cluster1:SSG140(M)-> get db st ****** packet decapsulated, type=ipsec, len=60****** ipid = 12856(3238), @1d6ac914 tunnel.2:164.82.7.51/416->208.86.147.170/1,1(8/0) no session found flow_first_sanity_check: in , out chose interface tunnel.2 as incoming nat if. flow_first_routing: in , out search route to (tunnel.2, 164.82.7.51->10.100.0.58) in vr trust-vr for vsd-0/ flag-0/ifp-null [ Dest] 1.route 10.100.0.58->10.100.0.58, to ethernet0/0 routed (x_dst_ip 10.100.0.58) from tunnel.2 (tunnel.2 in 0) to ethernet0/0 policy search from zone 1-> zone 2 policy_flow_search policy search nat_crt from zone 1-> zone 10 RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 208. 86.147.170, port 19387, proto 1) No SW RPC rule match, search HW rule swrs_search_ip: policy matched id/idx/action = 412/1/0x9 Permitted by policy 412 No src xlate choose interface ethernet0/0 as outgoing phy if check nsrp pak fwd: in_tun=0x4000005d, VSD 0 for out ifp ethernet0/0 no loop on ifp ethernet0/0. session application type 0, name None, nas_id 0, timeout 60sec service lookup identified service 0. flow_first_final_check: in , out existing vector list 25-307c95c. Session (id:47465) created for first pak 25 flow_first_install_session======> route to 10.100.0.58 arp entry found for 10.100.0.58 ifp2 ethernet0/0, out_ifp ethernet0/0, flag 00800800, tunnel ffffffff, rc 1 outgoing wing prepared, ready handle tunnel reverse route search route to (ethernet0/0, 10.100.0.58->164.82.7.51) in vr trust-vr for vsd -0/flag-3000/ifp-tunnel.2 [ Dest] 7913.route 164.82.7.51->164.82.7.51, to tunnel.2 route to 164.82.7.51 going into tunnel. ifp2 tunnel.2, out_ifp tunnel.2, flag 00002801, tunnel 4000005d, rc 1 flow got session. flow session id 47465 flow_main_body_vector in ifp tunnel.2 out ifp ethernet0/0 flow vector index 0x25, vector addr 0x307c95c, orig vector 0x307c95c vsd 0 is active post addr xlation: 164.82.7.51->10.100.0.58. skipping pre-frag no more encapping needed packet send out to 00155d007a0a through ethernet0/0 **** pak processing end. ****** 131100251.0: packet received [60]****** ipid = 7485(1d3d), @1d695114 packet passed sanity check. flow_decap_vector IPv4 process ethernet0/0:10.100.0.58/1->164.82.7.51/416,1(0/0) existing session found. sess token 3 flow got session. flow session id 47465 flow_main_body_vector in ifp ethernet0/0 out ifp N/A flow vector index 0x25, vector addr 0x307c95c, orig vector 0x307c95c vsd 0 is active post addr xlation: 208.86.147.170->164.82.7.51. skipping pre-frag going into tunnel 4000005d. flow_encrypt: pipeline. chip info: DMA. Tunnel id 0000005d (vn2) doing ESP encryption and size =64 ipsec encrypt prepare engine done ipsec encrypt set engine done ipsec encrypt engine released ipsec encrypt done put packet(5786f40) into flush queue. remove packet(5786f40) out from flush queue. **** jump to packet:208.86.147.164->164.82.6.11 packet encapsulated, type=ipsec, len=124 ipid = 59902(e9fe), @1d6950e8 out encryption tunnel 4000005d gw:208.86.147.161 no more encapping needed send out through normal path. flow_ip_send: e9fe:208.86.147.164->164.82.6.11,50 => ethernet0/2(124) flag 0x0 , vlan 0 mac 000ed6310c00 in session packet send out to 000ed6310c00 through ethernet0/2 **** pak processing end. cluster1:SSG140(M)->