get db stream ****** 3513104.0: packet received [49]****** ipid = 3141(0c45), @024ca214 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: bdf2:202.123.79.240->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: ee38:128.242.127.14->192.168.1.154,6 => ethernet1(40) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (60) ****** 3513104.0: packet received [40]****** ipid = 4765(129d), @c7d1f910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. flow_ip_send: fdc6:202.123.79.240->192.168.1.137,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3513110.0: packet received [60]****** ipid = 4810(12ca), @c7d00110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/3072,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31795 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d3. flow_encrypt: enc vector=d8601c. l2tp outbound tid=5, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255980072 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 0c97:218.189.189.121->203.184.161.56,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: 32f8:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3513115.0: packet received [60]****** ipid = 4814(12ce), @c7d07110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/3328,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31477 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d3. flow_encrypt: enc vector=d8601c. l2tp outbound tid=5, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255979072 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 0cea:218.189.189.121->203.184.161.56,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3513121.0: packet received [60]****** ipid = 4816(12d0), @c7d0b910 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/3584,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31172 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d3. flow_encrypt: enc vector=d8601c. l2tp outbound tid=5, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255978072 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 0d0f:218.189.189.121->203.184.161.56,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. ****** 3513125.0: packet received [60]****** ipid = 4821(12d5), @c7d01110 packet passed sanity check. ethernet1:192.168.1.101/1280->60.60.60.60/3840,1(0/0) Not IKE nor NAT-T nor ESP protocol. existing session found. sess token 4 flow got session. flow session id 31505 existing vector list 5-5281720. skipping pre-frag going into tunnel 800080d3. flow_encrypt: enc vector=d8601c. l2tp outbound tid=5, cid=1 going into tunnel 4000013b. flow_encrypt: enc vector=d81ba8. chip info: PIO. Tunnel id 0000013b (vn2) doing ESP encryption and size =88 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released SA lifesize_cur left 255977864 ipsec encrypt done out encryption tunnel 4000013b gw:218.189.189.113 no more encapping needed send out through normal path. flow_ip_send: 0d70:218.189.189.121->203.184.161.56,50 => ethernet3(136) flag 0x0, vlan 0 mac 000285070340 in session send packet to traffic shaping queue. flow_ip_send: 3ea6:210.0.146.43->192.168.1.132,6 => ethernet1(40) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (60) ****** 3513138.0: packet received [41]****** ipid = 4829(12dd), @c7d12110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [40]****** ipid = 3624(0e28), @024ca5f4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 35d3:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3513138.0: packet received [41]****** ipid = 3625(0e29), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: 35d4:119.247.59.137->192.168.1.125,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) flow_ip_send: 1411:74.125.209.16->192.168.1.132,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3513138.0: packet received [40]****** ipid = 4830(12de), @c7d00110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [41]****** ipid = 4831(12df), @c7d00910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [40]****** ipid = 3629(0e2d), @024b8924 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: fd08:202.123.79.240->192.168.1.111,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3513138.0: packet received [41]****** ipid = 3630(0e2e), @024b8924 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513138.0: packet received [40]****** ipid = 4832(12e0), @c7d11110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [41]****** ipid = 4833(12e1), @c7d13110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [40]****** ipid = 3641(0e39), @024b8924 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513138.0: packet received [41]****** ipid = 3642(0e3a), @024b8924 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513138.0: packet received [40]****** ipid = 4834(12e2), @c7d1b910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [41]****** ipid = 4835(12e3), @c7d1c110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513138.0: packet received [40]****** ipid = 3643(0e3b), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513138.0: packet received [41]****** ipid = 3644(0e3c), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 flow_ip_send: fd26:202.123.79.240->192.168.1.111,6 => ethernet1(1380) flag 0x20000, vlan 0 pak has mac Send to ethernet1 (1394) ****** 3513138.0: packet received [40]****** ipid = 4836(12e4), @c7d06110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513139.0: packet received [41]****** ipid = 4837(12e5), @c7d01910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513139.0: packet received [40]****** ipid = 3645(0e3d), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [41]****** ipid = 3646(0e3e), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [41]****** ipid = 4838(12e6), @c7d06110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513139.0: packet received [40]****** ipid = 3647(0e3f), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [41]****** ipid = 3648(0e40), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [41]****** ipid = 4839(12e7), @c7d09110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513139.0: packet received [40]****** ipid = 3649(0e41), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [41]****** ipid = 3650(0e42), @024c86f4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [40]****** ipid = 4840(12e8), @c7d0b910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513139.0: packet received [41]****** ipid = 4841(12e9), @c7d0c910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513139.0: packet received [40]****** ipid = 3651(0e43), @024c86f4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [41]****** ipid = 3652(0e44), @024c86f4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513139.0: packet received [40]****** ipid = 4842(12ea), @c7d11110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513140.0: packet received [41]****** ipid = 4843(12eb), @c7d11910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. existing vector list 81-50a7ae0. existing vector list 81-50a7ae0. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 4-35f9620. existing vector list 4-35f9620. existing vector list 4-35f9620. existing vector list 4-35f9620. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 81-50a7ae0. existing vector list 81-50a7ae0. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 4-35f9620. existing vector list 4-35f9620. existing vector list 0-35f95e0. existing vector list 0-35f95e0. existing vector list 4-35f9620. existing vector list 4-35f9620. existing vector list 81-50a7ae0. existing vector list 81-50a7ae0. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 81-50a7ae0. existing vector list 81-50a7ae0. existing vector list 81-50a7ae0. existing vector list 81-50a7ae0. ****** 3513140.0: packet received [40]****** ipid = 3655(0e47), @024c86f4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. existing vector list 203-528df60. ****** 3513140.0: packet received [41]****** ipid = 3656(0e48), @024c86f4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513140.0: packet received [41]****** ipid = 4844(12ec), @c7d13110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513140.0: packet received [40]****** ipid = 3657(0e49), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513140.0: packet received [41]****** ipid = 3658(0e4a), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513140.0: packet received [41]****** ipid = 4845(12ed), @c7d15110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513140.0: packet received [40]****** ipid = 3659(0e4b), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513140.0: packet received [41]****** ipid = 3660(0e4c), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ****** 3513140.0: packet received [40]****** ipid = 4846(12ee), @c7d18110 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513140.0: packet received [42]****** ipid = 4847(12ef), @c7d18910 packet passed sanity check. ethernet1:192.168.1.101/2285->192.168.1.6/23,6 existing session found. sess token 4 flow got session. flow session id 31552 packet is for self, copy packet to self copy packet to us. ****** 3513140.0: packet received [40]****** ipid = 3661(0e4d), @024c0ce4 flow_self_vector2: send pack with current vid =0, enc_size:0 processing packet through normal path. packet passed sanity check. self:192.168.1.6/23->192.168.1.101/2285,6 existing session found. sess token 8 flow got session. flow session id 31552 skip ttl adjust for packet from self. post addr xlation: 192.168.1.6->192.168.1.101. flow_send_vector_, vid = 0, is_layer2_if=0 packet send out to 0010c6a7a603 through ethernet1 ns25->