=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.09.03 15:04:20 =~=~=~=~=~=~=~=~=~=~=~= set ff dst-ip FW1.FW1.FW1.FW1 filter added FW2-> set ff src-ip FW1.FW1.FW1.FW1 filter added FW2-> snoop filter ip dst-ip FW1.FW1.FW1.FW1 snoop filter added FW2-> snoop filter ip src-ip FW1.FW1.FW1.FW1 snoop filter added FW2-> clear db FW2-> debug flow basic FW2-> snoopsnoopset console page 0 ^----------------unknown keyword snoopsnoopset FW2-> get db st ****** 1297419.0: packet received [44]****** ipid = 20485(5005), @01f31be4 flow_self_vector2: send pack with current vid =0, enc_size:0 handle raw/no_session packet. send no session packet flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 skipping pre-frag going into tunnel 40000006. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000006 (vn2) doing ESP encryption and size =48 ipsec encrypt prepare engine done ipsec encrypt set engine done **** pak processing end. ipsec encrypt engine released ipsec encrypt done put packet(5de0870) into flush queue. remove packet(5de0870) out from flush queue. **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               out encryption tunnel 40000006 gw:203.35.245.129 no more encapping needed send out through normal path. flow_ip_send: 5007:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 mac 000e0c5a5930 in session packet send out to 000e0c5a5930 through untrust **** pak processing end. ****** 1297419.0: packet received [44]****** ipid = 20487(5007), @01f31be4 flow_self_vector2: send pack with current vid =0, enc_size:0 handle raw/no_session packet. send no session packet flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 skipping pre-frag going into tunnel 40000007. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000007 (vn2) doing ESP encryption and size =48 ipsec encrypt prepare engine done ipsec encrypt set engine done --- more ---               **** pak processing end. ipsec encrypt engine released ipsec encrypt done put packet(5de0870) into flush queue. remove packet(5de0870) out from flush queue. **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 out encryption tunnel 40000007 gw:203.35.245.129 no more encapping needed send out through normal path. flow_ip_send: 5009:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 mac 000e0c5a5930 in session packet send out to 000e0c5a5930 through untrust **** pak processing end. ****** 1297429.0: packet received [44]****** ipid = 20497(5011), @01f31424 flow_self_vector2: send pack with current vid =0, enc_size:0 handle raw/no_session packet. send no session packet flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               skipping pre-frag going into tunnel 40000006. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000006 (vn2) doing ESP encryption and size =48 ipsec encrypt prepare engine done ipsec encrypt set engine done **** pak processing end. ipsec encrypt engine released ipsec encrypt done put packet(5de0870) into flush queue. remove packet(5de0870) out from flush queue. **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 out encryption tunnel 40000006 gw:203.35.245.129 no more encapping needed send out through normal path. flow_ip_send: 5013:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 mac 000e0c5a5930 in session packet send out to 000e0c5a5930 through untrust **** pak processing end. ****** 1297429.0: packet received [44]****** --- more ---               ipid = 20499(5013), @01f31424 flow_self_vector2: send pack with current vid =0, enc_size:0 handle raw/no_session packet. send no session packet flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 skipping pre-frag going into tunnel 40000007. flow_encrypt: pipeline. chip info: PIO. Tunnel id 00000007 (vn2) doing ESP encryption and size =48 ipsec encrypt prepare engine done ipsec encrypt set engine done **** pak processing end. ipsec encrypt engine released ipsec encrypt done put packet(5de0870) into flush queue. remove packet(5de0870) out from flush queue. **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 out encryption tunnel 40000007 gw:203.35.245.129 --- more ---               no more encapping needed send out through normal path. flow_ip_send: 5015:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 mac 000e0c5a5930 in session packet send out to 000e0c5a5930 through untrust **** pak processing end. ****** 1297432.0: packet received [104]****** ipid = 20501(5015), @01f31424 flow_self_vector2: send pack with current vid =0, enc_size:0 handle raw/no_session packet. send no session packet flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 skipping pre-frag no more encapping needed send out through normal path. flow_ip_send: 5015:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,17 => untrust(104) flag 0x8000890, vlan 0 no l2info for packet. no route for packet search route to (null, 0.0.0.0->FW1.FW1.FW1.FW1) in vr trust-vr for vsd-0/flag-2000/ifp-untrust [ Dest] 13.route FW1.FW1.FW1.FW1->203.35.245.129, to untrust --- more ---               route to 203.35.245.129 arp entry found for 203.35.245.129 mac 000e0c5a5930 packet send out to 000e0c5a5930 through untrust **** pak processing end. ****** 1297432.0: packet received [104]****** ipid = 3467(0d8b), @058d6970 packet passed sanity check. untrust:FW1.FW1.FW1.FW1/500->FW2.FW2.FW2.FW2/500,17 existing session found. sess token 6 flow got session. flow session id 2046 packet is for self, copy packet to self copy packet to us. ****** 1297433.0: packet received [104]****** ipid = 3509(0db5), @058d8970 packet passed sanity check. untrust:FW1.FW1.FW1.FW1/500->FW2.FW2.FW2.FW2/500,17 existing session found. sess token 6 flow got session. flow session id 2046 packet is for self, copy packet to self copy packet to us. --- more ---              ****** 1297434.0: packet received [104]****** --- more ---               ipid = 20503(5017), @01f31424 flow_self_vector2: send pack with current vid =0, enc_size:0 handle raw/no_session packet. send no session packet flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 skipping pre-frag no more encapping needed send out through normal path. flow_ip_send: 5017:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,17 => untrust(104) flag 0x8000890, vlan 0 no l2info for packet. no route for packet search route to (null, 0.0.0.0->FW1.FW1.FW1.FW1) in vr trust-vr for vsd-0/flag-2000/ifp-untrust [ Dest] 13.route FW1.FW1.FW1.FW1->203.35.245.129, to untrust route to 203.35.245.129 arp entry found for 203.35.245.129 mac 000e0c5a5930 packet send out to 000e0c5a5930 through untrust **** pak processing end. ****** 1297439.0: packet received [44]****** ipid = 20509(501d), @01f31424 flow_self_vector2: send pack with current vid =0, enc_size:0 --- more ---               handle raw/no_session packet. --- more ---               send no session packet --- more ---               flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               skipping pre-frag --- more ---               going into tunnel 40000006. --- more ---               flow_encrypt: pipeline. --- more ---              chip info: PIO. Tunnel id 00000006 --- more ---              (vn2) doing ESP encryption and size =48 --- more ---              ipsec encrypt prepare engine done --- more ---              ipsec encrypt set engine done --- more ---               **** pak processing end. --- more ---              ipsec encrypt engine released --- more ---              ipsec encrypt done --- more ---               put packet(5de0870) into flush queue. --- more ---               remove packet(5de0870) out from flush queue. --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               out encryption tunnel 40000006 gw:203.35.245.129 --- more ---               no more encapping needed --- more ---               send out through normal path. --- more ---               flow_ip_send: 501f:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 --- more ---               mac 000e0c5a5930 in session --- more ---               packet send out to 000e0c5a5930 through untrust --- more ---               **** pak processing end. --- more ---              ****** 1297439.0: packet received [44]****** --- more ---               ipid = 20511(501f), @01f31424 --- more ---              flow_self_vector2: send pack with current vid =0, enc_size:0 --- more ---               handle raw/no_session packet. --- more ---               send no session packet --- more ---               flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               skipping pre-frag --- more ---               going into tunnel 40000007. --- more ---               flow_encrypt: pipeline. --- more ---              chip info: PIO. Tunnel id 00000007 --- more ---              (vn2) doing ESP encryption and size =48 --- more ---              ipsec encrypt prepare engine done --- more ---              ipsec encrypt set engine done --- more ---               **** pak processing end. --- more ---              ipsec encrypt engine released --- more ---              ipsec encrypt done --- more ---               put packet(5de0870) into flush queue. --- more ---               remove packet(5de0870) out from flush queue. --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               out encryption tunnel 40000007 gw:203.35.245.129 --- more ---               no more encapping needed --- more ---               send out through normal path. --- more ---               flow_ip_send: 5021:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 --- more ---               mac 000e0c5a5930 in session --- more ---               packet send out to 000e0c5a5930 through untrust --- more ---               **** pak processing end. --- more ---              ****** 1297449.0: packet received [44]****** --- more ---               ipid = 20523(502b), @01f31be4 --- more ---              flow_self_vector2: send pack with current vid =0, enc_size:0 --- more ---               handle raw/no_session packet. --- more ---               send no session packet --- more ---               flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               skipping pre-frag --- more ---               going into tunnel 40000006. --- more ---               flow_encrypt: pipeline. --- more ---              chip info: PIO. Tunnel id 00000006 --- more ---              (vn2) doing ESP encryption and size =48 --- more ---              ipsec encrypt prepare engine done --- more ---              ipsec encrypt set engine done --- more ---               **** pak processing end. --- more ---              ipsec encrypt engine released --- more ---              ipsec encrypt done --- more ---               put packet(5de0870) into flush queue. --- more ---               remove packet(5de0870) out from flush queue. --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               out encryption tunnel 40000006 gw:203.35.245.129 --- more ---               no more encapping needed --- more ---               send out through normal path. --- more ---               flow_ip_send: 502d:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 --- more ---               mac 000e0c5a5930 in session --- more ---               packet send out to 000e0c5a5930 through untrust --- more ---               **** pak processing end. --- more ---              ****** 1297449.0: packet received [44]****** --- more ---               ipid = 20525(502d), @01f31be4 --- more ---              flow_self_vector2: send pack with current vid =0, enc_size:0 --- more ---               handle raw/no_session packet. --- more ---               send no session packet --- more ---               flow_if_ip_send_fwd: switch vectors: packet src FW2.FW2.FW2.FW2, dst FW1.FW1.FW1.FW1 --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               skipping pre-frag --- more ---               going into tunnel 40000007. --- more ---               flow_encrypt: pipeline. --- more ---              chip info: PIO. Tunnel id 00000007 --- more ---              (vn2) doing ESP encryption and size =48 --- more ---              ipsec encrypt prepare engine done --- more ---              ipsec encrypt set engine done --- more ---               **** pak processing end. --- more ---              ipsec encrypt engine released --- more ---              ipsec encrypt done --- more ---               put packet(5de0870) into flush queue. --- more ---               remove packet(5de0870) out from flush queue. --- more ---               --- more ---              **** jump to packet:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1 --- more ---               out encryption tunnel 40000007 gw:203.35.245.129 --- more ---               no more encapping needed --- more ---               send out through normal path. --- more ---               flow_ip_send: 502f:FW2.FW2.FW2.FW2->FW1.FW1.FW1.FW1,50 => untrust(96) flag 0x898, vlan 0 --- more ---               mac 000e0c5a5930 in session --- more ---               packet send out to 000e0c5a5930 through untrust --- more ---               **** pak processing end. --- more ---              Interface IPv6 disabled, drop IPv6 packet. --- more ---              FW2-> FW2-> FW2-> FW2-> FW2-> FW2-> All debug off --- more ---              nop off ^------unknown keyword nop FW2->