summaryrefslogtreecommitdiffstats
path: root/tests/of10_7050sx_bsn-vv.out
blob: 0bc749a5fc10c001864dd0a358dde6c4bb3ef0ff (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
    1  2015-01-30 16:11:51.293880 IP (tos 0x0, ttl 55, id 5483, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.37044 > 109.74.202.168.6653: Flags [S], cksum 0x0576 (correct), seq 1216143989, win 14600, options [mss 1460,sackOK,TS val 50525982 ecr 0,nop,wscale 7], length 0
    2  2015-01-30 16:11:51.293947 IP (tos 0x0, ttl 64, id 26571, offset 0, flags [DF], proto TCP (6), length 40)
    109.74.202.168.6653 > 88.150.169.52.37044: Flags [R.], cksum 0xa06e (correct), seq 0, ack 1216143990, win 0, length 0
    3  2015-01-30 16:11:53.295371 IP (tos 0x0, ttl 55, id 49495, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [S], cksum 0x4629 (correct), seq 774256709, win 14600, options [mss 1460,sackOK,TS val 50526482 ecr 0,nop,wscale 7], length 0
    4  2015-01-30 16:11:53.295463 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [S.], cksum 0x39ec (incorrect -> 0x0c04), seq 3422281440, ack 774256710, win 28960, options [mss 1460,sackOK,TS val 590230513 ecr 50526482,nop,wscale 7], length 0
    5  2015-01-30 16:11:53.298824 IP (tos 0x0, ttl 55, id 49496, offset 0, flags [DF], proto TCP (6), length 52)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab7c (correct), seq 1, ack 1, win 115, options [nop,nop,TS val 50526483 ecr 590230513], length 0
    6  2015-01-30 16:11:53.305813 IP (tos 0x0, ttl 64, id 60691, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa9f0), seq 1:9, ack 1, win 227, options [nop,nop,TS val 590230516 ecr 50526483], length 8: OpenFlow
	version 1.0, type HELLO, length 8, xid 0x00000001
    7  2015-01-30 16:11:53.308458 IP (tos 0x0, ttl 55, id 49497, offset 0, flags [DF], proto TCP (6), length 52)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab6e (correct), seq 1, ack 9, win 115, options [nop,nop,TS val 50526486 ecr 590230516], length 0
    8  2015-01-30 16:11:54.295523 IP (tos 0x0, ttl 55, id 49498, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x7b45 (correct), seq 1:9, ack 9, win 115, options [nop,nop,TS val 50526732 ecr 590230516], length 8: OpenFlow
	version 1.0, type HELLO, length 8, xid 0x00002e1b
    9  2015-01-30 16:11:54.295579 IP (tos 0x0, ttl 64, id 60692, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa8d7), seq 9, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 0
   10  2015-01-30 16:11:54.295793 IP (tos 0x0, ttl 64, id 60693, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa7b8), seq 9:17, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 8: OpenFlow
	version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
   11  2015-01-30 16:11:54.298928 IP (tos 0x0, ttl 55, id 49499, offset 0, flags [DF], proto TCP (6), length 52)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xa93e (correct), seq 9, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 0
   12  2015-01-30 16:11:54.299530 IP (tos 0x0, ttl 55, id 49500, offset 0, flags [DF], proto TCP (6), length 468)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xff61 (correct), seq 9:425, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 416: OpenFlow
	version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
	 dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
	 capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
	 actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
	  port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
	   config 0x80000001 (PORT_DOWN) (bogus)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
	   config 0x80000001 (PORT_DOWN) (bogus)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
   13  2015-01-30 16:11:54.303020 IP (tos 0x0, ttl 64, id 60694, offset 0, flags [DF], proto TCP (6), length 136)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a38 (incorrect -> 0xa414), seq 17:101, ack 425, win 235, options [nop,nop,TS val 590230815 ecr 50526733], length 84: OpenFlow
	version 1.0, type SET_CONFIG, length 12, xid 0x00000003
	 flags FRAG_NORMAL, miss_send_len 65535
	version 1.0, type FLOW_MOD, length 72, xid 0x00000004
	 cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
   14  2015-01-30 16:11:54.304964 IP (tos 0x0, ttl 64, id 60695, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa5a0), seq 101:109, ack 425, win 235, options [nop,nop,TS val 590230816 ecr 50526733], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
   15  2015-01-30 16:11:54.307353 IP (tos 0x0, ttl 55, id 49501, offset 0, flags [DF], proto TCP (6), length 140)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8297 (correct), seq 425:513, ack 109, win 115, options [nop,nop,TS val 50526735 ecr 590230815], length 88: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffd
	 match in_port 16
	 cookie 0x0000000000000001, priority 33000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
   16  2015-01-30 16:11:54.344876 IP (tos 0x0, ttl 64, id 60696, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa661), seq 109, ack 513, win 235, options [nop,nop,TS val 590230828 ecr 50526735], length 0
   17  2015-01-30 16:11:54.350268 IP (tos 0x0, ttl 55, id 49502, offset 0, flags [DF], proto TCP (6), length 236)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x6fdb (correct), seq 513:697, ack 109, win 115, options [nop,nop,TS val 50526745 ecr 590230828], length 184: OpenFlow
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffe
	 match in_port 18
	 cookie 0x0000000000000002, priority 31000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
	version 1.0, type FLOW_REMOVED, length 88, xid 0x00000fff
	 match in_port 22
	 cookie 0x0000000000000003, priority 30000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
   18  2015-01-30 16:11:54.350320 IP (tos 0x0, ttl 64, id 60697, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa596), seq 109, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 0
   19  2015-01-30 16:11:54.351010 IP (tos 0x0, ttl 64, id 60698, offset 0, flags [DF], proto TCP (6), length 140)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a3c (incorrect -> 0x41fa), seq 109:197, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 88: OpenFlow
	version 1.0, type VENDOR, length 20, xid 0x00000006, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_MIRRORING, report_mirror_ports ON
	version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
	 subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
	version 1.0, type VENDOR, length 20, xid 0x00000008, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_MIRRORING, report_mirror_ports OFF
	version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
	 subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
   20  2015-01-30 16:11:54.354984 IP (tos 0x0, ttl 55, id 49503, offset 0, flags [DF], proto TCP (6), length 72)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8c59 (correct), seq 697:717, ack 197, win 115, options [nop,nop,TS val 50526747 ecr 590230829], length 20: OpenFlow
	version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
	 subtype GET_MIRRORING_REPLY, report_mirror_ports ON
   21  2015-01-30 16:11:54.394872 IP (tos 0x0, ttl 64, id 60699, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa51a), seq 197, ack 717, win 243, options [nop,nop,TS val 590230843 ecr 50526747], length 0
   22  2015-01-30 16:11:54.397140 IP (tos 0x0, ttl 55, id 49504, offset 0, flags [DF], proto TCP (6), length 80)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8bfd (correct), seq 717:745, ack 197, win 115, options [nop,nop,TS val 50526758 ecr 590230843], length 28: OpenFlow
	version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
	 subtype GET_MIRRORING_REPLY, report_mirror_ports OFF
	version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
   23  2015-01-30 16:11:54.397175 IP (tos 0x0, ttl 64, id 60700, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa4f3), seq 197, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 0
   24  2015-01-30 16:11:54.397593 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 80)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a00 (incorrect -> 0xa165), seq 197:225, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 28: OpenFlow
	version 1.0, type FEATURES_REQUEST, length 8, xid 0x0000000b
	version 1.0, type STATS_REQUEST, length 12, xid 0x0000000c
	 type TABLE, flags 0x0000
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
   25  2015-01-30 16:11:54.400666 IP (tos 0x0, ttl 55, id 49505, offset 0, flags [DF], proto TCP (6), length 468)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xfb70 (correct), seq 745:1161, ack 225, win 115, options [nop,nop,TS val 50526759 ecr 590230843], length 416: OpenFlow
	version 1.0, type FEATURES_REPLY, length 416, xid 0x0000000b
	 dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
	 capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
	 actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
	  port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
	   config 0x80000001 (PORT_DOWN) (bogus)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
	   config 0x00000001 (PORT_DOWN)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
	  port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
	   config 0x80000001 (PORT_DOWN) (bogus)
	   state 0x00000001 (STP_LISTEN, LINK_DOWN)
	   curr 0x00000040 (10GB_FD)
	   advertised 0x00000000
	   supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
	   peer 0x00000000
   26  2015-01-30 16:11:54.438231 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa320), seq 225, ack 1161, win 252, options [nop,nop,TS val 590230856 ecr 50526759], length 0
   27  2015-01-30 16:11:54.442822 IP (tos 0x0, ttl 55, id 49506, offset 0, flags [DF], proto TCP (6), length 136)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4ea6 (correct), seq 1161:1245, ack 225, win 115, options [nop,nop,TS val 50526769 ecr 590230856], length 84: OpenFlow
	version 1.0, type STATS_REPLY, length 76, xid 0x0000000c
	 type TABLE, flags 0x0000
	 table_id 0, name 'Table 0'
	  wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
	  max_entries 1500, active_count 0, lookup_count 0, matched_count 0
	version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
   28  2015-01-30 16:11:54.442855 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa2c1), seq 225, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 0
   29  2015-01-30 16:11:54.443433 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa189), seq 225:233, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000e
   30  2015-01-30 16:11:54.445977 IP (tos 0x0, ttl 55, id 49507, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa208 (correct), seq 1245:1253, ack 233, win 115, options [nop,nop,TS val 50526770 ecr 590230857], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000e
   31  2015-01-30 16:11:54.446147 IP (tos 0x0, ttl 64, id 60705, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa176), seq 233:241, ack 1253, win 252, options [nop,nop,TS val 590230858 ecr 50526770], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000f
   32  2015-01-30 16:11:54.448750 IP (tos 0x0, ttl 55, id 49508, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1f5 (correct), seq 1253:1261, ack 241, win 115, options [nop,nop,TS val 50526771 ecr 590230858], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000f
   33  2015-01-30 16:11:54.448907 IP (tos 0x0, ttl 64, id 60706, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa163), seq 241:249, ack 1261, win 252, options [nop,nop,TS val 590230859 ecr 50526771], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000010
   34  2015-01-30 16:11:54.451413 IP (tos 0x0, ttl 55, id 49509, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1e3 (correct), seq 1261:1269, ack 249, win 115, options [nop,nop,TS val 50526771 ecr 590230859], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000010
   35  2015-01-30 16:11:54.451718 IP (tos 0x0, ttl 64, id 60707, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa151), seq 249:257, ack 1269, win 252, options [nop,nop,TS val 590230860 ecr 50526771], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000011
   36  2015-01-30 16:11:54.454979 IP (tos 0x0, ttl 55, id 49510, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1d0 (correct), seq 1269:1277, ack 257, win 115, options [nop,nop,TS val 50526772 ecr 590230860], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000011
   37  2015-01-30 16:11:54.455181 IP (tos 0x0, ttl 64, id 60708, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa13e), seq 257:265, ack 1277, win 252, options [nop,nop,TS val 590230861 ecr 50526772], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000012
   38  2015-01-30 16:11:54.458795 IP (tos 0x0, ttl 55, id 49511, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1bd (correct), seq 1277:1285, ack 265, win 115, options [nop,nop,TS val 50526773 ecr 590230861], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000012
   39  2015-01-30 16:11:54.459026 IP (tos 0x0, ttl 64, id 60709, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa12b), seq 265:273, ack 1285, win 252, options [nop,nop,TS val 590230862 ecr 50526773], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000013
   40  2015-01-30 16:11:54.461429 IP (tos 0x0, ttl 55, id 49512, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1aa (correct), seq 1285:1293, ack 273, win 115, options [nop,nop,TS val 50526774 ecr 590230862], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000013
   41  2015-01-30 16:11:54.461743 IP (tos 0x0, ttl 64, id 60710, offset 0, flags [DF], proto TCP (6), length 120)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a28 (incorrect -> 0x9a6c), seq 273:341, ack 1293, win 252, options [nop,nop,TS val 590230863 ecr 50526774], length 68: OpenFlow
	version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000014
	 port 16
	version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000015
	 port 20
	version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000016
	 port 18
	version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000017
	 port 22
	version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000018
	 port 17
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000019
   42  2015-01-30 16:11:54.464033 IP (tos 0x0, ttl 55, id 49513, offset 0, flags [DF], proto TCP (6), length 68)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa139 (correct), seq 1293:1309, ack 341, win 115, options [nop,nop,TS val 50526775 ecr 590230863], length 16: OpenFlow
	version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000014
	 port 16
   43  2015-01-30 16:11:54.501564 IP (tos 0x0, ttl 64, id 60711, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1f5), seq 341, ack 1309, win 252, options [nop,nop,TS val 590230875 ecr 50526775], length 0
   44  2015-01-30 16:11:54.504038 IP (tos 0x0, ttl 55, id 49514, offset 0, flags [DF], proto TCP (6), length 124)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9bb5 (correct), seq 1309:1381, ack 341, win 115, options [nop,nop,TS val 50526785 ecr 590230875], length 72: OpenFlow
	version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000015
	 port 20
	version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000016
	 port 18
	version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000017
	 port 22
	version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000018
	 port 17
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000019
   45  2015-01-30 16:11:54.504155 IP (tos 0x0, ttl 64, id 60712, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1a3), seq 341, ack 1381, win 252, options [nop,nop,TS val 590230875 ecr 50526785], length 0
   46  2015-01-30 16:11:54.505352 IP (tos 0x0, ttl 64, id 60713, offset 0, flags [DF], proto TCP (6), length 562)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3be2 (incorrect -> 0x4d80), seq 341:851, ack 1381, win 252, options [nop,nop,TS val 590230876 ecr 50526785], length 510: OpenFlow
	version 1.0, type VENDOR, length 24, xid 0x0000001a, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_IP_MASK, index 1, mask 255.0.14.0
	version 1.0, type VENDOR, length 24, xid 0x0000001b, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_IP_MASK, index 2, mask 255.0.28.0
	version 1.0, type VENDOR, length 24, xid 0x0000001c, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_IP_MASK, index 3, mask 255.0.56.0
	version 1.0, type VENDOR, length 24, xid 0x0000001d, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_IP_MASK, index 4, mask 255.0.112.0
	version 1.0, type VENDOR, length 24, xid 0x0000001e, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SET_IP_MASK, index 5, mask 255.0.224.0
	version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
	 subtype GET_IP_MASK_REQUEST, index 3
	version 1.0, type VENDOR, length 30, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SHELL_COMMAND, service 0, data 'show clock'
	version 1.0, type FLOW_MOD, length 104, xid 0x00000021
	 match in_port 16
	 cookie 0x0000000000000001, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
	  subtype MIRROR, dest_port 21, vlan_tag none, copy_stage INGRESS
	 action type OUTPUT, len 8, port 17
	version 1.0, type FLOW_MOD, length 128, xid 0x00000022
	 match in_port 18
	 cookie 0x0000000000000002, command ADD, priority 31000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
	  subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 2, p 4), copy_stage INGRESS
	 action type OUTPUT, len 8, port 19
	 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
	  subtype MIRROR, dest_port 23, vlan_tag 802.1Q (vlan 2748, p 5, DEI), copy_stage EGRESS
	version 1.0, type FLOW_MOD, length 96, xid 0x00000023
	 match in_port 22
	 cookie 0x0000000000000003, command ADD, priority 30000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
	 action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
	  subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 0, p 1), copy_stage INGRESS
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000024
   47  2015-01-30 16:11:54.508061 IP (tos 0x0, ttl 55, id 49515, offset 0, flags [DF], proto TCP (6), length 76)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4da3 (correct), seq 1381:1405, ack 851, win 123, options [nop,nop,TS val 50526786 ecr 590230876], length 24: OpenFlow
	version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
	 subtype GET_IP_MASK_REPLY, index 3, mask 255.0.56.0
   48  2015-01-30 16:11:54.544912 IP (tos 0x0, ttl 64, id 60714, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f7f), seq 851, ack 1405, win 252, options [nop,nop,TS val 590230888 ecr 50526786], length 0
   49  2015-01-30 16:11:54.549108 IP (tos 0x0, ttl 55, id 49516, offset 0, flags [DF], proto TCP (6), length 80)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8632 (correct), seq 1405:1433, ack 851, win 123, options [nop,nop,TS val 50526795 ecr 590230888], length 28: OpenFlow
	version 1.0, type VENDOR, length 20, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
	 subtype SHELL_STATUS, status 0xfffffffe
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000024
   50  2015-01-30 16:11:54.549207 IP (tos 0x0, ttl 64, id 60715, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f59), seq 851, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 0
   51  2015-01-30 16:11:54.549472 IP (tos 0x0, ttl 64, id 60716, offset 0, flags [DF], proto TCP (6), length 60)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0x9e0a), seq 851:859, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 8: OpenFlow
	version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000025
   52  2015-01-30 16:11:54.552183 IP (tos 0x0, ttl 55, id 49517, offset 0, flags [DF], proto TCP (6), length 60)
    88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9e80 (correct), seq 1433:1441, ack 859, win 123, options [nop,nop,TS val 50526797 ecr 590230889], length 8: OpenFlow
	version 1.0, type BARRIER_REPLY, length 8, xid 0x00000025
   53  2015-01-30 16:11:54.591537 IP (tos 0x0, ttl 64, id 60717, offset 0, flags [DF], proto TCP (6), length 52)
    109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f3a), seq 859, ack 1441, win 252, options [nop,nop,TS val 590230902 ecr 50526797], length 0