mirror of
https://github.com/the-tcpdump-group/tcpdump.git
synced 2025-01-22 23:58:16 +08:00
OpenFlow 1.3: Add initial partial support.
This code processes only the simplest message types (9 out of the 30 defined). Add a test from [1], which comes from [2], which comes from a contributor in Ericsson (Zoltán Lajos Kis). 1: https://wiki.wireshark.org/SampleCaptures#OpenFlow 2: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9283
This commit is contained in:
parent
afb9acd6bc
commit
bdac249ee0
@ -1033,6 +1033,7 @@ set(NETDISSECT_SOURCE_LIST_C
|
||||
print-null.c
|
||||
print-olsr.c
|
||||
print-openflow-1.0.c
|
||||
print-openflow-1.3.c
|
||||
print-openflow.c
|
||||
print-ospf.c
|
||||
print-ospf6.c
|
||||
|
@ -188,6 +188,7 @@ LIBNETDISSECT_SRC=\
|
||||
print-null.c \
|
||||
print-olsr.c \
|
||||
print-openflow-1.0.c \
|
||||
print-openflow-1.3.c \
|
||||
print-openflow.c \
|
||||
print-ospf.c \
|
||||
print-ospf6.c \
|
||||
|
@ -62,6 +62,8 @@ extern void of_data_print(netdissect_options *ndo,
|
||||
*/
|
||||
extern void of10_message_print(netdissect_options *ndo,
|
||||
const u_char *, uint16_t, const uint8_t);
|
||||
extern void of13_message_print(netdissect_options *ndo,
|
||||
const u_char *, uint16_t, const uint8_t);
|
||||
|
||||
/*
|
||||
* Use this instead of ofpt_str[] and OFPT_ constants because OpenFlow
|
||||
@ -69,3 +71,4 @@ extern void of10_message_print(netdissect_options *ndo,
|
||||
* versions clash on many names, including the OFPT_ constants.
|
||||
*/
|
||||
extern const char * of10_msgtype_str(const uint8_t);
|
||||
extern const char * of13_msgtype_str(const uint8_t);
|
||||
|
558
print-openflow-1.3.c
Normal file
558
print-openflow-1.3.c
Normal file
@ -0,0 +1,558 @@
|
||||
/*
|
||||
* This module implements decoding of OpenFlow protocol version 1.3 (wire
|
||||
* protocol 0x04). It is based on the implementation conventions explained in
|
||||
* print-openflow-1.0.c.
|
||||
*
|
||||
* [OF13] https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.3.4.pdf
|
||||
*
|
||||
* Copyright (c) 2020 The TCPDUMP project
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
||||
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
||||
* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
||||
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
||||
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
||||
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||
* POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
/* \summary: OpenFlow protocol version 1.3 printer */
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#include "netdissect-stdinc.h"
|
||||
|
||||
#define ND_LONGJMP_FROM_TCHECK
|
||||
#include "netdissect.h"
|
||||
#include "extract.h"
|
||||
#include "openflow.h"
|
||||
|
||||
#define OFPT_HELLO 0U
|
||||
#define OFPT_ERROR 1U
|
||||
#define OFPT_ECHO_REQUEST 2U
|
||||
#define OFPT_ECHO_REPLY 3U
|
||||
#define OFPT_EXPERIMENTER 4U
|
||||
#define OFPT_FEATURES_REQUEST 5U
|
||||
#define OFPT_FEATURES_REPLY 6U
|
||||
#define OFPT_GET_CONFIG_REQUEST 7U
|
||||
#define OFPT_GET_CONFIG_REPLY 8U
|
||||
#define OFPT_SET_CONFIG 9U
|
||||
#define OFPT_PACKET_IN 10U
|
||||
#define OFPT_FLOW_REMOVED 11U
|
||||
#define OFPT_PORT_STATUS 12U
|
||||
#define OFPT_PACKET_OUT 13U
|
||||
#define OFPT_FLOW_MOD 14U
|
||||
#define OFPT_GROUP_MOD 15U
|
||||
#define OFPT_PORT_MOD 16U
|
||||
#define OFPT_TABLE_MOD 17U
|
||||
#define OFPT_MULTIPART_REQUEST 18U
|
||||
#define OFPT_MULTIPART_REPLY 19U
|
||||
#define OFPT_BARRIER_REQUEST 20U
|
||||
#define OFPT_BARRIER_REPLY 21U
|
||||
#define OFPT_QUEUE_GET_CONFIG_REQUEST 22U
|
||||
#define OFPT_QUEUE_GET_CONFIG_REPLY 23U
|
||||
#define OFPT_ROLE_REQUEST 24U
|
||||
#define OFPT_ROLE_REPLY 25U
|
||||
#define OFPT_GET_ASYNC_REQUEST 26U
|
||||
#define OFPT_GET_ASYNC_REPLY 27U
|
||||
#define OFPT_SET_ASYNC 28U
|
||||
#define OFPT_METER_MOD 29U
|
||||
static const struct tok ofpt_str[] = {
|
||||
{ OFPT_HELLO, "HELLO" },
|
||||
{ OFPT_ERROR, "ERROR" },
|
||||
{ OFPT_ECHO_REQUEST, "ECHO_REQUEST" },
|
||||
{ OFPT_ECHO_REPLY, "ECHO_REPLY" },
|
||||
{ OFPT_EXPERIMENTER, "EXPERIMENTER" },
|
||||
{ OFPT_FEATURES_REQUEST, "FEATURES_REQUEST" },
|
||||
{ OFPT_FEATURES_REPLY, "FEATURES_REPLY" },
|
||||
{ OFPT_GET_CONFIG_REQUEST, "GET_CONFIG_REQUEST" },
|
||||
{ OFPT_GET_CONFIG_REPLY, "GET_CONFIG_REPLY" },
|
||||
{ OFPT_SET_CONFIG, "SET_CONFIG" },
|
||||
{ OFPT_PACKET_IN, "PACKET_IN" },
|
||||
{ OFPT_FLOW_REMOVED, "FLOW_REMOVED" },
|
||||
{ OFPT_PORT_STATUS, "PORT_STATUS" },
|
||||
{ OFPT_PACKET_OUT, "PACKET_OUT" },
|
||||
{ OFPT_FLOW_MOD, "FLOW_MOD" },
|
||||
{ OFPT_GROUP_MOD, "GROUP_MOD" },
|
||||
{ OFPT_PORT_MOD, "PORT_MOD" },
|
||||
{ OFPT_TABLE_MOD, "TABLE_MOD" },
|
||||
{ OFPT_MULTIPART_REQUEST, "MULTIPART_REQUEST" },
|
||||
{ OFPT_MULTIPART_REPLY, "MULTIPART_REPLY" },
|
||||
{ OFPT_BARRIER_REQUEST, "BARRIER_REQUEST" },
|
||||
{ OFPT_BARRIER_REPLY, "BARRIER_REPLY" },
|
||||
{ OFPT_QUEUE_GET_CONFIG_REQUEST, "QUEUE_GET_CONFIG_REQUEST" },
|
||||
{ OFPT_QUEUE_GET_CONFIG_REPLY, "QUEUE_GET_CONFIG_REPLY" },
|
||||
{ OFPT_ROLE_REQUEST, "ROLE_REQUEST" },
|
||||
{ OFPT_ROLE_REPLY, "ROLE_REPLY" },
|
||||
{ OFPT_GET_ASYNC_REQUEST, "GET_ASYNC_REQUEST" },
|
||||
{ OFPT_GET_ASYNC_REPLY, "GET_ASYNC_REPLY" },
|
||||
{ OFPT_SET_ASYNC, "SET_ASYNC" },
|
||||
{ OFPT_METER_MOD, "METER_MOD" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPP_MAX 0xffffff00U
|
||||
#define OFPP_IN_PORT 0xfffffff8U
|
||||
#define OFPP_TABLE 0xfffffff9U
|
||||
#define OFPP_NORMAL 0xfffffffaU
|
||||
#define OFPP_FLOOD 0xfffffffbU
|
||||
#define OFPP_ALL 0xfffffffcU
|
||||
#define OFPP_CONTROLLER 0xfffffffdU
|
||||
#define OFPP_LOCAL 0xfffffffeU
|
||||
#define OFPP_ANY 0xffffffffU
|
||||
static const struct tok ofpp_str[] = {
|
||||
{ OFPP_MAX, "MAX" },
|
||||
{ OFPP_IN_PORT, "IN_PORT" },
|
||||
{ OFPP_TABLE, "TABLE" },
|
||||
{ OFPP_NORMAL, "NORMAL" },
|
||||
{ OFPP_FLOOD, "FLOOD" },
|
||||
{ OFPP_ALL, "ALL" },
|
||||
{ OFPP_CONTROLLER, "CONTROLLER" },
|
||||
{ OFPP_LOCAL, "LOCAL" },
|
||||
{ OFPP_ANY, "ANY" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPET_HELLO_FAILED 0U
|
||||
#define OFPET_BAD_REQUEST 1U
|
||||
#define OFPET_BAD_ACTION 2U
|
||||
#define OFPET_BAD_INSTRUCTION 3U
|
||||
#define OFPET_BAD_MATCH 4U
|
||||
#define OFPET_FLOW_MOD_FAILED 5U
|
||||
#define OFPET_GROUP_MOD_FAILED 6U
|
||||
#define OFPET_PORT_MOD_FAILED 7U
|
||||
#define OFPET_TABLE_MOD_FAILED 8U
|
||||
#define OFPET_QUEUE_OP_FAILED 9U
|
||||
#define OFPET_SWITCH_CONFIG_FAILED 10U
|
||||
#define OFPET_ROLE_REQUEST_FAILED 11U
|
||||
#define OFPET_METER_MOD_FAILED 12U
|
||||
#define OFPET_TABLE_FEATURES_FAILED 13U
|
||||
#define OFPET_EXPERIMENTER 0xffffU /* a special case */
|
||||
static const struct tok ofpet_str[] = {
|
||||
{ OFPET_HELLO_FAILED, "HELLO_FAILED" },
|
||||
{ OFPET_BAD_REQUEST, "BAD_REQUEST" },
|
||||
{ OFPET_BAD_ACTION, "BAD_ACTION" },
|
||||
{ OFPET_BAD_INSTRUCTION, "BAD_INSTRUCTION" },
|
||||
{ OFPET_BAD_MATCH, "BAD_MATCH" },
|
||||
{ OFPET_FLOW_MOD_FAILED, "FLOW_MOD_FAILED" },
|
||||
{ OFPET_GROUP_MOD_FAILED, "GROUP_MOD_FAILED" },
|
||||
{ OFPET_PORT_MOD_FAILED, "PORT_MOD_FAILED" },
|
||||
{ OFPET_TABLE_MOD_FAILED, "TABLE_MOD_FAILED" },
|
||||
{ OFPET_QUEUE_OP_FAILED, "QUEUE_OP_FAILED" },
|
||||
{ OFPET_SWITCH_CONFIG_FAILED, "SWITCH_CONFIG_FAILED" },
|
||||
{ OFPET_ROLE_REQUEST_FAILED, "ROLE_REQUEST_FAILED" },
|
||||
{ OFPET_METER_MOD_FAILED, "METER_MOD_FAILED" },
|
||||
{ OFPET_TABLE_FEATURES_FAILED, "TABLE_FEATURES_FAILED" },
|
||||
{ OFPET_EXPERIMENTER, "EXPERIMENTER" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
/*
|
||||
* As far as of13_error_print() is concerned, OFPET_EXPERIMENTER is too large
|
||||
* and defines no codes anyway.
|
||||
*/
|
||||
#define OFPET_MAX OFPET_TABLE_FEATURES_FAILED
|
||||
|
||||
#define OFPHFC_INCOMPATIBLE 0U
|
||||
#define OFPHFC_EPERM 1U
|
||||
static const struct tok ofphfc_str[] = {
|
||||
{ OFPHFC_INCOMPATIBLE, "INCOMPATIBLE" },
|
||||
{ OFPHFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPBRC_BAD_VERSION 0U
|
||||
#define OFPBRC_BAD_TYPE 1U
|
||||
#define OFPBRC_BAD_MULTIPART 2U
|
||||
#define OFPBRC_BAD_EXPERIMENTER 3U
|
||||
#define OFPBRC_BAD_EXP_TYPE 4U
|
||||
#define OFPBRC_EPERM 5U
|
||||
#define OFPBRC_BAD_LEN 6U
|
||||
#define OFPBRC_BUFFER_EMPTY 7U
|
||||
#define OFPBRC_BUFFER_UNKNOWN 8U
|
||||
#define OFPBRC_BAD_TABLE_ID 9U
|
||||
#define OFPBRC_IS_SLAVE 10U
|
||||
#define OFPBRC_BAD_PORT 11U
|
||||
#define OFPBRC_BAD_PACKET 12U
|
||||
#define OFPBRC_MULTIPART_BUFFER_OVERFLOW 13U
|
||||
static const struct tok ofpbrc_str[] = {
|
||||
{ OFPBRC_BAD_VERSION, "BAD_VERSION" },
|
||||
{ OFPBRC_BAD_TYPE, "BAD_TYPE" },
|
||||
{ OFPBRC_BAD_MULTIPART, "BAD_MULTIPART" },
|
||||
{ OFPBRC_BAD_EXPERIMENTER, "BAD_EXPERIMENTER" },
|
||||
{ OFPBRC_BAD_EXP_TYPE, "BAD_EXP_TYPE" },
|
||||
{ OFPBRC_EPERM, "EPERM" },
|
||||
{ OFPBRC_BAD_LEN, "BAD_LEN" },
|
||||
{ OFPBRC_BUFFER_EMPTY, "BUFFER_EMPTY" },
|
||||
{ OFPBRC_BUFFER_UNKNOWN, "BUFFER_UNKNOWN" },
|
||||
{ OFPBRC_BAD_TABLE_ID, "BAD_TABLE_ID" },
|
||||
{ OFPBRC_IS_SLAVE, "IS_SLAVE" },
|
||||
{ OFPBRC_BAD_PORT, "BAD_PORT" },
|
||||
{ OFPBRC_BAD_PACKET, "BAD_PACKET" },
|
||||
{ OFPBRC_MULTIPART_BUFFER_OVERFLOW, "MULTIPART_BUFFER_OVERFLOW" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPBAC_BAD_TYPE 0U
|
||||
#define OFPBAC_BAD_LEN 1U
|
||||
#define OFPBAC_BAD_EXPERIMENTER 2U
|
||||
#define OFPBAC_BAD_EXP_TYPE 3U
|
||||
#define OFPBAC_BAD_OUT_PORT 4U
|
||||
#define OFPBAC_BAD_ARGUMENT 5U
|
||||
#define OFPBAC_EPERM 6U
|
||||
#define OFPBAC_TOO_MANY 7U
|
||||
#define OFPBAC_BAD_QUEUE 8U
|
||||
#define OFPBAC_BAD_OUT_GROUP 9U
|
||||
#define OFPBAC_MATCH_INCONSISTENT 10U
|
||||
#define OFPBAC_UNSUPPORTED_ORDER 11U
|
||||
#define OFPBAC_BAD_TAG 12U
|
||||
#define OFPBAC_BAD_SET_TYPE 13U
|
||||
#define OFPBAC_BAD_SET_LEN 14U
|
||||
#define OFPBAC_BAD_SET_ARGUMENT 15U
|
||||
static const struct tok ofpbac_str[] = {
|
||||
{ OFPBAC_BAD_TYPE, "BAD_TYPE" },
|
||||
{ OFPBAC_BAD_LEN, "BAD_LEN" },
|
||||
{ OFPBAC_BAD_EXPERIMENTER, "BAD_EXPERIMENTER" },
|
||||
{ OFPBAC_BAD_EXP_TYPE, "BAD_EXP_TYPE" },
|
||||
{ OFPBAC_BAD_OUT_PORT, "BAD_OUT_PORT" },
|
||||
{ OFPBAC_BAD_ARGUMENT, "BAD_ARGUMENT" },
|
||||
{ OFPBAC_EPERM, "EPERM" },
|
||||
{ OFPBAC_TOO_MANY, "TOO_MANY" },
|
||||
{ OFPBAC_BAD_QUEUE, "BAD_QUEUE" },
|
||||
{ OFPBAC_BAD_OUT_GROUP, "BAD_OUT_GROUP" },
|
||||
{ OFPBAC_MATCH_INCONSISTENT, "MATCH_INCONSISTENT" },
|
||||
{ OFPBAC_UNSUPPORTED_ORDER, "UNSUPPORTED_ORDER" },
|
||||
{ OFPBAC_BAD_TAG, "BAD_TAG" },
|
||||
{ OFPBAC_BAD_SET_TYPE, "BAD_SET_TYPE" },
|
||||
{ OFPBAC_BAD_SET_LEN, "BAD_SET_LEN" },
|
||||
{ OFPBAC_BAD_SET_ARGUMENT, "BAD_SET_ARGUMENT" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPBIC_UNKNOWN_INST 0U
|
||||
#define OFPBIC_UNSUP_INST 1U
|
||||
#define OFPBIC_BAD_TABLE_ID 2U
|
||||
#define OFPBIC_UNSUP_METADATA 3U
|
||||
#define OFPBIC_UNSUP_METADATA_MASK 4U
|
||||
#define OFPBIC_BAD_EXPERIMENTER 5U
|
||||
#define OFPBIC_BAD_EXP_TYPE 6U
|
||||
#define OFPBIC_BAD_LEN 7U
|
||||
#define OFPBIC_EPERM 8U
|
||||
static const struct tok ofpbic_str[] = {
|
||||
{ OFPBIC_UNKNOWN_INST, "UNKNOWN_INST" },
|
||||
{ OFPBIC_UNSUP_INST, "UNSUP_INST" },
|
||||
{ OFPBIC_BAD_TABLE_ID, "BAD_TABLE_ID" },
|
||||
{ OFPBIC_UNSUP_METADATA, "UNSUP_METADATA" },
|
||||
{ OFPBIC_UNSUP_METADATA_MASK, "UNSUP_METADATA_MASK" },
|
||||
{ OFPBIC_BAD_EXPERIMENTER, "BAD_EXPERIMENTER" },
|
||||
{ OFPBIC_BAD_EXP_TYPE, "BAD_EXP_TYPE" },
|
||||
{ OFPBIC_BAD_LEN, "BAD_LEN" },
|
||||
{ OFPBIC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPBMC_BAD_TYPE 0U
|
||||
#define OFPBMC_BAD_LEN 1U
|
||||
#define OFPBMC_BAD_TAG 2U
|
||||
#define OFPBMC_BAD_DL_ADDR_MASK 3U
|
||||
#define OFPBMC_BAD_NW_ADDR_MASK 4U
|
||||
#define OFPBMC_BAD_WILDCARDS 5U
|
||||
#define OFPBMC_BAD_FIELD 6U
|
||||
#define OFPBMC_BAD_VALUE 7U
|
||||
#define OFPBMC_BAD_MASK 8U
|
||||
#define OFPBMC_BAD_PREREQ 9U
|
||||
#define OFPBMC_DUP_FIELD 10U
|
||||
#define OFPBMC_EPERM 11U
|
||||
static const struct tok ofpbmc_str[] = {
|
||||
{ OFPBMC_BAD_TYPE, "BAD_TYPE" },
|
||||
{ OFPBMC_BAD_LEN, "BAD_LEN" },
|
||||
{ OFPBMC_BAD_TAG, "BAD_TAG" },
|
||||
{ OFPBMC_BAD_DL_ADDR_MASK, "BAD_DL_ADDR_MASK" },
|
||||
{ OFPBMC_BAD_NW_ADDR_MASK, "BAD_NW_ADDR_MASK" },
|
||||
{ OFPBMC_BAD_WILDCARDS, "BAD_WILDCARDS" },
|
||||
{ OFPBMC_BAD_FIELD, "BAD_FIELD" },
|
||||
{ OFPBMC_BAD_VALUE, "BAD_VALUE" },
|
||||
{ OFPBMC_BAD_MASK, "BAD_MASK" },
|
||||
{ OFPBMC_BAD_PREREQ, "BAD_PREREQ" },
|
||||
{ OFPBMC_DUP_FIELD, "DUP_FIELD" },
|
||||
{ OFPBMC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPFMFC_UNKNOWN 0U
|
||||
#define OFPFMFC_TABLE_FULL 1U
|
||||
#define OFPFMFC_BAD_TABLE_ID 2U
|
||||
#define OFPFMFC_OVERLAP 3U
|
||||
#define OFPFMFC_EPERM 4U
|
||||
#define OFPFMFC_BAD_TIMEOUT 5U
|
||||
#define OFPFMFC_BAD_COMMAND 6U
|
||||
#define OFPFMFC_BAD_FLAGS 7U
|
||||
static const struct tok ofpfmfc_str[] = {
|
||||
{ OFPFMFC_UNKNOWN, "UNKNOWN" },
|
||||
{ OFPFMFC_TABLE_FULL, "TABLE_FULL" },
|
||||
{ OFPFMFC_BAD_TABLE_ID, "BAD_TABLE_ID" },
|
||||
{ OFPFMFC_OVERLAP, "OVERLAP" },
|
||||
{ OFPFMFC_EPERM, "EPERM" },
|
||||
{ OFPFMFC_BAD_TIMEOUT, "BAD_TIMEOUT" },
|
||||
{ OFPFMFC_BAD_COMMAND, "BAD_COMMAND" },
|
||||
{ OFPFMFC_BAD_FLAGS, "BAD_FLAGS" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPGMFC_GROUP_EXISTS 0U
|
||||
#define OFPGMFC_INVALID_GROUP 1U
|
||||
#define OFPGMFC_WEIGHT_UNSUPPORTED 2U
|
||||
#define OFPGMFC_OUT_OF_GROUPS 3U
|
||||
#define OFPGMFC_OUT_OF_BUCKETS 4U
|
||||
#define OFPGMFC_CHAINING_UNSUPPORTED 5U
|
||||
#define OFPGMFC_WATCH_UNSUPPORTED 6U
|
||||
#define OFPGMFC_LOOP 7U
|
||||
#define OFPGMFC_UNKNOWN_GROUP 8U
|
||||
#define OFPGMFC_CHAINED_GROUP 9U
|
||||
#define OFPGMFC_BAD_TYPE 10U
|
||||
#define OFPGMFC_BAD_COMMAND 11U
|
||||
#define OFPGMFC_BAD_BUCKET 12U
|
||||
#define OFPGMFC_BAD_MATCH 13U
|
||||
#define OFPGMFC_EPERM 14U
|
||||
static const struct tok ofpgmfc_str[] = {
|
||||
{ OFPGMFC_GROUP_EXISTS, "GROUP_EXISTS" },
|
||||
{ OFPGMFC_INVALID_GROUP, "INVALID_GROUP" },
|
||||
{ OFPGMFC_WEIGHT_UNSUPPORTED, "WEIGHT_UNSUPPORTED" },
|
||||
{ OFPGMFC_OUT_OF_GROUPS, "OUT_OF_GROUPS" },
|
||||
{ OFPGMFC_OUT_OF_BUCKETS, "OUT_OF_BUCKETS" },
|
||||
{ OFPGMFC_CHAINING_UNSUPPORTED, "CHAINING_UNSUPPORTED" },
|
||||
{ OFPGMFC_WATCH_UNSUPPORTED, "WATCH_UNSUPPORTED" },
|
||||
{ OFPGMFC_LOOP, "LOOP" },
|
||||
{ OFPGMFC_UNKNOWN_GROUP, "UNKNOWN_GROUP" },
|
||||
{ OFPGMFC_CHAINED_GROUP, "CHAINED_GROUP" },
|
||||
{ OFPGMFC_BAD_TYPE, "BAD_TYPE" },
|
||||
{ OFPGMFC_BAD_COMMAND, "BAD_COMMAND" },
|
||||
{ OFPGMFC_BAD_BUCKET, "BAD_BUCKET" },
|
||||
{ OFPGMFC_BAD_MATCH, "BAD_MATCH" },
|
||||
{ OFPGMFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPPMFC_BAD_PORT 0U
|
||||
#define OFPPMFC_BAD_HW_ADDR 1U
|
||||
#define OFPPMFC_BAD_CONFIG 2U
|
||||
#define OFPPMFC_BAD_ADVERTISE 3U
|
||||
#define OFPPMFC_EPERM 4U
|
||||
static const struct tok ofppmfc_str[] = {
|
||||
{ OFPPMFC_BAD_PORT, "BAD_PORT" },
|
||||
{ OFPPMFC_BAD_HW_ADDR, "BAD_HW_ADDR" },
|
||||
{ OFPPMFC_BAD_CONFIG, "BAD_CONFIG" },
|
||||
{ OFPPMFC_BAD_ADVERTISE, "BAD_ADVERTISE" },
|
||||
{ OFPPMFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPTMFC_BAD_TABLE 0U
|
||||
#define OFPTMFC_BAD_CONFIG 1U
|
||||
#define OFPTMFC_EPERM 2U
|
||||
static const struct tok ofptmfc_str[] = {
|
||||
{ OFPTMFC_BAD_TABLE, "BAD_TABLE" },
|
||||
{ OFPTMFC_BAD_CONFIG, "BAD_CONFIG" },
|
||||
{ OFPTMFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPQOFC_BAD_PORT 0U
|
||||
#define OFPQOFC_BAD_QUEUE 1U
|
||||
#define OFPQOFC_EPERM 2U
|
||||
static const struct tok ofpqofc_str[] = {
|
||||
{ OFPQOFC_BAD_PORT, "BAD_PORT" },
|
||||
{ OFPQOFC_BAD_QUEUE, "BAD_QUEUE" },
|
||||
{ OFPQOFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPSCFC_BAD_FLAGS 0U
|
||||
#define OFPSCFC_BAD_LEN 1U
|
||||
#define OFPSCFC_EPERM 2U
|
||||
static const struct tok ofpscfc_str[] = {
|
||||
{ OFPSCFC_BAD_FLAGS, "BAD_FLAGS" },
|
||||
{ OFPSCFC_BAD_LEN, "BAD_LEN" },
|
||||
{ OFPSCFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPRRFC_STALE 0U
|
||||
#define OFPRRFC_UNSUP 1U
|
||||
#define OFPRRFC_BAD_ROLE 2U
|
||||
static const struct tok ofprrfc_str[] = {
|
||||
{ OFPRRFC_STALE, "STALE" },
|
||||
{ OFPRRFC_UNSUP, "UNSUP" },
|
||||
{ OFPRRFC_BAD_ROLE, "BAD_ROLE" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPMMFC_UNKNOWN 0U
|
||||
#define OFPMMFC_METER_EXISTS 1U
|
||||
#define OFPMMFC_INVALID_METER 2U
|
||||
#define OFPMMFC_UNKNOWN_METER 3U
|
||||
#define OFPMMFC_BAD_COMMAND 4U
|
||||
#define OFPMMFC_BAD_FLAGS 5U
|
||||
#define OFPMMFC_BAD_RATE 6U
|
||||
#define OFPMMFC_BAD_BURST 7U
|
||||
#define OFPMMFC_BAD_BAND 8U
|
||||
#define OFPMMFC_BAD_BAND_VALUE 9U
|
||||
#define OFPMMFC_OUT_OF_METERS 10U
|
||||
#define OFPMMFC_OUT_OF_BANDS 11U
|
||||
static const struct tok ofpmmfc_str[] = {
|
||||
{ OFPMMFC_UNKNOWN, "UNKNOWN" },
|
||||
{ OFPMMFC_METER_EXISTS, "METER_EXISTS" },
|
||||
{ OFPMMFC_INVALID_METER, "INVALID_METER" },
|
||||
{ OFPMMFC_UNKNOWN_METER, "UNKNOWN_METER" },
|
||||
{ OFPMMFC_BAD_COMMAND, "BAD_COMMAND" },
|
||||
{ OFPMMFC_BAD_FLAGS, "BAD_FLAGS" },
|
||||
{ OFPMMFC_BAD_RATE, "BAD_RATE" },
|
||||
{ OFPMMFC_BAD_BURST, "BAD_BURST" },
|
||||
{ OFPMMFC_BAD_BAND, "BAD_BAND" },
|
||||
{ OFPMMFC_BAD_BAND_VALUE, "BAD_BAND_VALUE" },
|
||||
{ OFPMMFC_OUT_OF_METERS, "OUT_OF_METERS" },
|
||||
{ OFPMMFC_OUT_OF_BANDS, "OUT_OF_BANDS" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
#define OFPTFFC_BAD_TABLE 0U
|
||||
#define OFPTFFC_BAD_METADATA 1U
|
||||
#define OFPTFFC_BAD_TYPE 2U
|
||||
#define OFPTFFC_BAD_LEN 3U
|
||||
#define OFPTFFC_BAD_ARGUMENT 4U
|
||||
#define OFPTFFC_EPERM 5U
|
||||
static const struct tok ofptffc_str[] = {
|
||||
{ OFPTFFC_BAD_TABLE, "BAD_TABLE" },
|
||||
{ OFPTFFC_BAD_METADATA, "BAD_METADATA" },
|
||||
{ OFPTFFC_BAD_TYPE, "BAD_TYPE" },
|
||||
{ OFPTFFC_BAD_LEN, "BAD_LEN" },
|
||||
{ OFPTFFC_BAD_ARGUMENT, "BAD_ARGUMENT" },
|
||||
{ OFPTFFC_EPERM, "EPERM" },
|
||||
{ 0, NULL }
|
||||
};
|
||||
|
||||
/* lengths (fixed or minimal) of particular protocol structures */
|
||||
#define OF_ERROR_MSG_MINLEN 12U
|
||||
#define OF_QUEUE_GET_CONFIG_REQUEST_FIXLEN 16U
|
||||
|
||||
/* [OF13] Section A.1 */
|
||||
const char *
|
||||
of13_msgtype_str(const uint8_t type)
|
||||
{
|
||||
return tok2str(ofpt_str, "invalid (0x%02x)", type);
|
||||
}
|
||||
|
||||
/* [OF13] Section A.4.4 */
|
||||
static void
|
||||
of13_error_print(netdissect_options *ndo,
|
||||
const u_char *cp, u_int len)
|
||||
{
|
||||
uint16_t type, code;
|
||||
const struct tok *code_str[OFPET_MAX + 1] = {
|
||||
/* [OFPET_HELLO_FAILED ] = */ ofphfc_str,
|
||||
/* [OFPET_BAD_REQUEST ] = */ ofpbrc_str,
|
||||
/* [OFPET_BAD_ACTION ] = */ ofpbac_str,
|
||||
/* [OFPET_BAD_INSTRUCTION ] = */ ofpbic_str,
|
||||
/* [OFPET_BAD_MATCH ] = */ ofpbmc_str,
|
||||
/* [OFPET_FLOW_MOD_FAILED ] = */ ofpfmfc_str,
|
||||
/* [OFPET_GROUP_MOD_FAILED ] = */ ofpgmfc_str,
|
||||
/* [OFPET_PORT_MOD_FAILED ] = */ ofppmfc_str,
|
||||
/* [OFPET_TABLE_MOD_FAILED ] = */ ofptmfc_str,
|
||||
/* [OFPET_QUEUE_OP_FAILED ] = */ ofpqofc_str,
|
||||
/* [OFPET_SWITCH_CONFIG_FAILED ] = */ ofpscfc_str,
|
||||
/* [OFPET_ROLE_REQUEST_FAILED ] = */ ofprrfc_str,
|
||||
/* [OFPET_METER_MOD_FAILED ] = */ ofpmmfc_str,
|
||||
/* [OFPET_TABLE_FEATURES_FAILED] = */ ofptffc_str,
|
||||
};
|
||||
|
||||
/* type */
|
||||
type = GET_BE_U_2(cp);
|
||||
OF_FWD(2);
|
||||
ND_PRINT("\n\t type %s", tok2str(ofpet_str, "invalid (0x%04x)", type));
|
||||
/* code */
|
||||
code = GET_BE_U_2(cp);
|
||||
OF_FWD(2);
|
||||
if (type <= OFPET_MAX && code_str[type] != NULL)
|
||||
ND_PRINT(", code %s",
|
||||
tok2str(code_str[type], "invalid (0x%04x)", code));
|
||||
else
|
||||
ND_PRINT(", code invalid (0x%04x)", code);
|
||||
/* data */
|
||||
of_data_print(ndo, cp, len);
|
||||
}
|
||||
|
||||
void
|
||||
of13_message_print(netdissect_options *ndo,
|
||||
const u_char *cp, uint16_t len, const uint8_t type)
|
||||
{
|
||||
/* See the comment at the beginning of of10_message_print(). */
|
||||
switch (type) {
|
||||
/* OpenFlow header only. */
|
||||
case OFPT_FEATURES_REQUEST: /* [OF13] Section A.3.1 */
|
||||
case OFPT_GET_CONFIG_REQUEST: /* [OF13] Section A.3.2 */
|
||||
case OFPT_BARRIER_REQUEST: /* [OF13] Section A.3.8 */
|
||||
case OFPT_BARRIER_REPLY: /* ibid */
|
||||
if (len)
|
||||
goto invalid;
|
||||
return;
|
||||
|
||||
/* OpenFlow header and fixed-size message body. */
|
||||
case OFPT_QUEUE_GET_CONFIG_REQUEST: /* [OF13] Section A.3.6 */
|
||||
if (len != OF_QUEUE_GET_CONFIG_REQUEST_FIXLEN - OF_HEADER_FIXLEN)
|
||||
goto invalid;
|
||||
if (ndo->ndo_vflag < 1)
|
||||
break;
|
||||
/* port */
|
||||
ND_PRINT("\n\t port %s",
|
||||
tok2str(ofpp_str, "%u", GET_BE_U_4(cp)));
|
||||
OF_FWD(4);
|
||||
/* pad */
|
||||
/* Always the last field, check bounds. */
|
||||
ND_TCHECK_4(cp);
|
||||
return;
|
||||
|
||||
/* OpenFlow header and variable-size data. */
|
||||
case OFPT_HELLO: /* [OF13] Section A.5.1 */
|
||||
case OFPT_ECHO_REQUEST: /* [OF13] Section A.5.2 */
|
||||
case OFPT_ECHO_REPLY: /* [OF13] Section A.5.3 */
|
||||
if (ndo->ndo_vflag < 1)
|
||||
break;
|
||||
of_data_print(ndo, cp, len);
|
||||
return;
|
||||
|
||||
/* OpenFlow header, fixed-size message body and variable-size data. */
|
||||
case OFPT_ERROR:
|
||||
if (len < OF_ERROR_MSG_MINLEN - OF_HEADER_FIXLEN)
|
||||
goto invalid;
|
||||
if (ndo->ndo_vflag < 1)
|
||||
break;
|
||||
of13_error_print(ndo, cp, len);
|
||||
return;
|
||||
}
|
||||
/*
|
||||
* Not a recognised type or did not print the details, fall back to
|
||||
* a bounds check.
|
||||
*/
|
||||
ND_TCHECK_LEN(cp, len);
|
||||
return;
|
||||
|
||||
invalid: /* skip the message body */
|
||||
nd_print_invalid(ndo);
|
||||
ND_TCHECK_LEN(cp, len);
|
||||
}
|
@ -124,6 +124,10 @@ openflow_print(netdissect_options *ndo, const u_char *cp, u_int len)
|
||||
ND_PRINT(", type %s", of10_msgtype_str(type));
|
||||
decoder = of10_message_print;
|
||||
break;
|
||||
case OF_VER_1_3:
|
||||
ND_PRINT(", type %s", of13_msgtype_str(type));
|
||||
decoder = of13_message_print;
|
||||
break;
|
||||
default:
|
||||
ND_PRINT(", type unknown (0x%02x)", type);
|
||||
}
|
||||
|
@ -247,6 +247,9 @@ of10_pf5240-vv of10_pf5240.pcap of10_pf5240-vv.out -vv
|
||||
of10_7050q-v of10_7050q.pcapng of10_7050q-v.out -v
|
||||
of10_7050sx_bsn-vv of10_7050sx_bsn.pcap of10_7050sx_bsn-vv.out -vv
|
||||
of10_7050sx_bsn-oobr of10_7050sx_bsn-oobr.pcap of10_7050sx_bsn-oobr.out -v
|
||||
of13_ericsson of13_ericsson.pcapng of13_ericsson.out
|
||||
of13_ericsson-v of13_ericsson.pcapng of13_ericsson-v.out -v
|
||||
of13_ericsson-vv of13_ericsson.pcapng of13_ericsson-vv.out -vv
|
||||
|
||||
# GeoNetworking and CALM FAST tests
|
||||
geonet-calm-fast geonet_and_calm_fast.pcap geonet_and_calm_fast.out -vv
|
||||
|
465
tests/of13_ericsson-v.out
Normal file
465
tests/of13_ericsson-v.out
Normal file
@ -0,0 +1,465 @@
|
||||
1 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236)
|
||||
127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfee0 (incorrect -> 0x21d3), seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 184, xid 0x00000199
|
||||
2 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1ad3), ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0
|
||||
3 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfe30 (incorrect -> 0x1512), seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a
|
||||
4 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1abf), ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0
|
||||
5 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x150a), seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a
|
||||
6 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], cksum 0xfe28 (incorrect -> 0x1ab5), ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0
|
||||
7 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420)
|
||||
127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], cksum 0xff98 (incorrect -> 0xd79d), seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 368, xid 0x00000012
|
||||
8 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432)
|
||||
127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], cksum 0xffa4 (incorrect -> 0xcda4), seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow
|
||||
version 1.3, type ERROR, length 380, xid 0x00000012
|
||||
type BAD_ACTION, code BAD_EXPERIMENTER
|
||||
data (368 octets)
|
||||
9 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], cksum 0xfe28 (incorrect -> 0xb37b), ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0
|
||||
10 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172)
|
||||
127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], cksum 0xfea0 (incorrect -> 0x8c0a), seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow
|
||||
version 1.3, type GROUP_MOD, length 120, xid 0x0000008a
|
||||
11 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184)
|
||||
127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], cksum 0xfeac (incorrect -> 0x8455), seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow
|
||||
version 1.3, type ERROR, length 132, xid 0x0000008a
|
||||
type GROUP_MOD_FAILED, code INVALID_GROUP
|
||||
data (120 octets)
|
||||
12 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], cksum 0xfe28 (incorrect -> 0xcbd6), ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0
|
||||
13 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x17bd), seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0
|
||||
14 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
|
||||
127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], cksum 0x7727 (correct), seq 0, ack 2797182348, win 0, length 0
|
||||
15 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x9014), seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0
|
||||
16 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], cksum 0xfe30 (incorrect -> 0xf3ee), seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0
|
||||
17 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc735), ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
|
||||
18 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc10f), seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow
|
||||
version 1.3, type HELLO, length 8, xid 0x83ea7e23
|
||||
19 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc72d), ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
|
||||
20 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0x5426), seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow
|
||||
version 1.0, type HELLO, length 8, xid 0x95b6dc37
|
||||
21 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc723), ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0
|
||||
22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe8a (incorrect -> 0x83b9), seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow
|
||||
version 1.3, type ERROR, length 98, xid 0xc4420f26
|
||||
type HELLO_FAILED, code INCOMPATIBLE
|
||||
data (86 octets)
|
||||
23 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], cksum 0xfe28 (incorrect -> 0xc6bf), seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0
|
||||
24 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc6b5), ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0
|
||||
25 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0xc22e), seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow
|
||||
version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a
|
||||
26 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], cksum 0xf312 (correct), seq 2428319660, win 0, length 0
|
||||
27 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc972), seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow
|
||||
version 1.3, type HELLO, length 8, xid 0x0000015f
|
||||
28 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xcad0), ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0
|
||||
29 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc47b), seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160
|
||||
30 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc92d), ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0
|
||||
31 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc3b1), seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000160
|
||||
32 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], cksum 0xfe28 (incorrect -> 0xc91b), ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0
|
||||
33 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe38 (incorrect -> 0xc315), seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow
|
||||
version 1.3, type HELLO, length 16, xid 0x00000161
|
||||
data (8 octets)
|
||||
34 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc84b), ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0
|
||||
35 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe30 (incorrect -> 0x5466), seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d
|
||||
36 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4f83), seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d
|
||||
37 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x53da), ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0
|
||||
38 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe3d (incorrect -> 0x23cf), seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e
|
||||
data (13 octets)
|
||||
39 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73)
|
||||
127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe3d (incorrect -> 0x225c), seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e
|
||||
data (13 octets)
|
||||
40 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x50e6), ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0
|
||||
41 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe38 (incorrect -> 0x994a), seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow
|
||||
version 1.3, type EXPERIMENTER, length 16, xid 0x00000041
|
||||
42 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe44 (incorrect -> 0x9024), seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow
|
||||
version 1.3, type ERROR, length 28, xid 0x00000041
|
||||
type BAD_REQUEST, code BAD_LEN
|
||||
data (16 octets)
|
||||
43 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8aee), ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0
|
||||
44 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0x8661), seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042
|
||||
45 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x862e), seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000042
|
||||
46 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8a7a), ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0
|
||||
47 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe49 (incorrect -> 0x4af3), seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow
|
||||
version 1.3, type EXPERIMENTER, length 33, xid 0x00000043
|
||||
48 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe55 (incorrect -> 0x45af), seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow
|
||||
version 1.3, type ERROR, length 45, xid 0x00000043
|
||||
type BAD_REQUEST, code BAD_LEN
|
||||
data (33 octets)
|
||||
49 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x88de), ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0
|
||||
50 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0xb4f6), seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow
|
||||
version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e
|
||||
51 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xbbc3), seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow
|
||||
version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e
|
||||
52 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0xb693), ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0
|
||||
53 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3d62), seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e
|
||||
54 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3880), seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e
|
||||
55 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x3cb9), ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0
|
||||
56 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe34 (incorrect -> 0x3760), seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow
|
||||
version 1.3, type SET_CONFIG, length 12, xid 0x0000002f
|
||||
57 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3c3d), ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0
|
||||
58 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3667), seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow
|
||||
version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030
|
||||
59 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3941), ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0
|
||||
60 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe34 (incorrect -> 0x3420), seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow
|
||||
version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030
|
||||
61 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x392d), ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0
|
||||
62 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe30 (incorrect -> 0x4e78), seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6
|
||||
63 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x49a6), seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6
|
||||
64 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4e45), ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0
|
||||
65 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xaa9b), seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow
|
||||
version 1.3, type PACKET_OUT, length 100, xid 0x000000a7
|
||||
66 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206)
|
||||
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfec2 (incorrect -> 0xa12e), seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow
|
||||
version 1.3, type PACKET_IN, length 154, xid 0x00000000
|
||||
67 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4bec), ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0
|
||||
68 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xa8c9), seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow
|
||||
version 1.3, type PACKET_OUT, length 100, xid 0x000000a8
|
||||
69 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234)
|
||||
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfede (incorrect -> 0x2262), seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow
|
||||
version 1.3, type PACKET_IN, length 182, xid 0x00000000
|
||||
70 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4abb), ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0
|
||||
71 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148)
|
||||
127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], cksum 0xfe88 (incorrect -> 0xf671), seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 96, xid 0x00000076
|
||||
72 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x6e9c), ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0
|
||||
73 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116)
|
||||
127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], cksum 0xfe68 (incorrect -> 0xdcd4), seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow
|
||||
version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000
|
||||
74 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], cksum 0xfe28 (incorrect -> 0x6c66), ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0
|
||||
75 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xadc3), seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow
|
||||
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
|
||||
76 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], cksum 0xfe28 (incorrect -> 0x2614), ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0
|
||||
77 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], cksum 0xfe38 (incorrect -> 0x4ae9), seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f
|
||||
78 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124)
|
||||
127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], cksum 0x0259 (incorrect -> 0x9472), seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f
|
||||
79 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], cksum 0xfe28 (incorrect -> 0x48ae), ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0
|
||||
80 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc9ae), seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076
|
||||
81 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfee0 (incorrect -> 0x89dd), seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076
|
||||
82 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5d19), ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0
|
||||
83 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc6f5), seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077
|
||||
84 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe50 (incorrect -> 0x4e7c), seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077
|
||||
85 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5ca0), ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0
|
||||
86 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe38 (incorrect -> 0xdced), seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed
|
||||
87 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0439 (incorrect -> 0xedc3), seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed
|
||||
88 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xd8b8), ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0
|
||||
89 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0x48f2), seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff
|
||||
90 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0069 (incorrect -> 0x23f8), seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff
|
||||
91 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x4793), ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0
|
||||
92 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0x4228), seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100
|
||||
93 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4278), seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000100
|
||||
94 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x46e0), ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0
|
||||
95 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0xa9d9), seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147
|
||||
96 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfed8 (incorrect -> 0xa1c3), seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147
|
||||
97 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xaa7b), ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0
|
||||
98 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0xa464), seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148
|
||||
99 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xa44e), seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000148
|
||||
100 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xa8fd), ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0
|
||||
101 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe40 (incorrect -> 0xcf7c), seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f
|
||||
102 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252)
|
||||
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfef0 (incorrect -> 0x3421), seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f
|
||||
103 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xd1f7), ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0
|
||||
104 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xcc99), seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020
|
||||
105 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204)
|
||||
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfec0 (incorrect -> 0xad66), seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020
|
||||
106 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcf4f), ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0
|
||||
107 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xca33), seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021
|
||||
108 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108)
|
||||
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfe60 (incorrect -> 0xc5b3), seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021
|
||||
109 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcd95), ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0
|
||||
110 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x07aa), seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028
|
||||
111 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfeb8 (incorrect -> 0x3ff1), seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028
|
||||
112 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x07fa), ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0
|
||||
113 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x029c), seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029
|
||||
114 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xfe54), seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029
|
||||
115 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x05d0), ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0
|
||||
116 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe30 (incorrect -> 0x010b), seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a
|
||||
117 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x0092), seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a
|
||||
118 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x04be), ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0
|
||||
119 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe38 (incorrect -> 0xffb1), seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b
|
||||
120 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xeddf), seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b
|
||||
121 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x0356), ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0
|
||||
122 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe30 (incorrect -> 0x68f4), seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d
|
||||
123 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x64b3), seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d
|
||||
124 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x6829), ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0
|
||||
125 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe38 (incorrect -> 0x6320), seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e
|
||||
126 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x30af), seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
127 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x38a9), ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
128 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xc66e), seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
129 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x0a99), ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
130 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x62e9), seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
131 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xdc94), ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
132 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xeed4), seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
133 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xae91), ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
134 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x7ac0), seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
135 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x808d), ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
136 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x04c0), seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
137 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x90ab), seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
138 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x1c98), seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
139 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x2486), ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
140 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xf621), ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0
|
||||
141 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], cksum 0xfe38 (incorrect -> 0x2338), seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d
|
||||
142 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388)
|
||||
127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], cksum 0xff78 (incorrect -> 0x0f3d), seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d
|
||||
143 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], cksum 0xfe28 (incorrect -> 0x21fc), ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0
|
||||
144 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0xe6e3), seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d
|
||||
145 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xe200), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d
|
||||
146 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0xe677), ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0
|
||||
147 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe38 (incorrect -> 0xe026), seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow
|
||||
version 1.3, type TABLE_MOD, length 16, xid 0x0000006e
|
||||
148 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xe511), ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0
|
||||
149 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe50 (incorrect -> 0xb18a), seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow
|
||||
version 1.3, type PORT_MOD, length 40, xid 0x000000d4
|
||||
150 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x92a0), seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow
|
||||
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
|
||||
151 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x25f0), ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0
|
||||
152 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0x3fa5), seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow
|
||||
version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed
|
||||
153 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3cb5), seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow
|
||||
version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed
|
||||
154 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x41bb), ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0
|
||||
155 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0x8da8), seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d
|
||||
156 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x88c5), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d
|
||||
157 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8d4b), ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0
|
||||
158 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe38 (incorrect -> 0x87d1), seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow
|
||||
version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e
|
||||
port 1
|
||||
159 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x80dc), seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow
|
||||
version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e
|
||||
160 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8b71), ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0
|
||||
161 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe40 (incorrect -> 0xba52), seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow
|
||||
version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f
|
||||
162 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe40 (incorrect -> 0xb75e), seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow
|
||||
version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f
|
||||
163 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xe276), ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0
|
||||
164 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xf205), seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165
|
||||
165 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xed24), seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000165
|
||||
166 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xf292), ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0
|
||||
167 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe48 (incorrect -> 0xeb3a), seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow
|
||||
version 1.3, type SET_ASYNC, length 32, xid 0x00000166
|
||||
168 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xef88), ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0
|
||||
169 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xe7bd), seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow
|
||||
version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167
|
||||
170 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xeb3a), ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0
|
||||
171 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xe557), seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow
|
||||
version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167
|
||||
172 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xeb10), ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0
|
||||
173 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100)
|
||||
127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], cksum 0xfe58 (incorrect -> 0x9b52), seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow
|
||||
version 1.3, type METER_MOD, length 48, xid 0x00000010
|
||||
174 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x9d9e), ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0
|
509
tests/of13_ericsson-vv.out
Normal file
509
tests/of13_ericsson-vv.out
Normal file
@ -0,0 +1,509 @@
|
||||
1 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236)
|
||||
127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfee0 (incorrect -> 0x21d3), seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 184, xid 0x00000199
|
||||
2 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1ad3), seq 1, ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0
|
||||
3 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfe30 (incorrect -> 0x1512), seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a
|
||||
4 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1abf), seq 1, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0
|
||||
5 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x150a), seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a
|
||||
6 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], cksum 0xfe28 (incorrect -> 0x1ab5), seq 192, ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0
|
||||
7 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420)
|
||||
127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], cksum 0xff98 (incorrect -> 0xd79d), seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 368, xid 0x00000012
|
||||
8 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432)
|
||||
127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], cksum 0xffa4 (incorrect -> 0xcda4), seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow
|
||||
version 1.3, type ERROR, length 380, xid 0x00000012
|
||||
type BAD_ACTION, code BAD_EXPERIMENTER
|
||||
data (368 octets)
|
||||
0x0000: 040e 0170 0000 0012 0000 0000 0001 e240 ...p...........@
|
||||
0x0010: 0000 0000 0009 fbf1 2a00 03e8 07d0 01f4 ........*.......
|
||||
0x0020: ffff ffff ffff ffff ffff ffff 0000 0000 ................
|
||||
0x0030: 0001 006d 8000 0004 0000 0001 8000 0204 ...m............
|
||||
0x0040: 0000 0002 8000 0510 0102 0304 0000 0000 ................
|
||||
0x0050: 0000 0000 ffff ffff 8000 0606 0a0b 0c0d ................
|
||||
0x0060: 0e0f 8000 0806 8f8e 8d8c 8b8a 8000 0a02 ................
|
||||
0x0070: 0800 8000 0c02 03e8 8000 1401 0680 0016 ................
|
||||
0x0080: 04c0 a801 0180 0019 08c0 a802 0000 0000 ................
|
||||
0x0090: ff80 001a 0203 e880 001c 0200 5000 0000 ............P...
|
||||
0x00a0: 0003 0070 0000 0000 0000 0010 0000 0001 ...p............
|
||||
0x00b0: 0080 0000 0000 0000 0000 0010 0000 0001 ................
|
||||
0x00c0: ffff 0000 0000 0000 0016 0008 0000 03e8 ................
|
||||
0x00d0: 0015 0008 0000 07d0 000f 0008 0500 0000 ................
|
||||
0x00e0: 0010 0008 0000 0000 0017 0008 0500 0000 ................
|
||||
0x00f0: 0018 0008 0000 0000 000b 0008 0000 0000 ................
|
||||
0x0100: ffff 0010 00d0 f0db 0001 0203 0405 0607 ................
|
||||
0x0110: 0004 0060 0000 0000 000c 0008 0000 0000 ...`............
|
||||
0x0120: 0011 0008 0800 0000 0012 0008 0000 0000 ................
|
||||
0x0130: 0013 0008 8847 0000 0014 0008 86dd 0000 .....G..........
|
||||
0x0140: 001a 0008 88a8 0000 0019 0010 8000 1604 ................
|
||||
0x0150: c0a8 0a01 0000 0000 0019 0018 8000 3610 ..............6.
|
||||
0x0160: 2001 4860 4860 0000 0000 0000 0000 8888 ..H`H`..........
|
||||
9 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], cksum 0xfe28 (incorrect -> 0xb37b), seq 368, ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0
|
||||
10 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172)
|
||||
127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], cksum 0xfea0 (incorrect -> 0x8c0a), seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow
|
||||
version 1.3, type GROUP_MOD, length 120, xid 0x0000008a
|
||||
11 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184)
|
||||
127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], cksum 0xfeac (incorrect -> 0x8455), seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow
|
||||
version 1.3, type ERROR, length 132, xid 0x0000008a
|
||||
type GROUP_MOD_FAILED, code INVALID_GROUP
|
||||
data (120 octets)
|
||||
0x0000: 040f 0078 0000 008a 0001 0300 0000 1388 ...x............
|
||||
0x0010: 0030 0064 ffff ffff ffff ffff 0000 0000 .0.d............
|
||||
0x0020: 0000 0010 0000 0001 ffff 0000 0000 0000 ................
|
||||
0x0030: 0016 0008 0000 03e8 0015 0008 0000 07d0 ................
|
||||
0x0040: 0028 0064 0000 1388 ffff ffff 0000 0000 .(.d............
|
||||
0x0050: 0017 0008 0500 0000 0018 0008 0000 0000 ................
|
||||
0x0060: 000b 0008 0000 0000 0010 0064 ffff ffff ...........d....
|
||||
0x0070: 0000 0064 0000 0000 ...d....
|
||||
12 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], cksum 0xfe28 (incorrect -> 0xcbd6), seq 120, ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0
|
||||
13 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x17bd), seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0
|
||||
14 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
|
||||
127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], cksum 0x7727 (correct), seq 0, ack 2797182348, win 0, length 0
|
||||
15 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x9014), seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0
|
||||
16 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], cksum 0xfe30 (incorrect -> 0xf3ee), seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0
|
||||
17 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc735), seq 1, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
|
||||
18 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc10f), seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow
|
||||
version 1.3, type HELLO, length 8, xid 0x83ea7e23
|
||||
19 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc72d), seq 1, ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
|
||||
20 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0x5426), seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow
|
||||
version 1.0, type HELLO, length 8, xid 0x95b6dc37
|
||||
21 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc723), seq 9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0
|
||||
22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe8a (incorrect -> 0x83b9), seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow
|
||||
version 1.3, type ERROR, length 98, xid 0xc4420f26
|
||||
type HELLO_FAILED, code INCOMPATIBLE
|
||||
data (86 octets)
|
||||
0x0000: 5765 2073 7570 706f 7274 2076 6572 7369 We.support.versi
|
||||
0x0010: 6f6e 7320 3078 3034 2074 6f20 3078 3034 ons.0x04.to.0x04
|
||||
0x0020: 2069 6e63 6c75 7369 7665 2062 7574 2079 .inclusive.but.y
|
||||
0x0030: 6f75 2073 7570 706f 7274 206e 6f20 6c61 ou.support.no.la
|
||||
0x0040: 7465 7220 7468 616e 2076 6572 7369 6f6e ter.than.version
|
||||
0x0050: 2030 7830 312e .0x01.
|
||||
23 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], cksum 0xfe28 (incorrect -> 0xc6bf), seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0
|
||||
24 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc6b5), seq 9, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0
|
||||
25 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0xc22e), seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow
|
||||
version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a
|
||||
26 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
|
||||
127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], cksum 0xf312 (correct), seq 2428319660, win 0, length 0
|
||||
27 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc972), seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow
|
||||
version 1.3, type HELLO, length 8, xid 0x0000015f
|
||||
28 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xcad0), seq 1, ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0
|
||||
29 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc47b), seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160
|
||||
30 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc92d), seq 1, ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0
|
||||
31 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc3b1), seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000160
|
||||
32 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], cksum 0xfe28 (incorrect -> 0xc91b), seq 16, ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0
|
||||
33 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe38 (incorrect -> 0xc315), seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow
|
||||
version 1.3, type HELLO, length 16, xid 0x00000161
|
||||
data (8 octets)
|
||||
0x0000: 0001 0008 0000 0015 ........
|
||||
34 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc84b), seq 9, ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0
|
||||
35 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe30 (incorrect -> 0x5466), seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d
|
||||
36 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4f83), seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d
|
||||
37 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x53da), seq 8, ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0
|
||||
38 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe3d (incorrect -> 0x23cf), seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e
|
||||
data (13 octets)
|
||||
0x0000: 0001 0203 0405 0607 0809 0a0b 0c .............
|
||||
39 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73)
|
||||
127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe3d (incorrect -> 0x225c), seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e
|
||||
data (13 octets)
|
||||
0x0000: 0001 0203 0405 0607 0809 0a0b 0c .............
|
||||
40 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x50e6), seq 29, ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0
|
||||
41 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe38 (incorrect -> 0x994a), seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow
|
||||
version 1.3, type EXPERIMENTER, length 16, xid 0x00000041
|
||||
42 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe44 (incorrect -> 0x9024), seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow
|
||||
version 1.3, type ERROR, length 28, xid 0x00000041
|
||||
type BAD_REQUEST, code BAD_LEN
|
||||
data (16 octets)
|
||||
0x0000: 0404 0010 0000 0041 00d0 f0db 0000 0065 .......A.......e
|
||||
43 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8aee), seq 16, ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0
|
||||
44 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0x8661), seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042
|
||||
45 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x862e), seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000042
|
||||
46 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8a7a), seq 24, ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0
|
||||
47 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe49 (incorrect -> 0x4af3), seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow
|
||||
version 1.3, type EXPERIMENTER, length 33, xid 0x00000043
|
||||
48 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe55 (incorrect -> 0x45af), seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow
|
||||
version 1.3, type ERROR, length 45, xid 0x00000043
|
||||
type BAD_REQUEST, code BAD_LEN
|
||||
data (33 octets)
|
||||
0x0000: 0404 0021 0000 0043 00d0 f0db 0000 0065 ...!...C.......e
|
||||
0x0010: 0001 0203 0405 0607 0809 0a0b 0c0d 0e0f ................
|
||||
0x0020: 10 .
|
||||
49 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x88de), seq 57, ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0
|
||||
50 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0xb4f6), seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow
|
||||
version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e
|
||||
51 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xbbc3), seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow
|
||||
version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e
|
||||
52 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0xb693), seq 657, ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0
|
||||
53 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3d62), seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e
|
||||
54 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3880), seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e
|
||||
55 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x3cb9), seq 8, ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0
|
||||
56 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe34 (incorrect -> 0x3760), seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow
|
||||
version 1.3, type SET_CONFIG, length 12, xid 0x0000002f
|
||||
57 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3c3d), seq 9, ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0
|
||||
58 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3667), seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow
|
||||
version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030
|
||||
59 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3941), seq 9, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0
|
||||
60 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64)
|
||||
127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe34 (incorrect -> 0x3420), seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow
|
||||
version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030
|
||||
61 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x392d), seq 28, ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0
|
||||
62 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe30 (incorrect -> 0x4e78), seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6
|
||||
63 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x49a6), seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6
|
||||
64 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4e45), seq 8, ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0
|
||||
65 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xaa9b), seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow
|
||||
version 1.3, type PACKET_OUT, length 100, xid 0x000000a7
|
||||
66 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206)
|
||||
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfec2 (incorrect -> 0xa12e), seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow
|
||||
version 1.3, type PACKET_IN, length 154, xid 0x00000000
|
||||
67 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4bec), seq 108, ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0
|
||||
68 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xa8c9), seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow
|
||||
version 1.3, type PACKET_OUT, length 100, xid 0x000000a8
|
||||
69 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234)
|
||||
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfede (incorrect -> 0x2262), seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow
|
||||
version 1.3, type PACKET_IN, length 182, xid 0x00000000
|
||||
70 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4abb), seq 208, ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0
|
||||
71 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148)
|
||||
127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], cksum 0xfe88 (incorrect -> 0xf671), seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 96, xid 0x00000076
|
||||
72 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x6e9c), seq 1, ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0
|
||||
73 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116)
|
||||
127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], cksum 0xfe68 (incorrect -> 0xdcd4), seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow
|
||||
version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000
|
||||
74 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], cksum 0xfe28 (incorrect -> 0x6c66), seq 96, ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0
|
||||
75 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xadc3), seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow
|
||||
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
|
||||
76 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], cksum 0xfe28 (incorrect -> 0x2614), seq 1, ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0
|
||||
77 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], cksum 0xfe38 (incorrect -> 0x4ae9), seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f
|
||||
78 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124)
|
||||
127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], cksum 0x0259 (incorrect -> 0x9472), seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f
|
||||
79 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], cksum 0xfe28 (incorrect -> 0x48ae), seq 16, ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0
|
||||
80 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc9ae), seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076
|
||||
81 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfee0 (incorrect -> 0x89dd), seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076
|
||||
82 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5d19), seq 64, ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0
|
||||
83 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc6f5), seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077
|
||||
84 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe50 (incorrect -> 0x4e7c), seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077
|
||||
85 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5ca0), seq 128, ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0
|
||||
86 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe38 (incorrect -> 0xdced), seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed
|
||||
87 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0439 (incorrect -> 0xedc3), seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed
|
||||
88 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xd8b8), seq 1088, ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0
|
||||
89 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0x48f2), seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff
|
||||
90 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0069 (incorrect -> 0x23f8), seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff
|
||||
91 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x4793), seq 1272, ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0
|
||||
92 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0x4228), seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100
|
||||
93 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4278), seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000100
|
||||
94 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x46e0), seq 1280, ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0
|
||||
95 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0xa9d9), seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147
|
||||
96 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfed8 (incorrect -> 0xa1c3), seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147
|
||||
97 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xaa7b), seq 1864, ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0
|
||||
98 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0xa464), seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148
|
||||
99 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xa44e), seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000148
|
||||
100 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xa8fd), seq 1872, ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0
|
||||
101 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe40 (incorrect -> 0xcf7c), seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f
|
||||
102 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252)
|
||||
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfef0 (incorrect -> 0x3421), seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f
|
||||
103 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xd1f7), seq 24, ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0
|
||||
104 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xcc99), seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020
|
||||
105 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204)
|
||||
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfec0 (incorrect -> 0xad66), seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020
|
||||
106 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcf4f), seq 40, ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0
|
||||
107 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xca33), seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021
|
||||
108 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108)
|
||||
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfe60 (incorrect -> 0xc5b3), seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021
|
||||
109 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcd95), seq 56, ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0
|
||||
110 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x07aa), seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028
|
||||
111 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfeb8 (incorrect -> 0x3ff1), seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028
|
||||
112 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x07fa), seq 24, ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0
|
||||
113 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x029c), seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029
|
||||
114 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xfe54), seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029
|
||||
115 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x05d0), seq 48, ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0
|
||||
116 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe30 (incorrect -> 0x010b), seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a
|
||||
117 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x0092), seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a
|
||||
118 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x04be), seq 56, ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0
|
||||
119 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe38 (incorrect -> 0xffb1), seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b
|
||||
120 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xeddf), seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b
|
||||
121 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x0356), seq 72, ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0
|
||||
122 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe30 (incorrect -> 0x68f4), seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d
|
||||
123 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x64b3), seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d
|
||||
124 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x6829), seq 8, ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0
|
||||
125 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe38 (incorrect -> 0x6320), seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e
|
||||
126 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x30af), seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
127 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x38a9), seq 24, ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
128 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xc66e), seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
129 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x0a99), seq 24, ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
130 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x62e9), seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
131 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xdc94), seq 24, ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
132 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xeed4), seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
133 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xae91), seq 24, ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
134 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x7ac0), seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
135 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x808d), seq 24, ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
136 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x04c0), seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
137 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x90ab), seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
138 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844)
|
||||
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x1c98), seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
139 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x2486), seq 24, ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
140 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xf621), seq 24, ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0
|
||||
141 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], cksum 0xfe38 (incorrect -> 0x2338), seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d
|
||||
142 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388)
|
||||
127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], cksum 0xff78 (incorrect -> 0x0f3d), seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d
|
||||
143 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], cksum 0xfe28 (incorrect -> 0x21fc), seq 16, ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0
|
||||
144 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0xe6e3), seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d
|
||||
145 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xe200), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d
|
||||
146 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0xe677), seq 8, ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0
|
||||
147 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe38 (incorrect -> 0xe026), seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow
|
||||
version 1.3, type TABLE_MOD, length 16, xid 0x0000006e
|
||||
148 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xe511), seq 9, ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0
|
||||
149 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe50 (incorrect -> 0xb18a), seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow
|
||||
version 1.3, type PORT_MOD, length 40, xid 0x000000d4
|
||||
150 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x92a0), seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow
|
||||
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
|
||||
151 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x25f0), seq 976, ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0
|
||||
152 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0x3fa5), seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow
|
||||
version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed
|
||||
153 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3cb5), seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow
|
||||
version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed
|
||||
154 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x41bb), seq 1176, ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0
|
||||
155 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0x8da8), seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d
|
||||
156 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x88c5), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d
|
||||
157 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8d4b), seq 8, ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0
|
||||
158 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe38 (incorrect -> 0x87d1), seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow
|
||||
version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e
|
||||
port 1
|
||||
159 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x80dc), seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow
|
||||
version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e
|
||||
160 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8b71), seq 24, ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0
|
||||
161 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe40 (incorrect -> 0xba52), seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow
|
||||
version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f
|
||||
162 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe40 (incorrect -> 0xb75e), seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow
|
||||
version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f
|
||||
163 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xe276), seq 1456, ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0
|
||||
164 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xf205), seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165
|
||||
165 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xed24), seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000165
|
||||
166 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xf292), seq 1912, ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0
|
||||
167 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe48 (incorrect -> 0xeb3a), seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow
|
||||
version 1.3, type SET_ASYNC, length 32, xid 0x00000166
|
||||
168 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xef88), seq 1993, ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0
|
||||
169 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xe7bd), seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow
|
||||
version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167
|
||||
170 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xeb3a), seq 1993, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0
|
||||
171 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84)
|
||||
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xe557), seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow
|
||||
version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167
|
||||
172 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xeb10), seq 1952, ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0
|
||||
173 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100)
|
||||
127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], cksum 0xfe58 (incorrect -> 0x9b52), seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow
|
||||
version 1.3, type METER_MOD, length 48, xid 0x00000010
|
||||
174 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52)
|
||||
127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x9d9e), seq 1, ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0
|
277
tests/of13_ericsson.out
Normal file
277
tests/of13_ericsson.out
Normal file
@ -0,0 +1,277 @@
|
||||
1 15:52:49.322823 IP 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 184, xid 0x00000199
|
||||
2 15:52:49.362355 IP 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0
|
||||
3 15:52:49.367093 IP 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a
|
||||
4 15:52:49.367137 IP 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0
|
||||
5 15:52:49.367403 IP 127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a
|
||||
6 15:52:49.367421 IP 127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0
|
||||
7 12:15:37.979676 IP 127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 368, xid 0x00000012
|
||||
8 12:15:37.985455 IP 127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow
|
||||
version 1.3, type ERROR, length 380, xid 0x00000012
|
||||
9 12:15:37.985482 IP 127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0
|
||||
10 14:53:56.336558 IP 127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow
|
||||
version 1.3, type GROUP_MOD, length 120, xid 0x0000008a
|
||||
11 14:53:56.339805 IP 127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow
|
||||
version 1.3, type ERROR, length 132, xid 0x0000008a
|
||||
12 14:53:56.339839 IP 127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0
|
||||
13 07:06:07.923021 IP 127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0
|
||||
14 07:06:07.923406 IP 127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], seq 0, ack 2797182348, win 0, length 0
|
||||
15 07:06:11.948050 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0
|
||||
16 07:06:11.948123 IP 127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0
|
||||
17 07:06:11.948171 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
|
||||
18 07:06:11.948588 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow
|
||||
version 1.3, type HELLO, length 8, xid 0x83ea7e23
|
||||
19 07:06:11.948646 IP 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
|
||||
20 07:06:11.951581 IP 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow
|
||||
version 1.0, type HELLO, length 8, xid 0x95b6dc37
|
||||
21 07:06:11.951654 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0
|
||||
22 07:06:11.954851 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow
|
||||
version 1.3, type ERROR, length 98, xid 0xc4420f26
|
||||
23 07:06:11.956875 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0
|
||||
24 07:06:11.995263 IP 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0
|
||||
25 07:06:11.996996 IP 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow
|
||||
version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a
|
||||
26 07:06:11.997117 IP 127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], seq 2428319660, win 0, length 0
|
||||
27 20:23:02.447284 IP 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow
|
||||
version 1.3, type HELLO, length 8, xid 0x0000015f
|
||||
28 20:23:02.487886 IP 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0
|
||||
29 20:23:03.289931 IP 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160
|
||||
30 20:23:03.290134 IP 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0
|
||||
31 20:23:03.292620 IP 127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000160
|
||||
32 20:23:03.292690 IP 127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0
|
||||
33 20:23:03.674363 IP 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow
|
||||
version 1.3, type HELLO, length 16, xid 0x00000161
|
||||
34 20:23:03.711246 IP 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0
|
||||
35 09:18:28.508689 IP 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d
|
||||
36 09:18:28.512206 IP 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d
|
||||
37 09:18:28.512310 IP 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0
|
||||
38 09:18:29.938866 IP 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e
|
||||
39 09:18:29.940525 IP 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e
|
||||
40 09:18:29.940621 IP 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0
|
||||
41 15:41:10.777155 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow
|
||||
version 1.3, type EXPERIMENTER, length 16, xid 0x00000041
|
||||
42 15:41:10.782182 IP 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow
|
||||
version 1.3, type ERROR, length 28, xid 0x00000041
|
||||
43 15:41:10.782279 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0
|
||||
44 15:41:10.978145 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042
|
||||
45 15:41:10.981725 IP 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000042
|
||||
46 15:41:10.981828 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0
|
||||
47 15:41:11.640555 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow
|
||||
version 1.3, type EXPERIMENTER, length 33, xid 0x00000043
|
||||
48 15:41:11.649632 IP 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow
|
||||
version 1.3, type ERROR, length 45, xid 0x00000043
|
||||
49 15:41:11.649721 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0
|
||||
50 15:47:18.960105 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow
|
||||
version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e
|
||||
51 15:47:18.962238 IP 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow
|
||||
version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e
|
||||
52 15:47:18.962333 IP 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0
|
||||
53 16:32:34.623939 IP 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e
|
||||
54 16:32:34.625658 IP 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e
|
||||
55 16:32:34.625750 IP 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0
|
||||
56 16:32:34.844806 IP 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow
|
||||
version 1.3, type SET_CONFIG, length 12, xid 0x0000002f
|
||||
57 16:32:34.883698 IP 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0
|
||||
58 16:32:36.376083 IP 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow
|
||||
version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030
|
||||
59 16:32:36.376174 IP 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0
|
||||
60 16:32:36.378403 IP 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow
|
||||
version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030
|
||||
61 16:32:36.378465 IP 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0
|
||||
62 17:39:10.589931 IP 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6
|
||||
63 17:39:10.592125 IP 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6
|
||||
64 17:39:10.592223 IP 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0
|
||||
65 17:39:11.275605 IP 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow
|
||||
version 1.3, type PACKET_OUT, length 100, xid 0x000000a7
|
||||
66 17:39:11.278453 IP 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow
|
||||
version 1.3, type PACKET_IN, length 154, xid 0x00000000
|
||||
67 17:39:11.278747 IP 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0
|
||||
68 17:39:11.293620 IP 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow
|
||||
version 1.3, type PACKET_OUT, length 100, xid 0x000000a8
|
||||
69 17:39:11.296836 IP 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow
|
||||
version 1.3, type PACKET_IN, length 182, xid 0x00000000
|
||||
70 17:39:11.334896 IP 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0
|
||||
71 10:22:45.030583 IP 127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow
|
||||
version 1.3, type FLOW_MOD, length 96, xid 0x00000076
|
||||
72 10:22:45.067011 IP 127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0
|
||||
73 10:22:46.038093 IP 127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow
|
||||
version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000
|
||||
74 10:22:46.038127 IP 127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0
|
||||
75 13:15:24.725748 IP 127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow
|
||||
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
|
||||
76 13:15:24.725788 IP 127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0
|
||||
77 16:37:49.792852 IP 127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f
|
||||
78 16:37:49.796567 IP 127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f
|
||||
79 16:37:49.796657 IP 127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0
|
||||
80 17:10:39.694164 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076
|
||||
81 17:10:39.695936 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076
|
||||
82 17:10:39.696001 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0
|
||||
83 17:10:39.706507 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077
|
||||
84 17:10:39.708491 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077
|
||||
85 17:10:39.747947 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0
|
||||
86 17:20:21.268792 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed
|
||||
87 17:20:21.270799 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed
|
||||
88 17:20:21.270887 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0
|
||||
89 17:21:32.610984 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff
|
||||
90 17:21:32.614400 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff
|
||||
91 17:21:32.614511 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0
|
||||
92 17:21:32.932077 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100
|
||||
93 17:21:32.939513 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000100
|
||||
94 17:21:32.939617 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0
|
||||
95 17:27:12.201785 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147
|
||||
96 17:27:12.204185 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147
|
||||
97 17:27:12.204269 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0
|
||||
98 17:27:12.931668 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148
|
||||
99 17:27:12.938585 IP 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000148
|
||||
100 17:27:12.938697 IP 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0
|
||||
101 17:57:16.110186 IP 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f
|
||||
102 17:57:16.113738 IP 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f
|
||||
103 17:57:16.113974 IP 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0
|
||||
104 17:57:17.127188 IP 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020
|
||||
105 17:57:17.129487 IP 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020
|
||||
106 17:57:17.130202 IP 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0
|
||||
107 17:57:17.869382 IP 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021
|
||||
108 17:57:17.871408 IP 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021
|
||||
109 17:57:17.871493 IP 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0
|
||||
110 10:02:19.814878 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028
|
||||
111 10:02:19.815701 IP 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028
|
||||
112 10:02:19.815724 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0
|
||||
113 10:02:20.713618 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029
|
||||
114 10:02:20.714133 IP 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029
|
||||
115 10:02:20.714160 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0
|
||||
116 10:02:21.229978 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a
|
||||
117 10:02:21.231013 IP 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a
|
||||
118 10:02:21.231044 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0
|
||||
119 10:02:21.852874 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b
|
||||
120 10:02:21.853489 IP 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b
|
||||
121 10:02:21.853515 IP 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0
|
||||
122 10:30:09.945368 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d
|
||||
123 10:30:09.946140 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d
|
||||
124 10:30:09.946173 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0
|
||||
125 10:30:10.672306 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e
|
||||
126 10:30:10.673261 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
127 10:30:10.673292 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
128 10:30:10.675065 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
129 10:30:10.675124 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
130 10:30:10.675159 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
131 10:30:10.675174 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
132 10:30:10.675194 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
133 10:30:10.675206 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
134 10:30:10.675226 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
135 10:30:10.675238 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
136 10:30:10.675257 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
137 10:30:10.675294 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
138 10:30:10.675314 IP 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
|
||||
139 10:30:10.675325 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0
|
||||
140 10:30:10.712539 IP 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0
|
||||
141 10:46:50.838754 IP 127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow
|
||||
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d
|
||||
142 10:46:50.839431 IP 127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow
|
||||
version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d
|
||||
143 10:46:50.839471 IP 127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0
|
||||
144 19:45:16.495434 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d
|
||||
145 19:45:16.496030 IP 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d
|
||||
146 19:45:16.496057 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0
|
||||
147 19:45:17.176752 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow
|
||||
version 1.3, type TABLE_MOD, length 16, xid 0x0000006e
|
||||
148 19:45:17.215970 IP 127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0
|
||||
149 19:53:23.472776 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow
|
||||
version 1.3, type PORT_MOD, length 40, xid 0x000000d4
|
||||
150 19:53:23.473744 IP 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow
|
||||
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
|
||||
151 19:53:23.473777 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0
|
||||
152 19:55:19.511983 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow
|
||||
version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed
|
||||
153 19:55:19.513048 IP 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow
|
||||
version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed
|
||||
154 19:55:19.513081 IP 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0
|
||||
155 20:10:12.609713 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d
|
||||
156 20:10:12.610357 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d
|
||||
157 20:10:12.610382 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0
|
||||
158 20:10:13.364783 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow
|
||||
version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e
|
||||
159 20:10:13.366754 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow
|
||||
version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e
|
||||
160 20:10:13.366788 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0
|
||||
161 20:24:40.574081 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow
|
||||
version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f
|
||||
162 20:24:40.574726 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow
|
||||
version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f
|
||||
163 20:24:40.574748 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0
|
||||
164 20:28:52.608224 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165
|
||||
165 20:28:52.609219 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow
|
||||
version 1.3, type ECHO_REPLY, length 8, xid 0x00000165
|
||||
166 20:28:52.609246 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0
|
||||
167 20:28:54.103683 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow
|
||||
version 1.3, type SET_ASYNC, length 32, xid 0x00000166
|
||||
168 20:28:54.140673 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0
|
||||
169 20:28:56.308694 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow
|
||||
version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167
|
||||
170 20:28:56.308754 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0
|
||||
171 20:28:56.309209 IP 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow
|
||||
version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167
|
||||
172 20:28:56.309230 IP 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0
|
||||
173 20:37:22.358712 IP 127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow
|
||||
version 1.3, type METER_MOD, length 48, xid 0x00000010
|
||||
174 20:37:22.396699 IP 127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0
|
BIN
tests/of13_ericsson.pcapng
Normal file
BIN
tests/of13_ericsson.pcapng
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user