1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
|
1 12:21:09.940811 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62224 > 172.16.1.51.6633: Flags [S], cksum 0x6dd0 (correct), seq 2446711727, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
2 12:21:09.940894 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
172.16.1.51.6633 > 172.16.1.101.62224: Flags [R.], cksum 0xda97 (correct), seq 0, ack 2446711728, win 0, length 0
3 12:21:13.928916 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [S], cksum 0xa14c (correct), seq 2619186670, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
4 12:21:13.929013 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [S.], cksum 0x5ae7 (incorrect -> 0x3c7c), seq 3998019188, ack 2619186671, win 14480, options [mss 1460,nop,nop,TS val 2256457959 ecr 0,nop,wscale 7], length 0
5 12:21:13.930368 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x956f (correct), seq 1, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 0
6 12:21:13.930613 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xb6f9 (correct), seq 1:9, ack 1, win 2920, options [nop,nop,TS val 0 ecr 2256457959], length 8: OpenFlow
version 1.0, type HELLO, length 8, xid 0x000cdd51
7 12:21:13.930635 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0xa05b), seq 1, ack 9, win 114, options [nop,nop,TS val 2256457961 ecr 0], length 0
8 12:21:13.955911 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f29), seq 1:9, ack 9, win 114, options [nop,nop,TS val 2256457986 ecr 0], length 8: OpenFlow
version 1.0, type HELLO, length 8, xid 0x00000001
9 12:21:13.963832 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9f13), seq 9:17, ack 9, win 114, options [nop,nop,TS val 2256457994 ecr 0], length 8: OpenFlow
version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
10 12:21:13.964871 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x9544 (correct), seq 9, ack 17, win 2912, options [nop,nop,TS val 0 ecr 2256457986], length 0
11 12:21:13.972093 IP (tos 0xa0, ttl 64, id 10679, offset 0, flags [DF], proto TCP (6), length 468)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xcacf (correct), seq 9:425, ack 17, win 2920, options [nop,nop,TS val 0 ecr 2256457986], length 416: OpenFlow
version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
dpid 0x000100255cab0c07, n_buffers 544, n_tables 11
capabilities 0x00000087 (FLOW_STATS, TABLE_STATS, PORT_STATS, ARP_MATCH_IP)
actions 0x00000fff (OUTPUT, SET_VLAN_VID, SET_VLAN_PCP, STRIP_VLAN, SET_DL_SRC, SET_DL_DST, SET_NW_SRC, SET_NW_DST, SET_NW_TOS, SET_TP_SRC, SET_TP_DST, ENQUEUE)
port_no 1, hw_addr 00:25:5c:ab:0c:87, name 'GBE0/1'
config 0x00000002 (NO_STP)
state 0x00000200 (STP_FORWARD)
curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 2, hw_addr 00:25:5c:ab:0c:47, name 'GBE0/2'
config 0x00000002 (NO_STP)
state 0x00000200 (STP_FORWARD)
curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 3, hw_addr 00:25:5c:ab:0c:c7, name 'GBE0/3'
config 0x00000002 (NO_STP)
state 0x00000200 (STP_FORWARD)
curr 0x000002a0 (1GB_FD, COPPER, AUTONEG)
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 4, hw_addr 00:25:5c:ab:0c:27, name 'GBE0/4'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 5, hw_addr 00:25:5c:ab:0c:a7, name 'GBE0/5'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 6, hw_addr 00:25:5c:ab:0c:67, name 'GBE0/6'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 7, hw_addr 00:25:5c:ab:0c:e7, name 'GBE0/7'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
port_no 8, hw_addr 00:25:5c:ab:0c:17, name 'GBE0/8'
config 0x00000002 (NO_STP)
state 0x00000201 (STP_FORWARD, LINK_DOWN)
curr 0x00000000
advertised 0x00000000
supported 0x00000000
peer 0x00000000
12 12:21:13.979465 IP (tos 0x0, ttl 64, id 16031, offset 0, flags [DF], proto TCP (6), length 136)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b33 (incorrect -> 0x9b62), seq 17:101, ack 425, win 122, options [nop,nop,TS val 2256458010 ecr 0], length 84: OpenFlow
version 1.0, type SET_CONFIG, length 12, xid 0x00000003
flags FRAG_NORMAL, miss_send_len 65535
version 1.0, type FLOW_MOD, length 72, xid 0x00000004
cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
13 12:21:13.983645 IP (tos 0x0, ttl 64, id 16032, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5ae7 (incorrect -> 0x9ceb), seq 101:109, ack 425, win 122, options [nop,nop,TS val 2256458014 ecr 0], length 8: OpenFlow
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
14 12:21:13.984861 IP (tos 0xa0, ttl 64, id 10680, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x932f (correct), seq 425, ack 109, win 2912, options [nop,nop,TS val 1 ecr 2256458010], length 0
15 12:21:13.985088 IP (tos 0xa0, ttl 64, id 10681, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x91f7 (correct), seq 425:433, ack 109, win 2920, options [nop,nop,TS val 1 ecr 2256458010], length 8: OpenFlow
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
16 12:21:13.986563 IP (tos 0x0, ttl 64, id 16033, offset 0, flags [DF], proto TCP (6), length 72)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x9ba7), seq 109:129, ack 433, win 122, options [nop,nop,TS val 2256458017 ecr 1], length 20: OpenFlow
version 1.0, type STATS_REQUEST, length 12, xid 0x00000006
type DESC, flags 0x0000
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000007
17 12:21:13.988086 IP (tos 0xa0, ttl 64, id 10682, offset 0, flags [DF], proto TCP (6), length 1120)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x7324 (correct), seq 433:1501, ack 129, win 2912, options [nop,nop,TS val 1 ecr 2256458017], length 1068: OpenFlow
version 1.0, type STATS_REPLY, length 1068, xid 0x00000006
type DESC, flags 0x0000
mfr_desc 'NEC Corporation'
hw_desc 'PF5240F-48T4XW-AX(L1L2)'
sw_desc 'OS-F3PA Ver. V4.0.1.0'
serial_num 'Y1252CFA0000S4068C8N004'
dp_desc 'PFS1'
18 12:21:14.028020 IP (tos 0x0, ttl 64, id 16034, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x998b), seq 129, ack 1501, win 139, options [nop,nop,TS val 2256458059 ecr 1], length 0
19 12:21:14.029070 IP (tos 0xa0, ttl 64, id 10686, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8da6 (correct), seq 1501:1509, ack 129, win 2920, options [nop,nop,TS val 1 ecr 2256458017], length 8: OpenFlow
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000007
20 12:21:14.029095 IP (tos 0x0, ttl 64, id 16035, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9982), seq 129, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 0
21 12:21:14.029852 IP (tos 0x0, ttl 64, id 16036, offset 0, flags [DF], proto TCP (6), length 84)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5aff (incorrect -> 0x95e2), seq 129:161, ack 1509, win 139, options [nop,nop,TS val 2256458060 ecr 1], length 32: OpenFlow
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000008
port 1
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000009
port 2
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
22 12:21:14.030813 IP (tos 0xa0, ttl 64, id 10687, offset 0, flags [DF], proto TCP (6), length 196)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b77 (correct), seq 1509:1653, ack 161, win 2900, options [nop,nop,TS val 1 ecr 2256458060], length 144: OpenFlow
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000008
port 1
queue_id 0, len 16
property NONE, len 8
queue_id 1, len 16
property NONE, len 8
queue_id 2, len 16
property NONE, len 8
queue_id 3, len 16
property NONE, len 8
queue_id 4, len 16
property NONE, len 8
queue_id 5, len 16
property NONE, len 8
queue_id 6, len 16
property NONE, len 8
queue_id 7, len 16
property NONE, len 8
23 12:21:14.070016 IP (tos 0x0, ttl 64, id 16037, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9899), seq 161, ack 1653, win 155, options [nop,nop,TS val 2256458101 ecr 1], length 0
24 12:21:14.071040 IP (tos 0xa0, ttl 64, id 10688, offset 0, flags [DF], proto TCP (6), length 204)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x89a4 (correct), seq 1653:1805, ack 161, win 2920, options [nop,nop,TS val 1 ecr 2256458060], length 152: OpenFlow
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 144, xid 0x00000009
port 2
queue_id 0, len 16
property NONE, len 8
queue_id 1, len 16
property NONE, len 8
queue_id 2, len 16
property NONE, len 8
queue_id 3, len 16
property NONE, len 8
queue_id 4, len 16
property NONE, len 8
queue_id 5, len 16
property NONE, len 8
queue_id 6, len 16
property NONE, len 8
queue_id 7, len 16
property NONE, len 8
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
25 12:21:14.071062 IP (tos 0x0, ttl 64, id 16038, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x97ef), seq 161, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 0
26 12:21:14.071697 IP (tos 0x0, ttl 64, id 16039, offset 0, flags [DF], proto TCP (6), length 100)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b0f (incorrect -> 0x9424), seq 161:209, ack 1805, win 172, options [nop,nop,TS val 2256458102 ecr 1], length 48: OpenFlow
version 1.0, type STATS_REQUEST, length 20, xid 0x0000000b
type QUEUE, flags 0x0000
port_no 1, queue_id ALL
version 1.0, type STATS_REQUEST, length 20, xid 0x0000000c
type QUEUE, flags 0x0000
port_no 2, queue_id ALL
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
27 12:21:14.073035 IP (tos 0xa0, ttl 64, id 10689, offset 0, flags [DF], proto TCP (6), length 96)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x8b9c (correct), seq 1805:1849, ack 209, win 2892, options [nop,nop,TS val 1 ecr 2256458102], length 44: OpenFlow
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
28 12:21:14.113015 IP (tos 0x0, ttl 64, id 16040, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9769), seq 209, ack 1849, win 172, options [nop,nop,TS val 2256458144 ecr 1], length 0
29 12:21:14.114014 IP (tos 0xa0, ttl 64, id 10690, offset 0, flags [DF], proto TCP (6), length 744)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x72af (correct), seq 1849:2541, ack 209, win 2920, options [nop,nop,TS val 1 ecr 2256458102], length 692: OpenFlow
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000b
type QUEUE, flags 0x0001 (MORE)
port_no 1, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 12, xid 0x0000000b
type QUEUE, flags 0x0000
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 0, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 1, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 2, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 3, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 4, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 5, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 6, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 44, xid 0x0000000c
type QUEUE, flags 0x0001 (MORE)
port_no 2, queue_id 7, tx_bytes 18446744073709551615, tx_packets 18446744073709551615, tx_errors 18446744073709551615
version 1.0, type STATS_REPLY, length 12, xid 0x0000000c
type QUEUE, flags 0x0000
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
30 12:21:14.114038 IP (tos 0x0, ttl 64, id 16041, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x94a3), seq 209, ack 2541, win 189, options [nop,nop,TS val 2256458145 ecr 1], length 0
31 12:21:14.116167 IP (tos 0x0, ttl 64, id 16042, offset 0, flags [DF], proto TCP (6), length 700)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5d67 (incorrect -> 0xa5e9), seq 209:857, ack 2541, win 189, options [nop,nop,TS val 2256458147 ecr 1], length 648: OpenFlow
version 1.0, type FLOW_MOD, length 80, xid 0x0000000e
match in_port 1
cookie 0x0000000000000001, command ADD, priority 24100, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 4
version 1.0, type FLOW_MOD, length 80, xid 0x0000000f
match in_port 2
cookie 0x0000000000000002, command ADD, priority 24200, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 4
version 1.0, type FLOW_MOD, length 80, xid 0x00000010
match in_port 3
cookie 0x0000000000000003, command ADD, priority 24300, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 4
version 1.0, type FLOW_MOD, length 80, xid 0x00000011
match in_port 5
cookie 0x0000000000000004, command ADD, priority 20500, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000012
match in_port 6
cookie 0x0000000000000005, command ADD, priority 20600, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000013
match in_port 7
cookie 0x0000000000000006, command ADD, priority 20700, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000014
match in_port 4
cookie 0x0000000000000007, command ADD, priority 25400, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
action type OUTPUT, len 8, port 8
version 1.0, type FLOW_MOD, length 80, xid 0x00000015
match in_port 8
cookie 0x0000000000000008, command ADD, priority 25800, buffer_id NONE, flags 0x0005 (SEND_FLOW_REM, EMERG)
action type OUTPUT, len 8, port 4
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000016
32 12:21:14.125259 IP (tos 0xa0, ttl 64, id 10691, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x862d (correct), seq 2541:2549, ack 857, win 2920, options [nop,nop,TS val 1 ecr 2256458147], length 8: OpenFlow
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000016
33 12:21:14.127411 IP (tos 0x0, ttl 64, id 16043, offset 0, flags [DF], proto TCP (6), length 116)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5b1f (incorrect -> 0x6ef4), seq 857:921, ack 2549, win 189, options [nop,nop,TS val 2256458158 ecr 1], length 64: OpenFlow
version 1.0, type STATS_REQUEST, length 56, xid 0x00000017
type FLOW, flags 0x0000
table_id ALL, out_port NONE
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000018
34 12:21:14.128774 IP (tos 0xa0, ttl 64, id 10692, offset 0, flags [DF], proto TCP (6), length 160)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x0485 (correct), seq 2549:2657, ack 921, win 2912, options [nop,nop,TS val 1 ecr 2256458158], length 108: OpenFlow
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 0
match in_port 3
duration_sec 0, duration_nsec 0, priority 24300, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000003, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
35 12:21:14.168017 IP (tos 0x0, ttl 64, id 16044, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x9131), seq 921, ack 2657, win 189, options [nop,nop,TS val 2256458199 ecr 1], length 0
36 12:21:14.168997 IP (tos 0xa0, ttl 64, id 10693, offset 0, flags [DF], proto TCP (6), length 828)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x1544 (correct), seq 2657:3433, ack 921, win 2920, options [nop,nop,TS val 1 ecr 2256458158], length 776: OpenFlow
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 0
match in_port 2
duration_sec 0, duration_nsec 0, priority 24200, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000002, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 0
match in_port 1
duration_sec 0, duration_nsec 0, priority 24100, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000001, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 1
match in_port 7
duration_sec 0, duration_nsec 0, priority 20700, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000006, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 1
match in_port 6
duration_sec 0, duration_nsec 0, priority 20600, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000005, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id 1
match in_port 5
duration_sec 0, duration_nsec 0, priority 20500, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000004, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id EMERG
match in_port 8
duration_sec 0, duration_nsec 0, priority 25800, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000008, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 4
version 1.0, type STATS_REPLY, length 108, xid 0x00000017
type FLOW, flags 0x0001 (MORE)
length 96, table_id EMERG
match in_port 4
duration_sec 0, duration_nsec 0, priority 25400, idle_timeout 0, hard_timeout 0, cookie 0x0000000000000007, packet_count 0, byte_count 0
action type OUTPUT, len 8, port 8
version 1.0, type STATS_REPLY, length 12, xid 0x00000017
type FLOW, flags 0x0000
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000018
37 12:21:14.169020 IP (tos 0x0, ttl 64, id 16045, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8e18), seq 921, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 0
38 12:21:14.169616 IP (tos 0x0, ttl 64, id 16046, offset 0, flags [DF], proto TCP (6), length 72)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [P.], cksum 0x5af3 (incorrect -> 0x8b90), seq 921:941, ack 3433, win 205, options [nop,nop,TS val 2256458200 ecr 1], length 20: OpenFlow
version 1.0, type STATS_REQUEST, length 12, xid 0x00000019
type TABLE, flags 0x0000
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000001a
39 12:21:14.170981 IP (tos 0xa0, ttl 64, id 10694, offset 0, flags [DF], proto TCP (6), length 128)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0xe84a (correct), seq 3433:3509, ack 941, win 2912, options [nop,nop,TS val 1 ecr 2256458200], length 76: OpenFlow
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 0, name 'Normal 1 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 5632, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
40 12:21:14.210016 IP (tos 0x0, ttl 64, id 16047, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8d8f), seq 941, ack 3509, win 205, options [nop,nop,TS val 2256458241 ecr 1], length 0
41 12:21:14.210954 IP (tos 0xa0, ttl 64, id 10695, offset 0, flags [DF], proto TCP (6), length 832)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [P.], cksum 0x198c (correct), seq 3509:4289, ack 941, win 2920, options [nop,nop,TS val 1 ecr 2256458200], length 780: OpenFlow
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 1, name 'Expanded Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 163840, active_count 3, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 20, name 'Normal 2 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 50, name 'Mpls 1 Flow Table'
wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 512, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 51, name 'Mpls 2 Flow Table'
wildcards 0x003820ef (IN_PORT, DL_VLAN, DL_SRC, DL_DST, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 16384, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 99, name 'Software Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 2048, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 100, name 'V-Normal 1 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 101, name 'V-Expanded Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 120, name 'V-Normal 2 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id 140, name 'Q-Normal 1 Flow Table'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 0, active_count 0, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 76, xid 0x00000019
type TABLE, flags 0x0001 (MORE)
table_id EMERG, name 'Emergency Flow Cache'
wildcards 0x003820ff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
max_entries 5632, active_count 2, lookup_count 18446744073709551615, matched_count 18446744073709551615
version 1.0, type STATS_REPLY, length 12, xid 0x00000019
type TABLE, flags 0x0000
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000001a
42 12:21:14.210982 IP (tos 0x0, ttl 64, id 16048, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x5adf (incorrect -> 0x8a72), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458241 ecr 1], length 0
43 12:21:14.486208 IP (tos 0x0, ttl 64, id 16049, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [F.], cksum 0x5adf (incorrect -> 0x895d), seq 941, ack 4289, win 222, options [nop,nop,TS val 2256458517 ecr 1], length 0
44 12:21:14.489079 IP (tos 0xa0, ttl 64, id 10696, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [.], cksum 0x7ed2 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
45 12:21:14.489301 IP (tos 0xa0, ttl 64, id 10697, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.101.62221 > 172.16.1.51.6633: Flags [F.], cksum 0x7ed1 (correct), seq 4289, ack 942, win 2920, options [nop,nop,TS val 2 ecr 2256458517], length 0
46 12:21:14.489341 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
172.16.1.51.6633 > 172.16.1.101.62221: Flags [.], cksum 0x8958 (correct), seq 942, ack 4290, win 222, options [nop,nop,TS val 2256458520 ecr 2], length 0
47 12:21:20.463722 IP (tos 0xa0, ttl 64, id 10710, offset 0, flags [DF], proto TCP (6), length 60)
172.16.1.101.62216 > 172.16.1.51.6633: Flags [S], cksum 0xf0a4 (correct), seq 2928426028, win 2048, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0], length 0
48 12:21:20.463750 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
172.16.1.51.6633 > 172.16.1.101.62216: Flags [R.], cksum 0x5d6c (correct), seq 0, ack 2928426029, win 0, length 0
|