****** 05204.0: packet received [60]****** ipid = 2706(0a92), @05bcb864 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->4.2.2.1/53,17 no session found flow_first_sanity_check: in , out chose interface ethernet0/0 as incoming nat if. flow_first_routing: in , out search route to (ethernet0/0, 192.168.1.201->4.2.2.1) in vr trust-vr for vsd-0/flag-0/ifp-null [ Dest] 5.route 4.2.2.1->65.60.81.129, to ethernet0/2 routed (x_dst_ip 4.2.2.1) from ethernet0/0 (ethernet0/0 in 0) to ethernet0/2 policy search from zone 2-> zone 1 policy_flow_search policy search nat_crt from zone 2-> zone 1 RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 4.2.2.1, port 53, proto 17) No SW RPC rule match, search HW rule swrs_search_ip: policy matched id/idx/action = 1/0/0x9 Permitted by policy 1 found reversed mip/vip 65.60.81.155 for 192.168.1.201 (on ethernet0/2) hip xlate: 192.168.1.201->65.60.81.155 at ethernet0/2 (vs. ethernet0/2) choose interface ethernet0/2 as outgoing phy if no loop on ifp ethernet0/2. session application type 16, name DNS, nas_id 0, timeout 60sec ALG vector is attached service lookup identified service 16. flow_first_final_check: in , out existing vector list 81-7356c44. Session (id:64040) created for first pak 81 flow_first_install_session======> route to 65.60.81.129 arp entry found for 65.60.81.129 ifp2 ethernet0/2, out_ifp ethernet0/2, flag 00800800, tunnel ffffffff, rc 1 outgoing wing prepared, ready handle cleartext reverse route search route to (ethernet0/2, 4.2.2.1->192.168.1.201) in vr trust-vr for vsd-0/flag-3000/ifp-ethernet0/0 [ Dest] 1.route 192.168.1.201->192.168.1.201, to ethernet0/0 route to 192.168.1.201 arp entry found for 192.168.1.201 ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1 flow got session. flow session id 64040 flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/2 flow vector index 0x81, vector addr 0x7356c44, orig vector 0x7356c44 post addr xlation: 65.60.81.155->4.2.2.1. packet send out to 00a0c825968b through ethernet0/2 ****** 05206.0: packet received [60]****** ipid = 2708(0a94), @05bf5864 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->64.60.0.17/53,17 no session found flow_first_sanity_check: in , out chose interface ethernet0/0 as incoming nat if. flow_first_routing: in , out search route to (ethernet0/0, 192.168.1.201->64.60.0.17) in vr trust-vr for vsd-0/flag-0/ifp-null [ Dest] 5.route 64.60.0.17->65.60.81.129, to ethernet0/2 routed (x_dst_ip 64.60.0.17) from ethernet0/0 (ethernet0/0 in 0) to ethernet0/2 policy search from zone 2-> zone 1 policy_flow_search policy search nat_crt from zone 2-> zone 1 RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 64.60.0.17, port 53, proto 17) No SW RPC rule match, search HW rule swrs_search_ip: policy matched id/idx/action = 1/0/0x9 Permitted by policy 1 found reversed mip/vip 65.60.81.155 for 192.168.1.201 (on ethernet0/2) hip xlate: 192.168.1.201->65.60.81.155 at ethernet0/2 (vs. ethernet0/2) choose interface ethernet0/2 as outgoing phy if no loop on ifp ethernet0/2. session application type 16, name DNS, nas_id 0, timeout 60sec ALG vector is attached service lookup identified service 16. flow_first_final_check: in , out existing vector list 81-7356c44. Session (id:64037) created for first pak 81 flow_first_install_session======> route to 65.60.81.129 arp entry found for 65.60.81.129 ifp2 ethernet0/2, out_ifp ethernet0/2, flag 00800800, tunnel ffffffff, rc 1 outgoing wing prepared, ready handle cleartext reverse route search route to (ethernet0/2, 64.60.0.17->192.168.1.201) in vr trust-vr for vsd-0/flag-3000/ifp-ethernet0/0 [ Dest] 1.route 192.168.1.201->192.168.1.201, to ethernet0/0 route to 192.168.1.201 arp entry found for 192.168.1.201 ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800801, tunnel ffffffff, rc 1 flow got session. flow session id 64037 flow_main_body_vector in ifp ethernet0/0 out ifp ethernet0/2 flow vector index 0x81, vector addr 0x7356c44, orig vector 0x7356c44 post addr xlation: 65.60.81.155->64.60.0.17. packet send out to 00a0c825968b through ethernet0/2 ****** 05208.0: packet received [60]****** ipid = 2709(0a95), @05bf6064 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->192.168.1.1/53,17 no session found flow_first_sanity_check: in , out self check, not for us chose interface ethernet0/0 as incoming nat if. packet dropped: for self but not interested ****** 05208.0: packet received [60]****** ipid = 2710(0a96), @05bf6864 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->64.60.0.17/53,17 existing session found. sess token 3 flow got session. flow session id 64037 flow_main_body_vector in ifp ethernet0/0 out ifp N/A flow vector index 0x81, vector addr 0x7356c44, orig vector 0x7356c44 post addr xlation: 65.60.81.155->64.60.0.17. packet send out to 00a0c825968b through ethernet0/2 ****** 05208.0: packet received [60]****** ipid = 2711(0a97), @05bf7064 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->4.2.2.1/53,17 existing session found. sess token 3 flow got session. flow session id 64040 flow_main_body_vector in ifp ethernet0/0 out ifp N/A flow vector index 0x81, vector addr 0x7356c44, orig vector 0x7356c44 post addr xlation: 65.60.81.155->4.2.2.1. packet send out to 00a0c825968b through ethernet0/2 ****** 05212.0: packet received [60]****** ipid = 2712(0a98), @05bf8064 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->192.168.1.1/53,17 no session found flow_first_sanity_check: in , out self check, not for us chose interface ethernet0/0 as incoming nat if. packet dropped: for self but not interested ****** 05212.0: packet received [60]****** ipid = 2713(0a99), @05bf8864 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->64.60.0.17/53,17 existing session found. sess token 3 flow got session. flow session id 64037 flow_main_body_vector in ifp ethernet0/0 out ifp N/A flow vector index 0x81, vector addr 0x7356c44, orig vector 0x7356c44 post addr xlation: 65.60.81.155->64.60.0.17. packet send out to 00a0c825968b through ethernet0/2 ****** 05212.0: packet received [60]****** ipid = 2714(0a9a), @05bf9064 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:192.168.1.201/59112->4.2.2.1/53,17 existing session found. sess token 3 flow got session. flow session id 64040 flow_main_body_vector in ifp ethernet0/0 out ifp N/A flow vector index 0x81, vector addr 0x7356c44, orig vector 0x7356c44 post addr xlation: 65.60.81.155->4.2.2.1. packet send out to 00a0c825968b through ethernet0/2