count 0, lookup_count 0, matched_count 0 + table_id 0, name 'ACL Table' + wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS) + max_entries 498, active_count 0, lookup_count 127028, matched_count 0 + table_id 0, name 'Learning Switch Table' + wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS) + max_entries 24576, active_count 0, lookup_count 0, matched_count 0 + table_id 0, name 'Egress Port Block Table' + wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS) + max_entries 256, active_count 0, lookup_count 0, matched_count 0 + 18 12:51:39.547502 IP (tos 0x0, ttl 64, id 53100, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0x088c), seq 137, ack 677, win 139, options [nop,nop,TS val 47836520 ecr 1], length 0 + 19 12:51:39.554378 IP (tos 0x0, ttl 64, id 53101, offset 0, flags [DF], proto TCP (6), length 4156) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x2493 (incorrect -> 0xa671), seq 137:4241, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 4104: OpenFlow + version 1.0, type FLOW_MOD, length 80, xid 0x00000009 + match in_port 1 + cookie 0x0000000000000001, command ADD, priority 35000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port CONTROLLER, max_len 65535 + version 1.0, type FLOW_MOD, length 80, xid 0x0000000a + match in_port 1 + cookie 0x0000000000000002, command ADD, priority 34999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_VLAN_VID, len 8, vlan_vid 2 + version 1.0, type FLOW_MOD, length 80, xid 0x0000000b + match in_port 1 + cookie 0x0000000000000003, command ADD, priority 34998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_VLAN_PCP, len 8, vlan_pcp 5 + version 1.0, type FLOW_MOD, length 88, xid 0x0000000c + match in_port 1 + cookie 0x0000000000000004, command ADD, priority 34997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_VLAN_VID, len 8, vlan_vid 2 + action type SET_VLAN_PCP, len 8, vlan_pcp 5 + version 1.0, type FLOW_MOD, length 88, xid 0x0000000d + match in_port 1 + cookie 0x0000000000000005, command ADD, priority 34996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66 + version 1.0, type FLOW_MOD, length 88, xid 0x0000000e + match in_port 1 + cookie 0x0000000000000006, command ADD, priority 34995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc + version 1.0, type FLOW_MOD, length 104, xid 0x0000000f + match in_port 1 + cookie 0x0000000000000007, command ADD, priority 34994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66 + action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc + version 1.0, type FLOW_MOD, length 80, xid 0x00000010 + match in_port 1 + match dl_src 00:00:00:00:00:01 + cookie 0x0000000000000008, command ADD, priority 34000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000011 + match in_port 1 + cookie 0x0000000000000009, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_NW_TOS, len 8, nw_tos 0x28 + version 1.0, type FLOW_MOD, length 80, xid 0x00000012 + match dl_vlan 100 + match dl_vlan_pcp 4 + match dl_type 0x0800 + cookie 0x000000000000000a, command ADD, priority 32000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000013 + match dl_type 0x0800 + match nw_src 10.11.12.0/24 + match nw_dst 10.13.14.0/24 + cookie 0x000000000000000b, command ADD, priority 31999, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000014 + match dl_type 0x0800 + match nw_proto 17 + match tp_src 68 + match tp_dst 67 + cookie 0x000000000000000c, command ADD, priority 31998, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000015 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 8 + cookie 0x000000000000000d, command ADD, priority 31997, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000016 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 3 + match icmp_code 13 + cookie 0x000000000000000e, command ADD, priority 31996, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000017 + match dl_src aa:00:00:00:00:11 + match dl_dst bb:00:00:00:00:22 + cookie 0x000000000000000f, command ADD, priority 31995, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000018 + match dl_type 0x0800 + match nw_tos 0x24 + cookie 0x0000000000000010, command ADD, priority 31994, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000019 + match dl_type 0x0800 + match nw_proto 6 + match tp_src 80 + match tp_dst 80 + cookie 0x0000000000000011, command ADD, priority 31993, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x0000001a + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.21.0.0/16 + cookie 0x0000000000000012, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x0000001b + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.22.0.0/16 + cookie 0x0000000000000013, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x0000001c + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.23.0.0/16 + cookie 0x0000000000000014, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x0000001d + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.24.0.0/16 + cookie 0x0000000000000015, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x0000001e + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.0.0/24 + cookie 0x0000000000000016, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x0000001f + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.1.0/24 + cookie 0x0000000000000017, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000020 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.2.0/24 + cookie 0x0000000000000018, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000021 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.3.0/24 + cookie 0x0000000000000019, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000022 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.4.0/24 + cookie 0x000000000000001a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000023 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.5.0/24 + cookie 0x000000000000001b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000024 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.6.0/24 + cookie 0x000000000000001c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000025 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.7.0/24 + cookie 0x000000000000001d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 112, xid 0x00000026 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + cookie 0x000000000000001e, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + version 1.0, type FLOW_MOD, length 80, xid 0x00000027 + match dl_dst 00:11:22:33:00:32 + match dl_vlan 50 + cookie 0x000000000000001f, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000028 + match dl_dst 00:11:22:33:00:33 + match dl_vlan 51 + cookie 0x0000000000000020, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000029 + match dl_dst 00:11:22:33:00:34 + match dl_vlan 52 + cookie 0x0000000000000021, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x0000002a + match dl_dst 00:11:22:33:00:35 + match dl_vlan 53 + cookie 0x0000000000000022, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x0000002b + match dl_dst 00:11:22:33:00:36 + match dl_vlan 54 + cookie 0x0000000000000023, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x0000002c + match dl_dst 00:11:22:33:00:37 + match dl_vlan 55 + cookie 0x0000000000000024, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x0000002d + match dl_dst 00:11:22:33:00:38 + match dl_vlan 56 + cookie 0x0000000000000025, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x0000002e + match dl_dst 00:11:22:33:00:39 + match dl_vlan 57 + cookie 0x0000000000000026, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x0000002f + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:14 + cookie 0x0000000000000027, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000030 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:15 + cookie 0x0000000000000028, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000031 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:16 + cookie 0x0000000000000029, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000032 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:14 + cookie 0x000000000000002a, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000033 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:15 + cookie 0x000000000000002b, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000034 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:16 + cookie 0x000000000000002c, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000035 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:14 + cookie 0x000000000000002d, command ADD, priority 65535, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM) + action type OUTPUT, len 8, port 1 + version 1.0, type FLOW_MOD, length 80, xid 0x00000036 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:15 [|openflow] + 20 12:51:39.554402 IP (tos 0x0, ttl 64, id 53104, offset 0, flags [DF], proto TCP (6), length 180) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x150b (incorrect -> 0x8ec7), seq 4241:4369, ack 677, win 139, options [nop,nop,TS val 47836527 ecr 1], length 128: OpenFlow + version unknown (0x00), type unknown (0x00), length 0 (too short!), xid 0x00000000 (invalid) + 21 12:51:39.555118 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xfaa7 (correct), seq 677, ack 2873, win 952, options [nop,nop,TS val 1 ecr 47836527], length 0 + 22 12:51:39.555156 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4fe (correct), seq 677, ack 4369, win 905, options [nop,nop,TS val 1 ecr 47836527], length 0 + 23 12:51:39.556280 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf4a7 (correct), seq 677, ack 4369, win 992, options [nop,nop,TS val 1 ecr 47836527], length 0 + 24 12:51:39.784172 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf318 (correct), seq 677:685, ack 4369, win 1035, options [nop,nop,TS val 2 ecr 47836527], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000038 + 25 12:51:39.784835 IP (tos 0x0, ttl 64, id 53105, offset 0, flags [DF], proto TCP (6), length 228) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x153b (incorrect -> 0x165f), seq 4369:4545, ack 685, win 139, options [nop,nop,TS val 47836757 ecr 2], length 176: OpenFlow + version 1.0, type STATS_REQUEST, length 56, xid 0x00000039 + type FLOW, flags 0x0000 + table_id ALL, out_port NONE + version 1.0, type STATS_REQUEST, length 56, xid 0x0000003a + type FLOW, flags 0x0000 + table_id 0, out_port NONE + version 1.0, type STATS_REQUEST, length 56, xid 0x0000003b + type FLOW, flags 0x0000 + match dl_src 00:00:00:00:77:77 + table_id 0, out_port CONTROLLER + version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000003c + 26 12:51:39.976677 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xf2dd (correct), seq 685, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 0 + 27 12:51:40.027155 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf170 (correct), seq 685:697, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 12: OpenFlow + version 1.0, type STATS_REPLY, length 12, xid 0x0000003b + type FLOW, flags 0x0000 + 28 12:51:40.027186 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf16a (correct), seq 697:705, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x0000003c + 29 12:51:40.027264 IP (tos 0x0, ttl 64, id 53106, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xf556), seq 4545, ack 705, win 139, options [nop,nop,TS val 47837000 ecr 2], length 0 + 30 12:51:40.027413 IP (tos 0x0, ttl 64, id 53575, offset 0, flags [DF], proto TCP (6), length 1216) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x39b4 (correct), seq 705:1869, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1164: OpenFlow + version 1.0, type STATS_REPLY, length 1164, xid 0x00000039 + type FLOW, flags 0x0001 (MORE) + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.21.0.0/16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000012, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.22.0.0/16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000013, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.23.0.0/16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000014, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.24.0.0/16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000015, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.0.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000016, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.1.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000017, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.2.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000018, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.3.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000019, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.4.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001a, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + 31 12:51:40.027426 IP (tos 0x0, ttl 64, id 53576, offset 0, flags [DF], proto TCP (6), length 1176) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6b64 (correct), seq 1869:2993, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 1124: OpenFlow + version 1.0, type STATS_REPLY, length 1124, xid 0x00000039 + type FLOW, flags 0x0001 (MORE) + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.5.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001b, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.6.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001c, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.7.0/24 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001d, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 128, table_id 30 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001e, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 00:01:e8:8a:e0:e4 + action type SET_DL_DST, len 16, dl_addr 11:00:00:00:00:00 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port CONTROLLER, max_len 65535 + length 96, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0 + action type SET_VLAN_VID, len 8, vlan_vid 2 + length 96, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0 + action type SET_VLAN_PCP, len 8, vlan_pcp 5 + length 104, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0 + action type SET_VLAN_VID, len 8, vlan_vid 2 + action type SET_VLAN_PCP, len 8, vlan_pcp 5 + length 104, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66 + length 104, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0 + action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc + 32 12:51:40.027435 IP (tos 0x0, ttl 64, id 53107, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xec39), seq 4545, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 0 + 33 12:51:40.027603 IP (tos 0x0, ttl 64, id 53108, offset 0, flags [DF], proto TCP (6), length 148) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14eb (incorrect -> 0xc5f7), seq 4545:4641, ack 2993, win 184, options [nop,nop,TS val 47837000 ecr 2], length 96: OpenFlow + version 1.0, type STATS_REQUEST, length 12, xid 0x0000003d + type DESC, flags 0x0000 + version 1.0, type STATS_REQUEST, length 56, xid 0x0000003e + type AGGREGATE, flags 0x0000 + table_id ALL, out_port NONE + version 1.0, type STATS_REQUEST, length 20, xid 0x0000003f + type PORT, flags 0x0000 + port_no NONE + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000040 + 34 12:51:40.027663 IP (tos 0x0, ttl 64, id 53577, offset 0, flags [DF], proto TCP (6), length 1048) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x29df (correct), seq 2993:3989, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 996: OpenFlow + version 1.0, type STATS_REPLY, length 996, xid 0x00000039 + type FLOW, flags 0x0001 (MORE) + length 120, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66 + action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc + length 96, table_id 40 + match in_port 1 + match dl_src 00:00:00:00:00:01 + duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0 + action type SET_NW_TOS, len 8, nw_tos 0x28 + length 96, table_id 40 + match dl_vlan 100 + match dl_vlan_pcp 4 + match dl_type 0x0800 + duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_type 0x0800 + match nw_src 10.11.12.0/24 + match nw_dst 10.13.14.0/24 + duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_type 0x0800 + match nw_proto 17 + match tp_src 68 + match tp_dst 67 + duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 8 + duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 3 + match icmp_code 13 + duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_src aa:00:00:00:00:11 + match dl_dst bb:00:00:00:00:22 + duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_type 0x0800 + match nw_tos 0x24 + duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + 35 12:51:40.027680 IP (tos 0x0, ttl 64, id 53578, offset 0, flags [DF], proto TCP (6), length 1024) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x45c0 (correct), seq 3989:4961, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 972: OpenFlow + version 1.0, type STATS_REPLY, length 972, xid 0x00000039 + type FLOW, flags 0x0001 (MORE) + length 96, table_id 40 + match dl_type 0x0800 + match nw_proto 6 + match tp_src 80 + match tp_dst 80 + duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:32 + match dl_vlan 50 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:33 + match dl_vlan 51 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:34 + match dl_vlan 52 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:35 + match dl_vlan 53 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:36 + match dl_vlan 54 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:37 + match dl_vlan 55 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:38 + match dl_vlan 56 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_dst 00:11:22:33:00:39 + match dl_vlan 57 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000026, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:14 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000027, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + 36 12:51:40.027715 IP (tos 0x0, ttl 64, id 53109, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xe405), seq 4641, ack 4961, win 220, options [nop,nop,TS val 47837000 ecr 2], length 0 + 37 12:51:40.027722 IP (tos 0x0, ttl 64, id 53579, offset 0, flags [DF], proto TCP (6), length 832) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x6f3d (correct), seq 4961:5741, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 780: OpenFlow + version 1.0, type STATS_REPLY, length 780, xid 0x00000039 + type FLOW, flags 0x0000 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:15 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000028, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000029, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:14 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002a, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:15 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002b, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002c, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:14 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002d, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:15 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002e, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 40 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:16 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000002f, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + 38 12:51:40.027911 IP (tos 0x0, ttl 64, id 53580, offset 0, flags [DF], proto TCP (6), length 976) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x0dbb (correct), seq 5741:6665, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47836757], length 924: OpenFlow + version 1.0, type STATS_REPLY, length 924, xid 0x0000003a + type FLOW, flags 0x0001 (MORE) + length 96, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 35000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port CONTROLLER, max_len 65535 + length 96, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34999, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0 + action type SET_VLAN_VID, len 8, vlan_vid 2 + length 96, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34998, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0 + action type SET_VLAN_PCP, len 8, vlan_pcp 5 + length 104, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34997, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0 + action type SET_VLAN_VID, len 8, vlan_vid 2 + action type SET_VLAN_PCP, len 8, vlan_pcp 5 + length 104, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34996, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66 + length 104, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34995, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0 + action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc + length 120, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 34994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0 + action type SET_DL_SRC, len 16, dl_addr 11:22:33:44:55:66 + action type SET_DL_DST, len 16, dl_addr 77:88:99:aa:bb:cc + length 96, table_id 0 + match in_port 1 + match dl_src 00:00:00:00:00:01 + duration_sec 0, duration_nsec 0, priority 34000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match in_port 1 + duration_sec 0, duration_nsec 0, priority 33000, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000009, packet_count 0, byte_count 0 + action type SET_NW_TOS, len 8, nw_tos 0x28 + 39 12:51:40.027920 IP (tos 0x0, ttl 64, id 53110, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xdd38), seq 4641, ack 6665, win 257, options [nop,nop,TS val 47837000 ecr 2], length 0 + 40 12:51:40.027928 IP (tos 0x0, ttl 64, id 53581, offset 0, flags [DF], proto TCP (6), length 1500) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0x2501 (correct), seq 6665:8113, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 1448: OpenFlow + version 1.0, type STATS_REPLY, length 972, xid 0x0000003a + type FLOW, flags 0x0001 (MORE) + length 96, table_id 0 + match dl_vlan 100 + match dl_vlan_pcp 4 + match dl_type 0x0800 + duration_sec 0, duration_nsec 0, priority 32000, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000a, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_type 0x0800 + match nw_src 10.11.12.0/24 + match nw_dst 10.13.14.0/24 + duration_sec 0, duration_nsec 0, priority 31999, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000b, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_type 0x0800 + match nw_proto 17 + match tp_src 68 + match tp_dst 67 + duration_sec 0, duration_nsec 0, priority 31998, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000c, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 8 + duration_sec 0, duration_nsec 0, priority 31997, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000d, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 3 + match icmp_code 13 + duration_sec 0, duration_nsec 0, priority 31996, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000e, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_src aa:00:00:00:00:11 + match dl_dst bb:00:00:00:00:22 + duration_sec 0, duration_nsec 0, priority 31995, idle_timeout 0, hard_timeout 0, cookie 0x000000000000000f, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_type 0x0800 + match nw_tos 0x24 + duration_sec 0, duration_nsec 0, priority 31994, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000010, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_type 0x0800 + match nw_proto 6 + match tp_src 80 + match tp_dst 80 + duration_sec 0, duration_nsec 0, priority 31993, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000011, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 2 + length 96, table_id 0 + match dl_dst 00:11:22:33:00:32 + match dl_vlan 50 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x000000000000001f, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 0 + match dl_dst 00:11:22:33:00:33 + match dl_vlan 51 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000020, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + version 1.0, type STATS_REPLY, length 972, xid 0x0000003a + type FLOW, flags 0x0001 (MORE) + length 96, table_id 0 + match dl_dst 00:11:22:33:00:34 + match dl_vlan 52 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000021, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 0 + match dl_dst 00:11:22:33:00:35 + match dl_vlan 53 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000022, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 0 + match dl_dst 00:11:22:33:00:36 + match dl_vlan 54 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000023, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 0 + match dl_dst 00:11:22:33:00:37 + match dl_vlan 55 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000024, packet_count 0, byte_count 0 + action type OUTPUT, len 8, port 1 + length 96, table_id 0 + match dl_dst 00:11:22:33:00:38 + match dl_vlan 56 + duration_sec 0, duration_nsec 0, priority 65535, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000025, packet_count 0 [|openflow] + 41 12:51:40.028159 IP (tos 0x0, ttl 64, id 53582, offset 0, flags [DF], proto TCP (6), length 1040) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x395e (correct), seq 8113:9101, ack 4545, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 988: OpenFlow + version unknown (0x00), type unknown (0x00), length 0 (too short!), xid 0x00000000 (invalid) + 42 12:51:40.028172 IP (tos 0x0, ttl 64, id 53111, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xd387), seq 4641, ack 9101, win 302, options [nop,nop,TS val 47837000 ecr 2], length 0 + 43 12:51:40.226408 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xd0aa (correct), seq 9101, ack 4641, win 1035, options [nop,nop,TS val 2 ecr 47837000], length 0 + 44 12:51:40.239219 IP (tos 0x0, ttl 64, id 53602, offset 0, flags [DF], proto TCP (6), length 1120) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x141f (correct), seq 9101:10169, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 1068: OpenFlow + version 1.0, type STATS_REPLY, length 1068, xid 0x0000003d + type DESC, flags 0x0000 + mfr_desc 'Dell Force 10' + hw_desc 'OpenFlow switch HW ver. 1.0' + sw_desc 'OpenFlow switch SW ver. 1.0' + serial_num '02132012' + dp_desc 'Dell-Switch: 00:01:e8:8a:e0:e2; instance: 1' + 45 12:51:40.239258 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcb12 (correct), seq 10169:10177, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000040 + 46 12:51:40.239264 IP (tos 0x0, ttl 64, id 53603, offset 0, flags [DF], proto TCP (6), length 88) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcaa5 (correct), seq 10177:10213, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 36: OpenFlow + version 1.0, type STATS_REPLY, length 36, xid 0x0000003e + type AGGREGATE, flags 0x0000 + packet_count 0, byte_count 0, flow_count 47 + 47 12:51:40.239267 IP (tos 0x0, ttl 64, id 53604, offset 0, flags [DF], proto TCP (6), length 189) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x03e7 (correct), seq 10213:10350, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 137: OpenFlow + version 1.0, type PACKET_IN, length 137, xid 0x00000000 + buffer_id NONE, total_len 119, in_port 1, reason ACTION + data (119 octets), frame decoding below +STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102 + port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0 + CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034, + message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s + v3len 64, MCID Name pica8, rev 0, + digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0, + CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20 + 48 12:51:40.239273 IP (tos 0x0, ttl 64, id 53605, offset 0, flags [DF], proto TCP (6), length 168) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x4a03 (correct), seq 10350:10466, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow + version 1.0, type STATS_REPLY, length 116, xid 0x0000003f + type PORT, flags 0x0001 (MORE) + port_no 1, rx_packets 129437, tx_packets 8061, rx_bytes 16090662, tx_bytes 515904, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0 + 49 12:51:40.239276 IP (tos 0x0, ttl 64, id 53606, offset 0, flags [DF], proto TCP (6), length 168) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc90e (correct), seq 10466:10582, ack 4641, win 1035, options [nop,nop,TS val 3 ecr 47837000], length 116: OpenFlow + version 1.0, type STATS_REPLY, length 116, xid 0x0000003f + type PORT, flags 0x0000 + port_no 2, rx_packets 0, tx_packets 0, rx_bytes 0, tx_bytes 0, rx_dropped 0, tx_dropped 0, rx_errors 18446744073709551615, tx_errors 18446744073709551615, rx_frame_err 18446744073709551615, rx_over_err 18446744073709551615, rx_crc_err 0, collisions 0 + 50 12:51:40.239287 IP (tos 0x0, ttl 64, id 53112, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xcccd), seq 4641, ack 10582, win 331, options [nop,nop,TS val 47837211 ecr 3], length 0 + 51 12:51:40.239984 IP (tos 0x0, ttl 64, id 53113, offset 0, flags [DF], proto TCP (6), length 132) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14db (incorrect -> 0xc93e), seq 4641:4721, ack 10582, win 331, options [nop,nop,TS val 47837212 ecr 3], length 80: OpenFlow + version 1.0, type FLOW_MOD, length 72, xid 0x00000041 + cookie 0x0000000000000000, command DELETE, priority 65535, out_port NONE, flags 0x0001 (SEND_FLOW_REM) + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000042 + 52 12:51:40.427977 IP (tos 0x0, ttl 64, id 53707, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc92c (correct), seq 10582:10670, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001a + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.21.0.0/16 + cookie 0x0000000000000012, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 53 12:51:40.428016 IP (tos 0x0, ttl 64, id 53708, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc8d1 (correct), seq 10670:10758, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001b + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.22.0.0/16 + cookie 0x0000000000000013, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 54 12:51:40.428024 IP (tos 0x0, ttl 64, id 53709, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc876 (correct), seq 10758:10846, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001c + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.23.0.0/16 + cookie 0x0000000000000014, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 55 12:51:40.428028 IP (tos 0x0, ttl 64, id 53710, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc81b (correct), seq 10846:10934, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001d + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.24.0.0/16 + cookie 0x0000000000000015, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 56 12:51:40.428031 IP (tos 0x0, ttl 64, id 53711, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc7c7 (correct), seq 10934:11022, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001e + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.0.0/24 + cookie 0x0000000000000016, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 57 12:51:40.428033 IP (tos 0x0, ttl 64, id 53712, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc66d (correct), seq 11022:11110, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000001f + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.1.0/24 + cookie 0x0000000000000017, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 58 12:51:40.428035 IP (tos 0x0, ttl 64, id 53713, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc513 (correct), seq 11110:11198, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000020 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.2.0/24 + cookie 0x0000000000000018, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 59 12:51:40.428039 IP (tos 0x0, ttl 64, id 53714, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc3b9 (correct), seq 11198:11286, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000021 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.3.0/24 + cookie 0x0000000000000019, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 60 12:51:40.428072 IP (tos 0x0, ttl 64, id 53114, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc900), seq 4721, ack 11286, win 331, options [nop,nop,TS val 47837400 ecr 3], length 0 + 61 12:51:40.428267 IP (tos 0x0, ttl 64, id 53715, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc25f (correct), seq 11286:11374, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000022 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.4.0/24 + cookie 0x000000000000001a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 62 12:51:40.428284 IP (tos 0x0, ttl 64, id 53716, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xc105 (correct), seq 11374:11462, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000023 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.5.0/24 + cookie 0x000000000000001b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 63 12:51:40.428289 IP (tos 0x0, ttl 64, id 53717, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbfab (correct), seq 11462:11550, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000024 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.6.0/24 + cookie 0x000000000000001c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 64 12:51:40.428292 IP (tos 0x0, ttl 64, id 53718, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xbe51 (correct), seq 11550:11638, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000025 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + match nw_dst 10.20.7.0/24 + cookie 0x000000000000001d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 65 12:51:40.428295 IP (tos 0x0, ttl 64, id 53719, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xcf05 (correct), seq 11638:11726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837212], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000026 + match dl_dst 00:01:e8:8a:e0:e4 + match dl_type 0x0800 + cookie 0x000000000000001e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 66 12:51:40.428298 IP (tos 0x0, ttl 64, id 53720, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x37c4 (correct), seq 11726:11814, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000009 + match in_port 1 + cookie 0x0000000000000001, priority 35000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 67 12:51:40.428301 IP (tos 0x0, ttl 64, id 53721, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x376b (correct), seq 11814:11902, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000a + match in_port 1 + cookie 0x0000000000000002, priority 34999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 68 12:51:40.428343 IP (tos 0x0, ttl 64, id 53115, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc697), seq 4721, ack 11902, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0 + 69 12:51:40.428502 IP (tos 0x0, ttl 64, id 53722, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3712 (correct), seq 11902:11990, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000b + match in_port 1 + cookie 0x0000000000000003, priority 34998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 70 12:51:40.428515 IP (tos 0x0, ttl 64, id 53723, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x36b9 (correct), seq 11990:12078, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000c + match in_port 1 + cookie 0x0000000000000004, priority 34997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 71 12:51:40.428519 IP (tos 0x0, ttl 64, id 53724, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3660 (correct), seq 12078:12166, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000d + match in_port 1 + cookie 0x0000000000000005, priority 34996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 72 12:51:40.428521 IP (tos 0x0, ttl 64, id 53725, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3607 (correct), seq 12166:12254, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000e + match in_port 1 + cookie 0x0000000000000006, priority 34995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 73 12:51:40.428524 IP (tos 0x0, ttl 64, id 53726, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x35ae (correct), seq 12254:12342, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837400], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000000f + match in_port 1 + cookie 0x0000000000000007, priority 34994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 74 12:51:40.428526 IP (tos 0x0, ttl 64, id 53727, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3938 (correct), seq 12342:12430, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000010 + match in_port 1 + match dl_src 00:00:00:00:00:01 + cookie 0x0000000000000008, priority 34000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 75 12:51:40.428529 IP (tos 0x0, ttl 64, id 53728, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x3cc3 (correct), seq 12430:12518, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000011 + match in_port 1 + cookie 0x0000000000000009, priority 33000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 76 12:51:40.428553 IP (tos 0x0, ttl 64, id 53116, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc42f), seq 4721, ack 12518, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0 + 77 12:51:40.428793 IP (tos 0x0, ttl 64, id 53729, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1317 (correct), seq 12518:12606, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000012 + match dl_vlan 100 + match dl_vlan_pcp 4 + match dl_type 0x0800 + cookie 0x000000000000000a, priority 32000, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 78 12:51:40.428810 IP (tos 0x0, ttl 64, id 53730, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x00fe (correct), seq 12606:12694, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000013 + match dl_type 0x0800 + match nw_src 10.11.12.0/24 + match nw_dst 10.13.14.0/24 + cookie 0x000000000000000b, priority 31999, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 79 12:51:40.428814 IP (tos 0x0, ttl 64, id 53731, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16ff (correct), seq 12694:12782, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000014 + match dl_type 0x0800 + match nw_proto 17 + match tp_src 68 + match tp_dst 67 + cookie 0x000000000000000c, priority 31998, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 80 12:51:40.428818 IP (tos 0x0, ttl 64, id 53732, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16b5 (correct), seq 12782:12870, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000015 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 8 + cookie 0x000000000000000d, priority 31997, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 81 12:51:40.428821 IP (tos 0x0, ttl 64, id 53733, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x16d4 (correct), seq 12870:12958, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000016 + match dl_type 0x0800 + match nw_proto 1 + match icmp_type 3 + match icmp_code 13 + cookie 0x000000000000000e, priority 31996, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 82 12:51:40.428821 IP (tos 0x0, ttl 64, id 53117, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc37f), seq 4721, ack 12694, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0 + 83 12:51:40.428823 IP (tos 0x0, ttl 64, id 53734, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xd96b (correct), seq 12958:13046, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000017 + match dl_src aa:00:00:00:00:11 + match dl_dst bb:00:00:00:00:22 + cookie 0x000000000000000f, priority 31995, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 84 12:51:40.428825 IP (tos 0x0, ttl 64, id 53735, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf172 (correct), seq 13046:13134, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000018 + match dl_type 0x0800 + match nw_tos 0x24 + cookie 0x0000000000000010, priority 31994, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 85 12:51:40.428830 IP (tos 0x0, ttl 64, id 53736, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x1534 (correct), seq 13134:13222, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000019 + match dl_type 0x0800 + match nw_proto 6 + match tp_src 80 + match tp_dst 80 + cookie 0x0000000000000011, priority 31993, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 86 12:51:40.428852 IP (tos 0x0, ttl 64, id 53118, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xc16f), seq 4721, ack 13222, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0 + 87 12:51:40.429052 IP (tos 0x0, ttl 64, id 53737, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x97c9 (correct), seq 13222:13310, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000027 + match dl_dst 00:11:22:33:00:32 + match dl_vlan 50 + cookie 0x000000000000001f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 88 12:51:40.429071 IP (tos 0x0, ttl 64, id 53738, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x976d (correct), seq 13310:13398, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000028 + match dl_dst 00:11:22:33:00:33 + match dl_vlan 51 + cookie 0x0000000000000020, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 89 12:51:40.429076 IP (tos 0x0, ttl 64, id 53739, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9711 (correct), seq 13398:13486, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000029 + match dl_dst 00:11:22:33:00:34 + match dl_vlan 52 + cookie 0x0000000000000021, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 90 12:51:40.429079 IP (tos 0x0, ttl 64, id 53740, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x96b5 (correct), seq 13486:13574, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002a + match dl_dst 00:11:22:33:00:35 + match dl_vlan 53 + cookie 0x0000000000000022, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 91 12:51:40.429082 IP (tos 0x0, ttl 64, id 53741, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9659 (correct), seq 13574:13662, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002b + match dl_dst 00:11:22:33:00:36 + match dl_vlan 54 + cookie 0x0000000000000023, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 92 12:51:40.429085 IP (tos 0x0, ttl 64, id 53742, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95fd (correct), seq 13662:13750, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002c + match dl_dst 00:11:22:33:00:37 + match dl_vlan 55 + cookie 0x0000000000000024, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 93 12:51:40.429088 IP (tos 0x0, ttl 64, id 53743, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x95a1 (correct), seq 13750:13838, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002d + match dl_dst 00:11:22:33:00:38 + match dl_vlan 56 + cookie 0x0000000000000025, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 94 12:51:40.429104 IP (tos 0x0, ttl 64, id 53119, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbf07), seq 4721, ack 13838, win 331, options [nop,nop,TS val 47837401 ecr 3], length 0 + 95 12:51:40.429275 IP (tos 0x0, ttl 64, id 53744, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x9545 (correct), seq 13838:13926, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002e + match dl_dst 00:11:22:33:00:39 + match dl_vlan 57 + cookie 0x0000000000000026, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 96 12:51:40.429284 IP (tos 0x0, ttl 64, id 53745, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72fd (correct), seq 13926:14014, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x0000002f + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:14 + cookie 0x0000000000000027, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 97 12:51:40.429287 IP (tos 0x0, ttl 64, id 53746, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x72a2 (correct), seq 14014:14102, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000030 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:15 + cookie 0x0000000000000028, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 98 12:51:40.429290 IP (tos 0x0, ttl 64, id 53747, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7247 (correct), seq 14102:14190, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000031 + match dl_src 00:11:22:33:00:0a + match dl_dst 00:11:22:33:00:16 + cookie 0x0000000000000029, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 99 12:51:40.429292 IP (tos 0x0, ttl 64, id 53748, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x71ee (correct), seq 14190:14278, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000032 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:14 + cookie 0x000000000000002a, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 100 12:51:40.429321 IP (tos 0x0, ttl 64, id 53120, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbd4e), seq 4721, ack 14278, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0 + 101 12:51:40.429558 IP (tos 0x0, ttl 64, id 53749, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7193 (correct), seq 14278:14366, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000033 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:15 + cookie 0x000000000000002b, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 102 12:51:40.429594 IP (tos 0x0, ttl 64, id 53750, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7138 (correct), seq 14366:14454, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000034 + match dl_src 00:11:22:33:00:0b + match dl_dst 00:11:22:33:00:16 + cookie 0x000000000000002c, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 103 12:51:40.429598 IP (tos 0x0, ttl 64, id 53751, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x70df (correct), seq 14454:14542, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000035 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:14 + cookie 0x000000000000002d, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 104 12:51:40.429601 IP (tos 0x0, ttl 64, id 53752, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7084 (correct), seq 14542:14630, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837401], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000036 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:15 + cookie 0x000000000000002e, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 105 12:51:40.429603 IP (tos 0x0, ttl 64, id 53753, offset 0, flags [DF], proto TCP (6), length 140) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0x7028 (correct), seq 14630:14718, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 88: OpenFlow + version 1.0, type FLOW_REMOVED, length 88, xid 0x00000037 + match dl_src 00:11:22:33:00:0c + match dl_dst 00:11:22:33:00:16 + cookie 0x000000000000002f, priority 65535, reason DELETE, duration_sec 0, duration_nsec 0, packet_count 0, byte_count 0 + 106 12:51:40.429605 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb769 (correct), seq 14718:14726, ack 4721, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000042 + 107 12:51:40.429648 IP (tos 0x0, ttl 64, id 53121, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbb8e), seq 4721, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 0 + 108 12:51:40.429929 IP (tos 0x0, ttl 64, id 53122, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xba21), seq 4721:4729, ack 14726, win 331, options [nop,nop,TS val 47837402 ecr 3], length 8: OpenFlow + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000043 + 109 12:51:40.430694 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb758 (correct), seq 14726:14734, ack 4729, win 1035, options [nop,nop,TS val 3 ecr 47837402], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000043 + 110 12:51:40.431060 IP (tos 0x0, ttl 64, id 53123, offset 0, flags [DF], proto TCP (6), length 144) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x14e7 (incorrect -> 0x2671), seq 4729:4821, ack 14734, win 331, options [nop,nop,TS val 47837403 ecr 3], length 92: OpenFlow + version 1.0, type PACKET_OUT, length 84, xid 0x00000044 + buffer_id 0xffffffff, in_port CONTROLLER + action type OUTPUT, len 8, port 1 + data (60 octets), frame decoding below + [|llc] + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000045 + 111 12:51:40.432275 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6f1 (correct), seq 14734:14742, ack 4821, win 1035, options [nop,nop,TS val 3 ecr 47837403], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000045 + 112 12:51:40.432599 IP (tos 0x0, ttl 64, id 53124, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb9a7), seq 4821:4829, ack 14742, win 331, options [nop,nop,TS val 47837405 ecr 3], length 8: OpenFlow + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000046 + 113 12:51:40.433290 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6de (correct), seq 14742:14750, ack 4829, win 1035, options [nop,nop,TS val 3 ecr 47837405], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000046 + 114 12:51:40.433594 IP (tos 0x0, ttl 64, id 53125, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x1493 (incorrect -> 0xb995), seq 4829:4837, ack 14750, win 331, options [nop,nop,TS val 47837406 ecr 3], length 8: OpenFlow + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000047 + 115 12:51:40.434261 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6cc (correct), seq 14750:14758, ack 4837, win 1035, options [nop,nop,TS val 3 ecr 47837406], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000047 + 116 12:51:40.434511 IP (tos 0x0, ttl 64, id 53126, offset 0, flags [DF], proto TCP (6), length 72) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [P.], cksum 0x149f (incorrect -> 0xb819), seq 4837:4857, ack 14758, win 331, options [nop,nop,TS val 47837407 ecr 3], length 20: OpenFlow + version 1.0, type SET_CONFIG, length 12, xid 0x00000048 + flags FRAG_NORMAL, miss_send_len 65535 + version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000049 + 117 12:51:40.435172 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xb6ad (correct), seq 14758:14766, ack 4857, win 1035, options [nop,nop,TS val 3 ecr 47837407], length 8: OpenFlow + version 1.0, type BARRIER_REPLY, length 8, xid 0x00000049 + 118 12:51:40.474288 IP (tos 0x0, ttl 64, id 53127, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xbab1), seq 4857, ack 14766, win 331, options [nop,nop,TS val 47837447 ecr 3], length 0 + 119 12:51:41.367956 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [S], cksum 0xb924 (correct), seq 553833795, win 32768, options [mss 1380,nop,wscale 5,sackOK,nop,nop,nop,nop,TS val 1 ecr 0], length 0 + 120 12:51:41.368013 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.55442: Flags [S.], cksum 0x1493 (incorrect -> 0x6111), seq 845973340, ack 553833796, win 14480, options [mss 1460,sackOK,TS val 47838340 ecr 1,nop,wscale 7], length 0 + 121 12:51:41.368292 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc462 (correct), seq 1, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 0 + 122 12:51:41.368326 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x3724 (correct), seq 1:9, ack 1, win 1035, options [nop,nop,TS val 1 ecr 47838340], length 8: OpenFlow + version 1.0, type HELLO, length 8, xid 0x95e1f644 + 123 12:51:41.368336 IP (tos 0x0, ttl 64, id 29656, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0x148b (incorrect -> 0xc7f2), seq 1, ack 9, win 114, options [nop,nop,TS val 47838341 ecr 1], length 0 + 124 12:51:41.374647 IP (tos 0x0, ttl 64, id 29657, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6d3), seq 1:9, ack 9, win 114, options [nop,nop,TS val 47838347 ecr 1], length 8: OpenFlow + version 1.0, type HELLO, length 8, xid 0x00000001 + 125 12:51:41.375407 IP (tos 0x0, ttl 64, id 29658, offset 0, flags [DF], proto TCP (6), length 60) + 10.0.0.20.6633 > 10.0.0.81.55442: Flags [P.], cksum 0x1493 (incorrect -> 0xc6c4), seq 9:17, ack 9, win 114, options [nop,nop,TS val 47838348 ecr 1], length 8: OpenFlow + version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002 + 126 12:51:41.375690 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc444 (correct), seq 9, ack 17, win 1034, options [nop,nop,TS val 1 ecr 47838347], length 0 + 127 12:51:41.378993 IP (tos 0x0, ttl 64, id 53761, offset 0, flags [DF], proto TCP (6), length 180) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [P.], cksum 0x1df1 (correct), seq 9:137, ack 17, win 1035, options [nop,nop,TS val 1 ecr 47838347], length 128: OpenFlow + version 1.0, type FEATURES_REPLY, length 128, xid 0x00000002 + dpid 0x00050001e88ae0e2, n_buffers 0, n_tables 6 + capabilities 0x00000007 (FLOW_STATS, TABLE_STATS, PORT_STATS) + actions 0x00000137 (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, SET_DL_SRC, SET_DL_DST, SET_NW_TOS) + port_no 13, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/12' + config 0x00000001 (PORT_DOWN) + state 0x00000001 (STP_LISTEN, LINK_DOWN) + curr 0x00000300 (FIBER, AUTONEG) + advertised 0x00000300 (FIBER, AUTONEG) + supported 0x00000300 (FIBER, AUTONEG) + peer 0x00000000 + port_no 16, hw_addr 00:01:e8:8a:e0:e4, name 'Te 0/15' + config 0x00008001 (PORT_DOWN) (bogus) + state 0x00000001 (STP_LISTEN, LINK_DOWN) + curr 0x00000300 (FIBER, AUTONEG) + advertised 0x00000300 (FIBER, AUTONEG) + supported 0x00000300 (FIBER, AUTONEG) + peer 0x00000000 + 128 12:51:41.380457 IP (tos 0x0, ttl 64, id 29659, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.55442: Flags [F.], cksum 0x148b (incorrect -> 0xc74d), seq 17, ack 137, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0 + 129 12:51:41.380660 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [.], cksum 0xc3bc (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0 + 130 12:51:41.380991 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.55442 > 10.0.0.20.6633: Flags [F.], cksum 0xc3bb (correct), seq 137, ack 18, win 1035, options [nop,nop,TS val 1 ecr 47838353], length 0 + 131 12:51:41.381041 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.55442: Flags [.], cksum 0xc74c (correct), seq 18, ack 138, win 122, options [nop,nop,TS val 47838353 ecr 1], length 0 + 132 12:51:42.080078 IP (tos 0x0, ttl 64, id 53775, offset 0, flags [DF], proto TCP (6), length 189) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [P.], cksum 0xf083 (correct), seq 14766:14903, ack 4857, win 1035, options [nop,nop,TS val 6 ecr 47837447], length 137: OpenFlow + version 1.0, type PACKET_IN, length 137, xid 0x00000000 + buffer_id NONE, total_len 119, in_port 1, reason NO_MATCH + data (119 octets), frame decoding below +STP 802.1s, Rapid STP, CIST Flags [Proposal, Learn, Forward, Agreement], length 102 + port-role Designated, CIST root-id 8000.08:9e:01:62:d5:f4, CIST ext-pathcost 0 + CIST regional-root-id 8000.08:9e:01:62:d5:f4, CIST port-id 8034, + message-age 0.00s, max-age 20.00s, hello-time 2.00s, forwarding-delay 15.00s + v3len 64, MCID Name pica8, rev 0, + digest ac36177f50283cd4b83821d8ab26de62, CIST int-root-pathcost 0, + CIST bridge-id 8000.08:9e:01:62:d5:f4, CIST remaining-hops 20 + 133 12:51:42.080120 IP (tos 0x0, ttl 64, id 53128, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0x148b (incorrect -> 0xb3e0), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47839052 ecr 6], length 0 + 134 12:51:44.046180 IP (tos 0x0, ttl 64, id 53129, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [F.], cksum 0x148b (incorrect -> 0xac31), seq 4857, ack 14903, win 331, options [nop,nop,TS val 47841018 ecr 6], length 0 + 135 12:51:44.046638 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [.], cksum 0xa96d (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0 + 136 12:51:44.046956 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.81.56068 > 10.0.0.20.6633: Flags [F.], cksum 0xa96c (correct), seq 14903, ack 4858, win 1035, options [nop,nop,TS val 10 ecr 47841018], length 0 + 137 12:51:44.046986 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) + 10.0.0.20.6633 > 10.0.0.81.56068: Flags [.], cksum 0xac2b (correct), seq 4858, ack 14904, win 331, options [nop,nop,TS val 47841019 ecr 10], length 0 |