login as: admin admin@192.168.0.105's password: show tech-support and show tech-support supplemental are the two most useful outputs to collect for any kind of troubleshooting session. 00:0b:86:f7:c9:ce# debug pkt ? dev dump ip Internet protocol ipv6 mac match mirror port Physical port proto reset type Network Type - employee or guest or voice vlan VLAN information 00:0b:86:f7:c9:ce# debug pkt match ? any dev ip Internet protocol ipv6 mac port Physical port proto vlan VLAN information 00:0b:86:f7:c9:ce# debug pkt match mac 1c:ab:a7:4c:52:17 ? 00:0b:86:f7:c9:ce# debug pkt match mac 1c:ab:a7:4c:52:17 00:0b:86:f7:c9:ce# debug pkt type ? arp/pppoe/apmsg/icmp/icmpv6/igmp/tcp/udp/gre/dhcp/dhcpv6/dns/radius/http/https/echo/nd/rd/mld/mobility/beacon/all 00:0b:86:f7:c9:ce# debug pkt type dhcp ? 00:0b:86:f7:c9:ce# debug pkt type dhcp 00:0b:86:f7:c9:ce# debug pkt dump ? count 00:0b:86:f7:c9:ce# debug pkt type ? arp/pppoe/apmsg/icmp/icmpv6/igmp/tcp/udp/gre/dhcp/dhcpv6/dns/radius/http/https/echo/nd/rd/mld/mobility/beacon/all 00:0b:86:f7:c9:ce# debug pkt type all ? 00:0b:86:f7:c9:ce# debug pkt type all 00:0b:86:f7:c9:ce# debug pkt dump ? count 00:0b:86:f7:c9:ce# debug pkt dump If source or destination MAC is 1c:ab:a7:4c:52:17 AND packet is of type ARP OR PPPoE OR AP Messages OR ICMP OR ICMPV6 OR IGMP OR TCP OR UDP OR GRE OR DHCP OR DHCPV6 OR DNS OR RADIUS OR HTTP OR HTTPS OR ECHO OR ND OR RD OR MLD OR Beacon OR Mobility Press 'q' to quit. Received packet from aruba000 (timestamp (116-9-7 07:05:20:268216)) [asap_firewall_forward(5370):firewall entry] len 20, vlan 0, egress CP, ingress aruba000: #mac: etype 0006 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #snap: sap ffff [asap_firewall_forward(5546):vlan decision] len 20, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 20, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 20, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 4] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6500):session section] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 4] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x4, type=1] len 20, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x4 type:1] len 6, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:20:414709)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 4] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 4] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 4] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:20:415917)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7276, cksum 9e39, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f494, seconds elapsed: 0 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: requested-ip: 10.10.11.117 #dhcp-option: message-type: request [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:20:425862)) [asap_firewall_forward(5370):firewall entry] len 62, vlan 0, egress CP, ingress aruba000: #mac: etype 86dd smac 1c:ab:a7:4c:52:17 dmac 33:33:00:00:00:02 #ipv6: sip fe80::184e:376a:2924:ae3d dip ff02::2 hoplimit 255 payload len 8 next hdr 58 #icmpv6: type router-solicitation(133) code 0 [asap_firewall_forward(5546):vlan decision] len 62, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 62, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 62, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 62, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 62, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 62, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 4] len 62, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6500):session section] len 62, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 4] len 62, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 4] len 62, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:20:438456)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:20:457435)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:21:420652)) [asap_firewall_forward(5370):firewall entry] len 130, vlan 0, egress CP, ingress aruba000: #mac: etype 86dd smac 1c:ab:a7:4c:52:17 dmac 33:33:00:00:00:16 #ipv6: sip fe80::184e:376a:2924:ae3d dip ff02::16 hoplimit 1 payload len 76 next hdr 0 #extension header: type hop-by-hop len 8 next hdr 58 #icmpv6: type mldv2-report(143) code 0 #mld: ngrp 3 #v2-report: record type 4 nsrc 0 group ff02::fb record type 4 nsrc 0 group ff02::2:ff87:399 record type 4 nsrc 0 group ff02::1:ff24:ae3d [asap_firewall_forward(5546):vlan decision] len 130, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 130, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 130, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 130, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 130, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 130, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:21:562886)) [asap_firewall_forward(5370):firewall entry] len 78, vlan 0, egress CP, ingress aruba000: #mac: etype 86dd smac 1c:ab:a7:4c:52:17 dmac 33:33:ff:24:ae:3d #ipv6: sip :: dip ff02::1:ff24:ae3d hoplimit 255 payload len 24 next hdr 58 #icmpv6: type nbr-solicitation(135) code 0 #nbr-sol: tip fe80::184e:376a:2924:ae3d [asap_firewall_forward(5546):vlan decision] len 78, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 78, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 78, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 78, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 78, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 78, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:21:964190)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:21:964902)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7277, cksum 9e38, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f494, seconds elapsed: 2 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: requested-ip: 10.10.11.117 #dhcp-option: message-type: request [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:21:979164)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:21:998125)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:23:423106)) [asap_firewall_forward(5370):firewall entry] len 130, vlan 0, egress CP, ingress aruba000: #mac: etype 86dd smac 1c:ab:a7:4c:52:17 dmac 33:33:00:00:00:16 #ipv6: sip fe80::184e:376a:2924:ae3d dip ff02::16 hoplimit 1 payload len 76 next hdr 0 #extension header: type hop-by-hop len 8 next hdr 58 #icmpv6: type mldv2-report(143) code 0 #mld: ngrp 3 #v2-report: record type 4 nsrc 0 group ff02::fb record type 4 nsrc 0 group ff02::2:ff87:399 record type 4 nsrc 0 group ff02::1:ff24:ae3d [asap_firewall_forward(5546):vlan decision] len 130, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 130, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 130, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 130, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 130, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 130, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:24:112368)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:24:113090)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7278, cksum 9e37, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f494, seconds elapsed: 4 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: requested-ip: 10.10.11.117 #dhcp-option: message-type: request [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:24:130331)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:24:149292)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:25:250028)) [asap_firewall_forward(5370):firewall entry] len 70, vlan 0, egress CP, ingress aruba000: #mac: etype 86dd smac 1c:ab:a7:4c:52:17 dmac 33:33:00:00:00:02 #ipv6: sip fe80::184e:376a:2924:ae3d dip ff02::2 hoplimit 255 payload len 16 next hdr 58 #icmpv6: type router-solicitation(133) code 0 [asap_firewall_forward(5546):vlan decision] len 70, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 70, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 70, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 70, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 70, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 70, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:29:58114)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac 00:0b:86:f7:c9:ce #arp: opcode request(1), sip 10.10.11.117, tip 10.10.11.1, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:29:59939)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7279, cksum 9e36, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f495, seconds elapsed: 9 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: message-type: discover [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:29:979759)) [asap_firewall_forward(5370):firewall entry] len 70, vlan 0, egress CP, ingress aruba000: #mac: etype 86dd smac 1c:ab:a7:4c:52:17 dmac 33:33:00:00:00:02 #ipv6: sip fe80::184e:376a:2924:ae3d dip ff02::2 hoplimit 255 payload len 16 next hdr 58 #icmpv6: type router-solicitation(133) code 0 [asap_firewall_forward(5546):vlan decision] len 70, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 70, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 70, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 70, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned -1 opcode 0] len 70, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 70, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:30:662412)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7280, cksum 9e35, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f495, seconds elapsed: 10 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: message-type: discover [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:33:436815)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7281, cksum 9e34, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f495, seconds elapsed: 13 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: message-type: discover [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:38:596229)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7282, cksum 9e33, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f495, seconds elapsed: 18 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: message-type: discover [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:46:869061)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7283, cksum 9e32, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f495, seconds elapsed: 27 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: message-type: discover [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:46:870300)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #arp: opcode request(1), sip 0.0.0.0, tip 169.254.156.180, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x806, type=1] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x806 type:1] len 28, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:47:194131)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #arp: opcode request(1), sip 0.0.0.0, tip 169.254.156.180, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x806, type=1] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x806 type:1] len 28, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:47:519966)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #arp: opcode request(1), sip 0.0.0.0, tip 169.254.156.180, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x806, type=1] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x806 type:1] len 28, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:47:843261)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #arp: opcode request(1), sip 169.254.156.180, tip 169.254.156.180, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x806, type=1] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x806 type:1] len 28, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:48:169742)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #arp: opcode request(1), sip 169.254.156.180, tip 169.254.156.180, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x806, type=1] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x806 type:1] len 28, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:48:498354)) [asap_firewall_forward(5370):firewall entry] len 42, vlan 0, egress CP, ingress aruba000: #mac: etype 0806 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #arp: opcode request(1), sip 169.254.156.180, tip 169.254.156.180, smac 1c:ab:a7:4c:52:17, tmac 00:00:00:00:00:00 [asap_firewall_forward(5546):vlan decision] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 42, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 0 opcode 0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to aruba000] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to aruba100] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x806, type=1] len 42, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_send_up_stack(3621):going to stack protocol:0x806 type:1] len 28, vlan 400, egress vlan 400, ingress br0: Received packet from aruba000 (timestamp (116-9-7 07:05:49:559469)) [asap_firewall_forward(5370):firewall entry] len 46, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac 01:00:5e:00:00:02 #ip: sip 169.254.156.180, dip 224.0.0.2, proto 2 hdr len 24 len 32, id 40990, cksum 6003, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #igmp: type host-leave(23) group 224.0.0.251 [asap_firewall_forward(5546):vlan decision] len 46, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 46, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 46, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 64] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7211):adduser section] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 0] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 46, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:49:561928)) [asap_firewall_forward(5370):firewall entry] len 46, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac 01:00:5e:00:00:fb #ip: sip 169.254.156.180, dip 224.0.0.251, proto 2 hdr len 24 len 32, id 34871, cksum 76f1, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #igmp: type v2-report(22) group 224.0.0.251 [asap_firewall_forward(5546):vlan decision] len 46, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 46, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 46, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 0] len 46, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(8128):dropping packet - opcode 0] len 46, vlan 400, egress vlan 400, ingress aruba000: Received packet from aruba000 (timestamp (116-9-7 07:05:55:783825)) [asap_firewall_forward(5370):firewall entry] len 342, vlan 0, egress CP, ingress aruba000: #mac: etype 0800 smac 1c:ab:a7:4c:52:17 dmac ff:ff:ff:ff:ff:ff #ip: sip 0.0.0.0, dip 255.255.255.255, proto 17 hdr len 20 len 328, id 7284, cksum 9e31, ttl 255, dscp 0 fragment ok, last fragment, frag off 0 #udp: sport 68 dport 67 len 308 #dhcp: message-type: request hardware type: 1, len: 6, hops: 0 txn id: 0xd3a0f495, seconds elapsed: 36 client mac: 1c:ab:a7:4c:52:17 magic cookie: 0x63825363 #dhcp-option: message-type: discover [asap_firewall_forward(5546):vlan decision] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_check_dhcp_packet(2464):dhcp packet from client] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6048):looking up bridge entry] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6371):bridge section] len 342, vlan 400, egress CP, ingress aruba000: [asap_firewall_forward(6500):session section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6747):fastpath session returned 1 opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(6761):slowpath section: opcode 4] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7002):back to fastpath, opcode 3] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7317):route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7367):cp route section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_forward(7676):forward section] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9102):flooding] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev7 bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to bond0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev12 gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9857):flooding to gre0] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev20 aruba000] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9306):checking dev21 aruba100] len 342, vlan 400, egress vlan 400, ingress aruba000: [asap_firewall_flood(9875):stack section protocol=0x800, type=1] len 342, vlan 400, egress vlan 400, ingress aruba000: 00:0b:86:f7:c9:ce#