Received packet from aruba100 (timestamp 0000708257) [asap_firewall_forward(4718):firewall entry] len 88, vlan 0, egress CP, ingress aruba100: #mac: etype 0800 smac 20:10:7a:fe:bf:9e dmac 00:1c:7f:3e:4c:da #ip: sip 10.161.1.101, dip 8.8.8.8, proto 17, dscp 0, fragment ok, last fragment, fragment offset 0 #udp: sport 54076 dport 53 len 54 #dns: message-type: standard query, txn id: 27783 domain name: alt1-safebrowsing.google.com, type: A(1), class: IPV4(1) [asap_firewall_forward(4887):vlan decision] len 88, vlan 110, egress CP, ingress aruba100: [asap_firewall_forward(5206):looking up bridge entry] len 88, vlan 110, egress CP, ingress aruba100: [asap_firewall_forward(5516):bridge section] len 88, vlan 110, egress CP, ingress aruba100: [asap_firewall_forward(5646):session section] len 88, vlan 110, egress bond0, ingress aruba100: [asap_firewall_forward(5860):slowpath section: opcode=4] len 88, vlan 110, egress bond0, ingress aruba100: [asap_firewall_forward(5646):session section] len 88, vlan 110, egress bond0, ingress aruba100: [asap_firewall_forward(5860):slowpath section: opcode=7] len 88, vlan 110, egress bond0, ingress aruba100: [asap_firewall_forward(7073):cp section] len 75, vlan 110, egress bond0, ingress aruba100: #mac: etype 0aa1 smac 00:00:40:11:50:ab dmac 45:00:00:4b:0d:e2 [asap_firewall_send_up_stack(3044):going to stack protocol:0x8580 type:3] len 75, vlan 110, egress bond0, ingress br0: Received packet from br0 (timestamp 0000708257) [asap_firewall_forward(4718):firewall entry] len 88, vlan 0, egress CP, ingress br0: #mac: etype 0800 smac 04:bd:88:c4:df:56 dmac 04:bd:88:c4:df:56 #ip: sip 8.8.8.8, dip 10.161.1.101, proto 17, dscp 0, fragment ok, last fragment, fragment offset 0 #udp: sport 53 dport 54076 len 54 #dns: message-type: standard response, txn id: 27783 response code: refused(5) domain name: alt1-safebrowsing.google.com, type: A(1), class: IPV4(1) [asap_firewall_forward(4887):vlan decision] len 88, vlan 1, egress CP, ingress br0: [asap_firewall_forward(5516):bridge section] len 88, vlan 1, egress CP, ingress br0: [asap_firewall_forward(5646):session section] len 88, vlan 1, egress CP, ingress br0: [asap_firewall_forward(5860):slowpath section: opcode=7] len 88, vlan 1, egress CP, ingress br0: [asap_firewall_forward(6339):route section] len 88, vlan 1, egress CP, ingress br0: [asap_firewall_forward(6396):cp route section] len 88, vlan 1, egress CP, ingress br0: [asap_firewall_forward(6638):forward section] len 88, vlan 110, egress aruba100, ingress br0: #mac: etype 0800 smac 04:bd:88:c4:df:56 dmac 20:10:7a:fe:bf:9e #ip: sip 8.8.8.8, dip 10.161.1.101, proto 17, dscp 0, fragment ok, last fragment, fragment offset 0 #udp: sport 53 dport 54076 len 54 #dns: message-type: standard response, txn id: 27783 response code: refused(5) domain name: alt1-safebrowsing.google.com, type: A(1), class: IPV4(1) [asap_firewall_forward(6925):forwarding packet to aruba100] len 88, vlan 110, egress aruba100, ingress aruba100: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 04:bd:88:c4:df:56# show datapath session | in 161 8.8.8.8 10.161.1.101 17 53 60830 0 0 0 1 dev12 62 FI 4.2.2.2 10.161.1.101 17 53 56688 0 0 0 1 dev12 55 FI 10.161.1.101 224.0.0.252 17 58762 5355 0 0 0 1 dev12 49 FC 4.2.2.2 10.161.1.101 17 53 54771 0 0 0 1 dev12 31 FI 8.8.8.8 10.161.1.101 17 53 50876 0 0 0 1 dev12 49 FI 10.161.1.101 8.8.8.8 17 64132 53 0 0 0 1 dev12 44 FCI 10.161.1.101 4.2.2.2 17 64132 53 0 0 0 1 dev12 44 FCI 78.108.114.39 10.161.1.101 17 1853 51876 0 0 0 0 dev12 7 FY 10.161.1.101 224.0.0.252 17 53640 5355 0 0 0 1 dev12 44 FC 10.161.1.101 8.8.8.8 17 56774 53 0 0 0 1 dev12 44 FCI 10.161.1.101 4.2.2.2 17 56774 53 0 0 0 1 dev12 44 FCI 10.161.1.101 10.150.5.182 6 55171 80 0 0 0 1 dev12 84 YC 10.161.1.101 8.8.8.8 17 56712 53 0 0 0 1 dev12 62 FCI 10.161.1.101 4.2.2.2 17 56712 53 0 0 0 1 dev12 62 FCI 4.2.2.2 10.161.1.101 17 53 52500 0 0 0 1 dev12 31 FI 10.161.1.101 10.144.182.245 17 58803 161 0 0 0 1 dev12 66 FC 8.8.8.8 10.161.1.101 17 53 64184 0 0 0 1 dev12 38 FI 8.8.8.8 10.161.1.101 17 53 57528 0 0 0 1 dev12 31 FI 10.161.1.101 224.0.0.252 17 49987 5355 0 0 0 1 dev12 31 FC 10.161.1.101 10.150.5.183 6 55170 80 0 0 0 1 dev12 84 YC 10.161.1.101 216.115.208.230 6 55073 8200 0 0 0 1 dev12 e83 C 4.2.2.2 10.161.1.101 17 53 64184 0 0 0 1 dev12 38 FI 4.2.2.2 10.161.1.101 17 53 57528 0 0 0 1 dev12 31 FI +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ip dhcp Mobile_Lab server-type Local,L2 server-vlan 110 subnet 10.161.0.0 subnet-mask 255.255.254.0 exclude-address 10.161.0.20 default-router 10.161.0.3 dns-server 4.2.2.2,8.8.8.8 wlan ssid-profile Mobile_Lab enable index 0 type employee essid Mobile_Lab_Wi-Fi wpa-passphrase ef0e4d0d3901bd48f94238b03c9f01e070e989b156f5f46a opmode wpa2-psk-aes max-authentication-failures 0 vlan 110 auth-server InternalServer rf-band all captive-portal disable dtim-period 1 inactivity-timeout 1000 broadcast-filter arp dmo-channel-utilization-threshold 90 local-probe-req-thresh 0 max-clients-threshold 64 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++